[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Mon, 4 Jan 2021 05:03:05 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 21/01/04 05:03:04
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po nl.po pl.po pot
proprietary-obsolescence.es.po
proprietary-obsolescence.fr.po
proprietary-obsolescence.pot
proprietary-obsolescence.ru.po
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.tr.po
proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.253&r2=1.254
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.363&r2=1.364
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.450&r2=1.451
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.253&r2=1.254
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.261&r2=1.262
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.254&r2=1.255
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.253&r2=1.254
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.252&r2=1.253
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.es.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.fr.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.pot?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.ru.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.364&r2=1.365
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.580&r2=1.581
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.376&r2=1.377
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.235&r2=1.236
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.358&r2=1.359
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.297&r2=1.298
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.663&r2=1.664
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.207&r2=1.208
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.245&r2=1.246
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.370&r2=1.371
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.415&r2=1.416
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.254&r2=1.255
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.224&r2=1.225
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.238&r2=1.239
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.220&r2=1.221
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.228&r2=1.229
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.237&r2=1.238
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.221&r2=1.222
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.218&r2=1.219
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.363&r2=1.364
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.441&r2=1.442
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.200&r2=1.201
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.208&r2=1.209
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.322&r2=1.323
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.544&r2=1.545
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.253&r2=1.254
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.253
retrieving revision 1.254
diff -u -b -r1.253 -r1.254
--- de.po 30 Dec 2020 10:33:44 -0000 1.253
+++ de.po 4 Jan 2021 10:03:01 -0000 1.254
@@ -12178,6 +12178,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The British supermarket Tesco sold tablets which were tethered to Tesco's "
"server for reinstalling default settings. Tesco <a href=\"https://www."
"theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -12185,6 +12194,14 @@
"default settings, it bricks them instead."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © [-2014-2018-] {+2019, 2020, 2021+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2014-2018 Free Software Foundation, Inc."
+msgid "Copyright © 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr "Copyright © 201<ins>3</ins>-2018 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
msgstr "Proprietäre Software - GNU-Projekt - Free Software Foundation"
@@ -12631,6 +12648,14 @@
msgid "Latest additions"
msgstr "Letzte Ergänzungen"
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -12660,13 +12685,13 @@
#. type: Content of: <div><p>
# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
+# | 2020, 2021+} Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
#| "Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr "Copyright © 2013-2018 Free Software Foundation, Inc."
@@ -13991,6 +14016,13 @@
"Insbesondere können so E-Mails von Parlamentarier gesammelt werden, da diese
"
"sie über Microsoft durchschleusen."
+#. type: Content of: <div><p>
+# | Copyright © [-2015-] {+2015-2021+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2015 Free Software Foundation, Inc."
+msgid "Copyright © 2015-2021 Free Software Foundation, Inc."
+msgstr "Copyright © 2015 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
msgstr "Proprietäre Haltestricke - GNU-Projekt - Free Software Foundation"
@@ -14394,6 +14426,15 @@
#, fuzzy
#~| msgid ""
+#~| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~| "Foundation, Inc."
+#~ msgid ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+#~ msgstr "Copyright © 2013-2018 Free Software Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
#~| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
#~| "words-to-avoid.html#Monetize\">“monetize”</a>."
#~ msgid ""
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.363
retrieving revision 1.364
diff -u -b -r1.363 -r1.364
--- es.po 30 Dec 2020 10:33:44 -0000 1.363
+++ es.po 4 Jan 2021 10:03:01 -0000 1.364
@@ -12485,6 +12485,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The British supermarket Tesco sold tablets which were tethered to Tesco's "
"server for reinstalling default settings. Tesco <a href=\"https://www."
"theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -12498,6 +12507,14 @@
"modelos</a>, de modo que si alguien trata ahora de restaurar las "
"Preferencias por defecto, la tableta se vuelve inutilizable."
+#. type: Content of: <div><p>
+# | Copyright © 2019, [-2020-] {+2020, 2021+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright © 2019, 2020 Free Software Foundation, Inc."
+msgid "Copyright © 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr "Copyright © 2019, 2020 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
msgstr "Software privativo - Proyecto GNU - Free Software Foundation"
@@ -12824,6 +12841,14 @@
msgid "Latest additions"
msgstr "Añadidos recientes"
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
#
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
@@ -12852,18 +12877,18 @@
"de este sitio web."
#. type: Content of: <div><p>
-# | Copyright © 2013, 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019,
-# | 2020+} Free Software Foundation, Inc.
+# | Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, [-2020-]
+# | {+2020, 2021+} Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
-#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-#| "Foundation, Inc."
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
#. type: Content of: <title>
# | Proprietary [-Software-] {+Sabotage+} - GNU Project - Free Software
@@ -14223,6 +14248,13 @@
"EspecÃficamente, eso le permite recoger los correos de los miembros del "
"Parlamento, porque pasan a través de Microsoft."
+#. type: Content of: <div><p>
+# | Copyright © 2015-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2015-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2015-2021 Free Software Foundation, Inc."
+msgstr "Copyright © 2015-2020 Free Software Foundation, Inc."
+
#. type: Content of: <title>
# | Proprietary [-Tyrants-] {+Tethers+} - GNU Project - Free Software
# | Foundation
@@ -14501,6 +14533,17 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+#, fuzzy
+#~| msgid ""
+#~| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~| "Foundation, Inc."
+#~ msgid ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+
#~ msgid ""
#~ "If you already own a Vizio smart TV (or any smart TV, for that matter), "
#~ "the easiest way to make sure it isn't spying on you is to disconnect it "
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.450
retrieving revision 1.451
diff -u -b -r1.450 -r1.451
--- fr.po 30 Dec 2020 23:17:20 -0000 1.450
+++ fr.po 4 Jan 2021 10:03:01 -0000 1.451
@@ -10754,6 +10754,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The British supermarket Tesco sold tablets which were tethered to Tesco's "
"server for reinstalling default settings. Tesco <a href=\"https://www."
"theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -10767,6 +10776,14 @@
"anciens</a>, de sorte que si on essaie de réinstaller les réglages par "
"défaut, la tablette devient inutilisable."
+#. type: Content of: <div><p>
+# | Copyright © 2019, [-2020-] {+2020, 2021+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright © 2019, 2020 Free Software Foundation, Inc."
+msgid "Copyright © 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr "Copyright © 2019, 2020 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
msgstr "Logiciel privateur - Projet GNU - Free Software Foundation "
@@ -11063,6 +11080,14 @@
msgid "Latest additions"
msgstr "Ajouts récents"
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -11090,8 +11115,14 @@
"README.translations.html\">guide de traduction</a>."
#. type: Content of: <div><p>
+# | Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, [-2020-]
+# | {+2020, 2021+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr "Copyright © 2013-2020 Free Software Foundation, Inc."
@@ -12275,6 +12306,13 @@
"En particulier, il peut récupérer les courriels des membres du Parlement
par "
"ce moyen, car ils l'envoient par l'intermédiaire de Microsoft."
+#. type: Content of: <div><p>
+# | Copyright © 2015-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2015-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2015-2021 Free Software Foundation, Inc."
+msgstr "Copyright © 2015-2020 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
msgstr "Ancrage privateur - Projet GNU - Free Software Foundation"
@@ -12517,3 +12555,8 @@
#. type: Content of: <div><div><dl><dd><ul><li>
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+
+#~ msgid ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+#~ msgstr "Copyright © 2013-2020 Free Software Foundation, Inc."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.253
retrieving revision 1.254
diff -u -b -r1.253 -r1.254
--- it.po 30 Dec 2020 10:33:45 -0000 1.253
+++ it.po 4 Jan 2021 10:03:02 -0000 1.254
@@ -11299,6 +11299,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The British supermarket Tesco sold tablets which were tethered to Tesco's "
"server for reinstalling default settings. Tesco <a href=\"https://www."
"theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -11306,6 +11315,14 @@
"default settings, it bricks them instead."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © [-2014-2017-] {+2019, 2020, 2021+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2014-2017 Free Software Foundation, Inc."
+msgid "Copyright © 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr "Copyright © 2014-2017 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
msgstr "Software Proprietario - Progetto GNU - Free Software Foundation"
@@ -11756,6 +11773,14 @@
msgid "Latest additions"
msgstr "Ultime aggiunte"
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -11785,13 +11810,13 @@
#. type: Content of: <div><p>
# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
+# | 2020, 2021+} Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
#| "Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
@@ -13083,6 +13108,13 @@
"Nello specifico può raccogliere i messaggi di posta elettronica dei membri "
"del Parlamento, dato che passano attraverso Microsoft."
+#. type: Content of: <div><p>
+# | Copyright © [-2015-] {+2015-2021+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2015 Free Software Foundation, Inc."
+msgid "Copyright © 2015-2021 Free Software Foundation, Inc."
+msgstr "Copyright © 2015 Free Software Foundation, Inc."
+
#. type: Content of: <title>
# | Proprietary [-Tyrants-] {+Tethers+} - GNU Project - Free Software
# | Foundation
@@ -13479,6 +13511,17 @@
#, fuzzy
#~| msgid ""
+#~| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~| "Foundation, Inc."
+#~ msgid ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~ "Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
#~| "As of April, 2017, the files in this directory list around 300 instances "
#~| "of malicious functionalities, but there are surely thousands more we "
#~| "don't know about."
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.261
retrieving revision 1.262
diff -u -b -r1.261 -r1.262
--- ja.po 30 Dec 2020 10:33:45 -0000 1.261
+++ ja.po 4 Jan 2021 10:03:02 -0000 1.262
@@ -8904,6 +8904,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The British supermarket Tesco sold tablets which were tethered to Tesco's "
"server for reinstalling default settings. Tesco <a href=\"https://www."
"theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -8911,6 +8920,12 @@
"default settings, it bricks them instead."
msgstr ""
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright © 2014-2017 Free Software Foundation, Inc."
+msgid "Copyright © 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr "Copyright © 2014-2017 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
msgstr ""
@@ -9221,6 +9236,14 @@
msgid "Latest additions"
msgstr "ææ°ã®è¿½å "
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -9250,7 +9273,7 @@
#| "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
#| "Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
@@ -10369,6 +10392,12 @@
"å
·ä½çã«ã¯ãã¡ã¼ã«ããã¤ã¯ãã½ãããçµç±ããã®ã§ããã®æ¹æ³ã§è°å¡ã®ã¡ã³ãã®"
"ã¡ã¼ã«ãéãããã¾ãã"
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright © 2015 Free Software Foundation, Inc."
+msgid "Copyright © 2015-2021 Free Software Foundation, Inc."
+msgstr "Copyright © 2015 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
msgstr ""
@@ -10659,6 +10688,17 @@
#, fuzzy
#~| msgid ""
+#~| "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#~| "Inc."
+#~ msgid ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#~ "Inc."
+
+#, fuzzy
+#~| msgid ""
#~| "As of January, 2017, the files in this directory list around 260 "
#~| "instances of malicious functionalities, but there are surely thousands "
#~| "more we don't know about."
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.254
retrieving revision 1.255
diff -u -b -r1.254 -r1.255
--- nl.po 30 Dec 2020 10:33:45 -0000 1.254
+++ nl.po 4 Jan 2021 10:03:02 -0000 1.255
@@ -8100,6 +8100,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The British supermarket Tesco sold tablets which were tethered to Tesco's "
"server for reinstalling default settings. Tesco <a href=\"https://www."
"theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -8107,6 +8116,14 @@
"default settings, it bricks them instead."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © [-2015, 2016-] {+2019, 2020, 2021+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2015, 2016 Free Software Foundation, Inc."
+msgid "Copyright © 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr "Copyright © 2015, 2016 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
msgstr "Niet-vrije software - GNU-project - Free Software Foundation"
@@ -8558,6 +8575,14 @@
msgid "Latest additions"
msgstr ""
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -8583,13 +8608,13 @@
#. type: Content of: <div><p>
# | Copyright © 2013, 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
+# | 2020, 2021+} Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
#| "Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
@@ -9573,6 +9598,14 @@
"because they pass it through Microsoft."
msgstr ""
+# type: Content of: <div><p>
+#. type: Content of: <div><p>
+# | Copyright © [-2011-] {+2015-2021+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2011 Free Software Foundation, Inc."
+msgid "Copyright © 2015-2021 Free Software Foundation, Inc."
+msgstr "Copyright © 2011 Free Software Foundation, Inc."
+
#. type: Content of: <title>
# | Proprietary [-Software-] {+Tethers+} - GNU Project - Free Software
# | Foundation
@@ -9942,6 +9975,17 @@
#, fuzzy
#~| msgid ""
+#~| "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#~| "Inc."
+#~ msgid ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#~ "Inc."
+
+#, fuzzy
+#~| msgid ""
#~| "As of April, 2019, the files in this directory list around 400 instances "
#~| "of malicious functionalities, but there are surely thousands more we "
#~| "don't know about."
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.253
retrieving revision 1.254
diff -u -b -r1.253 -r1.254
--- pl.po 30 Dec 2020 10:33:45 -0000 1.253
+++ pl.po 4 Jan 2021 10:03:02 -0000 1.254
@@ -7521,6 +7521,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The British supermarket Tesco sold tablets which were tethered to Tesco's "
"server for reinstalling default settings. Tesco <a href=\"https://www."
"theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -7528,6 +7537,14 @@
"default settings, it bricks them instead."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © [-2013, 2014, 2015-] {+2019, 2020, 2021+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
+msgid "Copyright © 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
msgstr ""
@@ -8061,6 +8078,14 @@
msgid "Latest additions"
msgstr ""
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -8089,11 +8114,11 @@
#. type: Content of: <div><p>
# | Copyright © 2013, 2014, [-2015-] {+2015, 2016, 2017, 2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
+# | 2020, 2021+} Free Software Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
@@ -9059,6 +9084,14 @@
"because they pass it through Microsoft."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © [-2013, 2014, 2015-] {+2015-2021+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
+msgid "Copyright © 2015-2021 Free Software Foundation, Inc."
+msgstr "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
+
#. type: Content of: <title>
# | Proprietary [-Software-] {+Tethers+} - GNU Project - Free Software
# | Foundation
@@ -9471,6 +9504,13 @@
msgstr "<a href=\"/philosophy/malware-microsoft.html\">Malware Microsoftu</a>"
#, fuzzy
+#~| msgid "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
+#~ msgid ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+#~ msgstr "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
+
+#, fuzzy
#~| msgid "<a href=\"/philosophy/malware-apple.html\">Apple Malware</a>"
#~ msgid ""
#~ "<a href=\"/proprietary/proprietary.html\">Proprietary malware</a> → "
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.252
retrieving revision 1.253
diff -u -b -r1.252 -r1.253
--- pot 30 Dec 2020 10:33:46 -0000 1.252
+++ pot 4 Jan 2021 10:03:02 -0000 1.253
@@ -7121,6 +7121,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The British supermarket Tesco sold tablets which were tethered to Tesco's "
"server for reinstalling default settings. Tesco <a href=\"https://www."
"theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -7128,6 +7137,10 @@
"default settings, it bricks them instead."
msgstr ""
+#. type: Content of: <div><p>
+msgid "Copyright © 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr ""
+
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
msgstr ""
@@ -7371,6 +7384,14 @@
msgid "Latest additions"
msgstr ""
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
#
#
#
@@ -7394,7 +7415,7 @@
#. type: Content of: <div><p>
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr ""
@@ -8282,6 +8303,10 @@
"because they pass it through Microsoft."
msgstr ""
+#. type: Content of: <div><p>
+msgid "Copyright © 2015-2021 Free Software Foundation, Inc."
+msgstr ""
+
#. type: Content of: <title>
msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
msgstr ""
Index: proprietary-obsolescence.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.es.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary-obsolescence.es.po 23 Nov 2020 14:35:48 -0000 1.17
+++ proprietary-obsolescence.es.po 4 Jan 2021 10:03:02 -0000 1.18
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-obsolescence.html\n"
-"POT-Creation-Date: 2020-11-23 14:26+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
"PO-Revision-Date: 2019-11-24 12:20+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-04 09:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -126,6 +127,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
"door that is used for updates and <a href=\"https://www.theregister.co."
"uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "
@@ -311,7 +321,11 @@
"coordinación y el envÃo de traducciones de las páginas de este sitio web."
#. type: Content of: <div><p>
-msgid "Copyright © 2019, 2020 Free Software Foundation, Inc."
+# | Copyright © 2019, [-2020-] {+2020, 2021+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright © 2019, 2020 Free Software Foundation, Inc."
+msgid "Copyright © 2019, 2020, 2021 Free Software Foundation, Inc."
msgstr "Copyright © 2019, 2020 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary-obsolescence.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.fr.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary-obsolescence.fr.po 23 Nov 2020 14:35:48 -0000 1.21
+++ proprietary-obsolescence.fr.po 4 Jan 2021 10:03:02 -0000 1.22
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-obsolescence.html\n"
-"POT-Creation-Date: 2020-11-23 14:26+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
"PO-Revision-Date: 2019-11-23 17:20+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free>\n"
"Language-Team: French <trad-gnu@apri.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-04 09:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Obsolescence - GNU Project - Free Software Foundation"
@@ -122,6 +123,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
"door that is used for updates and <a href=\"https://www.theregister.co."
"uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "
@@ -304,7 +314,11 @@
"infos nécessaires."
#. type: Content of: <div><p>
-msgid "Copyright © 2019, 2020 Free Software Foundation, Inc."
+# | Copyright © 2019, [-2020-] {+2020, 2021+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright © 2019, 2020 Free Software Foundation, Inc."
+msgid "Copyright © 2019, 2020, 2021 Free Software Foundation, Inc."
msgstr "Copyright © 2019, 2020 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary-obsolescence.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.pot,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary-obsolescence.pot 23 Nov 2020 14:35:48 -0000 1.10
+++ proprietary-obsolescence.pot 4 Jan 2021 10:03:02 -0000 1.11
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-obsolescence.html\n"
-"POT-Creation-Date: 2020-11-23 14:26+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -99,6 +99,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a "
+"href=\"https://www.quicken.com/support/quicken-discontinuation-policy\">has "
+"a discontinuation policy aka planned obsolescence</a> which is an injustice "
+"to users. A free (as in freedom) program would let users' to control the "
+"software but when you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
"door that is used for updates and <a "
"href=\"https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\">
"
@@ -225,7 +234,7 @@
msgstr ""
#. type: Content of: <div><p>
-msgid "Copyright © 2019, 2020 Free Software Foundation, Inc."
+msgid "Copyright © 2019, 2020, 2021 Free Software Foundation, Inc."
msgstr ""
#. type: Content of: <div><p>
Index: proprietary-obsolescence.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.ru.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-obsolescence.ru.po 23 Nov 2020 14:35:48 -0000 1.16
+++ proprietary-obsolescence.ru.po 4 Jan 2021 10:03:02 -0000 1.17
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-11-23 14:26+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-04 09:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Obsolescence - GNU Project - Free Software Foundation"
@@ -123,6 +124,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
"door that is used for updates and <a href=\"https://www.theregister.co."
"uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "
@@ -303,7 +313,11 @@
"translations.html\">“Ð ÑководÑÑве по
пеÑеводам”</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2019, 2020 Free Software Foundation, Inc."
+# | Copyright © 2019, [-2020-] {+2020, 2021+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright © 2019, 2020 Free Software Foundation, Inc."
+msgid "Copyright © 2019, 2020, 2021 Free Software Foundation, Inc."
msgstr "Copyright © 2019, 2020 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- proprietary-surveillance.de-diff.html 30 Dec 2020 10:33:46 -0000
1.151
+++ proprietary-surveillance.de-diff.html 4 Jan 2021 10:03:02 -0000
1.152
@@ -605,12 +605,7 @@
“clean” Windows install is not really clean since <a
href="/proprietary/malware-microsoft.html">Microsoft
puts</em></ins></span> in <span class="removed"><del><strong>the responsibility
for the injustice of their
being nonfree. It also distributes</strong></del></span> its
- own <span class="removed"><del><strong>nonfree apps, such as
- Google
- Play, <a
href="/philosophy/free-software-even-more-important.html">which
- are malicious</a>.</p>
-
- <p>Could Google have done a better job of
preventing</strong></del></span> <span
class="inserted"><ins><em>malware</a>.</p>
+ own <span class="removed"><del><strong>nonfree</strong></del></span> <span
class="inserted"><ins><em>malware</a>.</p>
</li>
</ul>
@@ -629,85 +624,55 @@
<ul class="blurbs">
<li id="M202006260">
- <p>Most</em></ins></span> apps <span
class="removed"><del><strong>from
- cheating? There</strong></del></span> <span class="inserted"><ins><em>are
malware, but
- Trump's campaign app, like Modi's campaign app,</em></ins></span> is <span
class="removed"><del><strong>no systematic way for Google, or Android
- users, to inspect executable proprietary apps to see what they
- do.</p>
-
- <p>Google could demand the source code for these apps, and study the
- source code somehow to determine whether they
mistreat</strong></del></span> <span class="inserted"><ins><em><a
+ <p>Most apps are malware, but
+ Trump's campaign app, like Modi's campaign app, is <a
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
- especially nasty malware, helping companies snoop on</em></ins></span>
users <span class="removed"><del><strong>in
- various ways. If it did</strong></del></span> <span
class="inserted"><ins><em>as well
+ especially nasty malware, helping companies snoop on users as well
as snooping on them itself</a>.</p>
- <p>The article says that Biden's app has</em></ins></span> a <span
class="removed"><del><strong>good job of this, it could more
or</strong></del></span> less
- <span class="removed"><del><strong>prevent</strong></del></span> <span
class="inserted"><ins><em>manipulative overall
+ <p>The article says that Biden's app has a less manipulative overall
approach, but that does not tell us whether it has functionalities we
- consider malicious,</em></ins></span> such <span
class="removed"><del><strong>snooping, except when the app developers are clever
- enough to outsmart</strong></del></span> <span
class="inserted"><ins><em>as sending data</em></ins></span> the <span
class="removed"><del><strong>checking.</p>
-
- <p>But since Google itself develops malicious apps, we cannot trust
- Google</strong></del></span> <span class="inserted"><ins><em>user has not
explicitly
- asked</em></ins></span> to <span class="removed"><del><strong>protect us.
We must demand release</strong></del></span> <span
class="inserted"><ins><em>send.</p>
+ consider malicious, such as sending data the user has not explicitly
+ asked to send.</p>
</li>
<li id="M201601110">
- <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>source code</strong></del></span> <span
class="inserted"><ins><em>monitoring
+ <p>The natural extension of monitoring
people through “their” phones is <a
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software</em></ins></span> to <span
class="inserted"><ins><em>make sure they can't
“fool”</em></ins></span>
- the
- <span class="removed"><del><strong>public, so we can depend on each
other.</p></strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p></em></ins></span>
+ proprietary software to make sure they can't “fool”
+ the monitoring</a>.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>A</strong></del></span>
- <span class="inserted"><ins><em><li id="M201510050">
- <p>According to Edward Snowden,</em></ins></span> <a <span
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233">agencies
can take over
+ <li id="M201510050">
+ <p>According to Edward Snowden, <a
+ href="http://www.bbc.com/news/uk-34444233">agencies can take over
smartphones</a> by sending hidden text messages which enable
- them to turn</em></ins></span> the <span
class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>phones on</em></ins></span> and <span
class="removed"><del><strong>security
- of 283 Android VPN apps concluded that “in spite
of</strong></del></span> <span class="inserted"><ins><em>off, listen
to</em></ins></span> the
- <span class="removed"><del><strong>promises for privacy, security, and
anonymity given by</strong></del></span> <span
class="inserted"><ins><em>microphone,
- retrieve geo-location data from</em></ins></span> the
- <span class="removed"><del><strong>majority of VPN apps—millions of
users may be unawarely subject
- to poor security guarantees</strong></del></span> <span
class="inserted"><ins><em>GPS, take photographs, read
- text messages, read call, location</em></ins></span> and <span
class="removed"><del><strong>abusive practices inflicted by
- VPN apps.”</p>
-
- <p>Following</strong></del></span> <span class="inserted"><ins><em>web
browsing history, and
- read the contact list. This malware</em></ins></span> is <span
class="removed"><del><strong>a non-exhaustive list of proprietary VPN
apps</strong></del></span> <span class="inserted"><ins><em>designed to disguise
itself</em></ins></span>
- from
- <span class="removed"><del><strong>the research paper that
tracks</strong></del></span> <span
class="inserted"><ins><em>investigation.</p>
+ them to turn the phones on and off, listen to the microphone,
+ retrieve geo-location data from the GPS, take photographs, read
+ text messages, read call, location and web browsing history, and
+ read the contact list. This malware is designed to disguise itself
+ from investigation.</p>
</li>
<li id="M201311120">
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones,
- Android,</em></ins></span> and <span
class="removed"><del><strong>infringes</strong></del></span> <span
class="inserted"><ins><em>BlackBerry</a>. While there is not much
- detail here, it seems that this does not operate via</em></ins></span>
- the <span class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>universal back door that we know nearly all portable
+ Android, and BlackBerry</a>. While there is not much
+ detail here, it seems that this does not operate via
+ the universal back door that we know nearly all portable
phones have. It may involve exploiting various bugs. There are <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots</em></ins></span> of
- <span class="removed"><del><strong>users:</p>
-
- <dl>
- <dt>SurfEasy</dt>
- <dd>Includes tracking libraries such as
NativeX</strong></del></span> <span class="inserted"><ins><em>bugs in the
phones' radio software</a>.</p>
+ lots of bugs in the phones' radio software</a>.</p>
</li>
<li id="M201307000">
<p>Portable phones with GPS <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send their GPS location on remote command,</em></ins></span> and
<span class="removed"><del><strong>Appflood,
- meant</strong></del></span> <span class="inserted"><ins><em>users cannot
stop
- them</a>. (The US says it will eventually require all new portable
phones</em></ins></span>
- to <span class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>have GPS.)</p>
+ will send their GPS location on remote command, and users cannot stop
+ them</a>. (The US says it will eventually require all new portable
phones
+ to have GPS.)</p>
</li>
</ul>
@@ -721,11 +686,7 @@
<li id="M202009183">
<p>Facebook <a
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops
- on Instagram</a></em></ins></span> users <span
class="removed"><del><strong>and show them targeted ads.</dd>
-
- <dt>sFly Network Booster</dt>
- <dd>Requests</strong></del></span> <span
class="inserted"><ins><em>by surreptitously turning on</em></ins></span> the
<span class="removed"><del><strong><code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning</strong></del></span> <span
class="inserted"><ins><em>device's
+ on Instagram</a> users by surreptitously turning on the device's
camera.</p>
</li>
@@ -734,397 +695,238 @@
made a practice of surreptitiously activating the Siri software to <a
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf">
record users' conversations when they had not activated Siri</a>.
- This was not just occasional,</em></ins></span> it <span
class="inserted"><ins><em>was systematic practice.</p>
+ This was not just occasional, it was systematic practice.</p>
<p>His job was to listen to these recordings, in a group that made
- transcripts of them. He does not believes that Apple</em></ins></span> has
<span class="removed"><del><strong>full</strong></del></span> <span
class="inserted"><ins><em>ceased this
+ transcripts of them. He does not believes that Apple has ceased this
practice.</p>
<p>The only reliable way to prevent this is, for the program that
- controls</em></ins></span> access to
- <span class="removed"><del><strong>users' text messages.</dd>
-
- <dt>DroidVPN and TigerVPN</dt>
- <dd>Requests</strong></del></span> the <span
class="removed"><del><strong><code>READ_LOGS</code>
permission</strong></del></span> <span
class="inserted"><ins><em>microphone</em></ins></span> to <span
class="removed"><del><strong>read logs
- for other apps</strong></del></span> <span
class="inserted"><ins><em>decide when the user has
- “activated” any service, to be free
software,</em></ins></span> and <span class="removed"><del><strong>also
core</strong></del></span> <span class="inserted"><ins><em>the
- operating</em></ins></span> system <span
class="removed"><del><strong>logs. TigerVPN developers
- have confirmed this.</dd>
-
- <dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also,</strong></del></span> <span
class="inserted"><ins><em>under</em></ins></span> it <span
class="removed"><del><strong>stores detailed logs
- and may turn them over</strong></del></span> <span
class="inserted"><ins><em>free as well. This way, users could make
- sure Apple can't listen</em></ins></span> to <span
class="removed"><del><strong>the UK government if
- requested.</dd>
-
- <dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages
returned</strong></del></span> <span class="inserted"><ins><em>them.</p>
+ controls access to the microphone to decide when the user has
+ “activated” any service, to be free software, and the
+ operating system under it free as well. This way, users could make
+ sure Apple can't listen to them.</p>
</li>
<li id="M201910131">
<p>Safari occasionally <a
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
- sends browsing data from Apple devices in China</em></ins></span> to the
- <span class="removed"><del><strong>users. The stated purpose of the JS
injection is</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
- Browsing service</a>,</em></ins></span> to <span
class="removed"><del><strong>display
- ads. Uses roughly 5 tracking libraries. Also, it redirects the
- user's traffic through valueclick.com (an advertising
- website).</dd>
-
- <dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses
- roughly 5 tracking libraries. Developers of this app have
- confirmed</strong></del></span> <span class="inserted"><ins><em>check
URLs</em></ins></span> that <span class="inserted"><ins><em>possibly correspond
to
+ sends browsing data from Apple devices in China to the Tencent Safe
+ Browsing service</a>, to check URLs that possibly correspond to
“fraudulent” websites. Since Tencent collaborates
- with</em></ins></span> the <span class="removed"><del><strong>non-premium
version</strong></del></span> <span class="inserted"><ins><em>Chinese
government, its Safe Browsing black list most certainly
- contains the websites</em></ins></span> of <span
class="inserted"><ins><em>political opponents. By linking</em></ins></span> the
<span class="removed"><del><strong>app does
- JavaScript injection for tracking</strong></del></span> <span
class="inserted"><ins><em>requests
+ with the Chinese government, its Safe Browsing black list most certainly
+ contains the websites of political opponents. By linking the requests
originating from single IP addresses, the government can identify
- dissenters in China</em></ins></span> and <span
class="removed"><del><strong>display ads.</dd>
- </dl></strong></del></span> <span class="inserted"><ins><em>Hong Kong,
thus endangering their lives.</p></em></ins></span>
+ dissenters in China and Hong Kong, thus endangering their lives.</p>
</li>
-<span class="removed"><del><strong><li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90%</strong></del></span>
- <span class="inserted"><ins><em><li id="M201905280">
- <p>In spite</em></ins></span> of <span
class="removed"><del><strong>the top-ranked gratis
- proprietary Android</strong></del></span> <span
class="inserted"><ins><em>Apple's supposed commitment to
- privacy, iPhone</em></ins></span> apps <span
class="removed"><del><strong>contained recognizable tracking libraries. For
- the paid proprietary apps, it was only 60%.</p></strong></del></span>
<span class="inserted"><ins><em>contain trackers that are busy at night <a
+ <li id="M201905280">
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers that are busy at night <a
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
- sending users' personal information to third
parties</a>.</p></em></ins></span>
+ sending users' personal information to third parties</a>.</p>
- <p>The article <span class="removed"><del><strong>confusingly
describes gratis</strong></del></span> <span class="inserted"><ins><em>mentions
specific examples: Microsoft OneDrive,
+ <p>The article mentions specific examples: Microsoft OneDrive,
Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
Channel (owned by IBM), the crime-alert service Citizen, Yelp
- and DoorDash. But it is likely that most nonfree</em></ins></span> apps
<span class="inserted"><ins><em>contain
- trackers. Some of these send personally identifying data
such</em></ins></span> as <span class="removed"><del><strong>“free”,
- but most</strong></del></span> <span class="inserted"><ins><em>phone
+ and DoorDash. But it is likely that most nonfree apps contain
+ trackers. Some of these send personally identifying data such as phone
fingerprint, exact location, email address, phone number or even
- delivery address (in the case</em></ins></span> of <span
class="removed"><del><strong>them are not in fact
- <a href="/philosophy/free-sw.html">free software</a>.
- It also uses</strong></del></span> <span
class="inserted"><ins><em>DoorDash). Once this information
- is collected by</em></ins></span> the <span
class="removed"><del><strong>ugly word “monetize”. A good
replacement
- for that word</strong></del></span> <span class="inserted"><ins><em>company,
there</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always
that</strong></del></span> <span class="inserted"><ins><em>no telling what
it</em></ins></span> will <span class="removed"><del><strong>fit
- perfectly.</p></strong></del></span> <span class="inserted"><ins><em>be
- used for.</p></em></ins></span>
+ delivery address (in the case of DoorDash). Once this information
+ is collected by the company, there is no telling what it will be
+ used for.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Apps for BART</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711250">
- <p>The DMCA and the EU Copyright Directive make it</em></ins></span>
<a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With proprietary apps, one can only hope that they don't.</p>
-</li>
-
-<li>
- <p>A</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to</em></ins></span> study <span
class="removed"><del><strong>found 234 Android apps that track users
by</strong></del></span> <span class="inserted"><ins><em>how iOS cr…apps
spy on users</a>, because
+ <li id="M201711250">
+ <p>The DMCA and the EU Copyright Directive make it <a
+ href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal to study how iOS cr…apps spy on users</a>, because
this would require circumventing the iOS DRM.</p>
</li>
<li id="M201709210">
<p>In the latest iThings system,
- “turning off” WiFi and Bluetooth the obvious
way</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ “turning off” WiFi and Bluetooth the obvious way <a
+
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
them off—only until 5am. That's Apple for you—“We
- know you want</em></ins></span> to <span
class="removed"><del><strong>ultrasound from beacons placed in stores or played
by TV programs</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>be
spied on”.</p></em></ins></span>
+ know you want to be spied on”.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Pairs of Android apps can collude</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702150">
+ <li id="M201702150">
<p>Apple proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
- fingerprint-scanning touch screen</a>—which would mean no
way</em></ins></span>
- to <span class="removed"><del><strong>transmit users' personal
- data</strong></del></span> <span class="inserted"><ins><em>use it
without having your fingerprints taken. Users would have
- no way</em></ins></span> to <span
class="removed"><del><strong>servers.</strong></del></span> <span
class="inserted"><ins><em>tell whether the phone is snooping on them.</p>
+ fingerprint-scanning touch screen</a>—which would mean no way
+ to use it without having your fingerprints taken. Users would have
+ no way to tell whether the phone is snooping on them.</p>
</li>
<li id="M201611170">
- <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots</em></ins></span> of <span class="removed"><del><strong>pairs that
collude</a>.</p></strong></del></span> <span
class="inserted"><ins><em>personal data to Apple's servers</a>. Big
Brother can get
- them from there.</p></em></ins></span>
+ <p>iPhones <a
+
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
+ lots of personal data to Apple's servers</a>. Big Brother can get
+ them from there.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201609280">
- <p>The iMessage</em></ins></span> app <span
class="removed"><del><strong>developers</strong></del></span> <span
class="inserted"><ins><em>on iThings</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details of users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number</em></ins></span> that <span
class="removed"><del><strong>install</strong></del></span> the <span
class="removed"><del><strong>app</a>.</p>
-
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>user types into it</a>;</em></ins></span> the
<span class="removed"><del><strong>“consent” of users is not
enough</strong></del></span>
- <span class="inserted"><ins><em>server records these numbers for at least
30 days.</p>
+ <li id="M201609280">
+ <p>The iMessage app on iThings <a
+
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that the user types into it</a>; the
+ server records these numbers for at least 30 days.</p>
</li>
<li id="M201509240">
- <p>iThings automatically upload</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>Apple's
servers all</em></ins></span> the <span
class="removed"><del><strong>“Terms</strong></del></span> <span
class="inserted"><ins><em>photos</em></ins></span>
- and <span class="removed"><del><strong>Conditions” that spell out
-what</strong></del></span> <span
class="inserted"><ins><em>videos</em></ins></span> they <span
class="removed"><del><strong>are “consenting” to. Google should
clearly</strong></del></span> <span class="inserted"><ins><em>make.</p>
-
- <blockquote><p> iCloud Photo Library stores every
photo</em></ins></span> and <span class="removed"><del><strong>honestly
identify the information it collects on users, instead
-of hiding it in an obscurely worded EULA.</p>
-
-<p>However, to truly protect people's privacy, we must prevent Google
-and other companies from getting this personal information in the first
-place!</p>
-</li>
-
- <li>
- <p>Google Play (a component of Android) <a
-
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without their permission</a>.</p>
+ <p>iThings automatically upload to Apple's servers all the photos
+ and videos they make.</p>
- <p>Even if</strong></del></span> <span
class="inserted"><ins><em>video</em></ins></span> you <span
class="removed"><del><strong>disable Google Maps</strong></del></span>
- <span class="inserted"><ins><em>take,</em></ins></span> and <span
class="removed"><del><strong>location tracking, you must
- disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>keeps them up</em></ins></span> to <span
class="removed"><del><strong>completely stop the tracking.
This</strong></del></span> <span class="inserted"><ins><em>date on all your
devices. Any edits you
+ <blockquote><p> iCloud Photo Library stores every photo and
video you
+ take, and keeps them up to date on all your devices. Any edits you
make are automatically updated everywhere. […]
</p></blockquote>
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud
feature</em></ins></span> is
- <span class="removed"><del><strong>yet another
example</strong></del></span>
- <span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT202033">activated by the
- startup</em></ins></span> of <span class="removed"><del><strong>nonfree
software pretending</strong></del></span> <span
class="inserted"><ins><em>iOS</a>. The term “cloud” means
“please
+ information</a> as accessed on 24 Sep 2015.) The iCloud feature is
+ <a href="https://support.apple.com/en-us/HT202033">activated by the
+ startup of iOS</a>. The term “cloud” means “please
don't ask where.”</p>
- <p>There is a way</em></ins></span> to <span
class="removed"><del><strong>obey the user,
- when</strong></del></span>
- <span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT201104"> deactivate
- iCloud</a>, but</em></ins></span> it's <span
class="removed"><del><strong>actually doing something else.
Such</strong></del></span> <span class="inserted"><ins><em>active by default so
it still counts as</em></ins></span> a <span class="removed"><del><strong>thing
would be almost
- unthinkable with free software.</p>
-
- </li>
+ <p>There is a way to
+ <a href="https://support.apple.com/en-us/HT201104"> deactivate
+ iCloud</a>, but it's active by default so it still counts as a
+ surveillance functionality.</p>
- <li><p>More than 73%</strong></del></span>
- <span class="inserted"><ins><em>surveillance functionality.</p>
-
- <p>Unknown people apparently took advantage</em></ins></span> of
<span class="removed"><del><strong>the most popular Android
apps</strong></del></span> <span class="inserted"><ins><em>this
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral and location information</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos</em></ins></span> of <span class="removed"><del><strong>their
users with third parties.</p>
- </li>
-
- <li><p>“Cryptic communication,”
unrelated</strong></del></span> <span class="inserted"><ins><em>many
celebrities</a>. They needed</em></ins></span> to <span
class="removed"><del><strong>the app's functionality,
- was</strong></del></span> <span class="inserted"><ins><em>break Apple's
- security to get at them, but NSA can access any of them
through</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+ <p>Unknown people apparently took advantage of this to <a
+
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security to get at them, but NSA can access any of them through <a
+
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
</li>
<li id="M201409220">
<p>Apple can, and regularly does, <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</em></ins></span> the <span
class="removed"><del><strong>500 most popular gratis Android
apps</a>.</p>
+ remotely extract some data from iPhones for the state</a>.</p>
- <p>The article should not</strong></del></span> <span
class="inserted"><ins><em>state</a>.</p>
-
- <p>This may</em></ins></span> have <span
class="removed"><del><strong>described these apps as
- “free”—they are</strong></del></span> <span
class="inserted"><ins><em>improved with <a
+ <p>This may have improved with <a
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">
iOS 8 security improvements</a>; but <a
-
href="https://firstlook.org/theintercept/2014/09/22/apple-data/"></em></ins></span>
- not <span class="removed"><del><strong>free software. The clear
way</strong></del></span> <span class="inserted"><ins><em>as much as Apple
claims</a>.</p>
+ href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not as much as Apple claims</a>.</p>
</li>
<li id="M201407230">
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem</em></ins></span> to <span
class="removed"><del><strong>say
- “zero price” is “gratis.”</p>
-
- <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>exist</em></ins></span>
- for <span class="removed"><del><strong>granted that the usual analytics
tools are
- legitimate, but is that valid? Software developers
have</strong></del></span> no <span class="removed"><del><strong>right to
- analyze what users are doing or how. “Analytics” tools that
snoop are
- just as wrong as any</strong></del></span> <span
class="inserted"><ins><em>possible purpose</em></ins></span> other <span
class="removed"><del><strong>snooping.</p>
- </li>
- <li><p>Gratis Android apps (but not</strong></del></span> <span
class="inserted"><ins><em>than surveillance</a>. Here is
the</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>)
- connect to 100</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Several “features” of iOS seem to exist
+ for no possible purpose other than surveillance</a>. Here is the
<a
+
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
<li id="M201401100">
- <p>The</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>class="not-a-duplicate"
+ <p>The <a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing
is,</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,</strong></del></span>
- <span class="inserted"><ins><em>get other info too.</p>
+ iBeacon</a> lets stores determine exactly where the iThing is, and
+ get other info too.</p>
</li>
<li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop</em></ins></span> on <span
class="inserted"><ins><em>all</em></ins></span> the <span
class="removed"><del><strong>average.</p>
- </li>
- <li><p>Spyware is present</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> in <span
class="removed"><del><strong>some Android devices when they are sold.
- Some Motorola phones modify Android to</strong></del></span> <span
class="inserted"><ins><em>an iThing, or it
+ Either Apple helps the NSA snoop on all the data in an iThing, or it
is totally incompetent</a>.</p>
</li>
<li id="M201308080">
- <p>The iThing also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data to Motorola</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ <p>The iThing also <a
+
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
tells Apple its geolocation</a> by default, though that can be
- turned off.</p></em></ins></span>
+ turned off.</p>
</li>
- <span class="removed"><del><strong><li><p>Some manufacturers
add</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201210170">
- <p>There is also</em></ins></span> a <span
class="inserted"><ins><em>feature for web sites to track users, which
is</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ <li id="M201210170">
+ <p>There is also a feature for web sites to track users, which is
<a
+
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it is
- still true in iOS 7.)</p></em></ins></span>
+ still true in iOS 7.)</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201204280">
+ <li id="M201204280">
<p>Users cannot make an Apple ID (<a
-
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary</em></ins></span>
- to <span class="removed"><del><strong>any file on</strong></del></span>
<span class="inserted"><ins><em>install even gratis apps</a>) without
giving a valid
- email address and receiving</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>verification code Apple sends
- to it.</p></em></ins></span>
+
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary
+ to install even gratis apps</a>) without giving a valid
+ email address and receiving the verification code Apple sends
+ to it.</p>
</li>
</ul>
-
-<span class="removed"><del><strong><!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
-
-
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on
Mobiles</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInAndroid">Android
Telephones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInAndroid">#SpywareInAndroid</a>)</span></em></ins></span>
-</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
-
-
<div class="big-subsection">
- <h4 id="SpywareIniThings">Spyware</strong></del></span>
+ <h4 id="SpywareInAndroid">Android Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInAndroid">#SpywareInAndroid</a>)</span>
+</div>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202012070">
<p>Baidu apps were <a
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/">caught
collecting
sensitive personal data</a> that can be used for lifetime tracking
- of users and putting them</em></ins></span> in <span
class="removed"><del><strong>iThings</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
-</div>
-
-<ul>
- <li><p>The DMCA</strong></del></span> <span
class="inserted"><ins><em>danger. More than 1.4 billion people
- worldwide are affected by these proprietary apps</em></ins></span> and
<span class="inserted"><ins><em>users'
+ of users and putting them in danger. More than 1.4 billion people
+ worldwide are affected by these proprietary apps and users'
privacy is jeopardized by this surveillance tool. Data collected by Baidu
may be shared with Chinese government, possibly putting Chinese people in
danger.</p>
</li>
<li id="M202004300">
<p>Xiaomi phones <a
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
- many actions</em></ins></span> the <span class="removed"><del><strong>EU
Copyright Directive</strong></del></span> <span class="inserted"><ins><em>user
takes</a>: starting an app, looking at a folder,
+ many actions the user takes</a>: starting an app, looking at a
folder,
visiting a website, listening to a song. They send device identifying
information too.</p>
<p>Other nonfree programs snoop too. For instance, Spotify and
- other streaming dis-services</em></ins></span> make <span
class="removed"><del><strong>it</strong></del></span> <span
class="inserted"><ins><em>a dossier about each user, and</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</strong></del></span>
- <span
class="inserted"><ins><em>href="/malware/proprietary-surveillance.html#M201508210">
they make
- users identify themselves</em></ins></span> to <span
class="removed"><del><strong>study how iOS cr...apps spy on users</a>,
because this
- would require circumventing the iOS DRM.</p>
- </li>
+ other streaming dis-services make a dossier about each user, and <a
+ href="/malware/proprietary-surveillance.html#M201508210"> they make
+ users identify themselves to pay</a>. Out, out, damned
Spotify!</p>
- <li><p>In</strong></del></span> <span
class="inserted"><ins><em>pay</a>. Out, out, damned Spotify!</p>
-
- <p>Forbes exonerates</em></ins></span> the <span
class="removed"><del><strong>latest iThings system, “turning off”
WiFi and Bluetooth</strong></del></span> <span class="inserted"><ins><em>same
wrongs when</em></ins></span> the
- <span class="removed"><del><strong>obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>.
- A more advanced way really</strong></del></span> <span
class="inserted"><ins><em>culprits are not Chinese,
- but we condemn this no matter who</em></ins></span> does <span
class="removed"><del><strong>turn them off—only until 5am.
- That's Apple for you—“We know you want to be spied
on”.</p></strong></del></span> <span
class="inserted"><ins><em>it.</p></em></ins></span>
+ <p>Forbes exonerates the same wrongs when the culprits are not
Chinese,
+ but we condemn this no matter who does it.</p>
</li>
- <span class="removed"><del><strong><li><p>Apple proposes
- <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without having your
fingerprints
- taken. Users would have no way</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201812060">
- <p>Facebook's app got “consent”</em></ins></span> to
<span class="removed"><del><strong>tell whether the phone is snooping on
- them.</p></li>
-
- <li><p>iPhones</strong></del></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots of personal data to Apple's servers</a>. Big Brother can
- get them</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
- upload call logs automatically</em></ins></span> from <span
class="removed"><del><strong>there.</p></strong></del></span> <span
class="inserted"><ins><em>Android phones</a> while disguising
- what the “consent” was for.</p></em></ins></span>
+ <li id="M201812060">
+ <p>Facebook's app got “consent” to <a
+
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
+ upload call logs automatically from Android phones</a> while
disguising
+ what the “consent” was for.</p>
</li>
- <span class="removed"><del><strong><li><p>The iMessage app on
iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201811230">
- <p>An Android</em></ins></span> phone <span
class="removed"><del><strong>number that</strong></del></span> <span
class="inserted"><ins><em>was observed to track location even while
- in airplane mode. It didn't send</em></ins></span> the <span
class="removed"><del><strong>user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>location
data while in
+ <li id="M201811230">
+ <p>An Android phone was observed to track location even while
+ in airplane mode. It didn't send the location data while in
airplane mode. Instead, <a
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up</em></ins></span> the <span
class="removed"><del><strong>server records these numbers for at least 30
- days.</p></strong></del></span> <span
class="inserted"><ins><em>data, and sent them all
later</a>.</p></em></ins></span>
+ it saved up the data, and sent them all later</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711210">
- <p>Android tracks location for Google</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"></em></ins></span>
- even <span class="removed"><del><strong>gratis apps)</a>
- without giving a valid email address and receiving</strong></del></span>
<span class="inserted"><ins><em>when “location services” are turned
off, even when</em></ins></span>
- the <span class="removed"><del><strong>code Apple
- sends</strong></del></span> <span class="inserted"><ins><em>phone has no
SIM card</a>.</p>
+ <li id="M201711210">
+ <p>Android tracks location for Google <a
+
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off, even when
+ the phone has no SIM card</a>.</p>
</li>
<li id="M201611150">
<p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data</em></ins></span> to <span
class="removed"><del><strong>it.</p></strong></del></span> <span
class="inserted"><ins><em>China</a>.</p></em></ins></span>
+ sold with spyware sending lots of data to China</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Around
47%</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201609140">
- <p>Google Play (a component</em></ins></span> of <span
class="removed"><del><strong>the most popular iOS apps</strong></del></span>
<span class="inserted"><ins><em>Android)</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ <li id="M201609140">
+ <p>Google Play (a component of Android) <a
+
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
tracks the users' movements without their permission</a>.</p>
- <p>Even if you disable Google Maps</em></ins></span> and location
<span class="removed"><del><strong>information</a></strong></del></span>
<span class="inserted"><ins><em>tracking, you must
+ <p>Even if you disable Google Maps and location tracking, you must
disable Google Play itself to completely stop the tracking. This is
- yet another example</em></ins></span> of <span
class="removed"><del><strong>their users with third parties.</p>
- </li>
-
- <li><p>iThings automatically upload</strong></del></span> <span
class="inserted"><ins><em>nonfree software pretending</em></ins></span> to
<span class="removed"><del><strong>Apple's servers all</strong></del></span>
<span class="inserted"><ins><em>obey</em></ins></span> the <span
class="removed"><del><strong>photos</strong></del></span> <span
class="inserted"><ins><em>user,
+ yet another example of nonfree software pretending to obey the user,
when it's actually doing something else. Such a thing would be almost
unthinkable with free software.</p>
</li>
@@ -1132,105 +934,46 @@
<li id="M201507030">
<p>Samsung phones come with <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>,</em></ins></span> and
- <span class="removed"><del><strong>videos</strong></del></span> they
<span class="removed"><del><strong>make.</p>
-
- <blockquote><p>
- iCloud Photo Library stores every photo and video you take,
- and keeps them up to date on all your devices.
- Any edits you make are automatically updated everywhere. [...]
- </p></blockquote>
-
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud
feature</strong></del></span> <span class="inserted"><ins><em>send so much data
that their
- transmission</em></ins></span> is
- <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT202033">activated</strong></del></span>
<span class="inserted"><ins><em>a substantial expense for users. Said
transmission,
- not wanted or requested</em></ins></span> by the
- <span class="removed"><del><strong>startup</strong></del></span> <span
class="inserted"><ins><em>user, clearly must constitute spying</em></ins></span>
- of <span class="removed"><del><strong>iOS</a>. The term
“cloud” means
- “please don't ask where.”</p>
-
- <p>There is a way</strong></del></span> <span
class="inserted"><ins><em>some kind.</p>
+ that users can't delete</a>, and they send so much data that their
+ transmission is a substantial expense for users. Said transmission,
+ not wanted or requested by the user, clearly must constitute spying
+ of some kind.</p>
</li>
<li id="M201403120">
<p><a href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</em></ins></span> to <span
class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active</strong></del></span> <span
class="inserted"><ins><em>any file on the system.</p>
+ Samsung's back door</a> provides access to any file on the
system.</p>
</li>
<li id="M201308010">
<p>Spyware in Android phones (and Windows? laptops): The Wall Street
- Journal (in an article blocked from us</em></ins></span> by <span
class="removed"><del><strong>default so it still counts
as</strong></del></span> a
- <span class="removed"><del><strong>surveillance functionality.</p>
-
- <p>Unknown people apparently took advantage of this to
- <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA can access any of them
through</strong></del></span> <span class="inserted"><ins><em>paywall) reports
that</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware in iThings:</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></em></ins></span>
- the <span class="removed"><del><strong><a class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly
where</strong></del></span> <span class="inserted"><ins><em>FBI can remotely
activate</em></ins></span> the <span class="removed"><del><strong>iThing
is,</strong></del></span> <span class="inserted"><ins><em>GPS</em></ins></span>
and <span class="removed"><del><strong>get other info too.</p>
- </li>
-
- <li><p>There is also a feature for web sites to track users,
which</strong></del></span> <span class="inserted"><ins><em>microphone in
Android phones
- and laptops</a> (presumably Windows laptops).
Here</em></ins></span> is <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6, but
it</strong></del></span>
- <span
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ Journal (in an article blocked from us by a paywall) reports that <a
+
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate the GPS and microphone in Android phones
+ and laptops</a> (presumably Windows laptops). Here is <a
+ href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
<li id="M201307280">
- <p>Spyware</em></ins></span> is <span
class="removed"><del><strong>still true</strong></del></span> <span
class="inserted"><ins><em>present</em></ins></span> in <span
class="removed"><del><strong>iOS 7.)</p>
- </li>
-
- <li><p>The iThing also
- <a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a></strong></del></span> <span
class="inserted"><ins><em>some Android devices when they are
- sold. Some Motorola phones, made when this company was
owned</em></ins></span>
- by <span class="removed"><del><strong>default,
though</strong></del></span> <span class="inserted"><ins><em>Google, use a
modified version of Android</em></ins></span> that <span
class="removed"><del><strong>can be
- turned off.</p>
- </li>
-
- <li><p>Apple can, and regularly does,</strong></del></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal</em></ins></span> data <span
class="removed"><del><strong>from iPhones</strong></del></span> <span
class="inserted"><ins><em>to Motorola</a>.</p>
+ <p>Spyware is present in some Android devices when they are
+ sold. Some Motorola phones, made when this company was owned
+ by Google, use a modified version of Android that <a
+
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ sends personal data to Motorola</a>.</p>
</li>
<li id="M201307250">
<p>A Motorola phone <a
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens</em></ins></span> for <span class="inserted"><ins><em>voice
all</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>time</a>.</p></em></ins></span>
+ listens for voice all the time</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201302150">
+ <li id="M201302150">
<p>Google Play intentionally sends app developers <a
-
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
- the <span class="removed"><del><strong>NSA snoop on
all</strong></del></span> <span class="inserted"><ins><em>personal details of
users that install</em></ins></span> the <span
class="removed"><del><strong>data in an iThing,
- or it is totally incompetent.</a></p>
- </li>
+
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+ the personal details of users that install the app</a>.</p>
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
-
- <p>Merely asking the “consent”</em></ins></span> of
<span class="removed"><del><strong>iOS seem to exist for no
- possible purpose other than surveillance</a>.
Here</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> is <span
class="removed"><del><strong>the
- <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTelephones">Spyware in
Telephones</h4></strong></del></span> <span class="inserted"><ins><em>not
enough to
+ <p>Merely asking the “consent” of users is not enough to
legitimize actions like this. At this point, most users have stopped
reading the “Terms and Conditions” that spell out what
they are “consenting” to. Google should clearly and
@@ -1251,47 +994,29 @@
<div class="big-subsection">
- <h4
id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
+ <h4 id="SpywareInElectronicReaders">E-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Tracking software in popular Android apps is pervasive and
- sometimes very clever. Some trackers</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201603080">
- <p>E-books</em></ins></span> can <span
class="inserted"><ins><em>contain JavaScript code, and</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
- networks</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops on
readers</a>.</p></em></ins></span>
+ <p>E-books can contain JavaScript code, and <a
+
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops on readers</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Android tracks
location for Google <a
-href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even
- when</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201410080">
- <p>Adobe made “Digital Editions,”</em></ins></span>
- the <span class="removed"><del><strong>phone has no SIM
card</a>.</p></li>
-
- <li><p>Some portable phones</strong></del></span> <span
class="inserted"><ins><em>e-reader used by most US libraries,</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send</em></ins></span> lots of data to <span
class="removed"><del><strong>China</a>.</p></li>
-
- <li><p>According</strong></del></span> <span
class="inserted"><ins><em>Adobe</a>. Adobe's “excuse”: it's
- needed</em></ins></span> to <span class="removed"><del><strong>Edward
Snowden,</strong></del></span> <span class="inserted"><ins><em>check
DRM!</p>
+ <li id="M201410080">
+ <p>Adobe made “Digital Editions,”
+ the e-reader used by most US libraries, <a
+
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p>
</li>
<li id="M201212030">
- <p>Spyware in many e-readers—not only the
Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
- report even</em></ins></span> which <span
class="removed"><del><strong>enable them to turn</strong></del></span> <span
class="inserted"><ins><em>page</em></ins></span> the <span
class="removed"><del><strong>phones</strong></del></span> <span
class="inserted"><ins><em>user reads at what time</a>.</p>
+ <p>Spyware in many e-readers—not only the Kindle: <a
+ href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
+ report even which page the user reads at what time</a>.</p>
</li>
</ul>
@@ -1312,251 +1037,146 @@
<li id="M202011260">
<p>Microsoft's Office 365 suite enables employers <a
href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance">to
- snoop</em></ins></span> on <span class="inserted"><ins><em>each
employee</a>. After
+ snoop on each employee</a>. After
a public outburst, Microsoft stated that <a
href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance">it
would remove this capability</a>. Let's hope so.</p>
</li>
<li id="M201912190">
- <p>Some Avast</em></ins></span> and <span
class="removed"><del><strong>off, listen</strong></del></span> <span
class="inserted"><ins><em>AVG extensions
- for Firefox and Chrome were found</em></ins></span> to <span
class="removed"><del><strong>the microphone, retrieve geo-location data from the
- GPS, take photographs, read text messages, read call, location and
web</strong></del></span> <span class="inserted"><ins><em><a
+ <p>Some Avast and AVG extensions
+ for Firefox and Chrome were found to <a
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
- snoop on users' detailed</em></ins></span> browsing <span
class="removed"><del><strong>history,</strong></del></span> <span
class="inserted"><ins><em>habits</a>. Mozilla</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>Google
- removed</em></ins></span> the <span class="removed"><del><strong>contact
list. This malware is designed to
- disguise itself</strong></del></span> <span
class="inserted"><ins><em>problematic extensions</em></ins></span> from <span
class="removed"><del><strong>investigation.</p>
- </li>
-
- <li><p>Samsung phones come with
- <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
- and they send so much data that</strong></del></span> their <span
class="removed"><del><strong>transmission is</strong></del></span> <span
class="inserted"><ins><em>stores, but this shows
+ snoop on users' detailed browsing habits</a>. Mozilla and Google
+ removed the problematic extensions from their stores, but this shows
once more how unsafe nonfree software can be. Tools that are supposed
- to protect</em></ins></span> a
- <span class="removed"><del><strong>substantial expense for users. Said
transmission, not wanted or
- requested by the user, clearly must constitute spying of some
- kind.</p></li>
-
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</strong></del></span> <span
class="inserted"><ins><em>proprietary system are, instead, infecting it with
- additional malware (the system itself being</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>original malware).</p></em></ins></span>
+ to protect a proprietary system are, instead, infecting it with
+ additional malware (the system itself being the original
malware).</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware in Android
phones (and Windows? laptops):</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201811020">
+ <li id="M201811020">
<p>Foundry's graphics software <a
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information to identify who is running
it</a>.</em></ins></span> The <span class="removed"><del><strong>Wall
- Street Journal (in an article blocked from us by</strong></del></span>
<span class="inserted"><ins><em>result is
- often</em></ins></span> a <span class="removed"><del><strong>paywall)
- reports</strong></del></span> <span class="inserted"><ins><em>legal
threat demanding a lot of money.</p>
-
- <p>The fact</em></ins></span> that
- <span class="removed"><del><strong><a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate the GPS and microphone in Android
- phones and laptops</a>.
- (I suspect</strong></del></span> this <span
class="removed"><del><strong>means Windows laptops.)
Here</strong></del></span> is
- <span class="removed"><del><strong><a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
- </li>
-
- <li><p>Portable phones with GPS will send their GPS location on
- remote command and users cannot stop them:
- <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says</strong></del></span> <span class="inserted"><ins><em>used
for repression of forbidden sharing
- makes</em></ins></span> it <span class="removed"><del><strong>will
eventually require all new portable phones
- to have GPS.)</p>
- </li>
+ reports information to identify who is running it</a>. The result is
+ often a legal threat demanding a lot of money.</p>
- <li><p>The</strong></del></span> <span
class="inserted"><ins><em>even more vicious.</p>
+ <p>The fact that this is used for repression of forbidden sharing
+ makes it even more vicious.</p>
- <p>This illustrates that making unauthorized copies
of</em></ins></span> nonfree <span class="removed"><del><strong>Snapchat app's
principal purpose</strong></del></span> <span
class="inserted"><ins><em>software</em></ins></span>
- is <span class="removed"><del><strong>to restrict</strong></del></span>
<span class="inserted"><ins><em>not a cure for</em></ins></span> the <span
class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="removed"><del><strong>data on</strong></del></span> <span
class="inserted"><ins><em>nonfree software. It may avoid
- paying for</em></ins></span> the <span class="removed"><del><strong>user's
computer,</strong></del></span> <span class="inserted"><ins><em>nasty
thing,</em></ins></span> but <span class="inserted"><ins><em>cannot
make</em></ins></span> it <span class="removed"><del><strong>does surveillance
- too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the user's list of other people's phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>less nasty.</p></em></ins></span>
+ <p>This illustrates that making unauthorized copies of nonfree
software
+ is not a cure for the injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less nasty.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInMobileApps">Mobile
Apps</h4></em></ins></span>
+ <h4 id="SpywareInMobileApps">Mobile Apps</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li></strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M202003260"></em></ins></span>
- <p>The <span class="removed"><del><strong>moviepass app and
dis-service spy on users even more than users
- expected. It</strong></del></span> <span class="inserted"><ins><em>Apple
iOS version of Zoom</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account">is
- sending users' data</em></ins></span> to <span
class="inserted"><ins><em>Facebook</a> even if the user doesn't
have</em></ins></span>
- a <span class="removed"><del><strong>movie</a>.
- </p>
-
- <p>Don't be tracked — pay
cash!</p></strong></del></span> <span class="inserted"><ins><em>Facebook
account. According to the article, Zoom and Facebook
+<ul class="blurbs">
+ <li id="M202003260">
+ <p>The Apple iOS version of Zoom <a
+
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account">is
+ sending users' data to Facebook</a> even if the user doesn't have
+ a Facebook account. According to the article, Zoom and Facebook
don't even mention this surveillance on their privacy policy page,
making this an obvious violation of people's privacy even in their
- own terms.</p></em></ins></span>
+ own terms.</p>
</li>
- <span class="removed"><del><strong><li><p>AI-powered driving
apps can</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M202003010">
+ <li id="M202003010">
<p>The Alipay Health Code app
- estimates whether the user has Covid-19 and</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
- tells the cops directly</a>.</p></em></ins></span>
+ estimates whether the user has Covid-19 and <a
+
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
+ tells the cops directly</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The
Sarahah</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M202001290">
- <p>The Amazon Ring</em></ins></span> app <span
class="inserted"><ins><em>does</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers and email addresses</a> in user's address
- book</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
+ <li id="M202001290">
+ <p>The Amazon Ring app does <a
+
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
surveillance for other companies as well as for Amazon</a>.</p>
</li>
<li id="M201912220">
- <p>The ToToc messaging app seems</em></ins></span> to <span
class="removed"><del><strong>developer's server. Note</strong></del></span>
<span class="inserted"><ins><em>be a <a
+ <p>The ToToc messaging app seems to be a <a
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
spying tool for the government of the United Arab Emirates</a>.
- Any nonfree program could be doing this, and</em></ins></span> that <span
class="inserted"><ins><em>is a good
+ Any nonfree program could be doing this, and that is a good
reason to use free software instead.</p>
- <p><small>Note:</em></ins></span> this article <span
class="removed"><del><strong>misuses</strong></del></span> <span
class="inserted"><ins><em>uses</em></ins></span> the <span
class="removed"><del><strong>words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p>
- </li>
-
- <li>
- <p>Facebook's app listens all</strong></del></span> <span
class="inserted"><ins><em>word “free” in</em></ins></span>
- the <span class="removed"><del><strong>time,</strong></del></span> <span
class="inserted"><ins><em>sense of “gratis.”</small></p>
+ <p><small>Note: this article uses the word “free”
in
+ the sense of “gratis.”</small></p>
</li>
<li id="M201912090">
<p>iMonsters and Android phones,
- when used for work, give employers powerful</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
+ when used for work, give employers powerful <a
+
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
snooping and sabotage capabilities</a> if they install their own
- software</em></ins></span> on <span class="removed"><del><strong>what
people are listening to or watching</a>. In addition, it may
- be analyzing people's conversations</strong></del></span> <span
class="inserted"><ins><em>the device. Many employers demand</em></ins></span>
to <span class="removed"><del><strong>serve them with targeted
- advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>do this. For the
+ software on the device. Many employers demand to do this. For the
employee, this is simply nonfree software, as fundamentally unjust
- and as dangerous as any other nonfree software.</p></em></ins></span>
+ and as dangerous as any other nonfree software.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Faceapp appears</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201910130">
+ <li id="M201910130">
<p>The Chinese Communist Party's “Study
- the Great Nation” app requires users</em></ins></span> to <span
class="removed"><del><strong>do lots of surveillance, judging
by</strong></del></span> <span class="inserted"><ins><em>grant
it</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"></em></ins></span>
- access <span class="removed"><del><strong>it demands</strong></del></span>
to <span class="removed"><del><strong>personal data</strong></del></span> <span
class="inserted"><ins><em>the phone's microphone, photos, text messages,
contacts, and
+ the Great Nation” app requires users to grant it <a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access to the phone's microphone, photos, text messages, contacts, and
internet history</a>, and the Android version was found to contain a
- back-door allowing developers to run any code they wish</em></ins></span>
in the <span class="removed"><del><strong>device</a>.
- </p>
- </li>
+ back-door allowing developers to run any code they wish in the users'
+ phone, as “superusers.” Downloading and using this
+ app is mandatory at some workplaces.</p>
- <li>
- <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search</strong></del></span> <span
class="inserted"><ins><em>users'
- phone, as “superusers.” Downloading and using
this</em></ins></span>
- app <span class="removed"><del><strong>that it will</a>
- pre-install on</strong></del></span> <span
class="inserted"><ins><em>is mandatory at</em></ins></span> some <span
class="removed"><del><strong>of its phones.</strong></del></span> <span
class="inserted"><ins><em>workplaces.</p>
-
- <p>Note:</em></ins></span> The <span
class="removed"><del><strong>app will give Verizon the same
- information about</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of</em></ins></span> the <span
class="removed"><del><strong>users' searches</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated, but
+ Washington Post version of the article</a> (partly obfuscated, but
readable after copy-pasting in a text editor) includes a clarification
- saying</em></ins></span> that <span class="removed"><del><strong>Google
normally gets when
- they use its search engine.</p>
-
- <p>Currently,</strong></del></span> the <span
class="removed"><del><strong>app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on</strong></del></span> <span
class="inserted"><ins><em>tests were</em></ins></span> only <span
class="removed"><del><strong>one phone</a>, and</strong></del></span>
<span class="inserted"><ins><em>performed on</em></ins></span> the
- <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>Android version
- of</em></ins></span> the <span class="inserted"><ins><em>app, and that,
according to Apple, “this kind of
+ saying that the tests were only performed on the Android version
+ of the app, and that, according to Apple, “this kind of
‘superuser’ surveillance could not be conducted on
Apple's operating system.”</p>
</li>
<li id="M201909091">
- <p>The Facebook</em></ins></span> app <span
class="removed"><del><strong>takes effect. However,</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>The Facebook app <a
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
tracks users even when it is turned off</a>, after tricking them
- into giving</em></ins></span> the app <span
class="removed"><del><strong>remains spyware—an “optional”
piece</strong></del></span> <span class="inserted"><ins><em>broad permissions
in order to use one</em></ins></span> of <span
class="removed"><del><strong>spyware is
- still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>its
- functionalities.</p></em></ins></span>
+ into giving the app broad permissions in order to use one of its
+ functionalities.</p>
</li>
- <span class="removed"><del><strong><li><p>The Meitu photo-editing
- app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201909090">
- <p>Some nonfree period-tracking apps including MIA Fem and
Maya</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
- send intimate details of users' lives</em></ins></span> to <span
class="inserted"><ins><em>Facebook</a>.</p>
+ <li id="M201909090">
+ <p>Some nonfree period-tracking apps including MIA Fem and Maya <a
+
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
+ send intimate details of users' lives to Facebook</a>.</p>
</li>
<li id="M201909060">
- <p>Keeping track of who downloads</em></ins></span> a <span
class="removed"><del><strong>Chinese company</a>.</p></li>
-
- <li><p>A pregnancy test controller application not only
- can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts</strong></del></span> <span
class="inserted"><ins><em>proprietary
- program is a form</em></ins></span> of <span
class="removed"><del><strong>data in the phone, and in server accounts, it can
- alter them too</a>.
- </p></li>
-
- <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
-
- <p>This example illustrates how “getting the user's
consent”
- for surveillance</strong></del></span> <span
class="inserted"><ins><em>surveillance. There</em></ins></span> is <span
class="removed"><del><strong>inadequate as</strong></del></span> a <span
class="removed"><del><strong>protection against massive
- surveillance.</p>
- </li>
-
- <li><p>Google's new voice messaging app</strong></del></span>
- <span class="inserted"><ins><em>proprietary program for adjusting a
certain telescopic rifle sight.</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
- A US prosecutor has demanded the list of</em></ins></span> all <span
class="removed"><del><strong>conversations</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the 10,000 or more people
+ <p>Keeping track of who downloads a proprietary
+ program is a form of surveillance. There is a
+ proprietary program for adjusting a certain telescopic rifle sight. <a
+
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded the list of all the 10,000 or more people
who have installed it</a>.</p>
<p>With a free program there would not be a list of who has installed
- it.</p></em></ins></span>
+ it.</p>
</li>
- <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201907081">
- <p>Many unscrupulous mobile-app developers keep finding ways
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
- bypass user's settings</a>, regulations,</em></ins></span> and <span
class="removed"><del><strong>TV programs
- are playing nearby</a>. Also on what users post on various sites
- such</strong></del></span> <span
class="inserted"><ins><em>privacy-enhancing features
- of the operating system, in order to gather</em></ins></span> as <span
class="removed"><del><strong>Facebook, Google+ and
Twitter.</p></strong></del></span> <span class="inserted"><ins><em>much
private data as
+ <li id="M201907081">
+ <p>Many unscrupulous mobile-app developers keep finding ways to <a
+
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations, and privacy-enhancing
features
+ of the operating system, in order to gather as much private data as
they possibly can.</p>
<p>Thus, we can't trust rules against spying. What we can trust is
- having control over the software we run.</p></em></ins></span>
+ having control over the software we run.</p>
</li>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201907080">
+ <li id="M201907080">
<p>Many Android apps can track
users' movements even when the user says <a
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
@@ -1567,144 +1187,68 @@
</li>
<li id="M201905300">
- <p>The Femm “fertility”</em></ins></span> app <span
class="inserted"><ins><em>is secretly a</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
- tool</em></ins></span> for <span class="removed"><del><strong>known
faces</a>,
- and suggests</strong></del></span> <span
class="inserted"><ins><em>propaganda</a> by natalist Christians. It
spreads distrust
+ <p>The Femm “fertility” app is secretly a <a
+
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
+ tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
- <p>It snoops on users, too, as</em></ins></span> you <span
class="inserted"><ins><em>must expect from nonfree
+ <p>It snoops on users, too, as you must expect from nonfree
programs.</p>
</li>
<li id="M201905060">
<p>BlizzCon 2019 imposed a <a
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement</em></ins></span> to <span class="removed"><del><strong>share
the picture you take according</strong></del></span> <span
class="inserted"><ins><em>run a proprietary phone
app</a></em></ins></span> to <span class="removed"><del><strong>who
- is in</strong></del></span> <span class="inserted"><ins><em>be allowed
into</em></ins></span>
- the <span
class="removed"><del><strong>frame.</p></strong></del></span> <span
class="inserted"><ins><em>event.</p></em></ins></span>
+ requirement to run a proprietary phone app</a> to be allowed into
+ the event.</p>
- <p>This <span class="inserted"><ins><em>app is a</em></ins></span>
spyware <span class="removed"><del><strong>feature seems to require online
access to some
- known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>that can snoop on a lot of
+ <p>This app is a spyware that can snoop on a lot of
sensitive data, including user's location and contact list, and has <a
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>pictures are likely</strong></del></span> <span
class="inserted"><ins><em>phone.</p>
+ near-complete control</a> over the phone.</p>
</li>
<li id="M201904131">
<p>Data collected by menstrual and pregnancy monitoring apps is
often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available</em></ins></span> to <span class="inserted"><ins><em>employers
and insurance companies</a>. Even though the
- data is “anonymized and aggregated,” it can
easily</em></ins></span> be
- <span class="removed"><del><strong>sent across</strong></del></span>
- <span class="inserted"><ins><em>traced back to</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>woman who uses the app.</p>
-
- <p>This has harmful implications for women's
rights</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span class="inserted"><ins><em>equal
employment</em></ins></span>
- and <span class="removed"><del><strong>face-recognition
- algorithms.</p>
-
- <p>If so, none of Facebook users' pictures are private
- anymore,</strong></del></span> <span class="inserted"><ins><em>freedom
to make their own pregnancy choices. Don't use
- these apps,</em></ins></span> even if <span
class="removed"><del><strong>the user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>someone offers you a
reward</em></ins></span> to <span class="inserted"><ins><em>do so. A
- free-software app that does more or less</em></ins></span> the <span
class="removed"><del><strong>service.</p>
- </li>
-
- <li><p>Like most “music screaming” disservices,
Spotify
- is based</strong></del></span> <span class="inserted"><ins><em>same
thing without
- spying</em></ins></span> on <span class="removed"><del><strong>proprietary
malware (DRM</strong></del></span> <span class="inserted"><ins><em>you is
available from <a
-
href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>snooping). In August
- 2015 it <a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some
- are starting to realize that it is nasty.</p>
-
- <p>This article shows the</strong></del></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as</strong></del></span>
- <span
class="inserted"><ins><em>href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"></em></ins></span>
- a <span class="removed"><del><strong>way
- to “serve” users better</a>—never mind
- whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>new one</em></ins></span> is <span
class="removed"><del><strong>a typical example of
- the attitude of the proprietary software industry towards
- those they have subjugated.</p>
-
- <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>being developed</a>.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other
- apps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201904130">
- <p>Google tracks</em></ins></span> the <span
class="removed"><del><strong>user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible</strong></del></span>
<span class="inserted"><ins><em>movements of Android phones</em></ins></span>
and
- <span class="removed"><del><strong>optional</a>. Not as bad as what
the others do.</p>
- </li>
-
- <li><p>FTC says most mobile apps for children don't respect
privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
- </li>
-
- <li><p>Widely used</strong></del></span> <span
class="inserted"><ins><em>iPhones
- running Google apps, and sometimes</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is</strong></del></span>
<span class="inserted"><ins><em>data for years</a>.</p>
-
- <p>Nonfree software</em></ins></span> in <span
class="removed"><del><strong>addition to
- the snooping done by</strong></del></span> the phone <span
class="removed"><del><strong>company, and perhaps by the OS in the
- phone.</p>
-
- <p>Don't</strong></del></span> <span class="inserted"><ins><em>has
to</em></ins></span> be <span class="removed"><del><strong>distracted by the
question of whether</strong></del></span> <span
class="inserted"><ins><em>responsible for sending</em></ins></span>
- the <span class="removed"><del><strong>app developers get
- users</strong></del></span> <span class="inserted"><ins><em>location
data</em></ins></span> to <span class="removed"><del><strong>say “I
agree”. That is no excuse for malware.</p></strong></del></span>
<span class="inserted"><ins><em>Google.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201903251">
- <p>Many Android phones come with a huge number of</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user</strong></del></span>
- <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ available to employers and insurance companies</a>. Even though the
+ data is “anonymized and aggregated,” it can easily be
+ traced back to the woman who uses the app.</p>
+
+ <p>This has harmful implications for women's rights to equal
employment
+ and freedom to make their own pregnancy choices. Don't use
+ these apps, even if someone offers you a reward to do so. A
+ free-software app that does more or less the same thing without
+ spying on you is available from <a
+ href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
+
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
+ a new one is being developed</a>.</p>
+ </li>
+
+ <li id="M201904130">
+ <p>Google tracks the movements of Android phones and iPhones
+ running Google apps, and sometimes <a
+
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves the data for years</a>.</p>
+
+ <p>Nonfree software in the phone has to be responsible for sending
+ the location data to Google.</p>
+ </li>
+
+ <li id="M201903251">
+ <p>Many Android phones come with a huge number of <a
+
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
preinstalled nonfree apps that have access to sensitive data without
users' knowledge</a>. These hidden apps may either call home with
- the</em></ins></span> data, <span class="removed"><del><strong>including
geolocation, for use by companies.</a></p>
-
- <p>The FTC criticized this app because</strong></del></span> <span
class="inserted"><ins><em>or pass</em></ins></span> it <span
class="removed"><del><strong>asked the user</strong></del></span> <span
class="inserted"><ins><em>on</em></ins></span> to
- <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>user-installed apps
that have access</em></ins></span> to
- the <span class="removed"><del><strong>app developer</strong></del></span>
<span class="inserted"><ins><em>network</em></ins></span> but <span
class="removed"><del><strong>did not
- ask about sending it</strong></del></span> <span
class="inserted"><ins><em>no direct access</em></ins></span> to <span
class="removed"><del><strong>other companies. This shows</strong></del></span>
the
- <span class="removed"><del><strong>weakness of the
reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should a flashlight
- app send any information to anyone? A free software flashlight
- app would not.</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware</strong></del></span> <span
class="inserted"><ins><em>data. This results</em></ins></span> in <span
class="removed"><del><strong>Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
-
- <li></strong></del></span> <span class="inserted"><ins><em>massive
+ the data, or pass it on to user-installed apps that have access to
+ the network but no direct access to the data. This results in massive
surveillance on which the user has absolutely no control.</p>
</li>
- <li id="M201903201"></em></ins></span>
- <p>A <span class="removed"><del><strong>remote-control sex toy
was</strong></del></span> <span class="inserted"><ins><em>study of 24
“health” apps</em></ins></span> found <span
class="removed"><del><strong>to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings</strong></del></span> <span class="inserted"><ins><em>that
19</em></ins></span> of <span class="removed"><del><strong>the conversation
between two users</a>.</p>
- </li>
-
- <li>
- <p>The “smart” toys My Friend Cayla and i-Que
transmit</strong></del></span> <span
class="inserted"><ins><em>them</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data</em></ins></span> to <span
class="removed"><del><strong>Nuance Communications</a>,
- a speech recognition company based in the U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities;
crackers</strong></del></span> <span class="inserted"><ins><em>third
parties</a>, which</em></ins></span> can <span
class="removed"><del><strong>remotely control the toys
with</strong></del></span> <span class="inserted"><ins><em>use it
+ <li id="M201903201">
+ <p>A study of 24 “health” apps found that 19 of them
<a
+
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data to third parties</a>, which can use it
for invasive advertising or discriminating against people in poor
medical condition.</p>
@@ -1714,214 +1258,103 @@
</li>
<li id="M201902230">
- <p>Facebook offered</em></ins></span> a <span
class="inserted"><ins><em>convenient proprietary
- library for building</em></ins></span> mobile <span
class="removed"><del><strong>phone. This</strong></del></span> <span
class="inserted"><ins><em>apps, which also <a
+ <p>Facebook offered a convenient proprietary
+ library for building mobile apps, which also <a
href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
sent personal data to Facebook</a>. Lots of companies built apps that
way and released them, apparently not realizing that all the personal
- data they collected</em></ins></span> would
- <span class="removed"><del><strong>enable crackers</strong></del></span>
<span class="inserted"><ins><em>go</em></ins></span> to <span
class="removed"><del><strong>listen in on</strong></del></span> <span
class="inserted"><ins><em>Facebook as well.</p>
+ data they collected would go to Facebook as well.</p>
- <p>It shows that no one can trust</em></ins></span> a <span
class="removed"><del><strong>child's speech, and</strong></del></span> <span
class="inserted"><ins><em>nonfree program, not</em></ins></span> even <span
class="removed"><del><strong>speak
- into</strong></del></span> the <span class="removed"><del><strong>toys
themselves.</p></strong></del></span>
- <span class="inserted"><ins><em>developers of other nonfree
programs.</p></em></ins></span>
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A computerized vibrator
- <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902140"></em></ins></span>
- <p>The <span class="removed"><del><strong>app was
reporting</strong></del></span> <span class="inserted"><ins><em>AppCensus
database gives information on <a
+ <li id="M201902140">
+ <p>The AppCensus database gives information on <a
href="https://www.appcensus.mobi"> how Android apps use and
misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span
class="removed"><del><strong>temperature</strong></del></span> <span
class="inserted"><ins><em><a
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
href="/proprietary/proprietary-surveillance.html#M201812290">
Advertising ID</a> to other companies, and <a
href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23%</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
- so that users cannot escape tracking</em></ins></span> by
- <span class="removed"><del><strong>minute (thus, indirectly,
whether</strong></del></span> <span class="inserted"><ins><em>resetting
it.</p>
+ 18,000 (23% of the total) link this ID to hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
<p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But</em></ins></span> it <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
- and, once informed,</em></ins></span> was <span
class="removed"><del><strong>surrounded by a person's
- body), as well as the vibration frequency.</p>
-
- <p>Note</strong></del></span> <span class="inserted"><ins><em>in no
hurry to take action. This proves
- that</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response:</strong></del></span> <span
class="inserted"><ins><em>policies of</em></ins></span> a <span
class="removed"><del><strong>labeling
- standard with which manufacturers would make statements about
- their products, rather than free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
- preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>which users could</strong></del></span> <span
class="inserted"><ins><em>developers from including malware in
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry to take action. This proves
+ that the policies of a development platform are ineffective at
+ preventing nonfree software developers from including malware in
their programs.</p>
</li>
<li id="M201902060">
- <p>Many nonfree apps</em></ins></span> have
- <span class="removed"><del><strong>checked and changed.</p>
-
- <p>The company that made the vibrator
- <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued</strong></del></span> <span class="inserted"><ins><em>a
surveillance feature</em></ins></span> for <span
class="removed"><del><strong>collecting lots of personal information about how
- people used it</a>.</p>
-
- <p>The company's statement that it was
anonymizing</strong></del></span> <span class="inserted"><ins><em><a
+ <p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all</em></ins></span> the <span
class="removed"><del><strong>data may be
- true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>users' actions</a> in interacting
with</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+ recording all the users' actions</a> in interacting with the
app.</p>
</li>
<li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>a
- data broker, the data broker would have been able</strong></del></span>
- <span class="inserted"><ins><em>be on Google Play had one or more
malicious functionalities, such as <a
+ <p>Twenty nine “beauty camera” apps that used to
+ be on Google Play had one or more malicious functionalities, such as <a
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
stealing users' photos</a> instead of “beautifying” them,
pushing unwanted and often malicious ads on users, and redirecting
- them</em></ins></span> to <span class="removed"><del><strong>figure out
- who</strong></del></span> <span class="inserted"><ins><em>phishing sites
that stole their credentials. Furthermore,</em></ins></span>
- the user <span class="removed"><del><strong>was.</p>
-
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered</strong></del></span> <span
class="inserted"><ins><em>interface of most of them was
designed</em></ins></span> to <span
class="removed"><del><strong>pay</strong></del></span> <span
class="inserted"><ins><em>make uninstallation
+ them to phishing sites that stole their credentials. Furthermore,
+ the user interface of most of them was designed to make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>total</strong></del></span> <span
class="inserted"><ins><em>potential risk because
- there is no easy way</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
- to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>knowing what they really
do.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902010">
- <p>An investigation of</em></ins></span> the
- <span class="removed"><del><strong>manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
<span class="inserted"><ins><em>150 most popular
- gratis VPN apps in Google Play</em></ins></span> found <span
class="removed"><del><strong>a way to access the data</a>
- collected by the manufacturer's snooping.</p>
-
- <p>That the manufacturer and the FBI could listen to these
conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail</em></ins></span> to <span class="removed"><del><strong>spy on
children and adults</a>.</p>
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they really do.</p>
</li>
-</ul>
-
-<!-- #SpywareOnSmartWatches -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>protect their usersâ privacy</a>
due</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>DNS leaks. In
+ <li id="M201902010">
+ <p>An investigation of the 150 most popular
+ gratis VPN apps in Google Play found that <a
+ href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
source code—often used for invasive advertising—that could
- potentially also be used to spy</em></ins></span> on <span
class="inserted"><ins><em>users. Other technical flaws were
+ potentially also be used to spy on users. Other technical flaws were
found as well.</p>
<p>Moreover, a previous investigation had found that <a
href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
- the</em></ins></span> top <span class="removed"><del><strong>under each
subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnSmartWatches">Spyware on “Smart”
Watches</h3>
- <span class="anchor-reference-id">
- (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
-<ul>
- <li>
- <p>An LG “smart” watch</strong></del></span> <span
class="inserted"><ins><em>10 gratis VPN apps have lousy privacy
policies</a>.</p>
-
- <p><small>(It</em></ins></span> is <span
class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>unfortunate that these articles talk about “free
- apps.” These apps are gratis, but they are
<em>not</em></em></ins></span> <a <span
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else and to transmit
- conversations too</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.)</small></p></em></ins></span>
+ <p><small>(It is unfortunate that these articles talk about
“free
+ apps.” These apps are gratis, but they are <em>not</em>
<a
+ href="/philosophy/free-sw.html">free
software</a>.)</small></p>
</li>
- <span class="removed"><del><strong><li>
- <p>A very cheap “smart watch” comes with an
Android</strong></del></span>
- <span class="inserted"><ins><em><li id="M201901050">
- <p>The Weather Channel</em></ins></span> app <a <span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations</em></ins></span> to <span
class="removed"><del><strong>an unidentified site in China</a>.</p>
- <p>The article says this</strong></del></span> <span
class="inserted"><ins><em>the company's server</a>. The
company</em></ins></span> is <span class="removed"><del><strong>a back door,
but</strong></del></span>
- <span class="inserted"><ins><em>being sued, demanding</em></ins></span>
that <span class="removed"><del><strong>could be a
- misunderstanding. However,</strong></del></span> it <span
class="inserted"><ins><em>notify the users of what it will do
+ <li id="M201901050">
+ <p>The Weather Channel app <a
+
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ stored users' locations to the company's server</a>. The company is
+ being sued, demanding that it notify the users of what it will do
with the data.</p>
- <p>We think that lawsuit</em></ins></span> is <span
class="removed"><del><strong>certainly surveillance,</strong></del></span>
<span class="inserted"><ins><em>about a side issue. What the company does
+ <p>We think that lawsuit is about a side issue. What the company does
with the data is a secondary issue. The principal wrong here is that
- the company gets that data</em></ins></span> at
- <span
class="removed"><del><strong>least.</p></strong></del></span> <span
class="inserted"><ins><em>all.</p>
+ the company gets that data at all.</p>
<p><a
href="https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps">
Other weather apps</a>, including Accuweather and WeatherBug, are
- tracking people's locations.</p></em></ins></span>
+ tracking people's locations.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
-
-<ul>
-<li><p></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201812290">
- <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report</em></ins></span> on <span class="removed"><del><strong>Windows
installs.
-Note that</strong></del></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a “clean” Windows install is not really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>user's actions</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
+ <li id="M201812290">
+ <p>Around 40% of gratis Android apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions to Facebook</a>.</p>
<p>Often they send the machine's “advertising ID,” so
that
- Facebook</em></ins></span> can <span
class="removed"><del><strong>collect</strong></del></span> <span
class="inserted"><ins><em>correlate</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
- this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
-
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>obtains from the same machine via
+ Facebook can correlate the data it obtains from the same machine via
various apps. Some of them send Facebook detailed information about
- the user's activities</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span
class="inserted"><ins><em>the app; others only say that the user is
+ the user's activities in the app; others only say that the user is
using that app, but that alone is often quite informative.</p>
<p>This spying occurs regardless of whether the user has a Facebook
@@ -1929,27 +1362,14 @@
</li>
<li id="M201810244">
- <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users that have deleted
them</a>.</p></em></ins></span>
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted them</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware in Skype:</strong></del></span>
- <span class="inserted"><ins><em><li id="M201808030">
- <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ <li id="M201808030">
+ <p>Some Google apps on Android <a
+
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
record the user's location even when users disable “location
tracking”</a>.</p>
@@ -1958,48 +1378,22 @@
</li>
<li id="M201806110">
- <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ <p>The Spanish football streaming app <a
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
the user's movements and listens through the
microphone</a>.</p>
- <p>This makes them act as spies</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
- </li>
-</ul>
-
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make</strong></del></span> <span
class="inserted"><ins><em>licensing enforcement.</p>
+ <p>This makes them act as spies for licensing enforcement.</p>
<p>We expect it implements DRM, too—that there is no way to
save
- a recording. But we can't be</em></ins></span> sure <span
class="inserted"><ins><em>from the article.</p>
-
- <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware</strong></del></span> <span
class="inserted"><ins><em>care much less about sports, you will
benefit</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
+ a recording. But we can't be sure from the article.</p>
-<ul>
- <li>
- <p>Every “home security” camera, if its manufacturer can
communicate with it,</strong></del></span>
- <span class="inserted"><ins><em>many ways. This</em></ins></span> is <span
class="removed"><del><strong>a surveillance device.</strong></del></span> <span
class="inserted"><ins><em>one more.</p>
+ <p>If you learn to care much less about sports, you will benefit in
+ many ways. This is one more.</p>
</li>
<li id="M201804160">
- <p>More than</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera is an example</a>.</p>
- <p>The article describes wrongdoing</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ <p>More than <a
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
of the 5,855 Android apps studied by researchers were found to snoop
and collect information about its users</a>. 40% of the apps were
found to insecurely snitch on its users. Furthermore, they could
@@ -2068,12 +1462,13 @@
<p>On the other hand, Google redistributes nonfree Android apps, and
therefore shares in the responsibility for the injustice of their being
- nonfree. It also distributes its own nonfree apps, such as Google Play,
+ nonfree. It also distributes its own nonfree</em></ins></span> apps, such
as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
<p>Could Google have done a better job of preventing apps from
- cheating? There is no systematic way for Google, or Android users,
+ cheating? There is no systematic way for Google, or <span
class="removed"><del><strong>Android
+ users,</strong></del></span> <span class="inserted"><ins><em>Android users,
to inspect executable proprietary apps to see what they do.</p>
<p>Google could demand the source code for these apps, and study
@@ -2106,23 +1501,30 @@
</li>
<li id="M201704260">
- <p>Faceapp appears to do lots of surveillance, judging by <a
+ <p>Faceapp appears</em></ins></span> to <span
class="removed"><del><strong>inspect executable proprietary
apps</strong></del></span> <span class="inserted"><ins><em>do lots of
surveillance, judging by <a
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data in the
device</a>.</p>
+ how much access it demands</em></ins></span> to <span
class="removed"><del><strong>see what they
+ do.</p>
+
+ <p>Google could demand</strong></del></span> <span
class="inserted"><ins><em>personal data in</em></ins></span> the <span
class="removed"><del><strong>source code</strong></del></span> <span
class="inserted"><ins><em>device</a>.</p>
</li>
<li id="M201704190">
- <p>Users are suing Bose for <a
+ <p>Users are suing Bose</em></ins></span> for <span
class="removed"><del><strong>these apps, and study</strong></del></span> <span
class="inserted"><ins><em><a
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing a spyware app for its headphones</a>. Specifically,
- the app would record the names of the audio files users listen to
+ distributing a spyware app for its headphones</a>.
Specifically,</em></ins></span>
+ the
+ <span class="removed"><del><strong>source code somehow to determine
whether they mistreat</strong></del></span> <span class="inserted"><ins><em>app
would record the names of the audio files</em></ins></span> users <span
class="removed"><del><strong>in
+ various ways.</strong></del></span> <span class="inserted"><ins><em>listen
to
along with the headphone's unique serial number.</p>
- <p>The suit accuses that this was done without the users' consent.
- If the fine print of the app said that users gave consent for this,
- would that make it acceptable? No way! It should be flat out <a
- href="/philosophy/surveillance-vs-democracy.html"> illegal to design
- the app to snoop at all</a>.</p>
+ <p>The suit accuses that this was done without the users'
consent.</em></ins></span>
+ If <span class="removed"><del><strong>it did a good
job</strong></del></span> <span class="inserted"><ins><em>the fine
print</em></ins></span> of <span class="inserted"><ins><em>the app said that
users gave consent for</em></ins></span> this,
+ <span class="inserted"><ins><em>would that make</em></ins></span> it <span
class="removed"><del><strong>could more or less
+ prevent such snooping, except when</strong></del></span> <span
class="inserted"><ins><em>acceptable? No way! It should be flat out <a
+ href="/philosophy/surveillance-vs-democracy.html"> illegal to
design</em></ins></span>
+ the app <span class="removed"><del><strong>developers are clever
+ enough</strong></del></span> to <span
class="removed"><del><strong>outsmart</strong></del></span> <span
class="inserted"><ins><em>snoop at all</a>.</p>
</li>
<li id="M201704074">
@@ -2136,35 +1538,39 @@
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
announced an opt-in proprietary search app that it will</a>
pre-install
- on some of its phones. The app will give Verizon the same information
- about the users' searches that Google normally gets when they use
+ on some of its phones. The app will give Verizon</em></ins></span> the
<span class="removed"><del><strong>checking.</p>
+
+ <p>But since Google itself develops malicious apps, we cannot
trust</strong></del></span> <span class="inserted"><ins><em>same information
+ about the users' searches that</em></ins></span> Google <span
class="removed"><del><strong>to protect us. We</strong></del></span> <span
class="inserted"><ins><em>normally gets when they use
its search engine.</p>
<p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and the user must
- explicitly opt-in before the app takes effect. However, the app
- remains spyware—an “optional” piece of spyware is
+ being pre-installed on only one phone</a>, and the
user</em></ins></span> must <span class="removed"><del><strong>demand
release</strong></del></span>
+ <span class="inserted"><ins><em>explicitly opt-in before the app takes
effect. However, the app
+ remains spyware—an “optional” piece</em></ins></span> of
<span class="removed"><del><strong>source code</strong></del></span> <span
class="inserted"><ins><em>spyware is
still spyware.</p>
</li>
<li id="M201701210">
<p>The Meitu photo-editing app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to a Chinese company</a>.</p>
+ user data</em></ins></span> to <span class="inserted"><ins><em>a Chinese
company</a>.</p>
</li>
<li id="M201611280">
<p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
+ movements before and after</em></ins></span> the
+ <span class="removed"><del><strong>public, so we can depend on each
other.</p></strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
<p>This example illustrates how “getting the user's
consent” for surveillance is inadequate as a protection against
- massive surveillance.</p>
+ massive surveillance.</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li></strong></del></span>
- <li id="M201611160">
+ <span class="inserted"><ins><em><li id="M201611160"></em></ins></span>
<p>A <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated the privacy and security of
@@ -2173,11 +1579,15 @@
apps—millions of users may be unawarely subject to poor security
guarantees and abusive practices inflicted by VPN apps.”</p>
- <p>Following is a non-exhaustive list, taken from the research paper,
- of some proprietary VPN apps that track users and infringe their
+ <p>Following is a non-exhaustive <span
class="removed"><del><strong>list</strong></del></span> <span
class="inserted"><ins><em>list, taken from the research paper,</em></ins></span>
+ of <span class="inserted"><ins><em>some</em></ins></span> proprietary VPN
apps <span class="removed"><del><strong>from
+ the research paper</strong></del></span> that <span
class="removed"><del><strong>tracks</strong></del></span> <span
class="inserted"><ins><em>track users</em></ins></span> and <span
class="removed"><del><strong>infringes the privacy of
+ users:</p>
+
+ <dl></strong></del></span> <span class="inserted"><ins><em>infringe
their
privacy:</p>
- <dl class="compact">
+ <dl class="compact"></em></ins></span>
<dt>SurfEasy</dt>
<dd>Includes tracking libraries such as NativeX and Appflood,
meant to track users and show them targeted ads.</dd>
@@ -2199,20 +1609,60 @@
<dt>VPN Services HotspotShield</dt>
<dd>Injects JavaScript code into the HTML pages returned to the
users. The stated purpose of the JS injection is to display ads. Uses
- roughly five tracking libraries. Also, it redirects the user's
+ roughly <span class="removed"><del><strong>5</strong></del></span> <span
class="inserted"><ins><em>five</em></ins></span> tracking libraries. Also, it
redirects the user's
traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses roughly
- five tracking libraries. Developers of this app have confirmed that
+ <dd>Injects JavaScript code into HTML pages, and also uses roughly
<span class="removed"><del><strong>5</strong></del></span>
+ <span class="inserted"><ins><em>five</em></ins></span> tracking
libraries. Developers of this app have confirmed that
the non-premium version of the app does JavaScript injection for
- tracking the user and displaying ads.</dd>
+ tracking <span class="inserted"><ins><em>the user</em></ins></span> and
<span class="removed"><del><strong>display</strong></del></span> <span
class="inserted"><ins><em>displaying</em></ins></span> ads.</dd>
</dl>
</li>
+<span class="removed"><del><strong><li>
+ <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of the top-ranked gratis
+ proprietary Android apps contained recognizable tracking libraries. For
+ the paid proprietary apps, it was only 60%.</p>
+
+ <p>The article confusingly describes gratis apps as “free”,
+ but most of them are not in fact
+ <a href="/philosophy/free-sw.html">free software</a>.
+ It also uses the ugly word “monetize”. A good replacement
+ for that word is “exploit”; nearly always that will fit
+ perfectly.</p>
+</li>
+
+<li>
+ <p>Apps for BART
+ <a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With proprietary apps, one can only hope that they don't.</p>
+</li>
+
+<li>
+ <p>A study found 234 Android apps that track users by
+ <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed in stores or played by TV
programs</a>.
+ </p>
+
+</li>
+
+<li>
+ <p>Pairs of Android apps can collude to transmit users' personal
+ data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands of pairs that collude</a>.</p>
+</li>
+
+<li>
+<p>Google Play intentionally sends</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609210">
+ <p>Google's new voice messaging</em></ins></span> app <span
class="removed"><del><strong>developers</strong></del></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+the personal details of users that install the app</a>.</p>
- <li id="M201609210">
- <p>Google's new voice messaging app <a
-
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+<p>Merely asking</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
all conversations</a>.</p>
</li>
@@ -2220,43 +1670,67 @@
<p>Facebook's new Magic Photo app <a
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections for known faces</a>,
- and suggests you to share the picture you take according to who is
- in the frame.</p>
+ and suggests you to share</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>picture you take
according to who</em></ins></span> is <span class="removed"><del><strong>not
enough</strong></del></span>
+ <span class="inserted"><ins><em>in the frame.</p>
+
+ <p>This spyware feature seems</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>require
online access to some
+ known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>“Terms and Conditions” that spell out
+what they</strong></del></span> <span
class="inserted"><ins><em>pictures</em></ins></span> are <span
class="removed"><del><strong>“consenting” to. Google should clearly
+and honestly identify</strong></del></span> <span
class="inserted"><ins><em>likely to be
+ sent across</em></ins></span> the <span
class="removed"><del><strong>information it collects on users, instead
+of hiding it in an obscurely worded EULA.</p>
+
+<p>However,</strong></del></span> <span
class="inserted"><ins><em>wire</em></ins></span> to <span
class="removed"><del><strong>truly protect people's privacy, we must prevent
Google</strong></del></span> <span class="inserted"><ins><em>Facebook's
servers</em></ins></span> and <span class="removed"><del><strong>other
companies from getting this personal information in the first
+place!</p>
+</li>
- <p>This spyware feature seems to require online access to some
- known-faces database, which means the pictures are likely to be
- sent across the wire to Facebook's servers and face-recognition
+ <li>
+ <p>Google Play (a component</strong></del></span> <span
class="inserted"><ins><em>face-recognition
algorithms.</p>
- <p>If so, none of Facebook users' pictures are private anymore,
- even if the user didn't “upload” them to the service.</p>
+ <p>If so, none</em></ins></span> of <span
class="removed"><del><strong>Android) <a
+
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks the</strong></del></span> <span
class="inserted"><ins><em>Facebook</em></ins></span> users' <span
class="removed"><del><strong>movements without their
permission</a>.</p>
+
+ <p>Even</strong></del></span> <span
class="inserted"><ins><em>pictures are private anymore,
+ even</em></ins></span> if <span class="removed"><del><strong>you disable
Google Maps and location tracking, you must
+ disable Google Play itself to completely stop</strong></del></span> the
<span class="removed"><del><strong>tracking. This is
+ yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>user didn't “upload”
them</em></ins></span> to <span
class="removed"><del><strong>obey</strong></del></span> the <span
class="removed"><del><strong>user,
+ when it's actually doing something else. Such a thing
would</strong></del></span> <span class="inserted"><ins><em>service.</p>
</li>
<li id="M201605310">
<p>Facebook's app listens all the time, <a
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html">to
snoop on what people are listening to or watching</a>. In addition,
- it may be analyzing people's conversations to serve them with targeted
- advertisements.</p>
+ it may</em></ins></span> be <span class="removed"><del><strong>almost
+ unthinkable</strong></del></span> <span
class="inserted"><ins><em>analyzing people's conversations to serve
them</em></ins></span> with <span class="removed"><del><strong>free
software.</p></strong></del></span> <span
class="inserted"><ins><em>targeted
+ advertisements.</p></em></ins></span>
</li>
- <li id="M201604250">
+ <span class="removed"><del><strong><li><p>More than
73%</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201604250">
<p>A pregnancy test controller application not only can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts of data in the phone, and in server accounts,
+ spy on many sorts</em></ins></span> of <span
class="inserted"><ins><em>data in</em></ins></span> the <span
class="removed"><del><strong>most popular Android apps</strong></del></span>
<span class="inserted"><ins><em>phone, and in server accounts,
it can alter them too</a>.</p>
</li>
<li id="M201601130">
- <p>Apps that include <a
-
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also on what users post on various sites
- such as Facebook, Google+ and Twitter.</p>
+ <p>Apps that include</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio</em></ins></span> and
<span class="removed"><del><strong>location information</a> of
their</strong></del></span> <span class="inserted"><ins><em>TV programs
+ are playing nearby</a>. Also on what</em></ins></span> users <span
class="removed"><del><strong>with third
parties.</p></strong></del></span> <span class="inserted"><ins><em>post
on various sites
+ such as Facebook, Google+ and Twitter.</p></em></ins></span>
</li>
- <li id="M201511190">
- <p>“Cryptic communication,”
+ <span
class="removed"><del><strong><li><p>“Cryptic</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511190">
+ <p>“Cryptic</em></ins></span> communication,”
unrelated to the app's functionality, was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
found in the 500 most popular gratis Android apps</a>.</p>
@@ -2266,19 +1740,99 @@
to say “zero price” is “gratis.”</p>
<p>The article takes for granted that the usual analytics tools are
- legitimate, but is that valid? Software developers have no right to
- analyze what users are doing or how. “Analytics” tools
- that snoop are just as wrong as any other snooping.</p>
+ legitimate, but is that valid? Software developers have no <span
class="removed"><del><strong>right to
+ analyze what users are doing or how. “Analytics” tools that
snoop are
+ just as wrong as any other snooping.</p>
+ </li>
+ <li><p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
+ connect to 100
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
+ on the average.</p>
+ </li>
+ <li><p>Spyware is present in some Android devices when they are
sold.
+ Some Motorola phones modify Android to
+ <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data to Motorola</a>.</p>
+ </li>
+
+ <li><p>Some manufacturers add a
+ <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p>
+ </li>
+
+ <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access to any file on the
system.</p>
+ </li>
+</ul>
+
+
+
+<!-- #SpywareOnMobiles -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareIniThings">Spyware in iThings</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+</div>
+
+<ul>
+ <li><p>The DMCA and the EU Copyright Directive make it <a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal to study how iOS cr...apps spy on users</a>, because this
+ would require circumventing the iOS DRM.</p>
+ </li>
+
+ <li><p>In the latest iThings system, “turning off”
WiFi and Bluetooth the
+ obvious way <a
+
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>.
+ A more advanced way really does turn them off—only until 5am.
+ That's Apple for you—“We know you want to be spied
on”.</p>
+ </li>
+
+ <li><p>Apple proposes
+ <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way to use it without having your
fingerprints
+ taken. Users would have no way to tell whether the phone is snooping on
+ them.</p></li>
+
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots of personal data</strong></del></span> <span
class="inserted"><ins><em>right</em></ins></span> to <span
class="removed"><del><strong>Apple's servers</a>. Big Brother can
+ get them from there.</p>
+ </li>
+
+ <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number</strong></del></span>
+ <span class="inserted"><ins><em>analyze what users are doing or how.
“Analytics” tools</em></ins></span>
+ that <span class="removed"><del><strong>the user types into it</a>;
the server records these numbers for at least 30
+ days.</p></strong></del></span> <span
class="inserted"><ins><em>snoop are just as wrong as any other
snooping.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
+ without giving a valid email address</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201510300">
+ <p>More than 73%</em></ins></span> and <span
class="removed"><del><strong>receiving the code Apple
+ sends to it.</p>
</li>
- <li id="M201510300">
- <p>More than 73% and 47% of mobile applications, for Android and iOS
- respectively <a href="https://techscience.org/a/2015103001/">share
+ <li><p>Around</strong></del></span> 47% of <span
class="removed"><del><strong>the most popular</strong></del></span> <span
class="inserted"><ins><em>mobile applications, for Android
and</em></ins></span> iOS <span
class="removed"><del><strong>apps</strong></del></span>
+ <span class="inserted"><ins><em>respectively</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+
href="http://jots.pub/a/2015103001/index.php">share</strong></del></span>
<span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">share</em></ins></span>
personal, behavioral and location information</a> of their users with
third parties.</p>
</li>
- <li id="M201508210">
+ <span class="removed"><del><strong><li><p>iThings automatically
upload</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201508210">
<p>Like most “music screaming” disservices, Spotify is
based on proprietary malware (DRM and snooping). In August 2015 it <a
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
@@ -2311,19 +1865,33 @@
<li id="M201505060">
<p>Gratis Android apps (but not <a
- href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
-
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
- and advertising</a> URLs, on the average.</p>
+ href="/philosophy/free-sw.html">free software</a>)
connect</em></ins></span> to <span class="removed"><del><strong>Apple's servers
all the photos and
+ videos they make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you
take,</strong></del></span> <span class="inserted"><ins><em>100 <a
+
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</em></ins></span>
+ and <span class="removed"><del><strong>keeps them up to
date</strong></del></span> <span
class="inserted"><ins><em>advertising</a> URLs,</em></ins></span> on
<span class="removed"><del><strong>all your devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
+
+ <p>(From</strong></del></span> <span class="inserted"><ins><em>the
average.</p>
</li>
<li id="M201504060">
- <p>Widely used <a
-
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This is in addition to
- the snooping done by the phone company, and perhaps by the OS in
+ <p>Widely used</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
+ information</a> as accessed</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop</em></ins></span> on <span
class="removed"><del><strong>24 Sep 2015.) The iCloud
feature</strong></del></span> <span class="inserted"><ins><em>the
user</a>. This</em></ins></span> is
+ <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT202033">activated</strong></del></span>
<span class="inserted"><ins><em>in addition to
+ the snooping done</em></ins></span> by the
+ <span class="removed"><del><strong>startup</strong></del></span> <span
class="inserted"><ins><em>phone company, and perhaps by the OS in
the phone.</p>
- <p>Don't be distracted by the question of whether the app developers
+ <p>Don't be distracted by the question</em></ins></span> of <span
class="removed"><del><strong>iOS</a>. The term “cloud” means
+ “please don't ask where.”</p>
+
+ <p>There</strong></del></span> <span
class="inserted"><ins><em>whether the app developers
get users to say “I agree”. That is no excuse for
malware.</p>
</li>
@@ -2331,44 +1899,68 @@
<li id="M201411260">
<p>Many proprietary apps for mobile devices
report which other apps the user has installed. <a
- href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible and optional</a>. Not
- as bad as what the others do.</p>
+
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</em></ins></span>
+ is <span class="inserted"><ins><em>doing this in</em></ins></span> a way
<span class="removed"><del><strong>to <a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default so it still
counts</strong></del></span> <span class="inserted"><ins><em>that at least is
visible and optional</a>. Not
+ as bad</em></ins></span> as <span class="inserted"><ins><em>what the
others do.</p>
</li>
<li id="M201401150.1">
- <p>The Simeji keyboard is a smartphone version of Baidu's <a
- href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
+ <p>The Simeji keyboard is</em></ins></span> a
+ <span class="removed"><del><strong>surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>smartphone version</em></ins></span> of <span
class="removed"><del><strong>this to</strong></del></span> <span
class="inserted"><ins><em>Baidu's</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
title="Input Method Editor">IME</abbr></a>.</p>
</li>
<li id="M201312270">
- <p>The nonfree Snapchat app's principal purpose is to restrict the
- use of data on the user's computer, but it does surveillance too: <a
-
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the user's list of other people's phone
- numbers</a>.</p>
+ <p>The nonfree Snapchat app's principal purpose is</em></ins></span>
to <span class="removed"><del><strong>get at them, but NSA can access
any</strong></del></span> <span class="inserted"><ins><em>restrict the
+ use</em></ins></span> of <span class="removed"><del><strong>them through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p>Spyware in iThings:</strong></del></span> <span
class="inserted"><ins><em>data on</em></ins></span> the <span
class="inserted"><ins><em>user's computer, but it does surveillance
too:</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly where the iThing is,
+ and</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to</em></ins></span> get <span class="inserted"><ins><em>the
user's list of</em></ins></span> other <span class="removed"><del><strong>info
too.</p></strong></del></span> <span class="inserted"><ins><em>people's
phone
+ numbers</a>.</p></em></ins></span>
</li>
- <li id="M201312060">
- <p>The Brightest Flashlight app <a
-
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies</a>.</p>
+ <span class="removed"><del><strong><li><p>There is also a
feature for web sites to track users, which is</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312060">
+ <p>The Brightest Flashlight app</em></ins></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use</em></ins></span> by <span
class="removed"><del><strong>default</a>. (That article talks about iOS
6,</strong></del></span> <span
class="inserted"><ins><em>companies</a>.</p>
<p>The FTC criticized this app because it asked the user to
- approve sending personal data to the app developer but did not ask
- about sending it to other companies. This shows the weakness of
+ approve sending personal data to the app developer</em></ins></span> but
<span class="inserted"><ins><em>did not ask
+ about sending</em></ins></span> it
+ <span class="removed"><del><strong>is still true in iOS
7.)</p></strong></del></span> <span class="inserted"><ins><em>to other
companies. This shows the weakness of
the reject-it-if-you-dislike-snooping “solution” to
surveillance: why should a flashlight app send any information to
- anyone? A free software flashlight app would not.</p>
+ anyone? A free software flashlight app would
not.</p></em></ins></span>
</li>
- <li id="M201212100">
- <p>FTC says most mobile apps for children don't respect privacy:
<a
-
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ <span class="removed"><del><strong><li><p>The iThing
also</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201212100">
+ <p>FTC says most mobile apps for children don't respect
privacy:</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default, though that can be
+ turned off.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -2378,122 +1970,184 @@
<ul class="blurbs">
<li id="M201908151">
- <p>Skype refuses to say whether it can <a
-
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
- on calls</a>.</p>
+ <p>Skype refuses to say whether it can</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for the
state</a>.</p>
+ </li>
- <p>That almost certainly means it can do so.</p>
+ <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps the NSA snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop</em></ins></span>
+ on <span class="removed"><del><strong>all the data in an iThing,
+ or</strong></del></span> <span
class="inserted"><ins><em>calls</a>.</p>
+
+ <p>That almost certainly means</em></ins></span> it <span
class="removed"><del><strong>is totally
incompetent.</a></p></strong></del></span> <span
class="inserted"><ins><em>can do so.</p></em></ins></span>
</li>
- <li id="M201307110">
- <p>Skype contains <a
-
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
+ <span class="removed"><del><strong><li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem to exist for no
+ possible purpose other than surveillance</a>. Here is
the</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201307110">
+ <p>Skype contains</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
Microsoft changed Skype <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
+ specifically for spying</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInGames">Games</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware in
Telephones</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInGames">Games</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInGames">#SpywareInGames</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>Tracking software in popular Android
apps</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202010221">
- <p>Microsoft is imposing its
+ <p>Microsoft</em></ins></span> is <span
class="removed"><del><strong>pervasive</strong></del></span> <span
class="inserted"><ins><em>imposing its
surveillance on the game of Minecraft by <a
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
every player to open an account on Microsoft's network</a>. Microsoft
- has bought the game and will merge all accounts into its network,
+ has bought the game</em></ins></span> and
+ <span class="removed"><del><strong>sometimes very clever. Some trackers
can</strong></del></span> <span class="inserted"><ins><em>will merge all
accounts into its network,
which will give them access to people's data.</p>
- <p>Minecraft players <a
- href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
+ <p>Minecraft players</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://directory.fsf.org/wiki/Minetest">can
play Minetest</a>
instead. The essential advantage of Minetest is that it is free
- software, meaning it respects the user's computer freedom. As a bonus,
- it offers more options.</p>
+ software, meaning it respects the</em></ins></span> user's <span
class="removed"><del><strong>movements around</strong></del></span> <span
class="inserted"><ins><em>computer freedom. As</em></ins></span> a <span
class="removed"><del><strong>physical store by noticing WiFi
+ networks</a>.</p></strong></del></span> <span
class="inserted"><ins><em>bonus,
+ it offers more options.</p></em></ins></span>
</li>
- <li id="M201908210">
- <p>Microsoft recorded users of Xboxes and had <a
-
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
- human workers listen to the recordings</a>.</p>
+ <span class="removed"><del><strong><li><p>Android tracks
location for Google</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201908210">
+ <p>Microsoft recorded users of Xboxes and had</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off, even
+ when</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
+ human workers listen to</em></ins></span> the <span
class="removed"><del><strong>phone has</strong></del></span> <span
class="inserted"><ins><em>recordings</a>.</p>
- <p>Morally, we see no difference between having human workers listen
and
+ <p>Morally, we see</em></ins></span> no <span
class="removed"><del><strong>SIM card</a>.</p></li>
+
+ <li><p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with</strong></del></span> <span
class="inserted"><ins><em>difference between having human workers listen and
having speech-recognition systems listen. Both intrude on
privacy.</p>
</li>
<li id="M201806240">
- <p>Red Shell is a spyware that
+ <p>Red Shell is a</em></ins></span> spyware <span
class="removed"><del><strong>sending lots of</strong></del></span> <span
class="inserted"><ins><em>that
is found in many proprietary games. It <a
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data on users' computers and sends it to third
parties</a>.</p>
+ tracks</em></ins></span> data <span class="inserted"><ins><em>on users'
computers and sends it</em></ins></span> to <span
class="removed"><del><strong>China</a>.</p></li>
+
+ <li><p>According</strong></del></span> <span
class="inserted"><ins><em>third parties</a>.</p>
</li>
<li id="M201804144">
<p>ArenaNet surreptitiously installed a spyware
- program along with an update to the massive
- multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
-
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
- to snoop on all open processes running on its user's
computer</a>.</p>
+ program along with an update</em></ins></span> to <span
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>the massive
+ multiplayer game Guild Wars 2. The spyware allowed
ArenaNet</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
+ by sending hidden text messages which enable them</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"></em></ins></span>
+ to <span class="removed"><del><strong>turn the
phones</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>and off, listen</strong></del></span> <span
class="inserted"><ins><em>all open processes running on its user's
computer</a>.</p>
</li>
<li id="M201711070">
<p>The driver for a certain gaming keyboard <a
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
- information to China</a>.</p>
+ information</em></ins></span> to <span class="removed"><del><strong>the
microphone, retrieve geo-location data from the
+ GPS, take photographs, read text messages, read call, location and web
+ browsing history,</strong></del></span> <span
class="inserted"><ins><em>China</a>.</p>
</li>
<li id="M201512290">
<p>Many <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and report to the
- internet</a>—even what their users weigh.</p>
+ video game consoles snoop on their users</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>report to</em></ins></span> the <span
class="removed"><del><strong>contact list. This malware</strong></del></span>
+ <span class="inserted"><ins><em>internet</a>—even what their
users weigh.</p>
- <p>A game console is a computer, and you can't trust a computer with
- a nonfree operating system.</p>
+ <p>A game console</em></ins></span> is <span
class="removed"><del><strong>designed to
+ disguise itself from investigation.</p>
+ </li>
+
+ <li><p>Samsung phones come</strong></del></span> <span
class="inserted"><ins><em>a computer, and you can't trust a
computer</em></ins></span> with
+ <span class="inserted"><ins><em>a nonfree operating system.</p>
</li>
<li id="M201509160">
- <p>Modern gratis game cr…apps <a
-
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data about their users and their users'
+ <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of data about their</em></ins></span> users <span
class="removed"><del><strong>can't delete</a>,</strong></del></span> and
<span class="inserted"><ins><em>their users'
friends and associates</a>.</p>
- <p>Even nastier, they do it through ad networks that merge the data
+ <p>Even nastier,</em></ins></span> they <span
class="removed"><del><strong>send so much</strong></del></span> <span
class="inserted"><ins><em>do it through ad networks that merge the data
collected by various cr…apps and sites made by different
companies.</p>
- <p>They use this data to manipulate people to buy things, and hunt
for
- “whales” who can be led to spend a lot of money. They also
- use a back door to manipulate the game play for specific players.</p>
+ <p>They use this</em></ins></span> data <span
class="removed"><del><strong>that their transmission is a
+ substantial expense</strong></del></span> <span
class="inserted"><ins><em>to manipulate people to buy things, and
hunt</em></ins></span> for <span class="removed"><del><strong>users. Said
transmission, not wanted or
+ requested by the user, clearly must constitute
spying</strong></del></span>
+ <span class="inserted"><ins><em>“whales” who can be led to
spend a lot</em></ins></span> of <span class="removed"><del><strong>some
+ kind.</p></li>
+
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens</strong></del></span> <span class="inserted"><ins><em>money.
They also
+ use a back door to manipulate the game play</em></ins></span> for <span
class="removed"><del><strong>voice all</strong></del></span> <span
class="inserted"><ins><em>specific players.</p>
+
+ <p>While</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+ </li>
- <p>While the article describes gratis games, games that cost money
- can use the same tactics.</p>
+ <li><p>Spyware in Android phones (and Windows? laptops): The Wall
+ Street Journal (in an</strong></del></span> article <span
class="removed"><del><strong>blocked from us by a paywall)
+ reports</strong></del></span> <span class="inserted"><ins><em>describes
gratis games, games</em></ins></span> that
+ <span class="removed"><del><strong><a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI</strong></del></span> <span class="inserted"><ins><em>cost
money</em></ins></span>
+ can <span class="removed"><del><strong>remotely
activate</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> the <span
class="removed"><del><strong>GPS and microphone in Android
+ phones</strong></del></span> <span class="inserted"><ins><em>same
tactics.</p>
</li>
<li id="M201401280">
<p>Angry Birds <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and the NSA takes advantage
- to spy through it too</a>. Here's information on <a
-
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ spies for companies,</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
+ (I suspect this means Windows laptops.) Here is</strong></del></span>
<span class="inserted"><ins><em>the NSA takes advantage
+ to spy through it too</a>. Here's information on</em></ins></span>
<a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
+ More about NSA app spying</a>.</p></em></ins></span>
</li>
- <li id="M200510200">
+ <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M200510200">
<p>Blizzard Warden is a hidden
“cheating-prevention” program that <a
href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies on every process running on a gamer's computer and sniffs a
- good deal of personal data</a>, including lots of activities which
- have nothing to do with cheating.</p>
+ spies</em></ins></span> on
+ <span class="removed"><del><strong>remote command</strong></del></span>
<span class="inserted"><ins><em>every process running on a gamer's
computer</em></ins></span> and <span class="removed"><del><strong>users cannot
stop them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable phones
+ to</strong></del></span> <span class="inserted"><ins><em>sniffs a
+ good deal of personal data</a>, including lots of activities
which</em></ins></span>
+ have <span class="removed"><del><strong>GPS.)</p>
+ </li>
+
+ <li><p>The nonfree Snapchat app's principal purpose
is</strong></del></span> <span
class="inserted"><ins><em>nothing</em></ins></span> to <span
class="removed"><del><strong>restrict
+ the use</strong></del></span> <span class="inserted"><ins><em>do with
cheating.</p>
</li>
</ul>
@@ -2507,147 +2161,246 @@
<ul class="blurbs">
<li id="M201708280">
- <p>The bad security in many Internet of Stings devices allows <a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on the people that use them</a>.</p>
+ <p>The bad security in many Internet</em></ins></span> of <span
class="removed"><del><strong>data on the user's computer, but it does
surveillance
+ too:</strong></del></span> <span class="inserted"><ins><em>Stings
devices allows</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
+ to <span class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>snoop on the people that use them</a>.</p>
- <p>Don't be a sucker—reject all the stings.</p>
+ <p>Don't be a sucker—reject all</em></ins></span> the <span
class="removed"><del><strong>user's list of other people's phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>stings.</p>
<p><small>(It is unfortunate that the article uses the term
<a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p>
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInTVSets">TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInTVSets">TV
Sets</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></em></ins></span>
</div>
-<p>Emo Phillips made a joke: The other day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
-before Amazon “smart” TVs.</p>
+<span class="removed"><del><strong><ul>
+ <li>
+ <p>The moviepass app</strong></del></span>
+
+<span class="inserted"><ins><em><p>Emo Phillips made a joke: The other
day a woman came up to me</em></ins></span> and <span
class="removed"><del><strong>dis-service spy</strong></del></span>
+<span class="inserted"><ins><em>said, “Didn't I see
you</em></ins></span> on <span class="removed"><del><strong>users even more
than users
+ expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel</strong></del></span> <span
class="inserted"><ins><em>television?” I said, “I
+don't know. You can't see out the other way.” Evidently that
was</em></ins></span>
+before <span class="removed"><del><strong>and after
going</strong></del></span> <span class="inserted"><ins><em>Amazon
“smart” TVs.</p>
<ul class="blurbs">
<li id="M202006250">
- <p>TV manufacturers are able to <a
-
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
- every second of what the user is watching</a>. This is illegal due to
- the Video Privacy Protection Act of 1988, but they're circumventing
- it through EULAs.</p>
+ <p>TV manufacturers are able</em></ins></span> to <span
class="removed"><del><strong>a movie</a>.
+ </p>
+
+ <p>Don't be tracked — pay cash!</p>
</li>
- <li id="M201901070">
- <p>Vizio TVs <a
-
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever the TV sees,”</a> in the own words of
the company's
+ <li><p>AI-powered driving apps can</strong></del></span> <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop</em></ins></span>
+ every <span class="removed"><del><strong>move</a>.</p>
+ </li>
+
+ <li><p>The Sarahah app
+ <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers and email addresses</a> in user's address
+ book to developer's server. Note that this article
misuses</strong></del></span> <span class="inserted"><ins><em>second of
what</em></ins></span> the <span class="removed"><del><strong>words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring</strong></del></span> <span class="inserted"><ins><em>user is
watching</a>. This is illegal due</em></ins></span> to <span
class="removed"><del><strong>zero price.</p>
+ </li>
+
+ <li>
+ <p>Facebook's app listens all</strong></del></span>
+ the <span class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
+ on what people are listening to or watching</a>. In
addition,</strong></del></span> <span class="inserted"><ins><em>Video Privacy
Protection Act of 1988, but they're circumventing</em></ins></span>
+ it <span class="removed"><del><strong>may
+ be analyzing people's conversations to serve them with targeted
+ advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>through EULAs.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li>
+ <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201901070">
+ <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands to personal
data</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever the TV sees,”</a></em></ins></span> in
the <span class="removed"><del><strong>device</a>.
+ </p>
+ </li>
+
+ <li>
+ <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that it will</a>
+ pre-install on some</strong></del></span> <span
class="inserted"><ins><em>own words</em></ins></span> of <span
class="removed"><del><strong>its phones. The app will give Verizon the same
+ information about</strong></del></span> the <span
class="removed"><del><strong>users' searches</strong></del></span> <span
class="inserted"><ins><em>company's
CTO, and this data is sold to third parties. This is in return for
“better service” (meaning more intrusive ads?) and slightly
lower retail prices.</p>
<p>What is supposed to make this spying acceptable, according to him,
- is that it is opt-in in newer models. But since the Vizio software is
- nonfree, we don't know what is actually happening behind the scenes,
- and there is no guarantee that all future updates will leave the
- settings unchanged.</p>
+ is</em></ins></span> that <span class="removed"><del><strong>Google
normally gets when
+ they use its search engine.</p>
+
+ <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>it is opt-in in newer models. But
since</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>Vizio software</em></ins></span> is <span
class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and</strong></del></span>
+ <span class="inserted"><ins><em>nonfree, we don't know what is actually
happening behind</em></ins></span> the
+ <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>scenes,
+ and there is no guarantee that all future updates will
leave</em></ins></span> the <span class="removed"><del><strong>app takes
effect. However,</strong></del></span>
+ <span class="inserted"><ins><em>settings unchanged.</p>
<p>If you already own a Vizio “smart” TV (or any
“smart” TV, for that
- matter), the easiest way to make sure it isn't spying on you is
- to disconnect it from the Internet, and use a terrestrial antenna
- instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is to get your own router (which can
- be an old computer running completely free software), and set up a
+ matter),</em></ins></span> the
+ <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware</strong></del></span> <span
class="inserted"><ins><em>easiest way to make sure it isn't spying on
you</em></ins></span> is
+ <span class="removed"><del><strong>still spyware.</p>
+ </li>
+
+ <li><p>The Meitu photo-editing
+ app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data</strong></del></span>
+ to <span class="inserted"><ins><em>disconnect it from the Internet, and
use</em></ins></span> a <span class="removed"><del><strong>Chinese
company</a>.</p></li>
+
+ <li><p>A pregnancy test controller
application</strong></del></span> <span class="inserted"><ins><em>terrestrial
antenna
+ instead. Unfortunately, this is</em></ins></span> not <span
class="removed"><del><strong>only</strong></del></span> <span
class="inserted"><ins><em>always possible. Another option,
+ if you are technically oriented, is to get your own router
(which</em></ins></span> can <span class="removed"><del><strong><a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts of data in the phone,</strong></del></span>
+ <span class="inserted"><ins><em>be an old computer running completely free
software),</em></ins></span> and <span class="removed"><del><strong>in server
accounts, it</strong></del></span> <span class="inserted"><ins><em>set up a
firewall to block connections to Vizio's servers. Or, as a last resort,
- you can replace your TV with another model.</p>
+ you</em></ins></span> can
+ <span class="removed"><del><strong>alter them too</a>.
+ </p></li>
+
+ <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>replace your TV with another model.</p>
</li>
<li id="M201804010">
- <p>Some “Smart” TVs automatically <a
-
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after the ride</a>.</p>
+
+ <p>This example illustrates how
“getting</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
- <p>We link to the article for the facts it presents. It
- is too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix app <a
- href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
- malware too</a>.</p>
+ <p>We link to</em></ins></span> the <span
class="removed"><del><strong>user's consent”</strong></del></span> <span
class="inserted"><ins><em>article</em></ins></span> for <span
class="removed"><del><strong>surveillance</strong></del></span> <span
class="inserted"><ins><em>the facts it presents. It</em></ins></span>
+ is <span class="removed"><del><strong>inadequate as a protection against
massive
+ surveillance.</p>
+ </li>
+
+ <li><p>Google's new voice messaging</strong></del></span> <span
class="inserted"><ins><em>too bad that the article finishes by advocating the
+ moral weakness of surrendering to Netflix. The Netflix</em></ins></span>
app <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ malware too</a>.</p></em></ins></span>
</li>
- <li id="M201702060">
- <p>Vizio “smart” <a
-
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts and
+ <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702060">
+ <p>Vizio “smart”</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed</em></ins></span> on <span
class="inserted"><ins><em>them, and not just broadcasts and
cable</a>. Even if the image is coming from the user's own computer,
- the TV reports what it is. The existence of a way to disable the
+ the TV reports</em></ins></span> what <span
class="removed"><del><strong>radio</strong></del></span> <span
class="inserted"><ins><em>it is. The existence of a way to disable the
surveillance, even if it were not hidden as it was in these TVs,
does not legitimize the surveillance.</p>
</li>
<li id="M201511130">
- <p>Some web and TV advertisements play inaudible
- sounds to be picked up by proprietary malware running
- on other devices in range so as to determine that they
+ <p>Some web</em></ins></span> and TV <span
class="removed"><del><strong>programs
+ are playing nearby</a>. Also on what users
post</strong></del></span> <span class="inserted"><ins><em>advertisements play
inaudible
+ sounds to be picked up by proprietary malware running</em></ins></span>
+ on <span class="removed"><del><strong>various sites
+ such</strong></del></span> <span class="inserted"><ins><em>other devices
in range so</em></ins></span> as <span class="removed"><del><strong>Facebook,
Google+</strong></del></span> <span class="inserted"><ins><em>to determine that
they
are nearby. Once your Internet devices are paired with
- your TV, advertisers can correlate ads with Web activity, and other <a
+ your TV, advertisers can correlate ads with Web
activity,</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
- cross-device tracking</a>.</p>
+ cross-device tracking</a>.</p></em></ins></span>
</li>
- <li id="M201511060">
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511060">
<p>Vizio goes a step further than other TV
- manufacturers in spying on their users: their <a
-
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so that advertisers can track you
- across devices.</p>
+ manufacturers in spying on their users: their</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze</em></ins></span> your <span
class="removed"><del><strong>mobile phone's photo collections for known
faces</a>,</strong></del></span> <span class="inserted"><ins><em>viewing
habits in detail</em></ins></span> and <span
class="removed"><del><strong>suggests you to share the
picture</strong></del></span>
+ <span class="inserted"><ins><em>link them your IP address</a> so
that advertisers can track</em></ins></span> you <span
class="removed"><del><strong>take according to who</strong></del></span>
+ <span class="inserted"><ins><em>across devices.</p>
+
+ <p>It</em></ins></span> is <span class="removed"><del><strong>in the
frame.</p>
- <p>It is possible to turn this off, but having it enabled by default
+ <p>This spyware feature seems</strong></del></span> <span
class="inserted"><ins><em>possible</em></ins></span> to <span
class="removed"><del><strong>require online access</strong></del></span> <span
class="inserted"><ins><em>turn this off, but having it enabled by default
is an injustice already.</p>
</li>
<li id="M201511020">
- <p>Tivo's alliance with Viacom adds 2.3 million households
- to the 600 millions social media profiles the company
+ <p>Tivo's alliance with Viacom adds 2.3 million
households</em></ins></span>
+ to <span class="removed"><del><strong>some
+ known-faces database, which means</strong></del></span> the <span
class="removed"><del><strong>pictures are likely to be
+ sent across</strong></del></span> <span class="inserted"><ins><em>600
millions social media profiles</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>company
already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
information with online social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing all
- users to new combined surveillance by default.</p>
+ users</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span class="inserted"><ins><em>new combined
surveillance by default.</p>
</li>
<li id="M201507240">
- <p>Vizio “smart” TVs recognize and <a
+ <p>Vizio “smart” TVs recognize</em></ins></span> and
<span class="removed"><del><strong>face-recognition
+ algorithms.</p>
+
+ <p>If so, none of Facebook users' pictures</strong></del></span>
<span class="inserted"><ins><em><a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are watching</a>, even if it isn't a TV
channel.</p>
+ what people</em></ins></span> are <span
class="removed"><del><strong>private
+ anymore,</strong></del></span> <span
class="inserted"><ins><em>watching</a>,</em></ins></span> even if <span
class="removed"><del><strong>the user didn't “upload” them to the
service.</p>
+ </li>
+
+ <li><p>Like most “music screaming” disservices,
Spotify
+ is based</strong></del></span> <span class="inserted"><ins><em>it isn't
a TV channel.</p>
</li>
<li id="M201505290">
<p>Verizon cable TV <a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch, and even what they wanted to
+ snoops</em></ins></span> on <span class="removed"><del><strong>proprietary
malware (DRM</strong></del></span> <span class="inserted"><ins><em>what
programs people watch,</em></ins></span> and <span
class="removed"><del><strong>snooping). In August
+ 2015 it</strong></del></span> <span class="inserted"><ins><em>even what
they wanted to
record</a>.</p>
</li>
<li id="M201504300">
- <p>Vizio <a
-
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade” to make its TVs snoop on what
- users watch</a>. The TVs did not do that when first sold.</p>
+ <p>Vizio</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ used a firmware “upgrade” to make its TVs snoop on
what</em></ins></span>
+ users <span class="removed"><del><strong>submit</strong></del></span>
<span class="inserted"><ins><em>watch</a>. The TVs did not do that when
first sold.</p>
</li>
<li id="M201502090">
<p>The Samsung “Smart” TV <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on the internet to another company,
Nuance</a>.
- Nuance can save it and would then have to give it to the US or some
- other government.</p>
+ transmits users' voice on the internet</em></ins></span> to <span
class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span
class="inserted"><ins><em>another company, Nuance</a>.
+ Nuance can save it</em></ins></span> and <span
class="inserted"><ins><em>would then have to give it to the US
or</em></ins></span> some
+ <span class="removed"><del><strong>are starting</strong></del></span>
+ <span class="inserted"><ins><em>other government.</p>
+
+ <p>Speech recognition is not</em></ins></span> to <span
class="removed"><del><strong>realize that</strong></del></span> <span
class="inserted"><ins><em>be trusted unless</em></ins></span> it is <span
class="removed"><del><strong>nasty.</p>
- <p>Speech recognition is not to be trusted unless it is done by free
+ <p>This article shows the <a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways</strong></del></span> <span class="inserted"><ins><em>done
by free
software in your own computer.</p>
- <p>In its privacy policy, Samsung explicitly confirms that <a
+ <p>In its privacy policy, Samsung explicitly
confirms</em></ins></span> that <span class="removed"><del><strong>they
present</strong></del></span> <span class="inserted"><ins><em><a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
data containing sensitive information will be transmitted to third
parties</a>.</p>
@@ -2655,8 +2408,8 @@
<li id="M201411090">
<p>The Amazon “Smart” TV is <a
-
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all the time</a>.</p>
+
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"></em></ins></span>
+ snooping <span class="inserted"><ins><em>all the time</a>.</p>
</li>
<li id="M201409290">
@@ -2664,32 +2417,41 @@
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
- <p>The report was as of 2014, but we don't expect this has got
+ <p>The report was</em></ins></span> as <span
class="removed"><del><strong>a way</strong></del></span> <span
class="inserted"><ins><em>of 2014, but we don't expect this has got
better.</p>
- <p>This shows that laws requiring products to get users' formal
+ <p>This shows that laws requiring products</em></ins></span> to
<span class="removed"><del><strong>“serve” users
better</a>—never mind
+ whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>get users' formal
consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent? Probably the TV will
- say, “Without your consent to tracking, the TV will not
+ And what happens if</em></ins></span> a <span
class="removed"><del><strong>typical example of</strong></del></span> <span
class="inserted"><ins><em>user declines consent? Probably</em></ins></span> the
<span class="removed"><del><strong>attitude of</strong></del></span> <span
class="inserted"><ins><em>TV will
+ say, “Without your consent to tracking,</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
+ those they have subjugated.</p>
+
+ <p>Out, out, damned Spotify!</p>
+ </li>
+ <li><p>Many proprietary apps for mobile
devices</strong></del></span> <span class="inserted"><ins><em>TV will not
work.”</p>
- <p>Proper laws would say that TVs are not allowed to report what the
+ <p>Proper laws would say that TVs are not allowed
to</em></ins></span> report <span class="removed"><del><strong>which other
+ apps</strong></del></span> <span class="inserted"><ins><em>what the
user watches—no exceptions!</p>
</li>
<li id="M201405200">
<p>Spyware in LG “smart” TVs <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches, and the switch to turn this off has
- no effect</a>. (The fact that the transmission reports a 404 error
+ reports what</em></ins></span> the user <span
class="inserted"><ins><em>watches, and the switch to turn this
off</em></ins></span> has
+ <span class="removed"><del><strong>installed.</strong></del></span>
+ <span class="inserted"><ins><em>no effect</a>. (The fact that the
transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
- <p>Even worse, it <a
-
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ <p>Even worse, it</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
snoops on other devices on the user's local network</a>.</p>
<p>LG later said it had installed a patch to stop this, but any
- product could spy this way.</p>
+ product could spy</em></ins></span> this <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>way.</p>
<p>Meanwhile, LG TVs <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
@@ -2699,10 +2461,18 @@
<li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a “smart”
TV</a>
- and use its camera to watch the people who are watching TV.</p>
+ Crackers found</em></ins></span> a way <span
class="removed"><del><strong>that at least is visible</strong></del></span>
<span class="inserted"><ins><em>to break security on a “smart”
TV</a></em></ins></span>
+ and
+ <span class="removed"><del><strong>optional</a>. Not as bad as
what</strong></del></span> <span class="inserted"><ins><em>use its camera to
watch</em></ins></span> the <span class="removed"><del><strong>others
do.</p>
</li>
-</ul>
+
+ <li><p>FTC says most mobile apps for children don't respect
privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>people who are watching
TV.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -2712,37 +2482,52 @@
<ul class="blurbs">
<li id="M201901100">
- <p>Amazon Ring “security” devices <a
-
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture to Amazon servers</a>, which save it
+ <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>video they
capture</em></ins></span> to <span class="inserted"><ins><em>Amazon
servers</a>, which save it
long-term.</p>
- <p>In many cases, the video shows everyone that comes near, or merely
- passes by, the user's front door.</p>
+ <p>In many cases,</em></ins></span> the <span
class="removed"><del><strong>snooping done by the phone company, and perhaps
by</strong></del></span> <span class="inserted"><ins><em>video shows everyone
that comes near, or merely
+ passes by,</em></ins></span> the <span class="removed"><del><strong>OS
in</strong></del></span> <span class="inserted"><ins><em>user's front
door.</p>
<p>The article focuses on how Ring used to let individual employees
look
- at the videos freely. It appears Amazon has tried to prevent that
- secondary abuse, but the primary abuse—that Amazon gets the
- video—Amazon expects society to surrender to.</p>
+ at</em></ins></span> the
+ <span class="removed"><del><strong>phone.</p>
+
+ <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>videos freely. It appears Amazon has tried to
prevent that
+ secondary abuse, but</em></ins></span> the <span
class="removed"><del><strong>question of whether</strong></del></span> <span
class="inserted"><ins><em>primary abuse—that Amazon
gets</em></ins></span> the <span class="removed"><del><strong>app developers get
+ users</strong></del></span>
+ <span class="inserted"><ins><em>video—Amazon expects
society</em></ins></span> to <span class="removed"><del><strong>say “I
agree”. That is no excuse for malware.</p></strong></del></span>
<span class="inserted"><ins><em>surrender to.</p></em></ins></span>
</li>
- <li id="M201810300">
- <p>Nearly all “home security cameras” <a
-
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy of everything they
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810300">
+ <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p>
+
+ <p>The FTC criticized this app because it
asked</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give</em></ins></span> the <span class="removed"><del><strong>user to
+ approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>manufacturer an unencrypted copy of everything they
see</a>. “Home insecurity camera” would be a better
name!</p>
<p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not to look at what's in the videos. That's not
- security for your home. Security means making sure they don't get to
- see through your camera.</p>
+ manufacturers promise not</em></ins></span> to <span
class="inserted"><ins><em>look at what's in</em></ins></span> the <span
class="removed"><del><strong>app developer but did</strong></del></span> <span
class="inserted"><ins><em>videos. That's</em></ins></span> not
+ <span class="removed"><del><strong>ask about sending
it</strong></del></span>
+ <span class="inserted"><ins><em>security for your home. Security means
making sure they don't get</em></ins></span> to <span
class="removed"><del><strong>other companies. This shows the
+ weakness</strong></del></span>
+ <span class="inserted"><ins><em>see through your camera.</p>
</li>
<li id="M201603220">
- <p>Over 70 brands of network-connected surveillance cameras have
<a
+ <p>Over 70 brands</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+ “solution”</strong></del></span> <span
class="inserted"><ins><em>network-connected surveillance cameras have <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone to watch through them</a>.</p>
+ security bugs that allow anyone</em></ins></span> to <span
class="removed"><del><strong>surveillance: why should a flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>watch through them</a>.</p>
</li>
<li id="M201511250">
@@ -2750,18 +2535,23 @@
href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
even when the “owner” switches it “off.”</p>
- <p>A “smart” device means the manufacturer is using it
- to outsmart you.</p>
+ <p>A “smart” device means the manufacturer is using
it</em></ins></span>
+ to <span class="removed"><del><strong>anyone? A free software flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInToys">Toys</h4>
+ <h4 <span class="removed"><del><strong>id="SpywareInToys">Spyware in
Toys</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
<span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+
+ <li></strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711244">
<p>The Furby Connect has a <a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
@@ -2770,14 +2560,27 @@
into one.</p>
</li>
- <li id="M201711100">
+ <li id="M201711100"></em></ins></span>
<p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings of the conversation between two users</a>.</p>
</li>
- <li id="M201703140">
- <p>A computerized vibrator <a
+ <span class="removed"><del><strong><li>
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
+ a speech recognition company based in the U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control the toys with a mobile phone. This would
+ enable crackers to listen in on a child's speech, and even speak
+ into the toys themselves.</p>
+ </li>
+
+ <li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201703140"></em></ins></span>
+ <p>A computerized vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
was snooping on its users through the proprietary control
app</a>.</p>
@@ -2806,62 +2609,105 @@
customers.</p>
</li>
- <li id="M201702280">
- <p>“CloudPets” toys with microphones <a
-
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess what?
<a
-
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a> collected by the
+ <span class="removed"><del><strong><li><p>
“CloudPets”</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702280">
+ <p>“CloudPets”</em></ins></span> toys with microphones
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak</em></ins></span> childrens' conversations to the
manufacturer</a>. Guess what? <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers</em></ins></span> found a way to access the data</a>
collected by the
manufacturer's snooping.</p>
<p>That the manufacturer and the FBI could listen to these
- conversations was unacceptable by itself.</p>
+ conversations was unacceptable by <span
class="removed"><del><strong>itself.</p></li>
+
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>itself.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<!-- #SpywareOnSmartWatches -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareOnSmartWatches">Spyware on “Smart”
Watches</h3>
+ <span class="anchor-reference-id">
+ (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li>
+ <p>An LG</strong></del></span>
- <li id="M201612060">
- <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
+ <span class="inserted"><ins><em><li id="M201612060">
+ <p>The</em></ins></span> “smart” <span
class="removed"><del><strong>watch is designed
+ <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+ to report its location to someone else</strong></del></span> <span
class="inserted"><ins><em>toys My Friend Cayla</em></ins></span> and <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>i-Que</em></ins></span> transmit
+ <span class="removed"><del><strong>conversations
too</a>.</p>
+ </li>
+ <li>
+ <p>A very cheap “smart watch” comes with an Android app
+ <a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>, a speech recognition
- company based in the U.S.</p>
+ conversations</em></ins></span> to <span class="removed"><del><strong>an
unidentified site</strong></del></span> <span class="inserted"><ins><em>Nuance
Communications</a>, a speech recognition
+ company based</em></ins></span> in <span
class="removed"><del><strong>China</a>.</p>
+ <p>The article says this is</strong></del></span> <span
class="inserted"><ins><em>the U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would enable
- crackers to listen in on a child's speech, and even speak into the
- toys themselves.</p>
+ can remotely control the toys with</em></ins></span> a <span
class="removed"><del><strong>back door, but that could be</strong></del></span>
<span class="inserted"><ins><em>mobile phone. This would enable
+ crackers to listen in on</em></ins></span> a
+ <span class="removed"><del><strong>misunderstanding. However, it is
certainly surveillance, at
+ least.</p></strong></del></span> <span
class="inserted"><ins><em>child's speech, and even speak into the
+ toys themselves.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure</strong></del></span>
- <li id="M201502180">
+ <span class="inserted"><ins><em><li id="M201502180">
<p>Barbie <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going to spy on children and adults</a>.</p>
+ going</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>children and
adults</a>.</p>
</li>
-</ul>
+</ul></em></ins></span>
-<div class="big-subsection">
- <h4 id="SpywareInDrones">Drones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low
Level</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear:
left;"></div></strong></del></span>
-<ul class="blurbs">
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708040">
<p>While you're using a DJI drone
to snoop on other people, DJI is in many cases <a
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p>
</li>
-</ul>
+</ul></em></ins></span>
<div class="big-subsection">
- <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4>
+ <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+<li><p></strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202009270">
<p>Many employers are using nonfree
- software, including videoconference software, to <a
-
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
+ software, including videoconference software, to</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
surveil and monitor staff working at home</a>. If the program reports
whether you are “active,” that is in effect a malicious
surveillance feature.</p>
@@ -2876,78 +2722,134 @@
listens for things like smoke alarms</a> and then notifies your phone
that an alarm is happening. This means the devices now listen for more
than just their wake words. Google says the software update was sent
- out prematurely and on accident and Google was planning on disclosing
+ out prematurely</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a></strong></del></span>
on <span class="removed"><del><strong>Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>accident and Google
was planning on disclosing
this new feature and offering it to customers who pay for it.</p>
</li>
<li id="M202006300">
- <p>“Bossware” is malware that bosses <a
+ <p>“Bossware” is malware</em></ins></span> that <span
class="inserted"><ins><em>bosses <a
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
- coerce workers into installing in their own computers</a>, so the
- bosses can spy on them.</p>
+ coerce workers into installing in their own computers</a>,
so</em></ins></span> the <span class="removed"><del><strong>specific sabotage
method Lenovo used did not affect
+GNU/Linux; also, a “clean” Windows install</strong></del></span>
+ <span class="inserted"><ins><em>bosses can spy on them.</p>
+
+ <p>This shows why requiring the user's
“consent”</em></ins></span> is not <span
class="removed"><del><strong>really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+ <span class="inserted"><ins><em>an adequate basis for protecting digital
privacy. The boss can coerce
+ most workers into consenting</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it</strong></del></span> <span
class="inserted"><ins><em>almost anything, even probable exposure
+ to contagious disease that</em></ins></span> can <span
class="removed"><del><strong>collect the emails of members of
Parliament</strong></del></span> <span class="inserted"><ins><em>be fatal.
Software like</em></ins></span> this <span class="removed"><del><strong>way,
because they pass</strong></del></span> <span class="inserted"><ins><em>should
+ be illegal and bosses that demand</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
+ </li>
+</ul>
+
- <p>This shows why requiring the user's “consent” is not
- an adequate basis for protecting digital privacy. The boss can coerce
- most workers into consenting to almost anything, even probable exposure
- to contagious disease that can be fatal. Software like this should
- be illegal and bosses that demand it should be prosecuted for it.</p>
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype
+ <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically</strong></del></span> <span
class="inserted"><ins><em>should be prosecuted</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>it.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span>
- <li id="M201911190">
+ <span class="inserted"><ins><em><li id="M201911190">
<p>Internet-tethered Amazon Ring had
- a security vulnerability that enabled attackers to <a
+ a security vulnerability that enabled attackers</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
- access the user's wifi password</a>, and snoop on the household
+ access the user's wifi password</a>, and snoop</em></ins></span> on
<span class="removed"><del><strong>The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>Every “home security” camera,</strong></del></span>
<span class="inserted"><ins><em>the household
through connected surveillance devices.</p>
<p>Knowledge of the wifi password would not be sufficient to carry
- out any significant surveillance if the devices implemented proper
- security, including encryption. But many devices with proprietary
- software lack this. Of course, they are also used</em></ins></span> by
<span class="inserted"><ins><em>their
+ out any significant surveillance</em></ins></span> if <span
class="removed"><del><strong>its manufacturer can
communicate</strong></del></span> <span class="inserted"><ins><em>the devices
implemented proper
+ security, including encryption. But many devices</em></ins></span> with
<span class="removed"><del><strong>it,</strong></del></span> <span
class="inserted"><ins><em>proprietary
+ software lack this. Of course, they are also used by their
manufacturers for snooping.</p>
</li>
<li id="M201907210">
<p>Google “Assistant” records users' conversations <a
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
- when it is not supposed to listen</a>. Thus, when one of Google's
- subcontractors discloses a thousand confidential voice recordings,
+ when it</em></ins></span> is <span class="inserted"><ins><em>not supposed
to listen</a>. Thus, when one of Google's
+ subcontractors discloses</em></ins></span> a <span
class="removed"><del><strong>surveillance device. <a
+href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+ Canary camera</strong></del></span> <span
class="inserted"><ins><em>thousand confidential voice recordings,
users were easily identified from these recordings.</p>
- <p>Since Google “Assistant” uses proprietary software,
there is no
+ <p>Since Google “Assistant” uses proprietary software,
there</em></ins></span> is <span class="removed"><del><strong>an
example</a>.</p>
+ <p>The article describes wrongdoing by</strong></del></span> <span
class="inserted"><ins><em>no
way to see or control what it records or sends.</p>
- <p>Rather than trying to better control the use of recordings, Google
- should not record or listen to the person's voice. It should only
- get commands that the user wants to send to some Google service.</p>
- </li>
-
- <li id="M201905061">
- <p>Amazon Alexa collects a lot more information from users
- than is necessary for correct functioning (time, location,
- recordings made without a legitimate prompt), and sends
- it to Amazon's servers, which store it indefinitely. Even
- worse, Amazon forwards it to third-party companies. Thus,
- even if users request deletion of their data from Amazon's servers, <a
-
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
- the <span class="removed"><del><strong>manufacturer,
based</strong></del></span> <span class="inserted"><ins><em>data
remain</em></ins></span> on <span class="inserted"><ins><em>other
servers</a>, where they can be accessed by
- advertising companies and government agencies. In other words,
- deleting</em></ins></span> the <span class="removed"><del><strong>fact
- that the device is tethered to a server.</p>
+ <p>Rather than trying to better control</em></ins></span> the <span
class="removed"><del><strong>manufacturer, based on</strong></del></span> <span
class="inserted"><ins><em>use of recordings, Google
+ should not record or listen to</em></ins></span> the <span
class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>person's voice. It should only
+ get commands</em></ins></span> that the <span
class="removed"><del><strong>device is tethered</strong></del></span> <span
class="inserted"><ins><em>user wants</em></ins></span> to <span
class="removed"><del><strong>a server.</p>
<p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But it also demonstrates that</strong></del></span> <span
class="inserted"><ins><em>collected information doesn't
cancel</em></ins></span> the <span class="removed"><del><strong>device
gives</strong></del></span> <span class="inserted"><ins><em>wrong of
- collecting it.</p>
-
- <p>Data collected by devices such as</em></ins></span> the <span
class="removed"><del><strong>company
- surveillance capability.</p>
+ <p>But it also demonstrates that the device gives the company
+ surveillance capability.</p></strong></del></span> <span
class="inserted"><ins><em>send to some Google
service.</p></em></ins></span>
</li>
- <li>
- <p>The</strong></del></span> Nest <span
class="removed"><del><strong>Cam “smart” camera is <a
+ <span class="removed"><del><strong><li>
+ <p>The Nest Cam “smart” camera</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905061">
+ <p>Amazon Alexa collects a lot more information from users
+ than</em></ins></span> is <span class="removed"><del><strong><a
href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when</strong></del></span> <span
class="inserted"><ins><em>thermostat,</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>Philips
- Hue-connected lights,</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using it to outsmart
+ watching</a>, even when the “owner”
switches</strong></del></span> <span class="inserted"><ins><em>necessary for
correct functioning (time, location,
+ recordings made without a legitimate prompt), and sends</em></ins></span>
+ it <span class="removed"><del><strong>“off.”</p>
+ <p>A “smart” device means the manufacturer is
using</strong></del></span> <span class="inserted"><ins><em>to Amazon's
servers, which store it indefinitely. Even
+ worse, Amazon forwards</em></ins></span> it to <span
class="removed"><del><strong>outsmart
you.</p>
</li>
</ul>
@@ -2958,22 +2860,25 @@
</div>
<ul>
- <li><p>E-books can contain JavaScript
code,</strong></del></span> <span class="inserted"><ins><em>Chamberlain MyQ
garage opener</em></ins></span> and <span class="removed"><del><strong><a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops</strong></del></span> <span class="inserted"><ins><em>the
Sonos
- speakers are likewise stored longer than necessary</em></ins></span> on
<span class="removed"><del><strong>readers</a>.</p>
+ <li><p>E-books can contain JavaScript code,
+ and</strong></del></span> <span class="inserted"><ins><em>third-party
companies. Thus,
+ even if users request deletion of their data from Amazon's
servers,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
</li>
- <li><p>Spyware in many e-readers—not
only</strong></del></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span> <span
class="inserted"><ins><em>servers</em></ins></span>
- the <span class="removed"><del><strong>user reads at what
time</a>.</p>
+ <li><p>Spyware in many e-readers—not
only</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
+ the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"></strong></del></span>
<span class="inserted"><ins><em>data remain on other servers</a>,
where</em></ins></span> they <span class="removed"><del><strong>report even
which page</strong></del></span> <span class="inserted"><ins><em>can be
accessed by
+ advertising companies and government agencies. In other words,
+ deleting</em></ins></span> the <span class="removed"><del><strong>user
reads at what time</a>.</p>
</li>
- <li><p>Adobe</strong></del></span> <span
class="inserted"><ins><em>devices are tethered to. Moreover, they
are</em></ins></span> made <span class="removed"><del><strong>“Digital
Editions,” the e-reader used
+ <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span
class="inserted"><ins><em>collected information doesn't
cancel</em></ins></span> the <span class="removed"><del><strong>e-reader used
by most US libraries,
<a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed</strong></del></span> <span
class="inserted"><ins><em>available</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
+ send lots</strong></del></span> <span
class="inserted"><ins><em>wrong</em></ins></span> of <span
class="removed"><del><strong>data to Adobe</a>. Adobe's
“excuse”: it's
+ needed to check DRM!</p>
</li>
</ul>
@@ -2988,22 +2893,28 @@
snooping devices</a>.</p>
</li>
- <li id="nissan-modem"><p>The Nissan Leaf</strong></del></span>
- <span class="inserted"><ins><em>Alexa. As a result,
Amazon</em></ins></span> has a <span class="removed"><del><strong>built-in cell
phone modem which allows
+ <li id="nissan-modem"><p>The Nissan Leaf has a built-in cell
phone modem which allows
effectively
anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes</strong></del></span> <span
class="inserted"><ins><em>very precise picture of users' life
- at home, not only</em></ins></span> in <span
class="removed"><del><strong>various
+ access its computers remotely</strong></del></span>
+ <span class="inserted"><ins><em>collecting it.</p>
+
+ <p>Data collected by devices such as the Nest thermostat, the Philips
+ Hue-connected lights, the Chamberlain MyQ garage opener</em></ins></span>
and <span class="removed"><del><strong>make changes in various
settings</a>.</p>
<p>That's easy to do because</strong></del></span> the <span
class="removed"><del><strong>system has no authentication when
- accessed through the modem. However, even if it asked for
- authentication, you couldn't be confident that Nissan has no
- access. The software</strong></del></span> <span
class="inserted"><ins><em>present, but</em></ins></span> in the <span
class="removed"><del><strong>car is
+ accessed through</strong></del></span> <span
class="inserted"><ins><em>Sonos
+ speakers are likewise stored longer than necessary on</em></ins></span>
the <span class="removed"><del><strong>modem. However, even if it asked for
+ authentication, you couldn't be confident that
Nissan</strong></del></span> <span class="inserted"><ins><em>servers
+ the devices are tethered to. Moreover, they are made available to
+ Alexa. As a result, Amazon</em></ins></span> has <span
class="removed"><del><strong>no
+ access. The software</strong></del></span> <span
class="inserted"><ins><em>a very precise picture of users' life
+ at home, not only</em></ins></span> in the <span
class="removed"><del><strong>car is
proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
means it demands blind faith from its users</a>.</p>
- <p>Even if no one connects to the car
remotely,</strong></del></span> <span class="inserted"><ins><em>past (and, who
knows,
+ <p>Even if no one connects to</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>past (and, who knows,
in</em></ins></span> the <span class="removed"><del><strong>cell phone
modem enables</strong></del></span> <span class="inserted"><ins><em>future
too?)</p>
</li>
@@ -3063,7 +2974,7 @@
<p>It was very difficult for them to do this. The job would be much
easier for Amazon. And</em></ins></span> if <span
class="inserted"><ins><em>some government such as China or</em></ins></span>
the <span class="removed"><del><strong>state orders it</strong></del></span>
<span class="inserted"><ins><em>US
- told Amazon to do this, or cease</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>sell</em></ins></span> the <span
class="removed"><del><strong>data
+ told Amazon</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>data
and hand it over,</strong></del></span> <span
class="inserted"><ins><em>product in that country,
do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>state can store it.</p>
</li>
@@ -3105,63 +3016,36 @@
about you for later examination.</p>
</li>
- <span
class="removed"><del><strong><li><p>Nest</strong></del></span>
+ <span class="removed"><del><strong><li><p>Nest thermometers
+ send</strong></del></span>
<span class="inserted"><ins><em><li id="M201407170">
- <p id="nest-thermometers">Nest</em></ins></span> thermometers send
<a
+ <p id="nest-thermometers">Nest thermometers send <a
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
data about the user</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201310260">
+ <li id="M201310260">
<p><a
-
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"></em></ins></span>
+
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
Rent-to-own computers were programmed to spy on their
renters</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareOnWearables">Wearables</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnWearables">#SpywareOnWearables</a>)</span></em></ins></span>
+ <h4 id="SpywareOnWearables">Wearables</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnWearables">#SpywareOnWearables</a>)</span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li>
- <p>Vizio
- “smart”</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201807260">
- <p>Tommy Hilfiger clothing</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts
- and cable</a>. Even if the image is coming from the user's own
- computer,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
+ <p>Tommy Hilfiger clothing <a
+
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
monitor how often people wear it</a>.</p>
- <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>TV reports what it is. The existence of a
way</strong></del></span> <span
class="inserted"><ins><em>sheeple</em></ins></span> to
- <span class="removed"><del><strong>disable the surveillance, even if it
were not hidden as</strong></del></span> <span
class="inserted"><ins><em>find</em></ins></span> it <span
class="removed"><del><strong>was in
- these TVs, does not legitimize the surveillance.</p>
- </li>
-
- <li><p>More or less all “smart” TVs <a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
-
- <p>The report was as of 2014, but we don't expect this has got
better.</p>
-
- <p>This shows</strong></del></span> <span
class="inserted"><ins><em>normal</em></ins></span> that <span
class="removed"><del><strong>laws requiring products to get users' formal
- consent before collecting personal data are totally inadequate.
- And</strong></del></span> <span class="inserted"><ins><em>companies
- monitor every aspect of</em></ins></span> what <span
class="removed"><del><strong>happens if</strong></del></span> <span
class="inserted"><ins><em>they do.</p>
+ <p>This will teach the sheeple to find it normal that companies
+ monitor every aspect of what they do.</p>
</li>
</ul>
@@ -3172,490 +3056,515 @@
<li id="M202009100">
<p>Internet-enabled watches with proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they have</em></ins></span> a <span
class="removed"><del><strong>user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>lot of security
flaws. They <a
+ privacy. In addition, they have a lot of security flaws. They <a
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
- permit security breakers (and unauthorized people) to
access</a></em></ins></span> the <span class="removed"><del><strong>TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>watch.</p>
-
- <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages</em></ins></span> to
<span class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>and from</em></ins></span> the <span
class="removed"><del><strong>TV will
- not work.”</p>
+ permit security breakers (and unauthorized people) to access</a> the
watch.</p>
- <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>watch, possibly endangering the child.</p>
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
- <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>TVs are not allowed to report
what</strong></del></span> <span class="inserted"><ins><em>this article
misuses</em></ins></span> the <span class="removed"><del><strong>user watches
— no exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>word “<a
+ <p><small>(Note that this article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
- to mean “crackers.”)</small></p></em></ins></span>
+ to mean “crackers.”)</small></p>
</li>
- <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying on
- their users: their</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201603020">
- <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></em></ins></span>
- that <span class="removed"><del><strong>advertisers can track you
- across devices.</p>
- <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>connects</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
+ <li id="M201603020">
+ <p>A very cheap “smart watch” comes with an Android app
<a
+
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects to an unidentified site in China</a>.</p>
- <p>The article says</em></ins></span> this <span
class="removed"><del><strong>off,</strong></del></span> <span
class="inserted"><ins><em>is a back door,</em></ins></span> but <span
class="removed"><del><strong>having</strong></del></span> <span
class="inserted"><ins><em>that could be a
- misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>certainly surveillance, at
least.</p></em></ins></span>
+ <p>The article says this is a back door, but that could be a
+ misunderstanding. However, it is certainly surveillance, at
least.</p>
</li>
- <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households</strong></del></span>
+ <li id="M201407090">
+ <p>An LG “smart” watch is designed</em></ins></span>
<a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot of data about the user</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201407090">
- <p>An LG “smart” watch is designed <a
-
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
- to
- <span class="removed"><del><strong>the 600 millions social media
profiles the company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo</strong></del></span> <span
class="inserted"><ins><em>report its location to someone else and to transmit
conversations
- too</a>.</p>
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
+ to <span class="removed"><del><strong>spy on their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>report its location to someone else and to transmit
conversations
+ too</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInVehicles">Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInVehicles">Vehicles</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202008181">
<p>New Toyotas will <a
href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/">
- upload data to AWS to help create custom insurance premiums</a>
+ upload data</em></ins></span> to <span
class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>AWS to help create custom insurance premiums</a>
based on driver behaviour.</p>
- <p>Before you buy a “connected” car, make sure
you</em></ins></span> can
- <span class="inserted"><ins><em>disconnect its cellular antenna and its
GPS antenna. If you want
- GPS navigation, get a separate navigator which runs free software
- and works with Open Street Map.</p>
+ <p>Before you buy a “connected” car, make sure you can
+ disconnect its cellular antenna</em></ins></span> and
+<span class="removed"><del><strong>said, “Didn't I
see</strong></del></span> <span class="inserted"><ins><em>its GPS antenna.
If</em></ins></span> you <span class="removed"><del><strong>on
television?” I said, “I
+don't know. You can't see out the other way.” Evidently that was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li>
+ <p>Vizio
+ “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them,</strong></del></span> <span
class="inserted"><ins><em>want
+ GPS navigation, get a separate navigator which runs free
software</em></ins></span>
+ and <span class="removed"><del><strong>not just
broadcasts</strong></del></span> <span class="inserted"><ins><em>works with
Open Street Map.</p>
</li>
<li id="M201912171">
- <p>Most modern cars</em></ins></span> now <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
- record and send various kinds of data to the manufacturer</a>. For
- the user, access</em></ins></span> to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>the data is nearly impossible, as it involves
- cracking the car's computer, which is always hidden</em></ins></span> and
<span class="removed"><del><strong>TV advertisements play inaudible sounds to be
- picked up by proprietary malware</strong></del></span> running <span
class="removed"><del><strong>on other devices in
- range so as to determine that they are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads</strong></del></span> with <span
class="removed"><del><strong>Web activity,</strong></del></span>
- <span class="inserted"><ins><em>proprietary software.</p>
+ <p>Most modern cars now <a
+
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
+ record</em></ins></span> and <span
class="removed"><del><strong>cable</a>. Even if the image is coming
from</strong></del></span> <span class="inserted"><ins><em>send various kinds
of data to</em></ins></span> the <span class="removed"><del><strong>user's own
+ computer,</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. For</em></ins></span>
+ the <span class="removed"><del><strong>TV reports what it is. The
existence of a way</strong></del></span> <span class="inserted"><ins><em>user,
access</em></ins></span> to
+ <span class="removed"><del><strong>disable</strong></del></span> the <span
class="removed"><del><strong>surveillance, even if it were not
hidden</strong></del></span> <span class="inserted"><ins><em>data is nearly
impossible,</em></ins></span> as it <span class="removed"><del><strong>was in
+ these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>involves
+ cracking</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>car's computer, which is always hidden and
running with
+ proprietary software.</p></em></ins></span>
</li>
- <li id="M201903290">
- <p>Tesla cars collect lots of personal data,</em></ins></span> and
- <span class="removed"><del><strong>other</strong></del></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
- when they go to a junkyard the driver's personal data goes with
- them</a>.</p></em></ins></span>
+ <span class="removed"><del><strong><li><p>More or less all
“smart” TVs <a
+href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report was as</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201903290">
+ <p>Tesla cars collect lots</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect this has got
better.</p>
+
+ <p>This shows that laws requiring products to get users' formal
+ consent before collecting</strong></del></span> personal <span
class="removed"><del><strong>data are totally inadequate.
+ And what happens if</strong></del></span> <span
class="inserted"><ins><em>data, and <a
+
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
+ when they go to</em></ins></span> a <span
class="removed"><del><strong>user declines consent?
Probably</strong></del></span> <span
class="inserted"><ins><em>junkyard</em></ins></span> the <span
class="removed"><del><strong>TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>driver's personal data goes with
+ them</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and</strong></del></span>
- <span class="inserted"><ins><em><li id="M201902011">
- <p>The FordPass Connect feature of some Ford vehicles
has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access to the internal car network</a>. It is
constantly
- connected to the cellular phone network and sends Ford a lot of data,
- including car location. This feature operates</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>when the ignition
- key is removed, and users report that they can't disable it.</p>
+ <li id="M201902011">
+ <p>The FordPass Connect feature of some Ford vehicles has <a
+
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ near-complete access</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> the <span
class="removed"><del><strong>TV will
+ not work.”</p>
+
+ <p>Proper laws would say that TVs are not
allowed</strong></del></span> <span class="inserted"><ins><em>internal car
network</a>. It is constantly
+ connected</em></ins></span> to <span class="removed"><del><strong>report
what</strong></del></span> the <span class="removed"><del><strong>user watches
— no exceptions!</p>
+ </li>
+ <li><p>Vizio goes</strong></del></span> <span
class="inserted"><ins><em>cellular phone network and sends
Ford</em></ins></span> a <span class="removed"><del><strong>step further than
other TV manufacturers in spying on
+ their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in
detail</strong></del></span> <span class="inserted"><ins><em>lot of data,
+ including car location. This feature operates even when the ignition
+ key is removed,</em></ins></span> and
+ <span class="removed"><del><strong>link them your IP address</a>
so</strong></del></span> <span class="inserted"><ins><em>users
report</em></ins></span> that <span class="removed"><del><strong>advertisers
can track</strong></del></span> <span class="inserted"><ins><em>they can't
disable it.</p>
+
+ <p>If</em></ins></span> you
+ <span class="removed"><del><strong>across devices.</p>
- <p>If you own one of these cars, have you succeeded in breaking the
+ <p>It</strong></del></span> <span class="inserted"><ins><em>own
one of these cars, have you succeeded in breaking the
connectivity by disconnecting the cellular modem, or wrapping the
antenna in aluminum foil?</p>
</li>
<li id="M201811300">
- <p>In China,</em></ins></span> it <span
class="removed"><del><strong>isn't</strong></del></span> <span
class="inserted"><ins><em>is mandatory for electric
- cars to be equipped with</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p>
- </li>
- <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>terminal that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- snooping all</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ <p>In China, it</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>mandatory for electric
+ cars</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>be equipped with a terminal that <a
+ href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
transfers technical data, including car location,
to a government-run platform</a>. In practice, <a
href="/proprietary/proprietary-surveillance.html#car-spying">
- manufacturers collect this data</a> as part of their own spying, then
- forward it to</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>government-run
platform.</p></em></ins></span>
+ manufacturers collect</em></ins></span> this <span
class="removed"><del><strong>off, but having</strong></del></span> <span
class="inserted"><ins><em>data</a> as part of their own spying, then
+ forward</em></ins></span> it <span class="removed"><del><strong>enabled by
default
+ is an injustice already.</p>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201810230">
- <p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked</em></ins></span> the <span class="removed"><del><strong>internet
to another
- company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>choices of radio programs</a> in its
- “connected” cars, minute by minute.</p>
-
- <p>GM did not get users' consent, but</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>could</em></ins></span> have <span
class="removed"><del><strong>to
- give</strong></del></span> <span class="inserted"><ins><em>got that
easily by
- sneaking</em></ins></span> it <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>into</em></ins></span> the <span
class="removed"><del><strong>US or</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for</em></ins></span> some
<span class="removed"><del><strong>other government.</p>
- <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>digital service
- or other. A requirement for consent</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>effectively no protection.</p>
-
- <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="removed"><del><strong>be trusted
unless it is done
- by free software in</strong></del></span> <span
class="inserted"><ins><em>you,
- watching you, following</em></ins></span> your <span
class="removed"><del><strong>own computer.</p>
- <p>In its privacy policy, Samsung explicitly confirms
- that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice</strong></del></span>
<span class="inserted"><ins><em>movements, tracking passengers' cell
- phones. <em>All</em> such</em></ins></span> data <span
class="removed"><del><strong>containing sensitive information
will</strong></del></span> <span class="inserted"><ins><em>collection
should</em></ins></span> be <span
class="removed"><del><strong>transmitted</strong></del></span> <span
class="inserted"><ins><em>forbidden.</p>
-
- <p>But if you really want</em></ins></span> to
- <span class="removed"><del><strong>third parties</a>.</p>
+ <li><p>Tivo's alliance with Viacom adds 2.3 million
households</strong></del></span> to the <span class="removed"><del><strong>600
millions social media profiles</strong></del></span> <span
class="inserted"><ins><em>government-run platform.</p>
</li>
- <li><p>Spyware in
- <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports what the user watches,
and</strong></del></span> <span class="inserted"><ins><em>be safe, we must make
sure</em></ins></span> the <span class="removed"><del><strong>switch to turn
this off has no effect. (The fact</strong></del></span> <span
class="inserted"><ins><em>car's
- hardware cannot collect any of</em></ins></span> that <span
class="removed"><del><strong>the
- transmission reports a 404 error really means nothing; the server
- could save</strong></del></span> <span class="inserted"><ins><em>data,
or</em></ins></span> that <span class="removed"><del><strong>data
anyway.)</p>
- <p>Even worse, it
- <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on</strong></del></span> the <span
class="removed"><del><strong>user's local network.</a></p>
-
- <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>software
- is free so we know</em></ins></span> it <span
class="removed"><del><strong>had installed a patch to stop this,
but</strong></del></span> <span class="inserted"><ins><em>won't
collect</em></ins></span> any <span class="removed"><del><strong>product
- could spy this way.</p>
+ <li id="M201810230">
+ <p>GM <a
+ href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
+ tracked</em></ins></span> the <span class="removed"><del><strong>company
already
+ monitors. Tivo customers are unaware they're being
watched</strong></del></span> <span class="inserted"><ins><em>choices of radio
programs</a> in its
+ “connected” cars, minute</em></ins></span> by
+ <span class="removed"><del><strong>advertisers. By combining TV viewing
information with online
+ social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing
all</strong></del></span> <span class="inserted"><ins><em>minute.</p>
+
+ <p>GM did not get users' consent, but it could have got that easily
by
+ sneaking it into the contract that</em></ins></span> users <span
class="inserted"><ins><em>sign for some digital service
+ or other. A requirement for consent is effectively no protection.</p>
- <p>Meanwhile, LG TVs
- <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span> of <span class="removed"><del><strong>spying
anyway</a>.</p></strong></del></span> <span
class="inserted"><ins><em>that data.</p></em></ins></span>
+ <p>The cars can also collect lots of other data:
listening</em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>you,
+ watching you, following your movements, tracking passengers' cell
+ phones. <em>All</em> such data collection should be
forbidden.</p>
+
+ <p>But if you really want</em></ins></span> to be
+ <span class="removed"><del><strong>picked up by proprietary malware
running on other devices in
+ range</strong></del></span> <span class="inserted"><ins><em>safe, we
must make sure the car's
+ hardware cannot collect any of that data, or that the software
+ is free</em></ins></span> so <span class="removed"><del><strong>as to
determine</strong></del></span> <span class="inserted"><ins><em>we know it
won't collect any of</em></ins></span> that <span
class="removed"><del><strong>they are nearby. Once your
+ Internet devices are paired with your TV,
advertisers</strong></del></span> <span
class="inserted"><ins><em>data.</p>
</li>
- <span class="removed"><del><strong><li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they wanted to
record.</a></p></strong></del></span>
- <span class="inserted"><ins><em><li id="M201711230">
- <p>AI-powered driving apps can <a
+ <li id="M201711230">
+ <p>AI-powered driving apps</em></ins></span> can
+ <span class="removed"><del><strong>correlate ads</strong></del></span>
<span class="inserted"><ins><em><a
href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p></em></ins></span>
+ track your every move</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareInGames -->
-<div class="big-section">
- <h3 id="SpywareInGames">Spyware in Games</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
-
- <li>
- <p>The driver for a certain gaming keyboard</strong></del></span>
- <span class="inserted"><ins><em><li id="M201607160">
- <p id="car-spying">Computerized cars with nonfree software
are</em></ins></span> <a <span
class="removed"><del><strong>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information
- to China</a>.</p></strong></del></span>
+ <li id="M201607160">
+ <p id="car-spying">Computerized cars</em></ins></span> with <span
class="removed"><del><strong>Web activity, and
+ other</strong></del></span> <span class="inserted"><ins><em>nonfree
software are</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
snooping devices</a>.</p></em></ins></span>
</li>
-
- <span class="removed"><del><strong><li><p>nVidia's proprietary
GeForce Experience</strong></del></span>
+ <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and</strong></del></span>
<span class="inserted"><ins><em><li id="M201602240">
<p id="nissan-modem">The Nissan Leaf has a built-in
- cell phone modem which allows effectively anyone to</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves</strong></del></span>
+ cell phone modem which allows effectively anyone to</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
- access its computers remotely</em></ins></span> and <span
class="removed"><del><strong>then sends personal data about
them</strong></del></span> <span class="inserted"><ins><em>make changes in
various
+ access its computers remotely and make changes in various
settings</a>.</p>
- <p>That's easy</em></ins></span> to
- <span class="removed"><del><strong>nVidia servers</a>.</p>
+ <p>That's easy to do because the system has no authentication
+ when accessed through the modem. However,</em></ins></span> even if it
<span class="removed"><del><strong>isn't a TV channel.</p>
</li>
-
- <li><p>Angry Birds</strong></del></span> <span
class="inserted"><ins><em>do because the system has no authentication
- when accessed through the modem. However, even if it asked
+ <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>asked
for authentication, you couldn't be confident that Nissan
- has no access. The software in the car is proprietary,</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and</strong></del></span>
+ has no access. The software in the car is proprietary,</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ snooping</strong></del></span>
<span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
means
it demands blind faith from its users</a>.</p>
- <p>Even if no one connects to</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>car remotely, the cell phone modem
- enables the phone company</em></ins></span> to <span
class="removed"><del><strong>spy through</strong></del></span> <span
class="inserted"><ins><em>track the car's movements all the
time;</em></ins></span>
- it <span class="removed"><del><strong>too</a>.
- Here's information on
- <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
- </li>
-
- <li><p>Many
- <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and
report</strong></del></span> <span class="inserted"><ins><em>is
possible</em></ins></span> to <span class="inserted"><ins><em>physically
remove</em></ins></span> the
- <span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
-
- <p>A game console is a computer, and you can't trust a computer
with
- a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>cell phone modem, though.</p></em></ins></span>
+ <p>Even if no one connects to the car remotely, the cell phone modem
+ enables the phone company to track the car's movements</em></ins></span>
all the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>time;
+ it is possible to physically remove the cell phone modem,
though.</p></em></ins></span>
</li>
-
- <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps
- <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV
+ <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
<span class="inserted"><ins><em><li id="M201306140">
- <p>Tesla cars allow the company to extract</em></ins></span>
- data <span class="removed"><del><strong>about their
users</strong></del></span> <span
class="inserted"><ins><em>remotely</em></ins></span> and <span
class="removed"><del><strong>their users'
- friends</strong></del></span> <span class="inserted"><ins><em>determine
the car's location
- at any time. (See Section 2, paragraphs b</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
-
- <p>Even nastier, they do</strong></del></span> <span
class="inserted"><ins><em>c of the <a
+ <p>Tesla cars allow</em></ins></span> the <span
class="removed"><del><strong>internet</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span> to <span
class="removed"><del><strong>another
+ company, Nuance</a>. Nuance can save it</strong></del></span> <span
class="inserted"><ins><em>extract
+ data remotely</em></ins></span> and <span
class="removed"><del><strong>would then have to
+ give</strong></del></span> <span class="inserted"><ins><em>determine the
car's location
+ at any time. (See Section 2, paragraphs b and c of the <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- privacy statement</a>.) The company says</em></ins></span> it <span
class="removed"><del><strong>through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
- information, but if the state orders it to get</em></ins></span> the data
- <span class="removed"><del><strong>collected by various
cr…apps</strong></del></span> and <span
class="removed"><del><strong>sites</strong></del></span> <span
class="inserted"><ins><em>hand it
- over, the state can store it.</p>
+ privacy statement</a>.) The company says it doesn't store this
+ information, but if the state orders</em></ins></span> it to <span
class="inserted"><ins><em>get</em></ins></span> the <span
class="removed"><del><strong>US or some other government.</p>
+ <p>Speech recognition is not to be trusted
unless</strong></del></span> <span class="inserted"><ins><em>data and
hand</em></ins></span> it <span class="removed"><del><strong>is done
+ by free</strong></del></span>
+ <span class="inserted"><ins><em>over, the state can store it.</p>
</li>
<li id="M201303250">
- <p id="records-drivers">Proprietary software in cars <a
-
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
- records information about drivers' movements</a>, which
is</em></ins></span> made <span class="removed"><del><strong>by different
- companies.</p>
+ <p id="records-drivers">Proprietary</em></ins></span> software in
<span class="removed"><del><strong>your own computer.</p>
- <p>They use this data to manipulate people</strong></del></span>
- <span class="inserted"><ins><em>available</em></ins></span> to <span
class="removed"><del><strong>buy things,</strong></del></span> <span
class="inserted"><ins><em>car manufacturers, insurance
companies,</em></ins></span> and <span class="removed"><del><strong>hunt
- for “whales” who can be led to spend a
lot</strong></del></span> <span class="inserted"><ins><em>others.</p>
-
- <p>The case</em></ins></span> of <span
class="removed"><del><strong>money. They
- also use</strong></del></span> <span
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
- is not really</em></ins></span> a <span class="removed"><del><strong>back
door to manipulate the game play for specific players.</p>
+ <p>In its privacy policy, Samsung explicitly confirms
+ that</strong></del></span> <span
class="inserted"><ins><em>cars</em></ins></span> <a <span
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ data containing sensitive</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
+ records</em></ins></span> information <span
class="removed"><del><strong>will be transmitted</strong></del></span> <span
class="inserted"><ins><em>about drivers' movements</a>, which is made
+ available</em></ins></span> to
+ <span class="removed"><del><strong>third parties</a>.</p>
+ </li>
+ <li><p>Spyware in
+ <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a> reports what the user
watches,</strong></del></span> <span class="inserted"><ins><em>car
manufacturers, insurance companies,</em></ins></span> and
+ <span class="removed"><del><strong>the switch to
turn</strong></del></span> <span class="inserted"><ins><em>others.</p>
- <p>While</strong></del></span> <span
class="inserted"><ins><em>matter of proprietary surveillance. These systems
+ <p>The case of toll-collection systems, mentioned
in</em></ins></span> this <span class="removed"><del><strong>off has no effect.
(The fact that the
+ transmission reports a 404 error</strong></del></span> <span
class="inserted"><ins><em>article,
+ is not</em></ins></span> really <span class="removed"><del><strong>means
nothing;</strong></del></span> <span class="inserted"><ins><em>a matter of
proprietary surveillance. These systems
are an intolerable invasion of privacy, and should be replaced with
- anonymous payment systems, but</em></ins></span> the <span
class="removed"><del><strong>article describes gratis games, games that cost
money
- can use</strong></del></span> <span class="inserted"><ins><em>invasion
isn't done by malware. The
- other cases mentioned are done by proprietary malware in</em></ins></span>
the <span class="removed"><del><strong>same
tactics.</p></strong></del></span> <span
class="inserted"><ins><em>car.</p></em></ins></span>
+ anonymous payment systems, but</em></ins></span> the <span
class="removed"><del><strong>server
+ could save that data anyway.)</p>
+
+ <p>Even worse, it
+ <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on</strong></del></span> <span class="inserted"><ins><em>invasion
isn't done by malware. The</em></ins></span>
+ other <span class="removed"><del><strong>devices</strong></del></span>
<span class="inserted"><ins><em>cases mentioned are done by proprietary malware
in the car.</p>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareAtRecreation
--></strong></del></span>
-
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareAtRecreation">Spyware at
Recreation</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInVR">Virtual Reality</h4></em></ins></span>
- <span <span class="removed"><del><strong>class="anchor-reference-id">
- (<a
href="#SpywareAtRecreation">#SpywareAtRecreation</a>)</span></strong></del></span>
<span class="inserted"><ins><em>class="anchor-reference-id">(<a
href="#SpywareInVR">#SpywareInVR</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 id="SpywareInVR">Virtual Reality</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVR">#SpywareInVR</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
-
-<ul>
- <li><p>Users are suing Bose for</strong></del></span>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202008182">
- <p>Oculus headsets</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing a spyware app for its headphones</a>.
- Specifically, the app would record the names of the audio
files</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require</em></ins></span>
- users <span class="removed"><del><strong>listen</strong></del></span> to
<span class="removed"><del><strong>along with the headphone's unique serial
number.
- </p>
- <p>The suit accuses that this was done without the users' consent.
- If the fine print of</strong></del></span> <span
class="inserted"><ins><em>identify themselves to Facebook</a>. This will
give Facebook
- free rein to pervasively snoop on Oculus users.</p>
+ <p>Oculus headsets <a
+
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
+ users to identify themselves to Facebook</a>. This will give Facebook
+ free rein to pervasively snoop</em></ins></span> on <span
class="inserted"><ins><em>Oculus users.</p>
</li>
<li id="M201612230">
<p>VR equipment, measuring every slight motion,
- creates</em></ins></span> the <span class="removed"><del><strong>app said
that users gave consent</strong></del></span> <span
class="inserted"><ins><em>potential</em></ins></span> for <span
class="removed"><del><strong>this,
- would that make</strong></del></span> <span
class="inserted"><ins><em>the most intimate
- surveillance ever. All</em></ins></span> it <span
class="removed"><del><strong>acceptable? No way! It should be flat out
- <a href="/philosophy/surveillance-vs-democracy.html">
- illegal</strong></del></span> <span
class="inserted"><ins><em>takes</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>make this potential real <a
-
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
+ creates</em></ins></span> the <span class="removed"><del><strong>user's
local network.</a></p>
+
+ <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>potential for the most intimate
+ surveillance ever. All</em></ins></span> it <span
class="removed"><del><strong>had installed a patch</strong></del></span> <span
class="inserted"><ins><em>takes</em></ins></span> to <span
class="removed"><del><strong>stop this, but any product
+ could spy</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> this <span
class="removed"><del><strong>way.</p>
+
+ <p>Meanwhile, LG TVs</strong></del></span> <span
class="inserted"><ins><em>potential real</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
+ </li>
+ <li>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
software as malicious as many other programs listed in this
page</a>.</p>
- <p>You can bet Facebook will implement</em></ins></span> the <span
class="removed"><del><strong>app to snoop at all</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>maximum
possible
- surveillance on Oculus Rift devices. The moral is, never trust a VR
+ <p>You can bet Facebook will implement the maximum possible
+ surveillance</em></ins></span> on <span class="removed"><del><strong>what
programs people watch, and even what they wanted to
record.</a></p></strong></del></span> <span
class="inserted"><ins><em>Oculus Rift devices. The moral is, never trust a VR
system with nonfree software in it.</p></em></ins></span>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareOnTheWeb
--></strong></del></span>
+<span class="removed"><del><strong><!-- #SpywareInGames
--></strong></del></span>
<div class="big-section">
- <h3 id="SpywareOnTheWeb">Spyware on the Web</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheWeb">#SpywareOnTheWeb</a>)</span>
+ <h3 <span class="removed"><del><strong>id="SpywareInGames">Spyware in
Games</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareOnTheWeb">Spyware on the
Web</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInGames">#SpywareInGames</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnTheWeb">#SpywareOnTheWeb</a>)</span></em></ins></span>
</div>
<div style="clear: left;"></div>
-<p>In addition, many web sites spy on their visitors. Web sites are not
- programs, so it
- <a href="/philosophy/network-services-arent-free-or-nonfree.html">
- makes no sense to call them “free” or
“proprietary”</a>,
- but the surveillance is an abuse all the <span
class="removed"><del><strong>same.</p>
+<span class="removed"><del><strong><ul>
-<ul>
- <li><p>When</strong></del></span> <span
class="inserted"><ins><em>same.</p>
+ <li>
+ <p>The driver for a certain gaming keyboard</strong></del></span>
+
+<span class="inserted"><ins><em><p>In addition, many web sites spy on
their visitors. Web sites are not
+ programs, so it</em></ins></span>
+ <a <span
class="removed"><del><strong>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/network-services-arent-free-or-nonfree.html">
+ makes no sense</em></ins></span> to <span
class="removed"><del><strong>China</a>.</p>
+ </li>
+
+ <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data
about</strong></del></span> <span
class="inserted"><ins><em>call</em></ins></span> them <span
class="removed"><del><strong>to
+ nVidia servers</a>.</p>
+ </li>
+
+ <li><p>Angry Birds
+ <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and</strong></del></span> <span
class="inserted"><ins><em>“free” or
“proprietary”</a>,
+ but</em></ins></span> the <span class="removed"><del><strong>NSA takes
advantage to spy through</strong></del></span> <span
class="inserted"><ins><em>surveillance is an abuse all the same.</p>
<ul class="blurbs">
<li id="M201904210">
- <p>As of April 2019, it is <a
-
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/">no
- longer possible to disable an
- unscrupulous tracking anti-feature</a> that <a
-
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
- users when they follow ping links</a> in Apple Safari, Google Chrome,
- Opera, Microsoft Edge and also in the upcoming Microsoft Edge that is
- going to be based on Chromium.</p>
+ <p>As of April 2019,</em></ins></span> it <span
class="removed"><del><strong>too</a>.
+ Here's information on
+ <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p>
+ </li>
+
+ <li><p>Many</strong></del></span> <span
class="inserted"><ins><em>is</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users and report</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/">no
+ longer possible</em></ins></span> to <span
class="removed"><del><strong>the
+ internet</a>— even what their users weigh.</p>
+
+ <p>A game console is a computer, and you can't trust a computer
with
+ a nonfree operating system.</p>
+ </li>
+
+ <li><p>Modern gratis game cr…apps</strong></del></span>
<span class="inserted"><ins><em>disable an
+ unscrupulous tracking anti-feature</a> that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of data about their</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports</em></ins></span>
+ users <span class="removed"><del><strong>and their users'
+ friends and associates</a>.</p>
+
+ <p>Even nastier,</strong></del></span> <span
class="inserted"><ins><em>when</em></ins></span> they <span
class="removed"><del><strong>do it through ad networks that merge the data
+ collected by various cr…apps</strong></del></span> <span
class="inserted"><ins><em>follow ping links</a> in Apple Safari, Google
Chrome,
+ Opera, Microsoft Edge</em></ins></span> and <span
class="removed"><del><strong>sites made by different
+ companies.</p>
+
+ <p>They use this data to manipulate people</strong></del></span>
<span class="inserted"><ins><em>also in the upcoming Microsoft Edge that is
+ going</em></ins></span> to <span class="removed"><del><strong>buy things,
and hunt
+ for “whales” who can</strong></del></span> be <span
class="removed"><del><strong>led to spend a lot of money. They
+ also use</strong></del></span> <span class="inserted"><ins><em>based on
Chromium.</p>
</li>
<li id="M201901101">
- <p>Until 2015, any tweet that listed a geographical tag <a
+ <p>Until 2015, any tweet that listed</em></ins></span> a <span
class="removed"><del><strong>back door</strong></del></span> <span
class="inserted"><ins><em>geographical tag <a
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/">
- sent the precise GPS location to Twitter's server</a>. It still
+ sent the precise GPS location</em></ins></span> to <span
class="removed"><del><strong>manipulate the game play for specific
players.</p>
+
+ <p>While</strong></del></span> <span
class="inserted"><ins><em>Twitter's server</a>. It still
contains these GPS locations.</p>
</li>
<li id="M201805170">
<p>The Storyful program <a
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies
- on the reporters that use it</a>.</p>
+ on</em></ins></span> the <span class="removed"><del><strong>article
describes gratis games, games</strong></del></span> <span
class="inserted"><ins><em>reporters</em></ins></span> that <span
class="removed"><del><strong>cost money
+ can</strong></del></span> use <span class="removed"><del><strong>the
same tactics.</p></strong></del></span> <span
class="inserted"><ins><em>it</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201701060">
- <p>When</em></ins></span> a page uses Disqus
- for comments, <span class="removed"><del><strong><a
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">the</strong></del></span>
<span class="inserted"><ins><em>the</em></ins></span> proprietary Disqus
software <span class="removed"><del><strong>loads</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">loads</em></ins></span>
- a Facebook software package into the browser of every anonymous visitor
- to the page, and makes the page's URL available to <span
class="removed"><del><strong>Facebook</a>.
- </p></li>
+<!-- #SpywareAtRecreation -->
+<div class="big-section">
+ <h3 id="SpywareAtRecreation">Spyware at Recreation</h3>
+ <span class="anchor-reference-id">
+ (<a
href="#SpywareAtRecreation">#SpywareAtRecreation</a>)</span>
+</div>
+<div style="clear: left;"></div>
- <li><p>Online</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
+<ul>
+ <li><p>Users are suing Bose for
+ <a
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201701060">
+ <p>When</em></ins></span> a <span
class="removed"><del><strong>spyware app</strong></del></span> <span
class="inserted"><ins><em>page uses Disqus</em></ins></span>
+ for <span class="removed"><del><strong>its headphones</a>.
+ Specifically,</strong></del></span> <span
class="inserted"><ins><em>comments,</em></ins></span> the <span
class="removed"><del><strong>app would record</strong></del></span> <span
class="inserted"><ins><em>proprietary Disqus software <a
+
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">loads
+ a Facebook software package into</em></ins></span> the <span
class="removed"><del><strong>names</strong></del></span> <span
class="inserted"><ins><em>browser</em></ins></span> of <span
class="inserted"><ins><em>every anonymous visitor
+ to</em></ins></span> the <span class="removed"><del><strong>audio files
+ users listen</strong></del></span> <span class="inserted"><ins><em>page,
and makes the page's URL available</em></ins></span> to <span
class="removed"><del><strong>along</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
</li>
<li id="M201612064">
- <p>Online</em></ins></span> sales, with tracking and surveillance of
customers, <a
+ <p>Online sales,</em></ins></span> with <span
class="inserted"><ins><em>tracking and surveillance of customers, <a
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
- businesses to show different people different prices</a>. Most of
- the tracking is done by recording interactions with servers, but
+ businesses to show different people different prices</a>. Most
of</em></ins></span>
+ the <span class="removed"><del><strong>headphone's unique serial number.
+ </p>
+ <p>The suit accuses that this was</strong></del></span> <span
class="inserted"><ins><em>tracking is</em></ins></span> done <span
class="removed"><del><strong>without</strong></del></span> <span
class="inserted"><ins><em>by recording interactions with servers, but
proprietary software contributes.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
- Baidu's Japanese-input and Chinese-input apps spy on
users.</a></p>
- </li>
-
- <li><p>Pages that contain “Like” buttons
- <a
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
- enable Facebook to track visitors</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201405140">
+ <li id="M201405140">
<p><a
href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
- Microsoft SkyDrive allows the NSA</em></ins></span> to <span
class="removed"><del><strong>those pages</a>—even
- users that don't have Facebook accounts.</p></strong></del></span>
<span class="inserted"><ins><em>directly examine users'
- data</a>.</p></em></ins></span>
+ Microsoft SkyDrive allows</em></ins></span> the <span
class="inserted"><ins><em>NSA to directly examine</em></ins></span> users'
<span class="removed"><del><strong>consent.
+ If</strong></del></span>
+ <span class="inserted"><ins><em>data</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201210240">
- <p>Many</em></ins></span> web sites rat their visitors to advertising
- networks that track users. Of the top 1000 web sites, <a
+ <li id="M201210240">
+ <p>Many web sites rat their visitors to advertising
+ networks that track users. Of</em></ins></span> the <span
class="removed"><del><strong>fine print</strong></del></span> <span
class="inserted"><ins><em>top 1000 web sites, <a
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
- (as of 5/17/2012) fed their visitors third-party cookies, allowing
+ (as</em></ins></span> of <span class="inserted"><ins><em>5/17/2012) fed
their visitors third-party cookies, allowing
other sites to track them</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201208210">
- <p>Many</em></ins></span> web sites report all their visitors
- to Google by using the Google Analytics service, which <a
+ <li id="M201208210">
+ <p>Many web sites report all their visitors
+ to Google by using</em></ins></span> the <span
class="removed"><del><strong>app said that users gave consent for this,
+ would</strong></del></span> <span class="inserted"><ins><em>Google
Analytics service, which <a
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
- tells Google the IP address and the page that was <span
class="removed"><del><strong>visited.</a></p></strong></del></span>
<span class="inserted"><ins><em>visited</a>.</p></em></ins></span>
+ tells Google the IP address and the page</em></ins></span> that <span
class="removed"><del><strong>make it acceptable? No way! It should be flat
out</strong></del></span> <span class="inserted"><ins><em>was
visited</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201200000">
- <p>Many</em></ins></span> web sites try to collect users' address
books (the user's list
+ <li id="M201200000">
+ <p>Many web sites try to collect users' address books (the user's
list
of other people's phone numbers or email addresses). This violates
the privacy of those other people.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
- Microsoft SkyDrive allows the NSA</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201110040">
- <p>Pages that contain “Like” buttons <a
-
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
- enable Facebook</em></ins></span> to <span
class="removed"><del><strong>directly examine users'
data</a>.</p></strong></del></span> <span
class="inserted"><ins><em>track visitors to those pages</a>—even
users
+ <li id="M201110040">
+ <p>Pages that contain “Like” buttons</em></ins></span>
<a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">
+ illegal</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
+ enable Facebook</em></ins></span> to <span
class="removed"><del><strong>design the app</strong></del></span> <span
class="inserted"><ins><em>track visitors</em></ins></span> to <span
class="removed"><del><strong>snoop at all</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>those
pages</a>—even users
that don't have Facebook accounts.</p></em></ins></span>
</li>
</ul>
-<span class="removed"><del><strong><!-- WEBMASTERS: make sure to place new
items on top under each subsection --></strong></del></span>
+<span class="removed"><del><strong><!-- #SpywareOnTheWeb
--></strong></del></span>
-<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInFlash">Spyware in
JavaScript and Flash</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInJavaScript">JavaScript</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInFlash">#SpywareInFlash</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInJavaScript">#SpywareInJavaScript</a>)</span></em></ins></span>
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareOnTheWeb">Spyware on the
Web</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInJavaScript">JavaScript</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareOnTheWeb">#SpywareOnTheWeb</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInJavaScript">#SpywareInJavaScript</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear: left;"></div>
-<span class="removed"><del><strong><ul>
- <li></strong></del></span>
+<p>In addition, many</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201811270">
- <p>Many web sites use JavaScript code <a
+ <p>Many</em></ins></span> web sites <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>use JavaScript code <a
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- to snoop on information that users have typed into a
- form but not sent</a>, in order to learn their identity. Some are
<a
-
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
- getting sued</a> for this.</p>
+ to snoop</em></ins></span> on <span class="inserted"><ins><em>information
that users have typed into a
+ form but not sent</a>, in order to learn</em></ins></span> their
<span class="removed"><del><strong>visitors. Web sites</strong></del></span>
<span class="inserted"><ins><em>identity. Some</em></ins></span> are <span
class="removed"><del><strong>not
+ programs, so it</strong></del></span> <a <span
class="removed"><del><strong>href="/philosophy/network-services-arent-free-or-nonfree.html">
+ makes no sense to call them “free” or
“proprietary”</a>,
+ but the surveillance is an abuse all the same.</p>
+
+<ul>
+ <li><p>When a page uses Disqus</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+ getting sued</a></em></ins></span> for
+ <span class="removed"><del><strong>comments, <a
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">the
+ proprietary Disqus software loads a Facebook software package into
+ the browser</strong></del></span> <span
class="inserted"><ins><em>this.</p>
+
+ <p>The chat facilities</em></ins></span> of <span
class="removed"><del><strong>every anonymous visitor to the page, and
makes</strong></del></span> <span class="inserted"><ins><em>some customer
services use</em></ins></span> the
+ <span class="removed"><del><strong>page's URL available to
Facebook</a>.
+ </p></li>
- <p>The chat facilities of some customer services use the same sort of
- malware to <a
+ <li><p>Online sales, with tracking and
surveillance</strong></del></span> <span class="inserted"><ins><em>same
sort</em></ins></span> of <span class="removed"><del><strong>customers, <a
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
+ businesses</strong></del></span>
+ <span class="inserted"><ins><em>malware</em></ins></span> to <span
class="removed"><del><strong>show different people different prices</a>.
Most
+ of</strong></del></span> <span class="inserted"><ins><em><a
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
- read what the user is typing before it is posted</a>.</p>
+ read what</em></ins></span> the <span
class="removed"><del><strong>tracking</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> is <span
class="removed"><del><strong>done by recording interactions with
+ servers, but proprietary software
contributes.</p></strong></del></span> <span
class="inserted"><ins><em>typing before it is
posted</a>.</p></em></ins></span>
</li>
- <li id="M201807190">
+ <span class="removed"><del><strong><li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
+ Baidu's Japanese-input and Chinese-input apps spy</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201807190">
<p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
- JavaScript on its web site to give other companies personal data on
- its customers</a>.</p>
+ JavaScript on its web site to give other companies personal
data</em></ins></span> on <span
class="removed"><del><strong>users.</a></p></strong></del></span>
+ <span class="inserted"><ins><em>its
customers</a>.</p></em></ins></span>
</li>
- <li id="M201712300"></em></ins></span>
+ <span
class="removed"><del><strong><li><p>Pages</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201712300">
<p>Some JavaScript malware <a
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
swipes usernames from browser-based password managers</a>.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711150"></em></ins></span>
+ <li id="M201711150">
<p>Some websites send
JavaScript code to collect all the user's input, <a
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
can then be used to reproduce the whole session</a>.</p>
- <p>If you use LibreJS, it will block that malicious JavaScript
+ <p>If you use LibreJS, it will block</em></ins></span> that <span
class="removed"><del><strong>contain “Like”
buttons</strong></del></span> <span class="inserted"><ins><em>malicious
JavaScript
code.</p>
</li>
-
- <span class="removed"><del><strong><li><p>Many web sites
use</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -3665,96 +3574,166 @@
<ul class="blurbs">
<li id="M201310110">
- <p>Flash and</em></ins></span> JavaScript <span
class="removed"><del><strong>code <a
-
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- to snoop on information that users have typed into a form but not
- sent</a>, in order to learn their identity.
Some</strong></del></span> are <span class="removed"><del><strong><a
-
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
- getting sued</a></strong></del></span> <span
class="inserted"><ins><em>used</em></ins></span> for <span
class="removed"><del><strong>this.</p></strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices</a> to identify
users.</p></em></ins></span>
+ <p>Flash and JavaScript are used for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
+ enable Facebook to track visitors</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ “fingerprinting” devices</a></em></ins></span> to <span
class="removed"><del><strong>those pages</a>—even
+ users that don't have Facebook accounts.</p></strong></del></span>
<span class="inserted"><ins><em>identify users.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Flash</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Many</strong></del></span>
<span class="inserted"><ins><em><li id="M201003010">
- <p>Flash</em></ins></span> Player's <a
+ <p>Flash Player's <a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
- cookie feature helps web sites track visitors</a>.</p>
- </li>
-
- <span class="removed"><del><strong><li><p>Flash and JavaScript
are also used for
- <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices</a> to identify
users.</p>
+ cookie feature helps</em></ins></span> web sites <span
class="removed"><del><strong>rat their visitors to advertising networks
that</strong></del></span> track
+ <span class="removed"><del><strong>users. Of the top 1000 web
sites,</strong></del></span> <span
class="inserted"><ins><em>visitors</a>.</p>
</li>
</ul>
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
-<span class="inserted"><ins><em></ul></em></ins></span>
-
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInChrome">Spyware in
Chrome</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInChrome">Chrome</h4></em></ins></span>
+ <h4 id="SpywareInChrome">Chrome</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Google</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201906220">
- <p>Google</em></ins></span> Chrome <span
class="inserted"><ins><em>is an</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/">
- spies on browser history, affiliations</a>,</strong></del></span>
+ <p>Google Chrome is an</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
+ (as</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/">
- instrument of surveillance</a>. It lets thousands of trackers invade
- users' computers</em></ins></span> and <span
class="removed"><del><strong>other installed software.
- </p>
+ instrument</em></ins></span> of <span
class="removed"><del><strong>5/17/2012) fed their visitors third-party cookies,
allowing other</strong></del></span> <span
class="inserted"><ins><em>surveillance</a>. It lets thousands of trackers
invade
+ users' computers and report the</em></ins></span> sites <span
class="inserted"><ins><em>they visit</em></ins></span> to <span
class="removed"><del><strong>track them</a>.</p>
</li>
- <li><p>Google Chrome contains</strong></del></span> <span
class="inserted"><ins><em>report the sites they visit to advertising and
- data companies, first of all to Google. Moreover, if users
have</em></ins></span> a <span class="removed"><del><strong>key logger
that</strong></del></span>
- <span class="inserted"><ins><em>Gmail account, Chrome automatically logs
them in to the browser for
+
+ <li><p>Many web sites report</strong></del></span> <span
class="inserted"><ins><em>advertising and
+ data companies, first of</em></ins></span> all <span
class="removed"><del><strong>their visitors</strong></del></span> to <span
class="removed"><del><strong>Google by using</strong></del></span> <span
class="inserted"><ins><em>Google. Moreover, if users have a
+ Gmail account, Chrome automatically logs them in to</em></ins></span> the
<span class="removed"><del><strong>Google Analytics service,
which</strong></del></span> <span class="inserted"><ins><em>browser for
more convenient profiling. On Android, Chrome also reports their
location to Google.</p>
- <p>The best way to escape surveillance is to switch
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
- sends Google every URL typed in</a>, one key
at</strong></del></span>
- <span
class="inserted"><ins><em>href="/software/icecat/">IceCat</a>,</em></ins></span>
a <span class="removed"><del><strong>time.</p></strong></del></span>
<span class="inserted"><ins><em>modified version of Firefox
- with several changes to protect users' privacy.</p></em></ins></span>
+ <p>The best way to escape surveillance is to switch
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
+ tells Google</strong></del></span>
+ <span
class="inserted"><ins><em>href="/software/icecat/">IceCat</a>, a
modified version of Firefox
+ with several changes to protect users' privacy.</p>
</li>
- <span class="removed"><del><strong><li><p>Google Chrome includes
a module</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704131">
+ <li id="M201704131">
<p>Low-priced Chromebooks for schools are <a
href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
collecting far more data on students than is necessary, and store
- it indefinitely</a>. Parents and students complain about the lack
- of transparency on the part of both the educational services and the
- schools, the difficulty of opting out of these services, and the lack
- of proper privacy policies, among other things.</p>
+ it indefinitely</a>. Parents and students complain
about</em></ins></span> the <span class="removed"><del><strong>IP
address</strong></del></span> <span class="inserted"><ins><em>lack
+ of transparency on the part of both the educational
services</em></ins></span> and the <span class="removed"><del><strong>page that
was visited.</a></p>
+ </li>
+
+ <li><p>Many web sites try to collect users' address books (the
+ user's list</strong></del></span>
+ <span class="inserted"><ins><em>schools, the difficulty</em></ins></span>
of <span class="removed"><del><strong>other people's phone numbers or email
addresses).
+ This violates</strong></del></span> <span
class="inserted"><ins><em>opting out of these services, and</em></ins></span>
the <span class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>lack</em></ins></span>
+ of <span class="removed"><del><strong>those</strong></del></span> <span
class="inserted"><ins><em>proper privacy policies, among</em></ins></span>
other <span class="removed"><del><strong>people.</p>
+ </li>
+
+ <li><p><a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
+ Microsoft SkyDrive allows</strong></del></span> <span
class="inserted"><ins><em>things.</p>
<p>But complaining is not sufficient. Parents, students and teachers
- should realize</em></ins></span> that <span class="inserted"><ins><em>the
software Google uses to spy on students is
+ should realize that</em></ins></span> the <span
class="removed"><del><strong>NSA to directly examine users'
data</a>.</p>
+ </li>
+</ul>
+
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>software Google uses</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+<div class="big-subsection">
+ <h4 id="SpywareInFlash">Spyware in JavaScript and Flash</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>Some JavaScript malware <a
+
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
+ swipes usernames from browser-based password managers</a>.</p>
+ </li>
+
+ <li>
+ <p>Some websites send JavaScript code</strong></del></span> <span
class="inserted"><ins><em>students is
nonfree, so they can't verify what it really does. The only remedy is
- to persuade school officials to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
- activates microphones</strong></del></span> <span
class="inserted"><ins><em>href="/education/edu-schools.html">
- exclusively use free software</a> for both
education</em></ins></span> and <span class="removed"><del><strong>transmits
audio</strong></del></span> <span class="inserted"><ins><em>school
- administration. If the school is run locally, parents and teachers
- can mandate their representatives at the School Board</em></ins></span> to
<span class="removed"><del><strong>its
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>refuse the
- budget unless the school initiates a switch to free software. If
+ to persuade school officials</em></ins></span> to <span
class="removed"><del><strong>collect all the user's
+ input,</strong></del></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which</strong></del></span>
<span class="inserted"><ins><em>href="/education/edu-schools.html">
+ exclusively use free software</a> for both education and school
+ administration. If the school is run locally, parents and
teachers</em></ins></span>
+ can <span class="removed"><del><strong>then
+ be used to reproduce</strong></del></span> <span
class="inserted"><ins><em>mandate their representatives at</em></ins></span>
the <span class="removed"><del><strong>whole session</a>.</p>
+
+ <p>If you use LibreJS, it will block that malicious JavaScript
+ code.</p>
+ </li>
+
+ <li><p>Many web sites use JavaScript code <a
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"></strong></del></span>
<span class="inserted"><ins><em>School Board</em></ins></span> to <span
class="removed"><del><strong>snoop on information that users have typed
into</strong></del></span> <span class="inserted"><ins><em>refuse the
+ budget unless the school initiates</em></ins></span> a <span
class="removed"><del><strong>form but not
+ sent</a>, in order</strong></del></span> <span
class="inserted"><ins><em>switch</em></ins></span> to <span
class="removed"><del><strong>learn their identity. Some are <a
+
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+ getting sued</a> for this.</p></strong></del></span> <span
class="inserted"><ins><em>free software. If
education is run nation-wide, they need to persuade legislators
(e.g., through free software organizations, political parties,
etc.) to migrate the public schools to free
software.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Google</strong></del></span>
+ <span class="removed"><del><strong><li><p>Flash
Player's</strong></del></span>
<span class="inserted"><ins><em><li id="M201507280">
- <p>Google</em></ins></span> Chrome makes it easy for an extension to
do <a
+ <p>Google Chrome makes it easy for an extension to
do</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
+ cookie feature helps web sites track visitors</a>.</p>
+ </li>
+
+ <li><p>Flash</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
+ snooping on the user's browsing</a>,</em></ins></span> and <span
class="removed"><del><strong>JavaScript are also used for</strong></del></span>
<span class="inserted"><ins><em>many of them do so.</p>
+ </li>
+
+ <li id="M201506180">
+ <p>Google Chrome includes a module that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ “fingerprinting” devices</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
+ activates microphones and transmits audio</em></ins></span> to <span
class="removed"><del><strong>identify users.</p></strong></del></span>
<span class="inserted"><ins><em>its
servers</a>.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+<div class="big-subsection">
+ <h4 id="SpywareInChrome">Spyware in Chrome</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
+</div>
+
+<ul>
+ <li><p>Google</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201308040">
+ <p>Google</em></ins></span> Chrome <a
+ href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/">
+ spies on browser history, affiliations</a>, and other installed
<span class="removed"><del><strong>software.
+ </p></strong></del></span>
+ <span class="inserted"><ins><em>software.</p></em></ins></span>
+ </li>
+ <span
class="removed"><del><strong><li><p>Google</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M200809060">
+ <p>Google</em></ins></span> Chrome contains a key logger that <a
<span
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/"></em></ins></span>
+ sends Google every URL typed in</a>, one key at a time.</p>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Google Chrome includes
a module that
+ <a
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
+ activates microphones and transmits audio to its
servers</a>.</p>
+ </li>
+
+ <li><p>Google Chrome makes it easy for an extension to do <a
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
snooping on the user's browsing</a>, and many of them do
so.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<!-- #SpywareInDrones -->
@@ -3766,27 +3745,9 @@
<ul>
<li>
- <p>While you're using</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201506180">
- <p>Google Chrome includes</em></ins></span> a <span
class="removed"><del><strong>DJI drone</strong></del></span> <span
class="inserted"><ins><em>module that <a
-
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
- activates microphones and transmits audio</em></ins></span> to <span
class="removed"><del><strong>snoop</strong></del></span> <span
class="inserted"><ins><em>its servers</a>.</p>
- </li>
-
- <li id="M201308040">
- <p>Google Chrome <a
- href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/">
- spies</em></ins></span> on <span class="inserted"><ins><em>browser
history, affiliations</a>, and</em></ins></span> other <span
class="removed"><del><strong>people, DJI is in many
- cases</strong></del></span> <span class="inserted"><ins><em>installed
- software.</p>
- </li>
-
- <li id="M200809060">
- <p>Google Chrome contains a key logger that</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/">
- sends Google every URL typed in</a>, one key at a
time.</p></em></ins></span>
- </li>
+ <p>While you're using a DJI drone to snoop on other people, DJI is
in many
+ cases <a
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p>
+ </li></strong></del></span>
</ul>
@@ -3802,20 +3763,26 @@
<span class="removed"><del><strong><ul>
<li><p>The natural extension of monitoring people through
- “their” phones is</strong></del></span>
+ “their” phones</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201905281">
- <p>Microsoft</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software</strong></del></span>
- <span
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
- people to give their phone number</a> in order</em></ins></span> to
<span class="removed"><del><strong>make sure they can't “fool” the
- monitoring</a>.</p>
- </li>
-
- <li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
- Intel devices will</strong></del></span> be able to <span
class="removed"><del><strong>listen for speech all</strong></del></span> <span
class="inserted"><ins><em>create an account on</em></ins></span>
+ <li id="M202009070">
+ <p>While the world</em></ins></span> is <span
class="inserted"><ins><em>still
+ struggling with COVID-19 coronavirus, many</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/">people
+ are in danger of surveillance</a> and their computers are infected
+ with malware as a result of installing</em></ins></span> proprietary <span
class="removed"><del><strong>software to make sure they can't
“fool” the
+ monitoring</a>.</p></strong></del></span> <span
class="inserted"><ins><em>software.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
+ Intel devices will</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905281">
+ <p>Microsoft <a
+
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
+ people to give their phone number</a> in order to</em></ins></span>
be able to <span class="removed"><del><strong>listen for speech
all</strong></del></span> <span class="inserted"><ins><em>create an account
on</em></ins></span>
the <span class="removed"><del><strong>time, even when
“off.”</a></p>
</li>
</ul>
@@ -3922,7 +3889,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © <span class="removed"><del><strong>2015, 2016, 2017,
2018</strong></del></span> <span
class="inserted"><ins><em>2015-2020</em></ins></span> Free Software Foundation,
Inc.</p>
+<p>Copyright © <span class="removed"><del><strong>2015, 2016, 2017,
2018</strong></del></span> <span
class="inserted"><ins><em>2015-2021</em></ins></span> Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -3933,7 +3900,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/12/30 10:33:46 $
+$Date: 2021/01/04 10:03:02 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.364
retrieving revision 1.365
diff -u -b -r1.364 -r1.365
--- proprietary-surveillance.de.po 30 Dec 2020 10:33:46 -0000 1.364
+++ proprietary-surveillance.de.po 4 Jan 2021 10:03:02 -0000 1.365
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-12-30 10:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -5680,6 +5680,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
@@ -5894,10 +5902,10 @@
"standards/README.translations\">LIESMICH für Ãbersetzungen</a>."
#. type: Content of: <div><p>
-# | Copyright © [-2015-] {+2015-2020+} Free Software Foundation, Inc.
+# | Copyright © [-2015-] {+2015-2021+} Free Software Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2015 Free Software Foundation, Inc."
-msgid "Copyright © 2015-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2015-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2015 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- proprietary-surveillance.es.po 31 Dec 2020 10:35:47 -0000 1.124
+++ proprietary-surveillance.es.po 4 Jan 2021 10:03:02 -0000 1.125
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-12-30 10:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
"PO-Revision-Date: 2020-12-31 11:19+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-04 09:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -5139,6 +5140,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
@@ -5259,7 +5268,10 @@
"coordinación y el envÃo de traducciones de las páginas de este sitio web."
#. type: Content of: <div><p>
-msgid "Copyright © 2015-2020 Free Software Foundation, Inc."
+# | Copyright © 2015-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2015-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2015-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2015-2020 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.580
retrieving revision 1.581
diff -u -b -r1.580 -r1.581
--- proprietary-surveillance.fr.po 30 Dec 2020 23:17:20 -0000 1.580
+++ proprietary-surveillance.fr.po 4 Jan 2021 10:03:02 -0000 1.581
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-12-30 10:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
"PO-Revision-Date: 2020-12-30 12:46+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-04 09:55+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -5153,6 +5154,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
@@ -5267,7 +5276,10 @@
"infos nécessaires."
#. type: Content of: <div><p>
-msgid "Copyright © 2015-2020 Free Software Foundation, Inc."
+# | Copyright © 2015-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2015-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2015-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2015-2020 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- proprietary-surveillance.it-diff.html 30 Dec 2020 10:33:46 -0000
1.217
+++ proprietary-surveillance.it-diff.html 4 Jan 2021 10:03:02 -0000
1.218
@@ -588,12 +588,17 @@
but most of them are</strong></del></span> <span
class="inserted"><ins><em>specific
sabotage method Lenovo used did</em></ins></span> not <span
class="removed"><del><strong>in fact
<a href="/philosophy/free-sw.html">free software</a>.
- It also uses</strong></del></span> <span class="inserted"><ins><em>affect
GNU/Linux; also, a
- “clean” Windows install is not really clean since <a
+ It also uses the ugly word “monetize”. A good replacement
+ for that word</strong></del></span> <span class="inserted"><ins><em>affect
GNU/Linux; also, a
+ “clean” Windows install</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always that will fit
+ perfectly.</p></strong></del></span> <span
class="inserted"><ins><em>not really clean since <a
href="/proprietary/malware-microsoft.html">Microsoft puts in its
- own malware</a>.</p>
+ own malware</a>.</p></em></ins></span>
</li>
-</ul>
+
+<span class="removed"><del><strong><li>
+ <p>Apps for BART</strong></del></span>
+<span class="inserted"><ins><em></ul>
@@ -611,33 +616,51 @@
<ul class="blurbs">
<li id="M202006260">
<p>Most apps are malware, but
- Trump's campaign app, like Modi's campaign app, is <a
-
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
- especially nasty malware, helping companies snoop on users as well
+ Trump's campaign app, like Modi's campaign app, is</em></ins></span> <a
<span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
+ especially nasty malware, helping companies snoop</em></ins></span> on
<span class="removed"><del><strong>users</a>.</p>
+ <p>With free software apps,</strong></del></span> users <span
class="removed"><del><strong>could <em>make
sure</em></strong></del></span> <span class="inserted"><ins><em>as well
as snooping on them itself</a>.</p>
- <p>The article says that Biden's app has a less manipulative overall
- approach, but that does not tell us whether it has functionalities we
+ <p>The article says</em></ins></span> that <span
class="removed"><del><strong>they don't snoop.</p>
+ <p>With proprietary apps, one can only hope</strong></del></span>
<span class="inserted"><ins><em>Biden's app has a less manipulative overall
+ approach, but</em></ins></span> that <span
class="removed"><del><strong>they don't.</p></strong></del></span> <span
class="inserted"><ins><em>does not tell us whether it has functionalities we
consider malicious, such as sending data the user has not explicitly
- asked to send.</p>
+ asked to send.</p></em></ins></span>
</li>
- <li id="M201601110">
+<span class="removed"><del><strong><li>
+ <p>A study found 234 Android apps that track users
by</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201601110">
<p>The natural extension of monitoring
- people through “their” phones is <a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software to make sure they can't “fool”
- the monitoring</a>.</p>
+ people through “their” phones is</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary software</em></ins></span> to <span
class="removed"><del><strong>ultrasound from beacons placed in stores or played
by TV programs</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>make
sure they can't “fool”
+ the monitoring</a>.</p></em></ins></span>
</li>
- <li id="M201510050">
+<span class="removed"><del><strong><li>
+ <p>Pairs of Android apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201510050">
<p>According to Edward Snowden, <a
- href="http://www.bbc.com/news/uk-34444233">agencies can take over
+ href="http://www.bbc.com/news/uk-34444233">agencies</em></ins></span>
can <span class="removed"><del><strong>collude</strong></del></span> <span
class="inserted"><ins><em>take over
smartphones</a> by sending hidden text messages which enable
- them to turn the phones on and off, listen to the microphone,
- retrieve geo-location data from the GPS, take photographs, read
+ them</em></ins></span> to <span class="removed"><del><strong>transmit
users' personal
+ data</strong></del></span> <span class="inserted"><ins><em>turn the
phones on and off, listen</em></ins></span> to <span
class="removed"><del><strong>servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands of pairs that collude</a>.</p>
+</li>
+
+<li>
+<p>Google Play intentionally sends app developers <a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>microphone,
+ retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
+
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>GPS, take photographs, read
text messages, read call, location and web browsing history, and
- read the contact list. This malware is designed to disguise itself
+ read</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>contact list. This
malware</em></ins></span> is <span class="removed"><del><strong>not
enough</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this.
At</strong></del></span> <span class="inserted"><ins><em>disguise itself
from investigation.</p>
</li>
@@ -646,21 +669,41 @@
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones,
Android, and BlackBerry</a>. While there is not much
- detail here, it seems that this does not operate via
- the universal back door that we know nearly all portable
- phones have. It may involve exploiting various bugs. There are <a
+ detail here, it seems that</em></ins></span> this <span
class="removed"><del><strong>point, most users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>does not
operate via</em></ins></span>
+ the <span class="removed"><del><strong>“Terms and
Conditions”</strong></del></span> <span
class="inserted"><ins><em>universal back door</em></ins></span> that <span
class="removed"><del><strong>spell out
+what they</strong></del></span> <span class="inserted"><ins><em>we know nearly
all portable
+ phones have. It may involve exploiting various bugs.
There</em></ins></span> are <span
class="removed"><del><strong>“consenting” to. Google should clearly
+and honestly identify the information it collects on users,
instead</strong></del></span> <span class="inserted"><ins><em><a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots of bugs in the phones' radio software</a>.</p>
+ lots</em></ins></span> of <span class="removed"><del><strong>hiding it in
an obscurely worded EULA.</p>
+
+<p>However, to truly protect people's privacy, we must prevent Google
+and other companies from getting this personal
information</strong></del></span> <span
class="inserted"><ins><em>bugs</em></ins></span> in the <span
class="removed"><del><strong>first
+place!</p></strong></del></span> <span class="inserted"><ins><em>phones'
radio software</a>.</p></em></ins></span>
</li>
- <li id="M201307000">
- <p>Portable phones with GPS <a
-
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send their GPS location on remote command, and users cannot stop
- them</a>. (The US says it will eventually require all new portable
phones
- to have GPS.)</p>
+ <span class="removed"><del><strong><li>
+ <p>Google Play (a component of Android)</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201307000">
+ <p>Portable phones with GPS</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks the users' movements without</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+ will send</em></ins></span> their <span
class="removed"><del><strong>permission</a>.</p>
+
+ <p>Even if you disable Google Maps and</strong></del></span> <span
class="inserted"><ins><em>GPS</em></ins></span> location <span
class="removed"><del><strong>tracking, you must
+ disable Google Play itself to completely</strong></del></span> <span
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span>
stop <span class="removed"><del><strong>the tracking. This is
+ yet another example of nonfree software pretending</strong></del></span>
+ <span class="inserted"><ins><em>them</a>. (The US says it will
eventually require all new portable phones</em></ins></span>
+ to <span class="removed"><del><strong>obey the user,
+ when it's actually doing something else. Such a thing would be almost
+ unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>have GPS.)</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>More than 73% of the
most popular Android apps</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -670,27 +713,38 @@
<ul class="blurbs">
<li id="M202009183">
- <p>Facebook <a
-
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops
- on Instagram</a> users by surreptitously turning on the device's
- camera.</p>
+ <p>Facebook</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral and location information</a> of their</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops
+ on Instagram</a></em></ins></span> users <span
class="removed"><del><strong>with third
parties.</p></strong></del></span> <span class="inserted"><ins><em>by
surreptitously turning on the device's
+ camera.</p></em></ins></span>
</li>
- <li id="M202004200">
+ <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated to</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202004200">
<p>Apple whistleblower Thomas Le Bonniec reports that Apple
- made a practice of surreptitiously activating the Siri software to <a
-
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf">
- record users' conversations when they had not activated Siri</a>.
- This was not just occasional, it was systematic practice.</p>
+ made a practice of surreptitiously activating</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
+ was</strong></del></span> <span class="inserted"><ins><em>Siri software
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in the 500 most popular gratis Android apps</a>.</p>
+
+ <p>The article should</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf">
+ record users' conversations when they had</em></ins></span> not <span
class="removed"><del><strong>have described these apps as
+ “free”—they are</strong></del></span> <span
class="inserted"><ins><em>activated Siri</a>.
+ This was</em></ins></span> not <span class="removed"><del><strong>free
software. The clear way</strong></del></span> <span
class="inserted"><ins><em>just occasional, it was systematic practice.</p>
- <p>His job was to listen to these recordings, in a group that made
+ <p>His job was</em></ins></span> to <span
class="removed"><del><strong>say
+ “zero price” is
“gratis.”</p></strong></del></span> <span
class="inserted"><ins><em>listen to these recordings, in a group that made
transcripts of them. He does not believes that Apple has ceased this
- practice.</p>
+ practice.</p></em></ins></span>
- <p>The only reliable way to prevent this is, for the program that
- controls access to the microphone to decide when the user has
+ <p>The <span class="removed"><del><strong>article
takes</strong></del></span> <span class="inserted"><ins><em>only reliable way
to prevent this is,</em></ins></span> for <span
class="removed"><del><strong>granted that</strong></del></span> the <span
class="removed"><del><strong>usual analytics tools are
+ legitimate, but is</strong></del></span> <span
class="inserted"><ins><em>program</em></ins></span> that <span
class="removed"><del><strong>valid? Software developers have no
right</strong></del></span>
+ <span class="inserted"><ins><em>controls access</em></ins></span> to
+ <span class="removed"><del><strong>analyze what</strong></del></span> <span
class="inserted"><ins><em>the microphone to decide when the user has
“activated” any service, to be free software, and the
- operating system under it free as well. This way, users could make
+ operating system under it free as well. This way,</em></ins></span> users
<span class="removed"><del><strong>are doing or how. “Analytics”
tools</strong></del></span> <span class="inserted"><ins><em>could make
sure Apple can't listen to them.</p>
</li>
@@ -698,35 +752,73 @@
<p>Safari occasionally <a
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
sends browsing data from Apple devices in China to the Tencent Safe
- Browsing service</a>, to check URLs that possibly correspond to
+ Browsing service</a>, to check URLs</em></ins></span> that <span
class="removed"><del><strong>snoop are
+ just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>possibly correspond to
“fraudulent” websites. Since Tencent collaborates
with the Chinese government, its Safe Browsing black list most certainly
contains the websites of political opponents. By linking the requests
originating from single IP addresses, the government can identify
- dissenters in China and Hong Kong, thus endangering their lives.</p>
+ dissenters in China and Hong Kong, thus endangering their
lives.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Gratis
Android</strong></del></span>
- <li id="M201905280">
+ <span class="inserted"><ins><em><li id="M201905280">
<p>In spite of Apple's supposed commitment to
- privacy, iPhone apps contain trackers that are busy at night <a
-
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
- sending users' personal information to third parties</a>.</p>
+ privacy, iPhone</em></ins></span> apps <span
class="removed"><del><strong>(but not</strong></del></span> <span
class="inserted"><ins><em>contain trackers that are busy at
night</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>)
+ connect</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
+ sending users' personal information</em></ins></span> to <span
class="removed"><del><strong>100
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
+ on</strong></del></span> <span class="inserted"><ins><em>third
parties</a>.</p>
<p>The article mentions specific examples: Microsoft OneDrive,
Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
- Channel (owned by IBM), the crime-alert service Citizen, Yelp
- and DoorDash. But it is likely that most nonfree apps contain
- trackers. Some of these send personally identifying data such as phone
+ Channel (owned by IBM),</em></ins></span> the <span
class="removed"><del><strong>average.</p>
+ </li>
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>crime-alert service Citizen, Yelp
+ and DoorDash. But it</em></ins></span> is <span
class="removed"><del><strong>present in some Android devices when they are
sold.</strong></del></span> <span class="inserted"><ins><em>likely that most
nonfree apps contain
+ trackers.</em></ins></span> Some <span
class="removed"><del><strong>Motorola phones modify Android to
+ <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"></strong></del></span>
<span class="inserted"><ins><em>of these</em></ins></span> send <span
class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>personally identifying</em></ins></span> data <span
class="removed"><del><strong>to Motorola</a>.</p>
+ </li>
+
+ <li><p>Some manufacturers add a
+ <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package</strong></del></span> such as <span
class="removed"><del><strong>Carrier IQ.</a></p>
+ </li>
+
+ <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access to any file
on</strong></del></span> <span class="inserted"><ins><em>phone
fingerprint, exact location, email address, phone number or even
- delivery address (in the case of DoorDash). Once this information
+ delivery address (in</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>case of DoorDash). Once this information
is collected by the company, there is no telling what it will be
- used for.</p>
+ used for.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
- <li id="M201711250">
+
+<!-- #SpywareOnMobiles -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711250">
<p>The DMCA and the EU Copyright Directive make it <a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr…apps spy on users</a>, because
+ illegal</em></ins></span> to <span class="removed"><del><strong>place new
items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware</strong></del></span> <span
class="inserted"><ins><em>study how iOS cr…apps spy</em></ins></span> on
<span class="removed"><del><strong>Mobiles</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareIniThings">Spyware in iThings</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+</div>
+
+<ul>
+ <li><p>Apple</strong></del></span> <span
class="inserted"><ins><em>users</a>, because
this would require circumventing the iOS DRM.</p>
</li>
@@ -740,34 +832,53 @@
</li>
<li id="M201702150">
- <p>Apple proposes <a
+ <p>Apple</em></ins></span> proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
- fingerprint-scanning touch screen</a>—which would mean no way
+ fingerprint-scanning touch <span
class="removed"><del><strong>screen</a>
+ — which</strong></del></span> <span
class="inserted"><ins><em>screen</a>—which</em></ins></span> would
mean no way
to use it without having your fingerprints taken. Users would have
- no way to tell whether the phone is snooping on them.</p>
+ no way to tell whether the phone is snooping on
+ <span class="removed"><del><strong>them.</p></li>
+
+ <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>them.</p>
</li>
<li id="M201611170">
- <p>iPhones <a
-
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
+ <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send</em></ins></span>
lots of personal data to Apple's servers</a>. Big Brother can get
them from there.</p>
</li>
- <li id="M201609280">
- <p>The iMessage app on iThings <a
+ <span
class="removed"><del><strong><li><p>The</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609280">
+ <p>The</em></ins></span> iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
a server every phone number that the user types into it</a>; the
server records these numbers for at least 30 days.</p>
</li>
- <li id="M201509240">
- <p>iThings automatically upload to Apple's servers all the photos
+ <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
+ without giving a valid email address and receiving the code Apple
+ sends to it.</p>
+ </li>
+
+ <li><p>Around 47% of the most popular iOS apps
+ <a class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a> of their users with third
parties.</p>
+ </li>
+
+ <li><p>iThings</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201509240">
+ <p>iThings</em></ins></span> automatically upload to Apple's servers
all the photos
and videos they make.</p>
<blockquote><p> iCloud Photo Library stores every photo and
video you
take, and keeps them up to date on all your devices. Any edits you
- make are automatically updated everywhere. […]
</p></blockquote>
+ make are automatically updated everywhere. <span
class="removed"><del><strong>[...]</strong></del></span> <span
class="inserted"><ins><em>[…]</em></ins></span>
</p></blockquote>
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
information</a> as accessed on 24 Sep 2015.) The iCloud feature is
@@ -783,8 +894,11 @@
<p>Unknown people apparently took advantage of this to <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA can access any of them through <a
-
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+ security to get at them, but NSA can access any of them through <a
<span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p>Spyware in iThings:</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
</li>
<li id="M201409220">
@@ -803,19 +917,21 @@
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
Several “features” of iOS seem to exist
- for no possible purpose other than surveillance</a>. Here is the
<a
-
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ for no possible purpose other than surveillance</a>. Here
is</em></ins></span> the <a
+ <span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
<li id="M201401100">
- <p>The <a class="not-a-duplicate"
+ <p>The <a</em></ins></span> class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
iBeacon</a> lets stores determine exactly where the iThing is, and
get other info too.</p>
</li>
- <li id="M201312300">
+ <span
class="removed"><del><strong><li><p>There</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
Either Apple helps the NSA snoop on all the data in an iThing, or it
@@ -830,54 +946,96 @@
</li>
<li id="M201210170">
- <p>There is also a feature for web sites to track users, which is
<a
+ <p>There</em></ins></span> is also a feature for web sites to track
users, which is <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it is
still true in iOS 7.)</p>
</li>
- <li id="M201204280">
- <p>Users cannot make an Apple ID (<a
+ <span class="removed"><del><strong><li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201204280">
+ <p>Users cannot make an</em></ins></span> Apple <span
class="removed"><del><strong>its geolocation</a> by default, though that
can be
+ turned off.</p>
+ </li>
+
+ <li><p>Apple can, and regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>ID (<a
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary
to install even gratis apps</a>) without giving a valid
- email address and receiving the verification code Apple sends
- to it.</p>
+ email address and receiving</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p>
+ </li>
+
+ <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either</strong></del></span> <span
class="inserted"><ins><em>verification code</em></ins></span> Apple <span
class="removed"><del><strong>helps the NSA snoop on all the data in an iThing,
+ or it is totally incompetent.</a></p>
+ </li>
+
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em>sends</em></ins></span>
+ to <span class="removed"><del><strong>exist for no
+ possible purpose other than surveillance</a>. Here is the
+ <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>it.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInAndroid">Android Telephones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInAndroid">#SpywareInAndroid</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware
in</strong></del></span> <span
class="inserted"><ins><em>id="SpywareInAndroid">Android</em></ins></span>
Telephones</h4>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInAndroid">#SpywareInAndroid</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
- <li id="M202012070">
- <p>Baidu apps were <a
-
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/">caught
collecting
- sensitive personal data</a> that can be used for lifetime tracking
- of users and putting them in danger. More than 1.4 billion people
- worldwide are affected by these proprietary apps and users'
- privacy is jeopardized by this surveillance tool. Data collected by Baidu
may be shared with Chinese government, possibly putting Chinese people in
danger.</p>
- </li>
+<span class="removed"><del><strong><ul>
+ <li><p>According to Edward Snowden,</strong></del></span>
- <li id="M202004300">
- <p>Xiaomi phones <a
-
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M202012070">
+ <p>Baidu apps were</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/">caught
collecting
+ sensitive personal data</a> that</em></ins></span> can <span
class="removed"><del><strong>take over smartphones</a>
+ by sending hidden text messages which enable them to turn the phones
+ on and off, listen to the microphone, retrieve geo-location data from the
+ GPS, take photographs, read text messages, read call,
location</strong></del></span> <span class="inserted"><ins><em>be used for
lifetime tracking
+ of users</em></ins></span> and <span class="removed"><del><strong>web
+ browsing history,</strong></del></span> <span
class="inserted"><ins><em>putting them in danger. More than 1.4 billion people
+ worldwide are affected by these proprietary apps</em></ins></span> and
<span class="removed"><del><strong>read the contact list. This
malware</strong></del></span> <span class="inserted"><ins><em>users'
+ privacy</em></ins></span> is <span class="removed"><del><strong>designed to
+ disguise itself from investigation.</p></strong></del></span>
<span class="inserted"><ins><em>jeopardized by this surveillance tool. Data
collected by Baidu may be shared with Chinese government, possibly putting
Chinese people in danger.</p></em></ins></span>
+ </li>
+
+ <span
class="removed"><del><strong><li><p>Samsung</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202004300">
+ <p>Xiaomi</em></ins></span> phones <span
class="removed"><del><strong>come with</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
+ and they</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
many actions the user takes</a>: starting an app, looking at a
folder,
- visiting a website, listening to a song. They send device identifying
+ visiting a website, listening to a song. They</em></ins></span> send
<span class="removed"><del><strong>so much data that their transmission
is</strong></del></span> <span class="inserted"><ins><em>device identifying
information too.</p>
<p>Other nonfree programs snoop too. For instance, Spotify and
- other streaming dis-services make a dossier about each user, and <a
- href="/malware/proprietary-surveillance.html#M201508210"> they make
+ other streaming dis-services make</em></ins></span> a
+ <span class="removed"><del><strong>substantial expense for users. Said
transmission, not wanted or
+ requested by the</strong></del></span> <span
class="inserted"><ins><em>dossier about each</em></ins></span> user, <span
class="removed"><del><strong>clearly must constitute spying of some
+ kind.</p></li>
+
+ <li><p>A Motorola phone</strong></del></span> <span
class="inserted"><ins><em>and</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</strong></del></span>
+ <span
class="inserted"><ins><em>href="/malware/proprietary-surveillance.html#M201508210">
they make
users identify themselves to pay</a>. Out, out, damned
Spotify!</p>
- <p>Forbes exonerates the same wrongs when the culprits are not
Chinese,
- but we condemn this no matter who does it.</p>
+ <p>Forbes exonerates</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>same wrongs when the culprits are not Chinese,
+ but we condemn this no matter who does it.</p></em></ins></span>
</li>
- <li id="M201812060">
+ <span class="removed"><del><strong><li><p>Spyware in Android
phones (and Windows?</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201812060">
<p>Facebook's app got “consent” to <a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
upload call logs automatically from Android phones</a> while
disguising
@@ -932,49 +1090,116 @@
</li>
<li id="M201308010">
- <p>Spyware in Android phones (and Windows? laptops): The Wall Street
+ <p>Spyware in Android phones (and Windows?</em></ins></span>
laptops): The Wall Street
Journal (in an article blocked from us by a paywall) reports that <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
the FBI can remotely activate the GPS and microphone in Android phones
- and laptops</a> (presumably Windows laptops). Here is <a
+ and <span class="removed"><del><strong>laptops</a>.
+ (I suspect this means</strong></del></span> <span
class="inserted"><ins><em>laptops</a> (presumably</em></ins></span>
Windows <span class="removed"><del><strong>laptops.)</strong></del></span>
<span class="inserted"><ins><em>laptops).</em></ins></span> Here is <a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
- <li id="M201307280">
- <p>Spyware is present in some Android devices when they are
- sold. Some Motorola phones, made when this company was owned
- by Google, use a modified version of Android that <a
-
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal data to Motorola</a>.</p>
+ <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
+ remote command and users cannot stop them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable phones
+ to have GPS.)</p>
+ </li>
+
+ <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201307280">
+ <p>Spyware</em></ins></span> is <span
class="removed"><del><strong>to restrict
+ the use of data on the user's computer, but it does surveillance
+ too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get the user's list of other people's phone
+ numbers.</a></p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Spyware</strong></del></span> <span
class="inserted"><ins><em>present</em></ins></span> in <span
class="removed"><del><strong>Mobile Applications</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>Faceapp appears to do lots of surveillance,
judging</strong></del></span> <span class="inserted"><ins><em>some Android
devices when they are
+ sold. Some Motorola phones, made when this company was
owned</em></ins></span>
+ by <span class="inserted"><ins><em>Google, use a modified version of
Android that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands to</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ sends</em></ins></span> personal data <span
class="removed"><del><strong>in the device</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>to Motorola</a>.</p></em></ins></span>
</li>
- <li id="M201307250">
- <p>A Motorola phone <a
-
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p>
+ <span class="removed"><del><strong><li>
+ <p>Verizon</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201307250">
+ <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that it will</a>
+ pre-install on some of its phones. The app will give Verizon the same
+ information about the users' searches that Google normally gets when
+ they use its search engine.</p>
+
+ <p>Currently,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</em></ins></span> the <span
class="inserted"><ins><em>time</a>.</p>
</li>
<li id="M201302150">
- <p>Google Play intentionally sends app developers <a
-
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
- the personal details of users that install the app</a>.</p>
+ <p>Google Play intentionally sends</em></ins></span> app <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>developers</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
+ the
+ <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>personal details
of users that install</em></ins></span> the <span
class="removed"><del><strong>app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>app</a>.</p>
+
+ <p>Merely asking</em></ins></span> the
+ <span class="removed"><del><strong>app remains spyware—an
“optional” piece</strong></del></span> <span
class="inserted"><ins><em>“consent”</em></ins></span> of <span
class="removed"><del><strong>spyware</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> is
+ <span class="removed"><del><strong>still spyware.</p>
+ </li>
+
+ <li><p>The Meitu photo-editing
+ app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to a Chinese company</a>.</p></li>
- <p>Merely asking the “consent” of users is not enough to
+ <li><p>A pregnancy test controller
application</strong></del></span> not <span class="removed"><del><strong>only
+ can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
<span class="inserted"><ins><em>enough to
legitimize actions like this. At this point, most users have stopped
reading the “Terms and Conditions” that spell out what
they are “consenting” to. Google should clearly and
- honestly identify the information it collects on users, instead of
- hiding it in an obscurely worded EULA.</p>
+ honestly identify the information it collects</em></ins></span> on <span
class="removed"><del><strong>many sorts</strong></del></span> <span
class="inserted"><ins><em>users, instead</em></ins></span> of <span
class="removed"><del><strong>data</strong></del></span>
+ <span class="inserted"><ins><em>hiding it</em></ins></span> in <span
class="removed"><del><strong>the phone,</strong></del></span> <span
class="inserted"><ins><em>an obscurely worded EULA.</p>
- <p>However, to truly protect people's privacy, we must prevent Google
- and other companies from getting this personal information in the
- first place!</p>
+ <p>However, to truly protect people's privacy, we must prevent
Google</em></ins></span>
+ and <span class="inserted"><ins><em>other companies from getting this
personal information</em></ins></span> in <span
class="removed"><del><strong>server accounts, it can
+ alter them too</a>.
+ </p></li>
+
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after the ride</a>.</p>
+
+ <p>This example illustrates how
“getting</strong></del></span> the <span
class="removed"><del><strong>user's consent”
+ for surveillance is inadequate as a protection against massive
+ surveillance.</p>
+ </li>
+
+ <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>first place!</p></em></ins></span>
</li>
- <li id="M201111170">
- <p>Some manufacturers add a <a
-
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier IQ</a>.</p>
+ <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201111170">
+ <p>Some manufacturers add a</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general</em></ins></span> surveillance <span
class="removed"><del><strong>software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users post on various
sites</strong></del></span> <span
class="inserted"><ins><em>package</em></ins></span> such as <span
class="removed"><del><strong>Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>Carrier IQ</a>.</p>
</li>
</ul>
@@ -986,25 +1211,42 @@
<ul class="blurbs">
<li id="M201603080">
- <p>E-books can contain JavaScript code, and <a
+ <p>E-books can contain JavaScript code,</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em><a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops on readers</a>.</p>
+ sometimes this code snoops on
readers</a>.</p></em></ins></span>
</li>
- <li id="M201410080">
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201410080">
<p>Adobe made “Digital Editions,”
- the e-reader used by most US libraries, <a
-
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed to check DRM!</p>
+ the e-reader used by most US libraries,</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known faces</a>,
+ and suggests you</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data</em></ins></span> to <span
class="removed"><del><strong>share the picture you take
according</strong></del></span> <span
class="inserted"><ins><em>Adobe</a>. Adobe's “excuse”: it's
+ needed</em></ins></span> to <span class="removed"><del><strong>who
+ is</strong></del></span> <span class="inserted"><ins><em>check
DRM!</p>
</li>
<li id="M201212030">
- <p>Spyware in many e-readers—not only the Kindle: <a
+ <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>many
e-readers—not only</em></ins></span> the <span
class="removed"><del><strong>frame.</p>
+
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means the pictures are likely to be
+ sent across the wire to Facebook's servers and face-recognition
+ algorithms.</p>
+
+ <p>If so, none of Facebook users' pictures are private
+ anymore,</strong></del></span> <span class="inserted"><ins><em>Kindle:
<a
href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
- report even which page the user reads at what time</a>.</p>
+ report</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>which page</em></ins></span> the user <span
class="removed"><del><strong>didn't “upload” them to the
service.</p></strong></del></span> <span class="inserted"><ins><em>reads
at what time</a>.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
+ is based</strong></del></span>
+<span class="inserted"><ins><em></ul>
@@ -1023,37 +1265,62 @@
<li id="M202011260">
<p>Microsoft's Office 365 suite enables employers <a
href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance">to
- snoop on each employee</a>. After
- a public outburst, Microsoft stated that <a
-
href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance">it
+ snoop</em></ins></span> on <span class="removed"><del><strong>proprietary
malware (DRM and snooping). In August
+ 2015 it</strong></del></span> <span class="inserted"><ins><em>each
employee</a>. After
+ a public outburst, Microsoft stated that</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased
snooping</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance">it
would remove this capability</a>. Let's hope so.</p>
</li>
<li id="M201912190">
- <p>Some Avast and AVG extensions
+ <p>Some Avast</em></ins></span> and <span
class="removed"><del><strong>some
+ are starting to realize</strong></del></span> <span
class="inserted"><ins><em>AVG extensions
for Firefox and Chrome were found to <a
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
snoop on users' detailed browsing habits</a>. Mozilla and Google
removed the problematic extensions from their stores, but this shows
- once more how unsafe nonfree software can be. Tools that are supposed
- to protect a proprietary system are, instead, infecting it with
- additional malware (the system itself being the original
malware).</p>
+ once more how unsafe nonfree software can be. Tools</em></ins></span> that
<span class="inserted"><ins><em>are supposed
+ to protect a proprietary system are, instead, infecting</em></ins></span>
it <span class="removed"><del><strong>is nasty.</p>
+
+ <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>with
+ additional malware (the system itself being</em></ins></span> the <span
class="inserted"><ins><em>original malware).</p>
</li>
<li id="M201811020">
- <p>Foundry's graphics software <a
-
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information to identify who is running it</a>. The result is
- often a legal threat demanding a lot of money.</p>
+ <p>Foundry's graphics software</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as a way</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
+ whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>identify who</em></ins></span> is <span
class="inserted"><ins><em>running it</a>. The result is
+ often</em></ins></span> a <span class="removed"><del><strong>typical
example</strong></del></span> <span class="inserted"><ins><em>legal threat
demanding a lot</em></ins></span> of
+ <span class="removed"><del><strong>the attitude</strong></del></span>
<span class="inserted"><ins><em>money.</p>
- <p>The fact that this is used for repression of forbidden sharing
+ <p>The fact that this is used for repression</em></ins></span> of
<span class="removed"><del><strong>the proprietary</strong></del></span> <span
class="inserted"><ins><em>forbidden sharing
makes it even more vicious.</p>
- <p>This illustrates that making unauthorized copies of nonfree
software
- is not a cure for the injustice of nonfree software. It may avoid
- paying for the nasty thing, but cannot make it less nasty.</p>
+ <p>This illustrates that making unauthorized copies of
nonfree</em></ins></span> software <span class="removed"><del><strong>industry
towards
+ those they have subjugated.</p>
+
+ <p>Out, out, damned Spotify!</p>
+ </li>
+ <li><p>Many proprietary apps for mobile devices report which
other
+ apps the user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
+ is <span class="removed"><del><strong>doing this in</strong></del></span>
<span class="inserted"><ins><em>not</em></ins></span> a <span
class="removed"><del><strong>way that at least is visible and
+ optional</a>. Not as bad as what</strong></del></span> <span
class="inserted"><ins><em>cure for</em></ins></span> the <span
class="removed"><del><strong>others do.</p>
+ </li>
+
+ <li><p>FTC says most mobile apps</strong></del></span> <span
class="inserted"><ins><em>injustice of nonfree software. It may avoid
+ paying</em></ins></span> for <span class="removed"><del><strong>children
don't respect privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the nasty thing, but cannot make it less
nasty.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
<h4 id="SpywareInMobileApps">Mobile Apps</h4>
@@ -1062,65 +1329,119 @@
<ul class="blurbs">
<li id="M202003260">
- <p>The Apple iOS version of Zoom <a
-
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account">is
- sending users' data to Facebook</a> even if the user doesn't have
- a Facebook account. According to the article, Zoom and Facebook
+ <p>The Apple iOS version of Zoom</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on the user</a>. This is in
addition</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account">is
+ sending users' data</em></ins></span> to <span
class="inserted"><ins><em>Facebook</a> even if</em></ins></span> the
<span class="removed"><del><strong>snooping done by</strong></del></span> <span
class="inserted"><ins><em>user doesn't have
+ a Facebook account. According to</em></ins></span> the <span
class="removed"><del><strong>phone company,</strong></del></span> <span
class="inserted"><ins><em>article, Zoom</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in the
+ phone.</p>
+
+ <p>Don't be distracted by the question</strong></del></span> <span
class="inserted"><ins><em>Facebook
don't even mention this surveillance on their privacy policy page,
- making this an obvious violation of people's privacy even in their
+ making this an obvious violation</em></ins></span> of <span
class="inserted"><ins><em>people's privacy even in their
own terms.</p>
</li>
<li id="M202003010">
<p>The Alipay Health Code app
- estimates whether the user has Covid-19 and <a
+ estimates</em></ins></span> whether the <span
class="inserted"><ins><em>user has Covid-19 and <a
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
tells the cops directly</a>.</p>
</li>
<li id="M202001290">
- <p>The Amazon Ring app does <a
-
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
- surveillance for other companies as well as for Amazon</a>.</p>
+ <p>The Amazon Ring</em></ins></span> app <span
class="removed"><del><strong>developers get
+ users to say “I agree”. That is no excuse for
malware.</p>
+ </li>
+
+ <li><p>The Brightest Flashlight app</strong></del></span> <span
class="inserted"><ins><em>does</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
+ surveillance</em></ins></span> for <span class="removed"><del><strong>use
by companies.</a></p></strong></del></span> <span
class="inserted"><ins><em>other companies as well as for
Amazon</a>.</p>
</li>
- <li id="M201912220">
- <p>The ToToc messaging app seems to be a <a
+ <li id="M201912220"></em></ins></span>
+ <p>The <span class="removed"><del><strong>FTC criticized this app
because it asked the user to
+ approve sending personal data to the</strong></del></span> <span
class="inserted"><ins><em>ToToc messaging</em></ins></span> app <span
class="removed"><del><strong>developer but did not
+ ask about sending it</strong></del></span> <span
class="inserted"><ins><em>seems</em></ins></span> to <span
class="removed"><del><strong>other companies. This shows</strong></del></span>
<span class="inserted"><ins><em>be a <a
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
- spying tool for the government of the United Arab Emirates</a>.
- Any nonfree program could be doing this, and that is a good
- reason to use free software instead.</p>
+ spying tool for</em></ins></span> the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>government</em></ins></span> of the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>United Arab Emirates</a>.
+ Any nonfree program could be doing this, and that is</em></ins></span> a
<span class="removed"><del><strong>flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>good
+ reason</em></ins></span> to <span class="removed"><del><strong>anyone?
A</strong></del></span> <span class="inserted"><ins><em>use</em></ins></span>
free software <span class="removed"><del><strong>flashlight
+ app would not.</p>
+ </li>
+</ul>
+
- <p><small>Note: this article uses the word “free”
in
- the sense of “gratis.”</small></p>
+<div class="big-subsection">
+ <h4 id="SpywareInGames">Spyware</strong></del></span> <span
class="inserted"><ins><em>instead.</p>
+
+ <p><small>Note: this article uses the word
“free”</em></ins></span> in <span
class="removed"><del><strong>Games</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+</div>
+
+<ul>
+ <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
+ <span class="inserted"><ins><em>the sense of
“gratis.”</small></p>
</li>
<li id="M201912090">
<p>iMonsters and Android phones,
- when used for work, give employers powerful <a
-
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
- snooping and sabotage capabilities</a> if they install their own
- software on the device. Many employers demand to do this. For the
- employee, this is simply nonfree software, as fundamentally unjust
- and as dangerous as any other nonfree software.</p>
+ when used for work, give employers powerful</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
+ snooping</em></ins></span> and <span class="removed"><del><strong>then
sends personal data about them</strong></del></span> <span
class="inserted"><ins><em>sabotage capabilities</a> if they install their
own
+ software on the device. Many employers demand</em></ins></span> to
+ <span class="removed"><del><strong>nVidia servers</a>.</p>
+ </li>
+
+ <li><p>Angry Birds
+ <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies,</strong></del></span> <span
class="inserted"><ins><em>do this. For the
+ employee, this is simply nonfree software, as fundamentally
unjust</em></ins></span>
+ and <span class="inserted"><ins><em>as dangerous as any other nonfree
software.</p>
</li>
<li id="M201910130">
- <p>The Chinese Communist Party's “Study
- the Great Nation” app requires users to grant it <a
-
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access to the phone's microphone, photos, text messages, contacts, and
- internet history</a>, and the Android version was found to contain a
- back-door allowing developers to run any code they wish in the users'
+ <p>The Chinese Communist Party's “Study</em></ins></span>
+ the <span class="removed"><del><strong>NSA takes
advantage</strong></del></span> <span class="inserted"><ins><em>Great
Nation” app requires users</em></ins></span> to <span
class="removed"><del><strong>spy through</strong></del></span> <span
class="inserted"><ins><em>grant</em></ins></span> it <span
class="removed"><del><strong>too</a>.
+ Here's information on</strong></del></span> <a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>The “smart” toys My Friend Cayla</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access to the phone's microphone, photos, text messages,
contacts,</em></ins></span> and <span class="removed"><del><strong>i-Que
transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
+ <span class="inserted"><ins><em>internet history</a>, and the
Android version was found</em></ins></span> to <span
class="removed"><del><strong>Nuance
Communications</a>,</strong></del></span> <span
class="inserted"><ins><em>contain</em></ins></span> a <span
class="removed"><del><strong>speech recognition company
based</strong></del></span>
+ <span class="inserted"><ins><em>back-door allowing developers to run any
code they wish</em></ins></span> in the <span
class="removed"><del><strong>U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</strong></del></span> <span
class="inserted"><ins><em>users'
phone, as “superusers.” Downloading and using this
app is mandatory at some workplaces.</p>
<p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated, but
- readable after copy-pasting in a text editor) includes a clarification
+ Washington Post version of</em></ins></span> the <span
class="removed"><del><strong>toys with a mobile phone. This would
+ enable crackers to listen</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated, but
+ readable after copy-pasting</em></ins></span> in <span
class="removed"><del><strong>on</strong></del></span> a <span
class="removed"><del><strong>child's speech,</strong></del></span> <span
class="inserted"><ins><em>text editor) includes a clarification
saying that the tests were only performed on the Android version
- of the app, and that, according to Apple, “this kind of
+ of the app,</em></ins></span> and <span class="inserted"><ins><em>that,
according to Apple, “this kind of
‘superuser’ surveillance could not be conducted on
Apple's operating system.”</p>
</li>
@@ -1128,53 +1449,80 @@
<li id="M201909091">
<p>The Facebook app <a
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks users even when it is turned off</a>, after tricking them
- into giving the app broad permissions in order to use one of its
- functionalities.</p>
+ tracks users</em></ins></span> even <span
class="removed"><del><strong>speak</strong></del></span> <span
class="inserted"><ins><em>when it is turned off</a>, after tricking
them</em></ins></span>
+ into <span class="inserted"><ins><em>giving</em></ins></span> the <span
class="removed"><del><strong>toys themselves.</p></strong></del></span>
<span class="inserted"><ins><em>app broad permissions in order to use one of its
+ functionalities.</p></em></ins></span>
</li>
- <li id="M201909090">
- <p>Some nonfree period-tracking apps including MIA Fem and Maya <a
-
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
+ <span class="removed"><del><strong><li>
+ <p>A computerized vibrator</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201909090">
+ <p>Some nonfree period-tracking apps including MIA Fem and
Maya</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through the</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
send intimate details of users' lives to Facebook</a>.</p>
</li>
<li id="M201909060">
- <p>Keeping track of who downloads a proprietary
- program is a form of surveillance. There is a
- proprietary program for adjusting a certain telescopic rifle sight. <a
-
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
- A US prosecutor has demanded the list of all the 10,000 or more people
- who have installed it</a>.</p>
+ <p>Keeping track of who downloads a</em></ins></span> proprietary
<span class="removed"><del><strong>control app</a>.</p>
+
+ <p>The app was reporting the temperature</strong></del></span>
+ <span class="inserted"><ins><em>program is a form</em></ins></span> of
<span class="removed"><del><strong>the vibrator minute by
+ minute (thus, indirectly, whether it was surrounded
by</strong></del></span> <span class="inserted"><ins><em>surveillance. There
is</em></ins></span> a <span class="removed"><del><strong>person's
+ body), as well as the vibration frequency.</p>
+
+ <p>Note the totally inadequate proposed
response:</strong></del></span>
+ <span class="inserted"><ins><em>proprietary program for
adjusting</em></ins></span> a <span class="removed"><del><strong>labeling
+ standard with which manufacturers would make statements about
+ their products, rather than free software which users could have
+ checked and changed.</p>
+
+ <p>The company that made the vibrator</strong></del></span> <span
class="inserted"><ins><em>certain telescopic rifle sight.</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded the list</em></ins></span> of <span
class="removed"><del><strong>personal information about
how</strong></del></span> <span class="inserted"><ins><em>all the 10,000 or
more</em></ins></span> people <span
class="removed"><del><strong>used</strong></del></span>
+ <span class="inserted"><ins><em>who have installed</em></ins></span>
it</a>.</p>
- <p>With a free program there would not be a list of who has installed
+ <span class="removed"><del><strong><p>The company's statement that
it was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold the data
to</strong></del></span>
+
+ <span class="inserted"><ins><em><p>With</em></ins></span> a
+ <span class="removed"><del><strong>data broker, the data
broker</strong></del></span> <span class="inserted"><ins><em>free program
there</em></ins></span> would <span class="removed"><del><strong>have been able
to figure out</strong></del></span> <span class="inserted"><ins><em>not be a
list of</em></ins></span> who <span class="removed"><del><strong>the user
was.</p>
+
+ <p>Following this lawsuit,
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company</strong></del></span> has <span
class="removed"><del><strong>been ordered</strong></del></span> <span
class="inserted"><ins><em>installed
it.</p>
</li>
<li id="M201907081">
- <p>Many unscrupulous mobile-app developers keep finding ways to <a
+ <p>Many unscrupulous mobile-app developers keep finding
ways</em></ins></span> to <span class="removed"><del><strong>pay a
total</strong></del></span> <span class="inserted"><ins><em><a
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
- bypass user's settings</a>, regulations, and privacy-enhancing
features
- of the operating system, in order to gather as much private data as
+ bypass user's settings</a>, regulations, and privacy-enhancing
features</em></ins></span>
+ of <span class="removed"><del><strong>C$4m</a></strong></del></span>
<span class="inserted"><ins><em>the operating system, in
order</em></ins></span> to <span class="removed"><del><strong>its
customers.</p></strong></del></span> <span
class="inserted"><ins><em>gather as much private data as
they possibly can.</p>
<p>Thus, we can't trust rules against spying. What we can trust is
- having control over the software we run.</p>
+ having control over the software we run.</p></em></ins></span>
</li>
- <li id="M201907080">
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201907080">
<p>Many Android apps can track
- users' movements even when the user says <a
-
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow them access to locations</a>.</p>
+ users' movements even when the user says</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not</em></ins></span> to <span class="removed"><del><strong>the
+ manufacturer</a>. Guess what?</strong></del></span> <span
class="inserted"><ins><em>allow them access to locations</a>.</p>
<p>This involves an apparently unintentional weakness in Android,
exploited intentionally by malicious apps.</p>
</li>
<li id="M201905300">
- <p>The Femm “fertility” app is secretly a <a
-
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
+ <p>The Femm “fertility” app is secretly
a</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
@@ -1183,10 +1531,10 @@
</li>
<li id="M201905060">
- <p>BlizzCon 2019 imposed a <a
+ <p>BlizzCon 2019 imposed</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em><a
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement to run a proprietary phone app</a> to be allowed into
- the event.</p>
+ requirement</em></ins></span> to <span
class="removed"><del><strong>access</strong></del></span> <span
class="inserted"><ins><em>run a proprietary phone app</a> to be allowed
into</em></ins></span>
+ the <span
class="removed"><del><strong>data</a></strong></del></span> <span
class="inserted"><ins><em>event.</p>
<p>This app is a spyware that can snoop on a lot of
sensitive data, including user's location and contact list, and has <a
@@ -1195,69 +1543,163 @@
</li>
<li id="M201904131">
- <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
+ <p>Data</em></ins></span> collected by <span
class="removed"><del><strong>the manufacturer's snooping.</p>
+
+ <p>That the manufacturer</strong></del></span> <span
class="inserted"><ins><em>menstrual and pregnancy monitoring apps is often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>. Even though the
- data is “anonymized and aggregated,” it can easily be
- traced back to the woman who uses the app.</p>
-
- <p>This has harmful implications for women's rights to equal
employment
- and freedom to make their own pregnancy choices. Don't use
- these apps, even if someone offers you a reward to do so. A
+ available to employers</em></ins></span> and <span
class="inserted"><ins><em>insurance companies</a>. Even
though</em></ins></span> the <span class="removed"><del><strong>FBI could
listen</strong></del></span>
+ <span class="inserted"><ins><em>data is “anonymized and
aggregated,” it can easily be
+ traced back</em></ins></span> to <span class="removed"><del><strong>these
conversations
+ was unacceptable by itself.</p></li>
+
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span class="inserted"><ins><em>the woman who uses
the app.</p>
+
+ <p>This has harmful implications for women's
rights</em></ins></span> to <span class="removed"><del><strong>spy on
children</strong></del></span> <span class="inserted"><ins><em>equal
employment</em></ins></span>
+ and <span class="removed"><del><strong>adults</a>.</p>
+ </li>
+</ul>
+
+
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS:</strong></del></span> <span
class="inserted"><ins><em>freedom to</em></ins></span> make <span
class="removed"><del><strong>sure</strong></del></span> <span
class="inserted"><ins><em>their own pregnancy choices. Don't use
+ these apps, even if someone offers you a reward</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>do so. A
free-software app that does more or less the same thing without
- spying on you is available from <a
- href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
-
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
- a new one is being developed</a>.</p>
+ spying</em></ins></span> on <span class="removed"><del><strong>top under
each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p></strong></del></span> <span class="inserted"><ins><em>you
is available from</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>spyware via BIOS</a> on Windows
installs.
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em><a
+
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"></em></ins></span>
+ a <span class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>new
one</em></ins></span> is <span class="removed"><del><strong>not really
+clean since</strong></del></span> <span class="inserted"><ins><em>being
developed</a>.</p>
</li>
<li id="M201904130">
<p>Google tracks the movements of Android phones and iPhones
- running Google apps, and sometimes <a
-
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ running Google apps, and sometimes</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
saves the data for years</a>.</p>
- <p>Nonfree software in the phone has to be responsible for sending
- the location data to Google.</p>
+ <p>Nonfree software</em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>the phone has</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect</strong></del></span> <span
class="inserted"><ins><em>be responsible for sending</em></ins></span>
+ the <span class="removed"><del><strong>emails of
members</strong></del></span> <span class="inserted"><ins><em>location data to
Google.</p>
</li>
<li id="M201903251">
- <p>Many Android phones come with a huge number of <a
+ <p>Many Android phones come with a huge number</em></ins></span> of
<span class="removed"><del><strong>Parliament
+ this way, because they</strong></del></span> <span
class="inserted"><ins><em><a
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
preinstalled nonfree apps that have access to sensitive data without
users' knowledge</a>. These hidden apps may either call home with
- the data, or pass it on to user-installed apps that have access to
- the network but no direct access to the data. This results in massive
- surveillance on which the user has absolutely no control.</p>
+ the data, or</em></ins></span> pass it <span
class="removed"><del><strong>through Microsoft.</p></li>
+
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>on to user-installed apps that have access to
+ the network but no direct access to the data. This
results</em></ins></span> in <span class="removed"><del><strong>Cisco TNP IP
phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>massive
+ surveillance on which the user has absolutely no
control.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of them
<a
-
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data to third parties</a>, which can use it
- for invasive advertising or discriminating against people in poor
- medical condition.</p>
- <p>Whenever user “consent” is sought, it is buried in
- lengthy terms of service that are difficult to understand. In any case,
- “consent” is not sufficient to legitimize snooping.</p>
- </li>
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
- <li id="M201902230">
- <p>Facebook offered a convenient proprietary
- library for building mobile apps, which also <a
- href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data to Facebook</a>. Lots of companies built apps that
- way and released them, apparently not realizing that all the personal
- data they collected would go to Facebook as well.</p>
+<ul>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
- <p>It shows that no one can trust a nonfree program, not even the
- developers of other nonfree programs.</p>
+ <span class="inserted"><ins><em><li id="M201903201">
+ <p>A study of 24 “health” apps found that 19 of
them</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
</li>
+</ul>
- <li id="M201902140">
- <p>The AppCensus database gives information on <a
- href="https://www.appcensus.mobi"> how Android apps use and
+
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware</strong></del></span> <span
class="inserted"><ins><em>third parties</a>, which can use it
+ for invasive advertising or discriminating against
people</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>The Nest Cam “smart” camera</strong></del></span>
<span class="inserted"><ins><em>poor
+ medical condition.</p>
+
+ <p>Whenever user “consent”</em></ins></span> is <span
class="removed"><del><strong><a
+ href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span> <span
class="inserted"><ins><em>sought, it is buried in
+ lengthy terms of service that are difficult to understand. In any case,
+ “consent” is not sufficient to legitimize snooping.</p>
+ </li>
+
+ <li id="M201902230">
+ <p>Facebook offered a convenient proprietary
+ library for building mobile apps, which also <a
+ href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built apps that
+ way and released them, apparently not realizing that all the personal
+ data they collected would go to Facebook as well.</p>
+
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p>
+ </li>
+
+ <li id="M201902140">
+ <p>The AppCensus database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps use and
misuse users' personal data</a>. As of March 2019, nearly
78,000 have been analyzed, of which 24,000 (31%) transmit the <a
href="/proprietary/proprietary-surveillance.html#M201812290">
@@ -1684,103 +2126,36 @@
<p>The article confusingly describes gratis apps as
“free”, but most of them are not in fact <a
- href="/philosophy/free-sw.html">free software</a>. It also
uses</em></ins></span> the
+ href="/philosophy/free-sw.html">free software</a>. It also uses
the
ugly word “monetize”. A good replacement for that word
is “exploit”; nearly always that will fit perfectly.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Apps for BART
- <a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With proprietary apps, one can only hope that they don't.</p>
-</li>
-
-<li>
- <p>A study found 234 Android apps that track users by
- <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
programs</a>.
- </p>
-
-</li>
-
-<li>
- <p>Pairs of Android apps can collude to transmit users' personal
- data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that collude</a>.</p>
-</li>
-
-<li>
-<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details of users that install the app</a>.</p>
-
-<p>Merely asking the “consent” of users is not enough
-to legitimize actions like this. At this point, most users have
-stopped reading the “Terms and Conditions” that spell out
-what they are “consenting” to. Google should clearly
-and honestly identify the information it collects on users, instead
-of hiding it in an obscurely worded EULA.</p>
-
-<p>However, to truly protect people's privacy, we must prevent Google
-and other companies from getting this personal information in the first
-place!</p>
-</li>
-
- <li>
- <p>Google Play (a component of Android) <a
-
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without their permission</a>.</p>
-
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself to completely stop the tracking. This is
- yet another example of nonfree software pretending to obey the user,
- when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p>
-
+ <li id="M201505060">
+ <p>Gratis Android apps (but not <a
+ href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
+
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
+ and advertising</a> URLs, on the average.</p>
</li>
- <li><p>More than 73% of the most popular</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201505060">
- <p>Gratis</em></ins></span> Android apps <span
class="inserted"><ins><em>(but not</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral</strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>) connect to 100 <a
-
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</em></ins></span>
- and <span class="removed"><del><strong>location information</a> of
their users with third parties.</p></strong></del></span> <span
class="inserted"><ins><em>advertising</a> URLs, on the
average.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201504060">
+ <li id="M201504060">
<p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This is in
addition</em></ins></span> to
- the <span class="removed"><del><strong>app's functionality,
- was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found</strong></del></span> <span class="inserted"><ins><em>snooping done by
the phone company, and perhaps by the OS</em></ins></span> in
- the <span class="removed"><del><strong>500 most popular gratis Android
apps</a>.</p>
-
- <p>The article should not have described these apps as
- “free”—they are not free software. The clear
way</strong></del></span> <span class="inserted"><ins><em>phone.</p>
+ QR-code scanner apps snoop on the user</a>. This is in addition to
+ the snooping done by the phone company, and perhaps by the OS in
+ the phone.</p>
<p>Don't be distracted by the question of whether the app developers
- get users</em></ins></span> to say
- <span class="removed"><del><strong>“zero
price”</strong></del></span> <span class="inserted"><ins><em>“I
agree”. That</em></ins></span> is <span
class="removed"><del><strong>“gratis.”</p>
-
- <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>no excuse</em></ins></span> for <span
class="removed"><del><strong>granted that</strong></del></span>
- <span class="inserted"><ins><em>malware.</p>
+ get users to say “I agree”. That is no excuse for
+ malware.</p>
</li>
<li id="M201411260">
<p>Many proprietary apps for mobile devices
- report which other apps</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
- legitimate, but</strong></del></span> <span class="inserted"><ins><em>user
has installed. <a
-
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</em></ins></span>
- is <span class="removed"><del><strong>that valid? Software developers
have no right to
- analyze what users are</strong></del></span> doing <span
class="removed"><del><strong>or how. “Analytics”
tools</strong></del></span> <span class="inserted"><ins><em>this in a
way</em></ins></span> that <span class="removed"><del><strong>snoop are
- just</strong></del></span> <span class="inserted"><ins><em>at least is
visible and optional</a>. Not</em></ins></span>
- as <span class="removed"><del><strong>wrong</strong></del></span> <span
class="inserted"><ins><em>bad</em></ins></span> as <span
class="removed"><del><strong>any</strong></del></span> <span
class="inserted"><ins><em>what the others do.</p>
+ report which other apps the user has installed. <a
+ href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way that at least is visible and optional</a>. Not
+ as bad as what the others do.</p>
</li>
<li id="M201401150.1">
@@ -1793,59 +2168,37 @@
<p>The nonfree Snapchat app's principal purpose is to restrict the
use of data on the user's computer, but it does surveillance too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the user's list of</em></ins></span> other <span
class="removed"><del><strong>snooping.</p></strong></del></span> <span
class="inserted"><ins><em>people's phone
- numbers</a>.</p></em></ins></span>
+ it tries to get the user's list of other people's phone
+ numbers</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Gratis Android apps
(but not</strong></del></span>
- <span class="inserted"><ins><em><li id="M201312060">
- <p>The Brightest Flashlight app</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>)
- connect</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ <li id="M201312060">
+ <p>The Brightest Flashlight app <a
+
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
sends user data, including geolocation, for use by
companies</a>.</p>
<p>The FTC criticized this app because it asked the user to
approve sending personal data to the app developer but did not ask
- about sending it</em></ins></span> to <span
class="removed"><del><strong>100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
- on</strong></del></span> <span class="inserted"><ins><em>other
companies. This shows</em></ins></span> the <span
class="removed"><del><strong>average.</p>
- </li>
- <li><p>Spyware is present in some Android devices when they are
sold.
- Some Motorola phones modify Android</strong></del></span> <span
class="inserted"><ins><em>weakness of
- the reject-it-if-you-dislike-snooping
“solution”</em></ins></span> to
- <span class="removed"><del><strong><a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"></strong></del></span>
- <span class="inserted"><ins><em>surveillance: why should a flashlight
app</em></ins></span> send <span class="removed"><del><strong>personal
data</strong></del></span> <span class="inserted"><ins><em>any
information</em></ins></span> to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>anyone? A free software flashlight app
would not.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201212100">
- <p>FTC says most mobile apps for children don't respect
privacy:</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p>
+ about sending it to other companies. This shows the weakness of
+ the reject-it-if-you-dislike-snooping “solution” to
+ surveillance: why should a flashlight app send any information to
+ anyone? A free software flashlight app would not.</p>
</li>
- <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file on the
system.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
+ <li id="M201212100">
+ <p>FTC says most mobile apps for children don't respect privacy:
<a
+
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
</ul>
-
-<span class="removed"><del><strong><!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
-
-
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on
Mobiles</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInSkype">Skype</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInSkype">#SpywareInSkype</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear:
left;"></div></strong></del></span>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201908151">
<p>Skype refuses to say whether it can <a
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
@@ -1861,169 +2214,93 @@
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
specifically for spying</a>.</p>
</li>
-</ul></em></ins></span>
+</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareIniThings">Spyware
in iThings</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInGames">Games</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareIniThings">#SpywareIniThings</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInGames">#SpywareInGames</a>)</span></em></ins></span>
+ <h4 id="SpywareInGames">Games</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Apple proposes
- <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without having your
fingerprints
- taken. Users would have no way to tell whether the
phone</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202010221">
- <p>Microsoft</em></ins></span> is <span
class="removed"><del><strong>snooping</strong></del></span> <span
class="inserted"><ins><em>imposing its
- surveillance</em></ins></span> on
- <span class="removed"><del><strong>them.</p></li>
-
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots</strong></del></span> <span class="inserted"><ins><em>the
game</em></ins></span> of <span class="removed"><del><strong>personal data to
Apple's servers</a>. Big Brother can
- get them from there.</p>
- </li>
-
- <li><p>The iMessage app on iThings</strong></del></span> <span
class="inserted"><ins><em>Minecraft by</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring</em></ins></span>
- every <span class="removed"><del><strong>phone number
that</strong></del></span> <span class="inserted"><ins><em>player to open an
account on Microsoft's network</a>. Microsoft
- has bought</em></ins></span> the <span class="removed"><del><strong>user
types</strong></del></span> <span class="inserted"><ins><em>game and will merge
all accounts</em></ins></span> into <span
class="removed"><del><strong>it</a>; the server records these numbers for
at least 30
- days.</p></strong></del></span> <span
class="inserted"><ins><em>its network,
+ <p>Microsoft is imposing its
+ surveillance on the game of Minecraft by <a
+
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
+ every player to open an account on Microsoft's network</a>. Microsoft
+ has bought the game and will merge all accounts into its network,
which will give them access to people's data.</p>
<p>Minecraft players <a
href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
instead. The essential advantage of Minetest is that it is free
software, meaning it respects the user's computer freedom. As a bonus,
- it offers more options.</p></em></ins></span>
+ it offers more options.</p>
</li>
- <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201908210">
- <p>Microsoft recorded users of Xboxes and had</em></ins></span>
<a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
- human workers listen</em></ins></span> to <span
class="removed"><del><strong>install even gratis apps)</a>
- without giving a valid email address and receiving</strong></del></span>
the <span class="removed"><del><strong>code Apple
- sends to it.</p></strong></del></span> <span
class="inserted"><ins><em>recordings</a>.</p>
+ <li id="M201908210">
+ <p>Microsoft recorded users of Xboxes and had <a
+
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
+ human workers listen to the recordings</a>.</p>
<p>Morally, we see no difference between having human workers listen
and
- having speech-recognition systems listen. Both intrude on
privacy.</p></em></ins></span>
+ having speech-recognition systems listen. Both intrude on
privacy.</p>
</li>
- <span class="removed"><del><strong><li><p>Around 47% of the most
popular iOS apps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201806240">
+ <li id="M201806240">
<p>Red Shell is a spyware that
- is found in many proprietary games. It</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral</strong></del></span>
- <span
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data on users' computers</em></ins></span> and <span
class="removed"><del><strong>location information</a> of their users
with</strong></del></span> <span class="inserted"><ins><em>sends it
to</em></ins></span> third <span
class="removed"><del><strong>parties.</p></strong></del></span> <span
class="inserted"><ins><em>parties</a>.</p></em></ins></span>
+ is found in many proprietary games. It <a
+
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
+ tracks data on users' computers and sends it to third
parties</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>iThings automatically
upload</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804144">
+ <li id="M201804144">
<p>ArenaNet surreptitiously installed a spyware
- program along with an update</em></ins></span> to <span
class="removed"><del><strong>Apple's servers all</strong></del></span> the
<span class="removed"><del><strong>photos and
- videos they make.</p>
-
- <blockquote><p>
- iCloud Photo Library stores every photo and video you take,
- and keeps them up</strong></del></span> <span
class="inserted"><ins><em>massive
+ program along with an update to the massive
multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
-
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"></em></ins></span>
- to <span class="removed"><del><strong>date</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on all <span
class="removed"><del><strong>your devices.
- Any edits you make are automatically updated everywhere. [...]
- </p></blockquote>
-
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed</strong></del></span> <span
class="inserted"><ins><em>open processes running</em></ins></span> on <span
class="removed"><del><strong>24 Sep 2015.) The iCloud feature
is</strong></del></span> <span class="inserted"><ins><em>its user's
computer</a>.</p>
+
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
+ to snoop on all open processes running on its user's
computer</a>.</p>
</li>
<li id="M201711070">
- <p>The driver for a certain gaming keyboard</em></ins></span> <a
<span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span>
- <span
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
+ <p>The driver for a certain gaming keyboard <a
+
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information to China</a>.</p>
</li>
<li id="M201512290">
<p>Many <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and report to</em></ins></span>
the
- <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
- “please don't ask where.”</p>
-
- <p>There</strong></del></span>
- <span class="inserted"><ins><em>internet</a>—even what their
users weigh.</p>
+ video game consoles snoop on their users and report to the
+ internet</a>—even what their users weigh.</p>
- <p>A game console</em></ins></span> is a <span
class="removed"><del><strong>way to</strong></del></span> <span
class="inserted"><ins><em>computer, and you can't trust a computer with
+ <p>A game console is a computer, and you can't trust a computer with
a nonfree operating system.</p>
</li>
<li id="M201509160">
- <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by default so it still
counts as</strong></del></span>
- <span
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect</em></ins></span> a
- <span class="removed"><del><strong>surveillance functionality.</p>
-
- <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>wide range</em></ins></span> of <span
class="inserted"><ins><em>data about their users and their users'
+ <p>Modern gratis game cr…apps <a
+
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of data about their users and their users'
friends and associates</a>.</p>
<p>Even nastier, they do it through ad networks that merge the data
collected by various cr…apps and sites made by different
companies.</p>
- <p>They use</em></ins></span> this <span
class="inserted"><ins><em>data</em></ins></span> to
- <span class="removed"><del><strong><a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security</strong></del></span> <span
class="inserted"><ins><em>manipulate people</em></ins></span> to <span
class="removed"><del><strong>get at them, but NSA</strong></del></span> <span
class="inserted"><ins><em>buy things, and hunt for
- “whales” who</em></ins></span> can <span
class="removed"><del><strong>access any</strong></del></span> <span
class="inserted"><ins><em>be led to spend a lot</em></ins></span> of <span
class="removed"><del><strong>them through
- <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware in iThings:
- the <a class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing is,
- and get other info too.</p>
+ <p>They use this data to manipulate people to buy things, and hunt
for
+ “whales” who can be led to spend a lot of money. They also
+ use a back door to manipulate the game play for specific players.</p>
+
+ <p>While the article describes gratis games, games that cost money
+ can use the same tactics.</p>
</li>
- <li><p>There is</strong></del></span> <span
class="inserted"><ins><em>money. They</em></ins></span> also
- <span class="inserted"><ins><em>use</em></ins></span> a <span
class="removed"><del><strong>feature for web sites</strong></del></span> <span
class="inserted"><ins><em>back door</em></ins></span> to <span
class="removed"><del><strong>track users, which is
- <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That</strong></del></span> <span
class="inserted"><ins><em>manipulate the game play for specific
players.</p>
-
- <p>While the</em></ins></span> article <span
class="removed"><del><strong>talks about iOS 6, but it
- is still true in iOS 7.)</p>
- </li>
-
- <li><p>The iThing also
- <a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default,
though</strong></del></span> <span class="inserted"><ins><em>describes gratis
games, games</em></ins></span> that <span class="inserted"><ins><em>cost
money</em></ins></span>
- can <span class="removed"><del><strong>be
- turned off.</p></strong></del></span> <span
class="inserted"><ins><em>use the same tactics.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201401280">
- <p>Angry Birds</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies</em></ins></span> for <span class="removed"><del><strong>the
state</a>.</p>
- </li>
-
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</strong></del></span> <span
class="inserted"><ins><em>companies, and</em></ins></span> the NSA <span
class="removed"><del><strong>snoop on all the data in an iThing,
- or</strong></del></span> <span class="inserted"><ins><em>takes advantage
- to spy through</em></ins></span> it <span
class="inserted"><ins><em>too</a>. Here's information on <a
+ <li id="M201401280">
+ <p>Angry Birds <a
+
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and the NSA takes advantage
+ to spy through it too</a>. Here's information on <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
@@ -2033,17 +2310,14 @@
</li>
<li id="M200510200">
- <p>Blizzard Warden</em></ins></span> is <span
class="removed"><del><strong>totally
incompetent.</a></p></strong></del></span> <span
class="inserted"><ins><em>a hidden
+ <p>Blizzard Warden is a hidden
“cheating-prevention” program that <a
href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
spies on every process running on a gamer's computer and sniffs a
good deal of personal data</a>, including lots of activities which
- have nothing to do with cheating.</p></em></ins></span>
+ have nothing to do with cheating.</p>
</li>
-
- <span class="removed"><del><strong><li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
@@ -2055,319 +2329,171 @@
<ul class="blurbs">
<li id="M201708280">
- <p>The bad security in many Internet</em></ins></span> of <span
class="removed"><del><strong>iOS seem</strong></del></span> <span
class="inserted"><ins><em>Stings devices allows <a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
- to <span class="removed"><del><strong>exist for no
- possible purpose other than surveillance</a>.
Here</strong></del></span> <span class="inserted"><ins><em>snoop on the people
that use them</a>.</p>
+ <p>The bad security in many Internet of Stings devices allows <a
+
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on the people that use them</a>.</p>
<p>Don't be a sucker—reject all the stings.</p>
- <p><small>(It</em></ins></span> is <span
class="inserted"><ins><em>unfortunate that the article uses</em></ins></span>
the <span class="inserted"><ins><em>term</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p></em></ins></span>
+ <p><small>(It is unfortunate that the article uses the term
<a
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware in
Telephones</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInTVSets">TV
Sets</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></em></ins></span>
+ <h4 id="SpywareInTVSets">TV Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>According to Edward Snowden,
- <a href="http://www.bbc.com/news/uk-34444233">agencies can take
over smartphones</a>
- by sending hidden text messages which enable them</strong></del></span>
-
-<span class="inserted"><ins><em><p>Emo Phillips made a joke: The other
day a woman came up</em></ins></span> to <span
class="removed"><del><strong>turn the phones
- on</strong></del></span> <span
class="inserted"><ins><em>me</em></ins></span> and <span
class="removed"><del><strong>off, listen to the microphone, retrieve
geo-location data from</strong></del></span>
-<span class="inserted"><ins><em>said, “Didn't I see you on
television?” I said, “I
-don't know. You can't see out</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
- browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>other way.” Evidently that was
+<p>Emo Phillips made a joke: The other day a woman came up to me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out the other way.” Evidently that was
before Amazon “smart” TVs.</p>
<ul class="blurbs">
<li id="M202006250">
<p>TV manufacturers are able to <a
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
- every second of what</em></ins></span> the <span
class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>user is watching</a>.</em></ins></span> This
<span class="removed"><del><strong>malware</strong></del></span> is <span
class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>illegal due</em></ins></span> to
- <span class="removed"><del><strong>disguise itself from
investigation.</p>
- </li>
-
- <li><p>Samsung phones come with
- <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
- and they send so much data that their transmission is a
- substantial expense for users. Said transmission, not wanted or
- requested by</strong></del></span>
- the <span class="removed"><del><strong>user, clearly must constitute
spying</strong></del></span> <span class="inserted"><ins><em>Video Privacy
Protection Act</em></ins></span> of <span class="removed"><del><strong>some
- kind.</p></li>
-
- <li><p>A Motorola phone</strong></del></span> <span
class="inserted"><ins><em>1988, but they're circumventing
+ every second of what the user is watching</a>. This is illegal due to
+ the Video Privacy Protection Act of 1988, but they're circumventing
it through EULAs.</p>
</li>
<li id="M201901070">
- <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
- </li>
-
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>TV sees,”</a></em></ins></span> in <span
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
- Street Journal (in an article blocked from us by a paywall)
- reports that
- <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
the <span class="removed"><del><strong>FBI can remotely
activate</strong></del></span> <span class="inserted"><ins><em>own words
of</em></ins></span> the <span class="removed"><del><strong>GPS and microphone
in Android
- phones</strong></del></span> <span class="inserted"><ins><em>company's
- CTO,</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
- (I suspect</strong></del></span> this <span
class="removed"><del><strong>means Windows laptops.)
Here</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> is
- <span class="removed"><del><strong><a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
- </li>
-
- <li><p>Portable phones with GPS will send their GPS location on
- remote command</strong></del></span> <span
class="inserted"><ins><em>sold to third parties. This is in return for
- “better service” (meaning more intrusive
ads?)</em></ins></span> and <span class="removed"><del><strong>users cannot
stop them:
- <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says</strong></del></span> <span
class="inserted"><ins><em>slightly
+ <p>Vizio TVs <a
+
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever the TV sees,”</a> in the own words of
the company's
+ CTO, and this data is sold to third parties. This is in return for
+ “better service” (meaning more intrusive ads?) and slightly
lower retail prices.</p>
<p>What is supposed to make this spying acceptable, according to him,
- is that</em></ins></span> it <span class="removed"><del><strong>will
eventually require</strong></del></span> <span class="inserted"><ins><em>is
opt-in in newer models. But since the Vizio software is
+ is that it is opt-in in newer models. But since the Vizio software is
nonfree, we don't know what is actually happening behind the scenes,
- and there is no guarantee that</em></ins></span> all <span
class="removed"><del><strong>new portable phones</strong></del></span> <span
class="inserted"><ins><em>future updates will leave the
+ and there is no guarantee that all future updates will leave the
settings unchanged.</p>
<p>If you already own a Vizio “smart” TV (or any
“smart” TV, for that
- matter), the easiest way</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p>
- </li>
-
- <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span> <span class="inserted"><ins><em>make sure it
isn't spying on you</em></ins></span> is
- to <span class="removed"><del><strong>restrict</strong></del></span> <span
class="inserted"><ins><em>disconnect it from</em></ins></span> the <span
class="inserted"><ins><em>Internet, and</em></ins></span> use <span
class="removed"><del><strong>of data on the user's computer, but it does
surveillance
- too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries</strong></del></span> <span class="inserted"><ins><em>a
terrestrial antenna
+ matter), the easiest way to make sure it isn't spying on you is
+ to disconnect it from the Internet, and use a terrestrial antenna
instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is</em></ins></span> to get <span
class="removed"><del><strong>the user's list of other people's phone
- numbers.</a></p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>Faceapp appears</strong></del></span> <span
class="inserted"><ins><em>your own router (which can
+ if you are technically oriented, is to get your own router (which can
be an old computer running completely free software), and set up a
- firewall</em></ins></span> to <span class="removed"><del><strong>do lots
of surveillance, judging by
- <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands</strong></del></span> <span
class="inserted"><ins><em>block connections</em></ins></span> to <span
class="removed"><del><strong>personal data in the device</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>Vizio's servers. Or, as a last resort,
- you can replace your TV with another model.</p></em></ins></span>
+ firewall to block connections to Vizio's servers. Or, as a last resort,
+ you can replace your TV with another model.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Verizon</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804010">
- <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades</em></ins></span> that <span
class="removed"><del><strong>it will</a>
- pre-install on some of its phones. The app will give Verizon the same
- information about</strong></del></span> <span
class="inserted"><ins><em>install a surveillance app</a>.</p>
-
- <p>We link to</em></ins></span> the <span
class="removed"><del><strong>users' searches that Google normally gets when
- they use its search engine.</p>
-
- <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>article for</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>facts it presents. It</em></ins></span>
- is <span class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and the
- user must explicitly opt-in before</strong></del></span> <span
class="inserted"><ins><em>too bad that</em></ins></span> the <span
class="removed"><del><strong>app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>article finishes by
advocating</em></ins></span> the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece</strong></del></span>
- <span class="inserted"><ins><em>moral weakness</em></ins></span> of <span
class="removed"><del><strong>spyware is
- still spyware.</p>
- </li>
-
- <li><p>The Meitu photo-editing</strong></del></span> <span
class="inserted"><ins><em>surrendering to Netflix. The
Netflix</em></ins></span> app <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to a Chinese company</a>.</p></li>
-
- <li><p>A pregnancy test controller application not only
- can</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ <li id="M201804010">
+ <p>Some “Smart” TVs automatically <a
+
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ load downgrades that install a surveillance app</a>.</p>
+
+ <p>We link to the article for the facts it presents. It
+ is too bad that the article finishes by advocating the
+ moral weakness of surrendering to Netflix. The Netflix app <a
+ href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
<li id="M201702060">
- <p>Vizio “smart”</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed</em></ins></span> on <span
class="removed"><del><strong>many sorts of data in the
phone,</strong></del></span> <span
class="inserted"><ins><em>them,</em></ins></span> and <span
class="removed"><del><strong>in server accounts, it can
- alter them too</a>.
- </p></li>
-
- <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before</strong></del></span> <span
class="inserted"><ins><em>not just broadcasts</em></ins></span> and <span
class="removed"><del><strong>after</strong></del></span>
- <span class="inserted"><ins><em>cable</a>. Even if</em></ins></span>
the <span class="removed"><del><strong>ride</a>.</p>
-
- <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>image is
coming from</em></ins></span> the user's <span
class="removed"><del><strong>consent”
- for surveillance is inadequate as</strong></del></span> <span
class="inserted"><ins><em>own computer,
- the TV reports what it is. The existence of</em></ins></span> a <span
class="removed"><del><strong>protection against massive</strong></del></span>
<span class="inserted"><ins><em>way to disable the
+ <p>Vizio “smart” <a
+
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them, and not just broadcasts and
+ cable</a>. Even if the image is coming from the user's own computer,
+ the TV reports what it is. The existence of a way to disable the
surveillance, even if it were not hidden as it was in these TVs,
- does not legitimize the</em></ins></span> surveillance.</p>
+ does not legitimize the surveillance.</p>
</li>
- <span class="removed"><del><strong><li><p>Google's new voice
messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
- </li>
-
- <li><p>Apps that include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511130">
- <p>Some web</em></ins></span> and TV <span
class="removed"><del><strong>programs
- are playing nearby</a>. Also on what users
post</strong></del></span> <span class="inserted"><ins><em>advertisements play
inaudible
- sounds to be picked up by proprietary malware running</em></ins></span>
- on <span class="removed"><del><strong>various sites
- such</strong></del></span> <span class="inserted"><ins><em>other devices
in range so</em></ins></span> as <span class="removed"><del><strong>Facebook,
Google+</strong></del></span> <span class="inserted"><ins><em>to determine that
they
+ <li id="M201511130">
+ <p>Some web and TV advertisements play inaudible
+ sounds to be picked up by proprietary malware running
+ on other devices in range so as to determine that they
are nearby. Once your Internet devices are paired with
- your TV, advertisers can correlate ads with Web
activity,</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>other <a
+ your TV, advertisers can correlate ads with Web activity, and other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
- cross-device tracking</a>.</p></em></ins></span>
+ cross-device tracking</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511060">
+ <li id="M201511060">
<p>Vizio goes a step further than other TV
- manufacturers in spying on their users: their</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze</em></ins></span> your <span
class="removed"><del><strong>mobile phone's photo collections for known
faces</a>,</strong></del></span> <span class="inserted"><ins><em>viewing
habits in detail</em></ins></span> and <span
class="removed"><del><strong>suggests you to share the
picture</strong></del></span>
- <span class="inserted"><ins><em>link them your IP address</a> so
that advertisers can track</em></ins></span> you <span
class="removed"><del><strong>take according to who</strong></del></span>
- <span class="inserted"><ins><em>across devices.</p>
-
- <p>It</em></ins></span> is <span class="removed"><del><strong>in the
frame.</p>
+ manufacturers in spying on their users: their <a
+
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so that advertisers can track you
+ across devices.</p>
- <p>This spyware feature seems</strong></del></span> <span
class="inserted"><ins><em>possible</em></ins></span> to <span
class="removed"><del><strong>require online access</strong></del></span> <span
class="inserted"><ins><em>turn this off, but having it enabled by default
+ <p>It is possible to turn this off, but having it enabled by default
is an injustice already.</p>
</li>
<li id="M201511020">
- <p>Tivo's alliance with Viacom adds 2.3 million
households</em></ins></span>
- to <span class="removed"><del><strong>some
- known-faces database, which means</strong></del></span> the <span
class="removed"><del><strong>pictures are likely to be
- sent across</strong></del></span> <span class="inserted"><ins><em>600
millions social media profiles</em></ins></span> the <span
class="removed"><del><strong>wire to Facebook's servers and face-recognition
- algorithms.</p>
-
- <p>If so, none of Facebook users' pictures</strong></del></span>
<span class="inserted"><ins><em>company
- already monitors. Tivo customers</em></ins></span> are <span
class="removed"><del><strong>private
- anymore, even if the user didn't “upload” them to the
service.</p>
- </li>
-
- <li><p>Like most “music screaming” disservices,
Spotify
- is based on proprietary malware (DRM and snooping). In August
- 2015 it</strong></del></span> <span class="inserted"><ins><em>unaware
they're
+ <p>Tivo's alliance with Viacom adds 2.3 million households
+ to the 600 millions social media profiles the company
+ already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can
now</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
- correlate TV advertisement with online purchases</a>, exposing
all</em></ins></span>
- users <span class="removed"><del><strong>submit</strong></del></span> to
<span class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em>new
combined surveillance by default.</p>
+ information with online social media participation, Tivo can now <a
+ href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ correlate TV advertisement with online purchases</a>, exposing all
+ users to new combined surveillance by default.</p>
</li>
<li id="M201507240">
- <p>Vizio “smart” TVs recognize</em></ins></span> and
<span class="removed"><del><strong>some</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Vizio “smart” TVs recognize and <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people</em></ins></span> are <span
class="removed"><del><strong>starting to realize that</strong></del></span>
<span class="inserted"><ins><em>watching</a>, even if</em></ins></span>
it <span class="removed"><del><strong>is nasty.</p>
-
- <p>This article shows the <a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way
- to “serve” users better</a>—never mind
- whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>isn't</em></ins></span> a <span
class="removed"><del><strong>typical example of
- the attitude of the proprietary software industry towards
- those they have subjugated.</p>
-
- <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>TV channel.</p></em></ins></span>
+ what people are watching</a>, even if it isn't a TV
channel.</p>
</li>
- <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other
- apps the user has
- installed.</strong></del></span>
- <span class="inserted"><ins><em><li id="M201505290">
- <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch,</em></ins></span> and
- <span class="removed"><del><strong>optional</a>. Not as bad
as</strong></del></span> <span class="inserted"><ins><em>even</em></ins></span>
what <span class="removed"><del><strong>the others
do.</p></strong></del></span> <span class="inserted"><ins><em>they wanted
to
- record</a>.</p></em></ins></span>
+ <li id="M201505290">
+ <p>Verizon cable TV <a
+
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops on what programs people watch, and even what they wanted to
+ record</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>FTC says most mobile
apps for children don't respect privacy:</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201504300">
- <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
- </li>
-
- <li><p>Widely</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"></em></ins></span>
- used <span class="inserted"><ins><em>a firmware “upgrade” to
make its TVs snoop on what
+ <li id="M201504300">
+ <p>Vizio <a
+
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ used a firmware “upgrade” to make its TVs snoop on what
users watch</a>. The TVs did not do that when first sold.</p>
</li>
<li id="M201502090">
- <p>The Samsung “Smart” TV</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice</em></ins></span> on the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span
class="inserted"><ins><em>internet</em></ins></span> to
- <span class="removed"><del><strong>the snooping done by the
phone</strong></del></span> <span
class="inserted"><ins><em>another</em></ins></span> company, <span
class="inserted"><ins><em>Nuance</a>.
- Nuance can save it</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span
class="inserted"><ins><em>would then have to give it to</em></ins></span> the
- <span class="removed"><del><strong>phone.</p>
-
- <p>Don't</strong></del></span> <span class="inserted"><ins><em>US
or some
+ <p>The Samsung “Smart” TV <a
+
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice on the internet to another company,
Nuance</a>.
+ Nuance can save it and would then have to give it to the US or some
other government.</p>
- <p>Speech recognition is not to</em></ins></span> be <span
class="removed"><del><strong>distracted</strong></del></span> <span
class="inserted"><ins><em>trusted unless it is done</em></ins></span> by <span
class="removed"><del><strong>the question of whether the app developers get
- users</strong></del></span> <span class="inserted"><ins><em>free
+ <p>Speech recognition is not to be trusted unless it is done by free
software in your own computer.</p>
<p>In its privacy policy, Samsung explicitly confirms that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be
transmitted</em></ins></span> to <span class="removed"><del><strong>say
“I agree”. That</strong></del></span> <span
class="inserted"><ins><em>third
+ data containing sensitive information will be transmitted to third
parties</a>.</p>
</li>
<li id="M201411090">
- <p>The Amazon “Smart” TV</em></ins></span> is <span
class="removed"><del><strong>no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em><a
+ <p>The Amazon “Smart” TV is <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all the time</a>.</p></em></ins></span>
+ snooping all the time</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201409290">
- <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p></em></ins></span>
+ <li id="M201409290">
+ <p>More or less all “smart” TVs <a
+
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
- <p>The <span class="removed"><del><strong>FTC
criticized</strong></del></span> <span class="inserted"><ins><em>report was as
of 2014, but we don't expect</em></ins></span> this <span
class="removed"><del><strong>app because it asked the
user</strong></del></span> <span class="inserted"><ins><em>has got
+ <p>The report was as of 2014, but we don't expect this has got
better.</p>
- <p>This shows that laws requiring products</em></ins></span> to
- <span class="removed"><del><strong>approve sending</strong></del></span>
<span class="inserted"><ins><em>get users' formal
- consent before collecting</em></ins></span> personal data <span
class="inserted"><ins><em>are totally inadequate.
+ <p>This shows that laws requiring products to get users' formal
+ consent before collecting personal data are totally inadequate.
And what happens if a user declines consent? Probably the TV will
- say, “Without your consent</em></ins></span> to <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>app developer but did</strong></del></span> <span
class="inserted"><ins><em>TV will</em></ins></span> not
- <span class="removed"><del><strong>ask about sending
it</strong></del></span>
- <span class="inserted"><ins><em>work.”</p>
+ say, “Without your consent to tracking, the TV will not
+ work.”</p>
<p>Proper laws would say that TVs are not allowed to report what the
user watches—no exceptions!</p>
@@ -2376,50 +2502,41 @@
<li id="M201405200">
<p>Spyware in LG “smart” TVs <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches, and the switch</em></ins></span> to <span
class="inserted"><ins><em>turn this off has
+ reports what the user watches, and the switch to turn this off has
no effect</a>. (The fact that the transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
<p>Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on</em></ins></span> other <span
class="removed"><del><strong>companies. This shows</strong></del></span> <span
class="inserted"><ins><em>devices on</em></ins></span> the
- <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
+ snoops on other devices on the user's local network</a>.</p>
<p>LG later said it had installed a patch to stop this, but any
product could spy this way.</p>
<p>Meanwhile, LG TVs <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots</em></ins></span> of <span class="removed"><del><strong>the
reject-it-if-you-dislike-snooping
- “solution”</strong></del></span> <span
class="inserted"><ins><em>spying anyway</a>.</p>
+ do lots of spying anyway</a>.</p>
</li>
<li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>break security on</em></ins></span> a <span
class="removed"><del><strong>flashlight
- app send any information</strong></del></span> <span
class="inserted"><ins><em>“smart” TV</a>
- and use its camera</em></ins></span> to <span
class="removed"><del><strong>anyone? A free software flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>watch the people who are watching
TV.</p></em></ins></span>
+ Crackers found a way to break security on a “smart”
TV</a>
+ and use its camera to watch the people who are watching TV.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInGames">Spyware in
Games</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInGames">#SpywareInGames</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+ <h4 id="SpywareInCameras">Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends personal data about
them</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture</em></ins></span> to
- <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Amazon servers</a>, which save it
+ <p>Amazon Ring “security” devices <a
+
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send the video they capture to Amazon servers</a>, which save it
long-term.</p>
<p>In many cases, the video shows everyone that comes near, or merely
@@ -2428,304 +2545,147 @@
<p>The article focuses on how Ring used to let individual employees
look
at the videos freely. It appears Amazon has tried to prevent that
secondary abuse, but the primary abuse—that Amazon gets the
- video—Amazon expects society to surrender
to.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201810300">
- <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give</em></ins></span> the <span class="removed"><del><strong>NSA takes
advantage</strong></del></span> <span class="inserted"><ins><em>manufacturer an
unencrypted copy of everything they
- see</a>. “Home insecurity camera” would be a better
- name!</p>
-
- <p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>look at what's in the videos. That's not
- security for your home. Security means making sure they don't get to
- see</em></ins></span> through <span class="removed"><del><strong>it
too</a>.
- Here's information on</strong></del></span> <span
class="inserted"><ins><em>your camera.</p>
- </li>
-
- <li id="M201603220">
- <p>Over 70 brands of network-connected surveillance cameras
have</em></ins></span> <a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone to watch through them</a>.</p>
- </li>
-
- <li id="M201511250">
- <p>The Nest Cam “smart” camera is <a
- href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when the “owner” switches it “off.”</p>
-
- <p>A “smart” device means the manufacturer is using it
- to outsmart you.</p></em></ins></span>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInToys">Spyware in
Toys</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-<span class="removed"><del><strong></div>
-
-<ul>
- <li>
- <p>The “smart” toys My Friend Cayla and i-Que transmit
- <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,</strong></del></span>
-<span class="inserted"><ins><em></div>
-
-<ul class="blurbs">
- <li id="M201711244">
- <p>The Furby Connect has</em></ins></span> a <span
class="removed"><del><strong>speech recognition company based in the
U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>toys with</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as</em></ins></span> a
<span class="removed"><del><strong>mobile phone. This would
- enable crackers</strong></del></span>
- <span class="inserted"><ins><em>listening device, remote
changes</em></ins></span> to <span class="removed"><del><strong>listen in on a
child's speech, and even speak</strong></del></span> <span
class="inserted"><ins><em>the code could surely convert it</em></ins></span>
- into <span class="inserted"><ins><em>one.</p>
- </li>
-
- <li id="M201711100">
- <p>A remote-control sex toy was found to make <a
-
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of</em></ins></span> the <span
class="removed"><del><strong>toys themselves.</p></strong></del></span>
<span class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201703140"></em></ins></span>
- <p>A computerized vibrator <a
-
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
-
- <p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether it was surrounded by a person's
- body), as well as the vibration frequency.</p>
-
- <p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about their
- products, rather than free software which users could have checked
- and changed.</p>
-
- <p>The company that made the vibrator <a
-
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how people
- used it</a>.</p>
-
- <p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the data to a data
- broker, the data broker would have <span class="removed"><del><strong>been
able to figure out
- who the user was.</p>
-
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of C$4m</a>
- to its customers.</p>
- </li>
-
- <li><p> “CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
- manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way to access the data</a>
- collected by the manufacturer's snooping.</p>
-
- <p>That the manufacturer and the FBI could listen to these
conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
- </li>
-</ul>
-
-
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
-
-<ul>
-<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note that the specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a “clean” Windows install is not really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+ video—Amazon expects society to surrender to.</p>
+ </li>
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ <li id="M201810300">
+ <p>Nearly all “home security cameras” <a
+
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give the manufacturer an unencrypted copy of everything they
+ see</a>. “Home insecurity camera” would be a better
+ name!</p>
-<ul>
- <li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
+ <p>When Consumer Reports tested them, it suggested that these
+ manufacturers promise not to look at what's in the videos. That's not
+ security for your home. Security means making sure they don't get to
+ see through your camera.</p>
+ </li>
- <p>Specifically, it can collect</strong></del></span> <span
class="inserted"><ins><em>been able to figure out who</em></ins></span> the
<span class="removed"><del><strong>emails of members of
Parliament</strong></del></span>
- <span class="inserted"><ins><em>user was.</p>
+ <li id="M201603220">
+ <p>Over 70 brands of network-connected surveillance cameras have
<a
+
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ security bugs that allow anyone to watch through them</a>.</p>
+ </li>
- <p>Following</em></ins></span> this <span
class="removed"><del><strong>way, because they pass it through
Microsoft.</p></li>
+ <li id="M201511250">
+ <p>The Nest Cam “smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
+ even when the “owner” switches it “off.”</p>
- <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of C$4m</a> to its
- customers.</p></em></ins></span>
+ <p>A “smart” device means the manufacturer is using it
+ to outsmart you.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+ <h4 id="SpywareInToys">Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
-<ul>
- <li><p>Spyware in Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702280">
- <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
+<ul class="blurbs">
+ <li id="M201711244">
+ <p>The Furby Connect has a <a
+
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If the product as shipped doesn't act as a
+ listening device, remote changes to the code could surely convert it
+ into one.</p>
</li>
-</ul>
+ <li id="M201711100">
+ <p>A remote-control sex toy was found to make <a
+
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings of the conversation between two users</a>.</p>
+ </li>
+ <li id="M201703140">
+ <p>A computerized vibrator <a
+
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through the proprietary control
app</a>.</p>
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+ <p>The app was reporting the temperature of the vibrator minute by
+ minute (thus, indirectly, whether it was surrounded by a person's
+ body), as well as the vibration frequency.</p>
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ <p>Note the totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about their
+ products, rather than free software which users could have checked
+ and changed.</p>
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
+ <p>The company that made the vibrator <a
+
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal information about how people
+ used it</a>.</p>
-<ul>
- <li>
- <p>The Nest Cam “smart” camera is</strong></del></span>
<span class="inserted"><ins><em>the manufacturer</a>. Guess
what?</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>data</a> collected by the
- manufacturer's snooping.</p>
+ <p>The company's statement that it was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold the data to a data
+ broker, the data broker would have been able to figure out who the
+ user was.</p>
- <p>That</em></ins></span> the manufacturer <span
class="removed"><del><strong>is using it</strong></del></span> <span
class="inserted"><ins><em>and the FBI could listen</em></ins></span> to <span
class="removed"><del><strong>outsmart
- you.</p></strong></del></span> <span
class="inserted"><ins><em>these
- conversations was unacceptable by itself.</p></em></ins></span>
+ <p>Following this lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of C$4m</a> to its
+ customers.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-<ul>
- <li><p>E-books can contain Javascript code,</strong></del></span>
+ <li id="M201702280">
+ <p>“CloudPets” toys with microphones <a
+
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations to the manufacturer</a>. Guess what?
<a
+
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found a way to access the data</a> collected by the
+ manufacturer's snooping.</p>
- <span class="inserted"><ins><em><li id="M201612060">
- <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="inserted"><ins><em>i-Que transmit</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
+ <p>That the manufacturer and the FBI could listen to these
+ conversations was unacceptable by itself.</p>
</li>
- <li><p>Spyware</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ <li id="M201612060">
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
+
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>, a speech recognition
- company based</em></ins></span> in <span class="removed"><del><strong>many
e-readers—not only</strong></del></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
+ company based in the U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
can remotely control the toys with a mobile phone. This would enable
- crackers to listen in on a child's speech, and</em></ins></span> even
<span class="removed"><del><strong>which page</strong></del></span> <span
class="inserted"><ins><em>speak into</em></ins></span> the <span
class="removed"><del><strong>user reads at what
time</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
+ crackers to listen in on a child's speech, and even speak into the
+ toys themselves.</p>
</li>
- <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used
- by most US libraries,</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201502180">
- <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to <span class="removed"><del><strong>check
DRM!</p></strong></del></span> <span class="inserted"><ins><em>spy on
children and adults</a>.</p></em></ins></span>
+ <li id="M201502180">
+ <p>Barbie <a
+
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going to spy on children and adults</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInVehicles">Spyware
in Vehicles</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+ <h4 id="SpywareInDrones">Drones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
-<li><p>Computerized cars with nonfree software
are</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201708040">
<p>While you're using a DJI drone
- to snoop on other people, DJI is in many cases</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p></em></ins></span>
+ to snoop on other people, DJI is in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p>
</li>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
<h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
</div>
-<ul class="blurbs"></em></ins></span>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
- effectively
- anyone</strong></del></span> <span
class="inserted"><ins><em>id="M202009270">
+<ul class="blurbs">
+ <li id="M202009270">
<p>Many employers are using nonfree
- software, including videoconference software, to</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
- surveil</em></ins></span> and <span class="removed"><del><strong>make
changes</strong></del></span> <span class="inserted"><ins><em>monitor staff
working at home</a>. If the program reports
- whether you are “active,” that is</em></ins></span> in <span
class="removed"><del><strong>various
- settings</a>.</p>
-
- <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>effect a malicious
+ software, including videoconference software, to <a
+
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
+ surveil and monitor staff working at home</a>. If the program reports
+ whether you are “active,” that is in effect a malicious
surveillance feature.</p>
</li>
@@ -2733,279 +2693,284 @@
<p>Google Nest <a
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
is taking over ADT</a>. Google sent out a software
- update</em></ins></span> to <span class="removed"><del><strong>do
because</strong></del></span> <span class="inserted"><ins><em>its speaker
devices using their back door <a
+ update to its speaker devices using their back door <a
href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that
listens for things like smoke alarms</a> and then notifies your phone
- that an alarm is happening. This means</em></ins></span> the <span
class="removed"><del><strong>system has no authentication when
- accessed through</strong></del></span> <span
class="inserted"><ins><em>devices now listen for more
- than just their wake words. Google says</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>software update was sent
+ that an alarm is happening. This means the devices now listen for more
+ than just their wake words. Google says the software update was sent
out prematurely and on accident and Google was planning on disclosing
- this new feature and offering</em></ins></span> it <span
class="removed"><del><strong>asked</strong></del></span> <span
class="inserted"><ins><em>to customers who pay</em></ins></span> for
- <span class="removed"><del><strong>authentication, you couldn't be
confident</strong></del></span> <span class="inserted"><ins><em>it.</p>
+ this new feature and offering it to customers who pay for it.</p>
</li>
<li id="M202006300">
- <p>“Bossware” is malware</em></ins></span> that <span
class="removed"><del><strong>Nissan has no
- access. The software</strong></del></span> <span
class="inserted"><ins><em>bosses <a
+ <p>“Bossware” is malware that bosses <a
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
- coerce workers into installing</em></ins></span> in <span
class="inserted"><ins><em>their own computers</a>, so</em></ins></span>
the <span class="removed"><del><strong>car</strong></del></span>
- <span class="inserted"><ins><em>bosses can spy on them.</p>
+ coerce workers into installing in their own computers</a>, so the
+ bosses can spy on them.</p>
- <p>This shows why requiring the user's
“consent”</em></ins></span> is
- <span class="removed"><del><strong>proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means</strong></del></span> <span class="inserted"><ins><em>not
+ <p>This shows why requiring the user's “consent” is not
an adequate basis for protecting digital privacy. The boss can coerce
most workers into consenting to almost anything, even probable exposure
to contagious disease that can be fatal. Software like this should
- be illegal and bosses that demand</em></ins></span> it <span
class="removed"><del><strong>demands blind faith from its
users</a>.</p>
-
- <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>should be prosecuted for it.</p>
+ be illegal and bosses that demand it should be prosecuted for it.</p>
</li>
<li id="M201911190">
<p>Internet-tethered Amazon Ring had
- a security vulnerability that enabled attackers</em></ins></span> to <span
class="inserted"><ins><em><a
+ a security vulnerability that enabled attackers to <a
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
- access</em></ins></span> the <span class="removed"><del><strong>car
remotely, the cell phone
- modem enables the phone company to track</strong></del></span> <span
class="inserted"><ins><em>user's wifi password</a>, and snoop
on</em></ins></span> the <span class="removed"><del><strong>car's movements
all</strong></del></span> <span class="inserted"><ins><em>household
+ access the user's wifi password</a>, and snoop on the household
through connected surveillance devices.</p>
- <p>Knowledge of</em></ins></span> the <span
class="removed"><del><strong>time; it is possible</strong></del></span> <span
class="inserted"><ins><em>wifi password would not be
sufficient</em></ins></span> to <span class="removed"><del><strong>physically
remove</strong></del></span> <span class="inserted"><ins><em>carry
- out any significant surveillance if</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>devices implemented proper
+ <p>Knowledge of the wifi password would not be sufficient to carry
+ out any significant surveillance if the devices implemented proper
security, including encryption. But many devices with proprietary
software lack this. Of course, they are also used by their
- manufacturers for snooping.</p></em></ins></span>
+ manufacturers for snooping.</p>
</li>
- <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201907210">
- <p>Google “Assistant” records users'
conversations</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
- when it</em></ins></span> is <span class="removed"><del><strong>made
available</strong></del></span> <span class="inserted"><ins><em>not
supposed</em></ins></span> to <span class="removed"><del><strong>car
manufacturers, insurance companies, and
- others.</p>
-
- <p>The case</strong></del></span> <span
class="inserted"><ins><em>listen</a>. Thus, when one</em></ins></span> of
<span class="removed"><del><strong>toll-collection systems, mentioned in this
article, is not
- really</strong></del></span> <span class="inserted"><ins><em>Google's
- subcontractors discloses</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
- intolerable invasion of privacy, and should be replaced with anonymous
- payment systems, but the invasion isn't done by malware. The other
- cases mentioned are done by</strong></del></span> <span
class="inserted"><ins><em>thousand confidential voice recordings,
+ <li id="M201907210">
+ <p>Google “Assistant” records users' conversations <a
+
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
+ when it is not supposed to listen</a>. Thus, when one of Google's
+ subcontractors discloses a thousand confidential voice recordings,
users were easily identified from these recordings.</p>
- <p>Since Google “Assistant” uses</em></ins></span>
proprietary <span class="removed"><del><strong>malware in the
car.</p></li>
+ <p>Since Google “Assistant” uses proprietary software,
there is no
+ way to see or control what it records or sends.</p>
- <li><p>Tesla cars allow the company</strong></del></span> <span
class="inserted"><ins><em>software, there is no
- way</em></ins></span> to <span class="removed"><del><strong>extract data
remotely and
- determine the car's location at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The company
says</strong></del></span> <span class="inserted"><ins><em>see or control
what</em></ins></span> it <span class="removed"><del><strong>doesn't
- store this information, but if</strong></del></span> <span
class="inserted"><ins><em>records or sends.</p>
-
- <p>Rather than trying to better control</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>use of recordings, Google
- should not record or listen</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> the <span
class="removed"><del><strong>data
- and hand it over,</strong></del></span> <span
class="inserted"><ins><em>person's voice. It should only
- get commands that</em></ins></span> the <span
class="removed"><del><strong>state can store it.</p>
+ <p>Rather than trying to better control the use of recordings, Google
+ should not record or listen to the person's voice. It should only
+ get commands that the user wants to send to some Google service.</p>
</li>
-</ul>
+ <li id="M201905061">
+ <p>Amazon Alexa collects a lot more information from users
+ than is necessary for correct functioning (time, location,
+ recordings made without a legitimate prompt), and sends
+ it to Amazon's servers, which store it indefinitely. Even
+ worse, Amazon forwards it to third-party companies. Thus,
+ even if users request deletion of their data from Amazon's servers, <a
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
+ the data remain on other servers</a>, where they can be accessed by
+ advertising companies and government agencies. In other words,
+ deleting the collected information doesn't cancel the wrong of
+ collecting it.</p>
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>user wants</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+ <p>Data collected by devices such as the Nest
thermostat,</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>Philips
+ Hue-connected lights,</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using it to outsmart
+ you.</p>
+ </li>
+</ul>
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
-<div style="clear: left;"></div>
<ul>
- <li><p>Nest thermometers</strong></del></span> send <span
class="removed"><del><strong><a
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot of data about the user</a>.</p>
+ <li><p>E-books can contain Javascript
code,</strong></del></span> <span class="inserted"><ins><em>Chamberlain MyQ
garage opener</em></ins></span> and <span class="removed"><del><strong><a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops</strong></del></span> <span class="inserted"><ins><em>the
Sonos
+ speakers are likewise stored longer than necessary</em></ins></span> on
<span class="removed"><del><strong>readers</a>.</p>
</li>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span> to <span
class="removed"><del><strong>spy on their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>some Google service.</p></em></ins></span>
+ <li><p>Spyware in many e-readers—not
only</strong></del></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>servers</em></ins></span>
+ the <span class="removed"><del><strong>user reads at what
time</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
+ <li><p>Adobe</strong></del></span> <span
class="inserted"><ins><em>devices are tethered to. Moreover, they
are</em></ins></span> made <span class="removed"><del><strong>“Digital
Editions,” the e-reader used
+ by most US libraries,
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed</strong></del></span> <span
class="inserted"><ins><em>available</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
+ </li>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
</div>
-<p>Emo Phillips made</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905061">
- <p>Amazon Alexa collects</em></ins></span> a <span
class="removed"><del><strong>joke: The other day</strong></del></span> <span
class="inserted"><ins><em>lot more information from users
- than is necessary for correct functioning (time, location,
- recordings made without</em></ins></span> a <span
class="removed"><del><strong>woman came up to me</strong></del></span> <span
class="inserted"><ins><em>legitimate prompt),</em></ins></span> and
-<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
-before</strong></del></span> <span class="inserted"><ins><em>sends
- it to Amazon's servers, which store it indefinitely. Even
- worse,</em></ins></span> Amazon <span
class="removed"><del><strong>“smart” TVs.</p>
-
<ul>
- <li>
- <p>Vizio
- “smart”</strong></del></span> <span
class="inserted"><ins><em>forwards it to third-party companies. Thus,
- even if users request deletion of their data from Amazon's
servers,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
- the data remain</em></ins></span> on <span
class="removed"><del><strong>them,</strong></del></span> <span
class="inserted"><ins><em>other servers</a>, where they can be accessed by
- advertising companies</em></ins></span> and <span
class="removed"><del><strong>not just broadcasts</strong></del></span> <span
class="inserted"><ins><em>government agencies. In other words,
- deleting the collected information doesn't cancel the wrong of
- collecting it.</p>
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p>
+ </li>
- <p>Data collected by devices such as the Nest thermostat, the Philips
- Hue-connected lights, the Chamberlain MyQ garage opener</em></ins></span>
and <span class="removed"><del><strong>cable</a>. Even
if</strong></del></span> the <span class="removed"><del><strong>image is coming
from</strong></del></span> <span class="inserted"><ins><em>Sonos
- speakers are likewise stored longer than necessary on</em></ins></span>
the <span class="removed"><del><strong>user's own
- computer,</strong></del></span> <span
class="inserted"><ins><em>servers</em></ins></span>
- the <span class="removed"><del><strong>TV reports what it is. The
existence of a way</strong></del></span> <span
class="inserted"><ins><em>devices are tethered to. Moreover, they are made
available</em></ins></span> to
- <span class="removed"><del><strong>disable the surveillance, even if it
were</strong></del></span>
- <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very
precise picture of users' life
- at home,</em></ins></span> not <span class="removed"><del><strong>hidden
as it was</strong></del></span> <span
class="inserted"><ins><em>only</em></ins></span> in
- <span class="removed"><del><strong>these TVs, does not
legitimize</strong></del></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>present, but in the past (and, who knows,
- in the future too?)</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>More or less all
“smart” TVs</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201904240">
- <p>Some of users' commands to the Alexa service
are</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
+ <li id="nissan-modem"><p>The Nissan Leaf</strong></del></span>
+ <span class="inserted"><ins><em>Alexa. As a result,
Amazon</em></ins></span> has a <span class="removed"><del><strong>built-in cell
phone modem which allows
+ effectively
+ anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make changes</strong></del></span> <span
class="inserted"><ins><em>very precise picture of users' life
+ at home, not only</em></ins></span> in <span
class="removed"><del><strong>various
+ settings</a>.</p>
- <p>The report was as</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees to listen to</a>. The Google and Apple
+ <p>That's easy to do because</strong></del></span> the <span
class="removed"><del><strong>system has no authentication when
+ accessed through</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
+ authentication, you couldn't be confident that Nissan has no
+ access. The software</strong></del></span> <span
class="inserted"><ins><em>past (and, who knows,</em></ins></span>
+ in the <span class="removed"><del><strong>car is
+ proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>future too?)</p>
+ </li>
+
+ <li id="M201904240">
+ <p>Some of users' commands</em></ins></span> to the <span
class="removed"><del><strong>car remotely, the cell phone
+ modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>Alexa service are <a
+
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>listen to</a>. The Google and Apple
voice assistants do similar things.</p>
- <p>A fraction</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect
this</strong></del></span> <span class="inserted"><ins><em>the Alexa service
staff even</em></ins></span> has <span class="removed"><del><strong>got
better.</p>
-
- <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>access</em></ins></span> to <span
class="removed"><del><strong>get users' formal
- consent before collecting</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even has access to <a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
- location and other</em></ins></span> personal <span
class="inserted"><ins><em>data</a>.</p>
+ location and other personal data</a>.</p>
- <p>Since the client program is nonfree, and</em></ins></span> data
<span class="removed"><del><strong>are totally inadequate.
- And</strong></del></span> <span class="inserted"><ins><em>processing is
done
+ <p>Since</em></ins></span> the <span
class="removed"><del><strong>time; it</strong></del></span> <span
class="inserted"><ins><em>client program</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>nonfree, and data processing is done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
the cloud</a>” (a soothing way of saying “We won't
tell you how and where it's done”), users have no way
- to know</em></ins></span> what happens <span
class="removed"><del><strong>if a user declines consent? Probably the TV
- will say, “Without your consent</strong></del></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> the <span
class="removed"><del><strong>TV will
- not work.”</p>
-
- <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>recordings unless human eavesdroppers <a
+ to know what happens</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> the <span
class="removed"><del><strong>cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>recordings unless human eavesdroppers <a
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure agreements</a>.</p>
+ break their non-disclosure
agreements</a>.</p></em></ins></span>
</li>
- <li id="M201902080">
- <p>The HP <a
- href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
- “ink subscription” cartridges have DRM</em></ins></span> that
<span class="removed"><del><strong>TVs are not allowed</strong></del></span>
<span class="inserted"><ins><em>constantly
- communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>make sure</em></ins></span> the user <span
class="removed"><del><strong>watches — no exceptions!</p>
- </li>
- <li><p>Vizio goes a step further</strong></del></span> <span
class="inserted"><ins><em>is still
- paying for the subscription, and hasn't printed more
pages</em></ins></span> than <span class="removed"><del><strong>other TV
manufacturers</strong></del></span> <span class="inserted"><ins><em>were
- paid for.</p>
+ <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201902080">
+ <p>The HP</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ “ink subscription” cartridges have DRM that constantly
+ communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance
companies,</strong></del></span> <span class="inserted"><ins><em>make sure the
user is still
+ paying for the subscription,</em></ins></span> and
+ <span class="removed"><del><strong>others.</p>
- <p>Even though the ink subscription program may be
cheaper</em></ins></span> in <span
class="removed"><del><strong>spying</strong></del></span> <span
class="inserted"><ins><em>some
- specific cases, it spies</em></ins></span> on
- <span class="removed"><del><strong>their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in
detail</strong></del></span> <span
class="inserted"><ins><em>users,</em></ins></span> and
- <span class="removed"><del><strong>link them your IP address</a>
so</strong></del></span> <span class="inserted"><ins><em>involves totally
unacceptable
- restrictions in the use of ink cartridges</em></ins></span> that <span
class="removed"><del><strong>advertisers can track you
- across devices.</p>
+ <p>The case</strong></del></span> <span
class="inserted"><ins><em>hasn't printed more pages than were
+ paid for.</p>
- <p>It is possible to turn this off, but having it enabled by
default
- is an injustice already.</p></strong></del></span> <span
class="inserted"><ins><em>would otherwise be in
- working order.</p></em></ins></span>
+ <p>Even though the ink subscription program may be cheaper in some
+ specific cases, it spies on users, and involves totally unacceptable
+ restrictions in the use</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span class="inserted"><ins><em>ink cartridges
that would otherwise be</em></ins></span> in <span
class="removed"><del><strong>this article, is not
+ really</strong></del></span>
+ <span class="inserted"><ins><em>working order.</p>
</li>
- <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201808120">
- <p>Crackers found a way</em></ins></span> to <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>600 millions social media profiles the company
already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all users to
- new combined surveillance by default.</p></li>
- <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
- and <span class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ <li id="M201808120">
+ <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>matter</strong></del></span> <span
class="inserted"><ins><em>way to break the security</em></ins></span> of <span
class="removed"><del><strong>proprietary surveillance. These systems
are</strong></del></span> an
+ <span class="removed"><del><strong>intolerable invasion of
privacy,</strong></del></span> <span class="inserted"><ins><em>Amazon
device,</em></ins></span>
+ and <span class="removed"><del><strong>should</strong></del></span> <span
class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
- <p>It was very difficult for them</em></ins></span> to <span
class="inserted"><ins><em>do this. The job would</em></ins></span> be
- <span class="removed"><del><strong>picked up by proprietary malware
running on other devices in
- range so</strong></del></span> <span class="inserted"><ins><em>much
- easier for Amazon. And if some government such</em></ins></span> as <span
class="inserted"><ins><em>China or the US
- told Amazon</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell the product
in</em></ins></span> that <span class="removed"><del><strong>they are nearby.
Once your
- Internet devices</strong></del></span> <span
class="inserted"><ins><em>country,
- do you think Amazon would have the moral fiber to say no?</p>
-
- <p><small>(These crackers</em></ins></span> are <span
class="removed"><del><strong>paired with your TV, advertisers can
- correlate ads with Web activity, and
- other</strong></del></span> <span class="inserted"><ins><em>probably
hackers too, but please</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
+ <p>It was very difficult for them to do this. The job
would</em></ins></span> be <span class="removed"><del><strong>replaced with
anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>much
+ easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>invasion isn't done
by malware. The other
+ cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>US
+ told Amazon to do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>product in that country,
+ do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>moral fiber</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
+ determine the car's location at any time. (See</strong></del></span>
<span class="inserted"><ins><em>say no?</p>
+
+ <p><small>(These crackers are probably hackers too, but
please</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>). The</strong></del></span>
<span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
- “hacking” to mean “breaking
security”</a>.)</small></p></em></ins></span>
+ “hacking” to mean “breaking
security”</a>.)</small></p>
</li>
- <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and</strong></del></span>
- <span class="inserted"><ins><em><li id="M201804140">
- <p>A medical insurance company</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
- even if it isn't</strong></del></span>
- <span
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p></strong></del></span> <span class="inserted"><ins><em>gratis
electronic toothbrush that snoops on its user by
- sending usage data back over the
Internet</a>.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201706204">
- <p>Lots of “smart” products are
designed</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching and listening</strong></del></span>
- <span
class="inserted"><ins><em>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen to everyone in the house,</em></ins></span> all the
time</a>.</p>
-
- <span class="inserted"><ins><em><p>Today's technological practice
does not include any way of making
- a device that can obey your voice commands without potentially spying
- on you. Even if it is air-gapped, it could be saving up records
- about you for later examination.</p></em></ins></span>
+ <li id="M201804140">
+ <p>A medical insurance</em></ins></span> company <span
class="removed"><del><strong>says it doesn't
+ store this information, but if</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
+ offers a gratis electronic toothbrush that snoops on its user by
+ sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
- <span class="inserted"><ins><em><li id="M201407170">
- <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice</strong></del></span>
- <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot of
+ <li id="M201706204">
+ <p>Lots of “smart” products are designed <a
+
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
+ listen</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>everyone in</em></ins></span> the <span
class="removed"><del><strong>data
+ and hand it over,</strong></del></span> <span
class="inserted"><ins><em>house, all</em></ins></span> the <span
class="removed"><del><strong>state</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+
+ <p>Today's technological practice does not include any way of making
+ a device that</em></ins></span> can <span
class="removed"><del><strong>store it.</p>
+ </li>
+</ul>
+
+
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure to place new items</strong></del></span> <span
class="inserted"><ins><em>obey your voice commands without potentially
spying</em></ins></span>
+ on <span class="removed"><del><strong>top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Nest</strong></del></span> <span
class="inserted"><ins><em>you. Even if it is air-gapped, it could be saving up
records
+ about you for later examination.</p>
+ </li>
+
+ <li id="M201407170">
+ <p id="nest-thermometers">Nest</em></ins></span> thermometers send
<a
+ href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
data about the user</a>.</p>
</li>
- <li id="M201310260">
+ <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201310260">
<p><a
-
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy</em></ins></span> on <span
class="inserted"><ins><em>their renters</a>.</p>
+
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"></em></ins></span>
+ Rent-to-own computers were programmed to spy on their
renters</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareOnWearables">Wearables</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareOnWearables">#SpywareOnWearables</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareOnWearables">Wearables</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnWearables">#SpywareOnWearables</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up to me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out the other way.” Evidently that was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li>
+ <p>Vizio
+ “smart”</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201807260">
- <p>Tommy Hilfiger clothing <a
-
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
+ <p>Tommy Hilfiger clothing</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them, and not just broadcasts
+ and cable</a>. Even if the image is coming from the user's own
+ computer,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
monitor how often people wear it</a>.</p>
- <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>internet</strong></del></span> <span
class="inserted"><ins><em>sheeple</em></ins></span> to <span
class="removed"><del><strong>another
- company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>find</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>normal that companies
- monitor every aspect of what they do.</p>
+ <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>TV reports what it is. The existence of a
way</strong></del></span> <span
class="inserted"><ins><em>sheeple</em></ins></span> to
+ <span class="removed"><del><strong>disable the surveillance, even if it
were not hidden as</strong></del></span> <span
class="inserted"><ins><em>find</em></ins></span> it <span
class="removed"><del><strong>was in
+ these TVs, does not legitimize the surveillance.</p>
+ </li>
+
+ <li><p>More or less all “smart” TVs <a
+href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report was as of 2014, but we don't expect this has got
better.</p>
+
+ <p>This shows</strong></del></span> <span
class="inserted"><ins><em>normal</em></ins></span> that <span
class="removed"><del><strong>laws requiring products to get users' formal
+ consent before collecting personal data are totally inadequate.
+ And</strong></del></span> <span class="inserted"><ins><em>companies
+ monitor every aspect of</em></ins></span> what <span
class="removed"><del><strong>happens if</strong></del></span> <span
class="inserted"><ins><em>they do.</p>
</li>
</ul>
@@ -3016,31 +2981,52 @@
<li id="M202009100">
<p>Internet-enabled watches with proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they</em></ins></span> have <span
class="inserted"><ins><em>a lot of security flaws. They <a
+ privacy. In addition, they have</em></ins></span> a <span
class="removed"><del><strong>user declines consent? Probably the TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>lot of security flaws. They <a
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
- permit security breakers (and unauthorized people)</em></ins></span> to
- <span class="removed"><del><strong>give</strong></del></span> <span
class="inserted"><ins><em>access</a> the watch.</p>
+ permit security breakers (and unauthorized people)</em></ins></span> to
<span class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>access</a></em></ins></span> the <span
class="removed"><del><strong>TV will
+ not work.”</p>
+
+ <p>Proper laws would say that TVs are not
allowed</strong></del></span> <span class="inserted"><ins><em>watch.</p>
- <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages</em></ins></span> to
<span class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>and from the watch, possibly
endangering</em></ins></span> the <span class="removed"><del><strong>user
watches — no exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>child.</p>
<p><small>(Note that this article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
- to mean “crackers.”)</small></p>
+ to mean “crackers.”)</small></p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying on
+ their users: their</strong></del></span>
- <li id="M201603020">
- <p>A very cheap “smart watch” comes with an Android app
<a
-
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects to an unidentified site in China</a>.</p>
+ <span class="inserted"><ins><em><li id="M201603020">
+ <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></em></ins></span>
+ that <span class="removed"><del><strong>advertisers can track you
+ across devices.</p>
+
+ <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>connects</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
- <p>The article says this is a back door, but that could be a
- misunderstanding. However,</em></ins></span> it <span
class="inserted"><ins><em>is certainly surveillance, at least.</p>
+ <p>The article says</em></ins></span> this <span
class="removed"><del><strong>off,</strong></del></span> <span
class="inserted"><ins><em>is a back door,</em></ins></span> but <span
class="removed"><del><strong>having</strong></del></span> <span
class="inserted"><ins><em>that could be a
+ misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>certainly surveillance, at
least.</p></em></ins></span>
</li>
- <li id="M201407090">
- <p>An LG “smart” watch is designed <a
-
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else and to transmit conversations
+ <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to
+ the 600 millions social media profiles the company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo can now</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407090">
+ <p>An LG “smart” watch is designed</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all
users</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
+ to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>report its location to someone else</em></ins></span>
and <span class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> to <span class="removed"><del><strong>be
+ picked up by proprietary malware running on other devices in
+ range so as</strong></del></span> <span
class="inserted"><ins><em>transmit conversations
too</a>.</p>
</li>
</ul>
@@ -3055,195 +3041,203 @@
<li id="M202008181">
<p>New Toyotas will <a
href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/">
- upload data</em></ins></span> to <span class="removed"><del><strong>the US
or some other government.</p>
- <p>Speech recognition is not</strong></del></span> <span
class="inserted"><ins><em>AWS</em></ins></span> to <span
class="removed"><del><strong>be trusted unless it is done
- by</strong></del></span> <span class="inserted"><ins><em>help create
custom insurance premiums</a>
+ upload data</em></ins></span> to <span
class="removed"><del><strong>determine that they are nearby. Once your
+ Internet devices are paired with your TV,
advertisers</strong></del></span> <span class="inserted"><ins><em>AWS to help
create custom insurance premiums</a>
based on driver behaviour.</p>
- <p>Before you buy a “connected” car, make sure you can
- disconnect its cellular antenna and its GPS antenna. If you want
- GPS navigation, get a separate navigator which runs</em></ins></span> free
software <span class="removed"><del><strong>in your own computer.</p>
-
- <p>In its privacy policy, Samsung explicitly confirms
- that</strong></del></span>
- <span class="inserted"><ins><em>and works with Open Street Map.</p>
+ <p>Before you buy a “connected” car, make sure
you</em></ins></span> can
+ <span class="removed"><del><strong>correlate ads</strong></del></span>
+ <span class="inserted"><ins><em>disconnect its cellular antenna and its
GPS antenna. If you want
+ GPS navigation, get a separate navigator which runs free software
+ and works</em></ins></span> with <span class="removed"><del><strong>Web
activity,</strong></del></span> <span class="inserted"><ins><em>Open Street
Map.</p>
</li>
<li id="M201912171">
- <p>Most modern cars now</em></ins></span> <a <span
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
- record and send various kinds of</em></ins></span> data <span
class="removed"><del><strong>containing sensitive information will be
transmitted</strong></del></span> to
- <span class="removed"><del><strong>third parties</a>.</p>
- </li>
- <li><p>Spyware in
- <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports what</strong></del></span>
the <span class="removed"><del><strong>user watches, and</strong></del></span>
<span class="inserted"><ins><em>manufacturer</a>. For</em></ins></span>
- the <span class="removed"><del><strong>switch</strong></del></span> <span
class="inserted"><ins><em>user, access</em></ins></span> to <span
class="removed"><del><strong>turn this off has no effect. (The fact that the
- transmission reports a 404 error really means
nothing;</strong></del></span> the <span class="removed"><del><strong>server
- could save that</strong></del></span> data <span
class="removed"><del><strong>anyway.)</p>
-
- <p>Even worse,</strong></del></span> <span
class="inserted"><ins><em>is nearly impossible, as</em></ins></span> it
- <span class="removed"><del><strong><a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on</strong></del></span> <span
class="inserted"><ins><em>involves
- cracking</em></ins></span> the <span class="removed"><del><strong>user's
local network.</a></p>
-
- <p>LG later said it had installed a patch to stop this, but any
product
- could spy this way.</p>
-
- <p>Meanwhile, LG TVs
- <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do</strong></del></span> <span class="inserted"><ins><em>car's computer, which
is always hidden and running with
- proprietary software.</p>
+ <p>Most modern cars now <a
+
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
+ record and send various kinds of data to the manufacturer</a>. For
+ the user, access to the data is nearly impossible, as it involves
+ cracking the car's computer, which is always hidden</em></ins></span> and
+ <span class="removed"><del><strong>other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>running with
+ proprietary software.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize</strong></del></span>
- <li id="M201903290">
- <p>Tesla cars collect</em></ins></span> lots of <span
class="removed"><del><strong>spying anyway</a>.</p>
+ <span class="inserted"><ins><em><li id="M201903290">
+ <p>Tesla cars collect lots of personal data,</em></ins></span> and
<a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if it isn't</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
+ when they go to</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p>
</li>
- <li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch,</strong></del></span> <span
class="inserted"><ins><em>personal data,</em></ins></span> and <span
class="removed"><del><strong>even what</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
- when</em></ins></span> they <span
class="removed"><del><strong>wanted</strong></del></span> <span
class="inserted"><ins><em>go</em></ins></span> to <span
class="removed"><del><strong>record.</a></p></strong></del></span>
<span class="inserted"><ins><em>a junkyard the driver's personal data goes with
+ <li><p>The Amazon “Smart” TV
+ <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching and listening all</strong></del></span> <span
class="inserted"><ins><em>junkyard</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>driver's personal data goes with
them</a>.</p></em></ins></span>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareAtPlay -->
-<div class="big-section">
- <h3 id="SpywareAtPlay">Spyware at Play</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
-<li><p>Users are suing Bose for</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
<span class="inserted"><ins><em><li id="M201902011">
- <p>The FordPass Connect feature of some Ford vehicles
has</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
-distributing</strong></del></span>
+ <p>The FordPass Connect feature of some Ford vehicles
has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access to the internal car network</a>. It is
constantly
- connected to the cellular phone network and sends Ford</em></ins></span> a
<span class="removed"><del><strong>spyware app for its headphones</a>.
-Specifically,</strong></del></span> <span class="inserted"><ins><em>lot of
data,
+ near-complete access to</em></ins></span> the <span
class="removed"><del><strong>internet</strong></del></span> <span
class="inserted"><ins><em>internal car network</a>. It is constantly
+ connected</em></ins></span> to <span class="removed"><del><strong>another
+ company, Nuance</a>. Nuance can save it</strong></del></span> <span
class="inserted"><ins><em>the cellular phone network</em></ins></span> and
<span class="removed"><del><strong>would then</strong></del></span> <span
class="inserted"><ins><em>sends Ford a lot of data,
including car location. This feature operates even when the ignition
key is removed, and users report that they can't disable it.</p>
- <p>If you own one of these cars, have you succeeded in
breaking</em></ins></span> the <span class="removed"><del><strong>app would
record</strong></del></span>
- <span class="inserted"><ins><em>connectivity by
disconnecting</em></ins></span> the <span class="removed"><del><strong>names
of</strong></del></span> <span class="inserted"><ins><em>cellular modem, or
wrapping</em></ins></span> the <span class="removed"><del><strong>audio files
-users listen</strong></del></span>
- <span class="inserted"><ins><em>antenna in aluminum foil?</p>
+ <p>If you own one of these cars,</em></ins></span> have <span
class="removed"><del><strong>to
+ give it to</strong></del></span> <span class="inserted"><ins><em>you
succeeded in breaking</em></ins></span> the <span
class="removed"><del><strong>US</strong></del></span>
+ <span class="inserted"><ins><em>connectivity by disconnecting the cellular
modem,</em></ins></span> or <span class="removed"><del><strong>some other
government.</p>
+ <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>wrapping the
+ antenna in aluminum foil?</p>
</li>
<li id="M201811300">
- <p>In China, it is mandatory for electric
- cars</em></ins></span> to <span
class="removed"><del><strong>along</strong></del></span> <span
class="inserted"><ins><em>be equipped</em></ins></span> with <span
class="removed"><del><strong>the headphone's unique serial number.
-</p>
-
-<p>The suit accuses</strong></del></span> <span
class="inserted"><ins><em>a terminal</em></ins></span> that <span
class="inserted"><ins><em><a
- href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
- transfers technical data, including car location,
- to a government-run platform</a>. In practice, <a
- href="/proprietary/proprietary-surveillance.html#car-spying">
- manufacturers collect</em></ins></span> this <span
class="removed"><del><strong>was done without</strong></del></span> <span
class="inserted"><ins><em>data</a> as part of their own spying, then
- forward it to</em></ins></span> the <span
class="removed"><del><strong>users' consent.
-If</strong></del></span> <span class="inserted"><ins><em>government-run
platform.</p>
+ <p>In China, it</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>mandatory for electric
+ cars</em></ins></span> to be <span class="removed"><del><strong>trusted
unless it is done
+ by free software in your own computer.</p>
+
+ <p>In its privacy policy, Samsung explicitly
confirms</strong></del></span> <span class="inserted"><ins><em>equipped with a
terminal</em></ins></span> that <a <span
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ data containing sensitive information will be
transmitted</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ transfers technical data, including car location,</em></ins></span>
+ to
+ <span class="removed"><del><strong>third parties</a>.</p>
+ </li>
+ <li><p>Spyware in</strong></del></span> <span
class="inserted"><ins><em>a government-run platform</a>. In
practice,</em></ins></span> <a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a> reports what</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying">
+ manufacturers collect this data</a> as part of their own spying, then
+ forward it to</em></ins></span> the <span
class="removed"><del><strong>user watches, and</strong></del></span> <span
class="inserted"><ins><em>government-run platform.</p>
</li>
<li id="M201810230">
<p>GM <a
href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked</em></ins></span> the <span class="removed"><del><strong>fine
print</strong></del></span> <span
class="inserted"><ins><em>choices</em></ins></span> of <span
class="inserted"><ins><em>radio programs</a> in its
+ tracked</em></ins></span> the <span class="removed"><del><strong>switch to
turn this off has no effect. (The fact</strong></del></span> <span
class="inserted"><ins><em>choices of radio programs</a> in its
“connected” cars, minute by minute.</p>
- <p>GM did not get users' consent, but it could have got that easily
by
- sneaking it into</em></ins></span> the <span
class="removed"><del><strong>app said</strong></del></span> <span
class="inserted"><ins><em>contract</em></ins></span> that users <span
class="removed"><del><strong>gave consent</strong></del></span> <span
class="inserted"><ins><em>sign</em></ins></span> for <span
class="removed"><del><strong>this,
-would</strong></del></span> <span class="inserted"><ins><em>some digital
service
+ <p>GM did not get users' consent, but it could have
got</em></ins></span> that <span class="inserted"><ins><em>easily by
+ sneaking it into</em></ins></span> the
+ <span class="removed"><del><strong>transmission reports a 404 error
really means nothing;</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for some digital service
or other. A requirement for consent is effectively no protection.</p>
<p>The cars can also collect lots of other data: listening to you,
watching you, following your movements, tracking passengers' cell
phones. <em>All</em> such data collection should be
forbidden.</p>
- <p>But if you really want to be safe, we must make sure the car's
- hardware cannot collect any of that data, or that the software
- is free so we know it won't collect any of</em></ins></span> that <span
class="inserted"><ins><em>data.</p>
+ <p>But if you really want to be safe, we must make
sure</em></ins></span> the <span class="removed"><del><strong>server
+ could save</strong></del></span> <span class="inserted"><ins><em>car's
+ hardware cannot collect any of that data, or</em></ins></span> that <span
class="removed"><del><strong>data anyway.)</p>
+
+ <p>Even worse, it
+ <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on</strong></del></span> the <span
class="removed"><del><strong>user's local network.</a></p>
+
+ <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>software
+ is free so we know</em></ins></span> it <span
class="removed"><del><strong>had installed a patch to stop this,
but</strong></del></span> <span class="inserted"><ins><em>won't
collect</em></ins></span> any <span class="removed"><del><strong>product
+ could spy this way.</p>
+
+ <p>Meanwhile, LG TVs
+ <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span> of <span class="removed"><del><strong>spying
anyway</a>.</p></strong></del></span> <span
class="inserted"><ins><em>that data.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they wanted to
record.</a></p></strong></del></span>
- <li id="M201711230">
+ <span class="inserted"><ins><em><li id="M201711230">
<p>AI-powered driving apps can <a
href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p>
+ track your every move</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+<!-- #SpywareAtPlay -->
+<div class="big-section">
+ <h3 id="SpywareAtPlay">Spyware at Play</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+<li><p>Users</strong></del></span>
- <li id="M201607160">
- <p id="car-spying">Computerized cars with nonfree software are <a
-
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ <span class="inserted"><ins><em><li id="M201607160">
+ <p id="car-spying">Computerized cars with nonfree
software</em></ins></span> are <span class="removed"><del><strong>suing Bose
for</strong></del></span> <a
+<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+distributing</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
snooping devices</a>.</p>
</li>
<li id="M201602240">
- <p id="nissan-modem">The Nissan Leaf has a built-in
+ <p id="nissan-modem">The Nissan Leaf has</em></ins></span> a <span
class="removed"><del><strong>spyware app for</strong></del></span> <span
class="inserted"><ins><em>built-in
cell phone modem which allows effectively anyone to <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
- access its computers remotely and</em></ins></span> make <span
class="inserted"><ins><em>changes in various
+ access</em></ins></span> its <span
class="removed"><del><strong>headphones</a>.
+Specifically,</strong></del></span> <span class="inserted"><ins><em>computers
remotely and make changes in various
settings</a>.</p>
- <p>That's easy to do because the system has no authentication
- when accessed through the modem. However, even if</em></ins></span> it
<span class="removed"><del><strong>acceptable? No way! It
should</strong></del></span> <span class="inserted"><ins><em>asked
- for authentication, you couldn't</em></ins></span> be <span
class="removed"><del><strong>flat out</strong></del></span> <span
class="inserted"><ins><em>confident that Nissan
- has no access. The software in the car is proprietary,</em></ins></span>
<a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">
-illegal</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
means
+ <p>That's easy to do because</em></ins></span> the <span
class="removed"><del><strong>app would record</strong></del></span> <span
class="inserted"><ins><em>system has no authentication
+ when accessed through</em></ins></span> the <span
class="removed"><del><strong>names of</strong></del></span> <span
class="inserted"><ins><em>modem. However, even if it asked
+ for authentication, you couldn't be confident that Nissan
+ has no access. The software in</em></ins></span> the <span
class="removed"><del><strong>audio files
+users listen</strong></del></span> <span class="inserted"><ins><em>car is
proprietary, <a
+ href="/philosophy/free-software-even-more-important.html">which means
it demands blind faith from its users</a>.</p>
- <p>Even if no one connects</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> the <span
class="removed"><del><strong>app to snoop at all</a>.
+ <p>Even if no one connects</em></ins></span> to <span
class="removed"><del><strong>along with the headphone's unique serial number.
+</p>
+
+<p>The suit accuses that this was done without</strong></del></span> the
<span class="removed"><del><strong>users' consent.
+If</strong></del></span> <span class="inserted"><ins><em>car
remotely,</em></ins></span> the <span class="removed"><del><strong>fine print
of</strong></del></span> <span class="inserted"><ins><em>cell phone modem
+ enables</em></ins></span> the <span class="removed"><del><strong>app said
that users gave consent for this,
+would that make it acceptable? No way! It should be flat out
+<a href="/philosophy/surveillance-vs-democracy.html">
+illegal</strong></del></span> <span class="inserted"><ins><em>phone company to
track the car's movements all the time;
+ it is possible</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>physically remove</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>cell phone modem, though.</p>
+ </li>
+
+ <li id="M201306140">
+ <p>Tesla cars allow the company</em></ins></span> to <span
class="removed"><del><strong>snoop</strong></del></span> <span
class="inserted"><ins><em>extract
+ data remotely and determine the car's location</em></ins></span>
+ at <span class="removed"><del><strong>all</a>.
</p>
</li>
<li><p>Many
<a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and
report</strong></del></span> <span class="inserted"><ins><em>car remotely, the
cell phone modem
- enables the phone company</em></ins></span> to <span
class="inserted"><ins><em>track</em></ins></span> the
- <span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
-
- <p>A game console</strong></del></span> <span
class="inserted"><ins><em>car's movements all the time;
- it</em></ins></span> is <span class="removed"><del><strong>a computer, and
you can't trust a computer with
- a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>possible to physically remove the cell phone modem,
though.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps
- <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201306140">
- <p>Tesla cars allow the company to extract</em></ins></span>
- data <span class="removed"><del><strong>about their
users</strong></del></span> <span
class="inserted"><ins><em>remotely</em></ins></span> and <span
class="removed"><del><strong>their users'
- friends</strong></del></span> <span class="inserted"><ins><em>determine
the car's location
- at any time. (See Section 2, paragraphs b</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
-
- <p>Even nastier, they do</strong></del></span> <span
class="inserted"><ins><em>c of the <a
+ video game consoles snoop on their users</strong></del></span> <span
class="inserted"><ins><em>any time. (See Section 2, paragraphs
b</em></ins></span> and <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>c of the <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- privacy statement</a>.) The company says</em></ins></span> it <span
class="removed"><del><strong>through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
- information, but if the state orders it to get</em></ins></span> the data
- <span class="removed"><del><strong>collected by various
cr…apps</strong></del></span> and <span
class="removed"><del><strong>sites</strong></del></span> <span
class="inserted"><ins><em>hand it
- over, the state can store it.</p>
- </li>
+ privacy statement</a>.) The company says it doesn't store this
+ information, but if the state orders it</em></ins></span> to <span
class="inserted"><ins><em>get</em></ins></span> the
+ <span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
- <li id="M201303250">
- <p id="records-drivers">Proprietary software in cars <a
-
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
- records information about drivers' movements</a>, which
is</em></ins></span> made <span class="removed"><del><strong>by different
+ <p>A game console is a computer,</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> and <span
class="removed"><del><strong>you can't trust a computer with
+ a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>hand it
+ over, the state can store it.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201303250">
+ <p id="records-drivers">Proprietary software in
cars</em></ins></span> <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of data</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
+ records information</em></ins></span> about <span
class="removed"><del><strong>their users</strong></del></span> <span
class="inserted"><ins><em>drivers' movements</a>, which is made
+ available to car manufacturers, insurance companies,</em></ins></span> and
<span class="removed"><del><strong>their users'
+ friends</strong></del></span> <span
class="inserted"><ins><em>others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
+ is not really a matter of proprietary surveillance. These systems
+ are an intolerable invasion of privacy,</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
+
+ <p>Even nastier, they do it through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>should be replaced
with
+ anonymous payment systems, but</em></ins></span> the <span
class="removed"><del><strong>data
+ collected</strong></del></span> <span class="inserted"><ins><em>invasion
isn't done</em></ins></span> by <span class="removed"><del><strong>various
cr…apps and sites made</strong></del></span> <span
class="inserted"><ins><em>malware. The
+ other cases mentioned are done</em></ins></span> by <span
class="removed"><del><strong>different
companies.</p>
- <p>They use this data to manipulate people</strong></del></span>
- <span class="inserted"><ins><em>available</em></ins></span> to <span
class="removed"><del><strong>buy things,</strong></del></span> <span
class="inserted"><ins><em>car manufacturers, insurance
companies,</em></ins></span> and <span class="removed"><del><strong>hunt
- for “whales” who can be led to spend a
lot</strong></del></span> <span class="inserted"><ins><em>others.</p>
-
- <p>The case</em></ins></span> of <span
class="removed"><del><strong>money. They
- also use</strong></del></span> <span
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
- is not really</em></ins></span> a <span class="removed"><del><strong>back
door</strong></del></span> <span class="inserted"><ins><em>matter of
proprietary surveillance. These systems
- are an intolerable invasion of privacy, and should be replaced with
- anonymous payment systems, but the invasion isn't done by malware. The
- other cases mentioned are done by proprietary malware in the car.</p>
+ <p>They use this data to manipulate people</strong></del></span>
<span class="inserted"><ins><em>proprietary malware in the car.</p>
</li>
</ul>
@@ -3257,8 +3251,10 @@
<li id="M202008182">
<p>Oculus headsets <a
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
- users to identify themselves</em></ins></span> to <span
class="removed"><del><strong>manipulate</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. This will give Facebook
- free rein to pervasively snoop on Oculus users.</p>
+ users</em></ins></span> to <span class="removed"><del><strong>buy things,
and hunt
+ for “whales” who can be led</strong></del></span> <span
class="inserted"><ins><em>identify themselves</em></ins></span> to <span
class="removed"><del><strong>spend a lot of money. They
+ also use a back door</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. This will give Facebook
+ free rein</em></ins></span> to <span
class="removed"><del><strong>manipulate</strong></del></span> <span
class="inserted"><ins><em>pervasively snoop on Oculus users.</p>
</li>
<li id="M201612230">
@@ -3397,12 +3393,14 @@
<p>Many</em></ins></span> web sites <span
class="removed"><del><strong>rat their visitors</strong></del></span> <span
class="inserted"><ins><em>use JavaScript code <a
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"></em></ins></span>
to <span class="removed"><del><strong>advertising
networks</strong></del></span> <span class="inserted"><ins><em>snoop on
information</em></ins></span> that <span class="removed"><del><strong>track
- users. Of</strong></del></span> <span class="inserted"><ins><em>users
have typed into a
- form but not sent</a>, in order to learn their identity. Some are
<a
-
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+ users. Of the top 1000 web sites,</strong></del></span> <span
class="inserted"><ins><em>users have typed into a
+ form but not sent</a>, in order to learn their identity. Some
are</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
+ (as</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
getting sued</a> for this.</p>
- <p>The chat facilities of some customer services
use</em></ins></span> the <span class="removed"><del><strong>top
1000</strong></del></span> <span class="inserted"><ins><em>same sort of
+ <p>The chat facilities</em></ins></span> of <span
class="removed"><del><strong>5/17/2012) fed their visitors third-party cookies,
allowing</strong></del></span> <span class="inserted"><ins><em>some customer
services use the same sort of
malware to <a
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
read what the user is typing before it is posted</a>.</p>
@@ -3411,21 +3409,20 @@
<li id="M201807190">
<p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
- JavaScript on its</em></ins></span> web <span
class="removed"><del><strong>sites,</strong></del></span> <span
class="inserted"><ins><em>site to give other companies personal data on
+ JavaScript on its web site to give</em></ins></span> other
+ <span class="removed"><del><strong>sites</strong></del></span> <span
class="inserted"><ins><em>companies personal data on
its customers</a>.</p>
</li>
<li id="M201712300">
- <p>Some JavaScript malware</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
- (as</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
+ <p>Some JavaScript malware <a
+
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
swipes usernames from browser-based password managers</a>.</p>
</li>
<li id="M201711150">
<p>Some websites send
- JavaScript code to collect all the user's input, <a
+ JavaScript code</em></ins></span> to <span
class="removed"><del><strong>track
them</a>.</p></strong></del></span> <span
class="inserted"><ins><em>collect all the user's input, <a
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
can then be used to reproduce the whole session</a>.</p>
@@ -3444,13 +3441,15 @@
<li id="M201310110">
<p>Flash and JavaScript are used for <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices</a> to identify users.</p>
+ “fingerprinting” devices</a> to identify
users.</p></em></ins></span>
</li>
- <li id="M201003010">
+ <span
class="removed"><del><strong><li><p>Many</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201003010">
<p>Flash Player's <a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
- cookie feature helps web sites track visitors</a>.</p>
+ cookie feature helps</em></ins></span> web sites <span
class="inserted"><ins><em>track visitors</a>.</p>
</li>
</ul>
@@ -3464,22 +3463,19 @@
<li id="M201906220">
<p>Google Chrome is an <a
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/">
- instrument</em></ins></span> of <span
class="removed"><del><strong>5/17/2012) fed their visitors third-party cookies,
allowing other</strong></del></span> <span
class="inserted"><ins><em>surveillance</a>. It lets thousands of trackers
invade
- users' computers and report the</em></ins></span> sites <span
class="inserted"><ins><em>they visit to advertising and
- data companies, first of all to Google. Moreover, if users have a
- Gmail account, Chrome automatically logs them in to the browser for
+ instrument of surveillance</a>. It lets thousands of trackers invade
+ users' computers and</em></ins></span> report <span
class="inserted"><ins><em>the sites they visit to advertising and
+ data companies, first of</em></ins></span> all <span
class="removed"><del><strong>their visitors</strong></del></span> to <span
class="removed"><del><strong>Google by using</strong></del></span> <span
class="inserted"><ins><em>Google. Moreover, if users have a
+ Gmail account, Chrome automatically logs them in to</em></ins></span> the
<span class="removed"><del><strong>Google Analytics service,
which</strong></del></span> <span class="inserted"><ins><em>browser for
more convenient profiling. On Android, Chrome also reports their
location to Google.</p>
<p>The best way to escape surveillance is to switch to <a
href="/software/icecat/">IceCat</a>, a modified version of Firefox
- with several changes</em></ins></span> to <span
class="removed"><del><strong>track
them</a>.</p></strong></del></span> <span
class="inserted"><ins><em>protect users' privacy.</p></em></ins></span>
+ with several changes to protect users' privacy.</p>
</li>
- <span class="removed"><del><strong><li><p>Many web sites report
all their visitors to Google by using
- the Google Analytics service, which</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704131">
+ <li id="M201704131">
<p>Low-priced Chromebooks for schools are</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
tells Google</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
@@ -3560,22 +3556,23 @@
“fingerprinting” devices </a> to identify
users.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/">
spies on browser history, affiliations</a>, and other installed
- software.</p>
- </li>
-
- <li id="M200809060">
- <p>Google Chrome contains a key logger that <a
-
href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/">
- sends Google every URL typed in</a>, one key at a
time.</p></em></ins></span>
+ software.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
-<span class="removed"><del><strong><p><a
href="/philosophy/javascript-trap.html">Javascript code</a>
+<p><a href="/philosophy/javascript-trap.html">Javascript
code</a>
is another method of “fingerprinting” devices.</p>
<!-- #SpywareEverywhere --></strong></del></span>
+ <span class="inserted"><ins><em><li id="M200809060">
+ <p>Google Chrome contains a key logger that <a
+
href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/">
+ sends Google every URL typed in</a>, one key at a time.</p>
+ </li>
+</ul></em></ins></span>
+
<div class="big-section">
@@ -3586,20 +3583,26 @@
<span class="removed"><del><strong><ul>
<li><p>The natural extension of monitoring people through
- “their” phones is</strong></del></span>
+ “their” phones</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201905281">
- <p>Microsoft</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software</strong></del></span>
- <span
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
- people to give their phone number</a> in order</em></ins></span> to
<span class="removed"><del><strong>make sure they can't “fool” the
- monitoring</a>.</p>
- </li>
-
- <li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
- Intel devices will</strong></del></span> be able to <span
class="removed"><del><strong>listen for speech all</strong></del></span> <span
class="inserted"><ins><em>create an account on</em></ins></span>
+ <li id="M202009070">
+ <p>While the world</em></ins></span> is <span
class="inserted"><ins><em>still
+ struggling with COVID-19 coronavirus, many</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/">people
+ are in danger of surveillance</a> and their computers are infected
+ with malware as a result of installing</em></ins></span> proprietary <span
class="removed"><del><strong>software to make sure they can't
“fool” the
+ monitoring</a>.</p></strong></del></span> <span
class="inserted"><ins><em>software.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
+ Intel devices will</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905281">
+ <p>Microsoft <a
+
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
+ people to give their phone number</a> in order to</em></ins></span>
be able to <span class="removed"><del><strong>listen for speech
all</strong></del></span> <span class="inserted"><ins><em>create an account
on</em></ins></span>
the <span class="removed"><del><strong>time, even when
“off.”</a></p>
</li>
</ul>
@@ -3706,7 +3709,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © <span class="removed"><del><strong>2015, 2016,
2017</strong></del></span> <span
class="inserted"><ins><em>2015-2020</em></ins></span> Free Software Foundation,
Inc.</p>
+<p>Copyright © <span class="removed"><del><strong>2015, 2016,
2017</strong></del></span> <span
class="inserted"><ins><em>2015-2021</em></ins></span> Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -3717,7 +3720,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/12/30 10:33:46 $
+$Date: 2021/01/04 10:03:02 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.376
retrieving revision 1.377
diff -u -b -r1.376 -r1.377
--- proprietary-surveillance.it.po 30 Dec 2020 10:33:46 -0000 1.376
+++ proprietary-surveillance.it.po 4 Jan 2021 10:03:02 -0000 1.377
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-12-30 10:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -5337,6 +5337,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
@@ -5454,10 +5462,10 @@
"traduzioni</a>."
#. type: Content of: <div><p>
-# | Copyright © [-2015-] {+2015-2020+} Free Software Foundation, Inc.
+# | Copyright © [-2015-] {+2015-2021+} Free Software Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2015 Free Software Foundation, Inc."
-msgid "Copyright © 2015-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2015-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2015 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.235
retrieving revision 1.236
diff -u -b -r1.235 -r1.236
--- proprietary-surveillance.ja-diff.html 30 Dec 2020 10:33:46 -0000
1.235
+++ proprietary-surveillance.ja-diff.html 4 Jan 2021 10:03:02 -0000
1.236
@@ -1665,50 +1665,56 @@
social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
advertisement with online purchases</a>, exposing all
users</strong></del></span> <span class="inserted"><ins><em>app.</p>
- <p>This has harmful implications for women's rights to equal
employment
- and freedom to make their own pregnancy choices. Don't use
- these apps, even if someone offers you a reward</em></ins></span> to <span
class="inserted"><ins><em>do so. A
- free-software app that does more or less the same thing without
+ <p>This has harmful implications for women's
rights</em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>equal employment</em></ins></span>
+ and <span class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span
class="inserted"><ins><em>freedom</em></ins></span> to <span
class="removed"><del><strong>be
+ picked up by proprietary malware running on other devices in
+ range so as</strong></del></span> <span class="inserted"><ins><em>make
their own pregnancy choices. Don't use
+ these apps, even if someone offers you a reward</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>do so. A
+ free-software app</em></ins></span> that <span
class="removed"><del><strong>they are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads with Web activity,</strong></del></span> <span
class="inserted"><ins><em>does more or less the same thing without
spying on you is available from <a
- href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
-
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
- a</em></ins></span> new <span class="removed"><del><strong>combined
surveillance by default.</p></li>
- <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>one is being developed</a>.</p>
- </li>
-
- <li id="M201904130">
- <p>Google tracks the movements of Android phones</em></ins></span>
and <span class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>iPhones
- running Google apps, and sometimes <a
-
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+
href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and
+ <span class="removed"><del><strong>other</strong></del></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
+ a new one is being developed</a>.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201904130">
+ <p>Google tracks the movements of Android phones and iPhones
+ running Google apps,</em></ins></span> and <span
class="inserted"><ins><em>sometimes</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if it isn't</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
saves the data for years</a>.</p>
- <p>Nonfree software in the phone has</em></ins></span> to be
- <span class="removed"><del><strong>picked up by proprietary malware
running</strong></del></span> <span class="inserted"><ins><em>responsible for
sending
+ <p>Nonfree software in the phone has to be responsible for sending
the location data to Google.</p>
</li>
<li id="M201903251">
- <p>Many Android phones come with a huge number of <a
+ <p>Many Android phones come with</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p></strong></del></span> <span
class="inserted"><ins><em>huge number of <a
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
preinstalled nonfree apps that have access to sensitive data without
users' knowledge</a>. These hidden apps may either call home with
- the data, or pass it</em></ins></span> on <span
class="removed"><del><strong>other devices</strong></del></span> <span
class="inserted"><ins><em>to user-installed apps that have access to
- the network but no direct access to the data. This
results</em></ins></span> in
- <span class="removed"><del><strong>range so as</strong></del></span>
<span class="inserted"><ins><em>massive
- surveillance on which the user has absolutely no control.</p>
+ the data, or pass it on to user-installed apps that have access to
+ the network but no direct access to the data. This results in massive
+ surveillance on which the user has absolutely no
control.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
- <li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of them
<a
-
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>third parties</a>, which can use it
+ <span class="inserted"><ins><em><li id="M201903201">
+ <p>A study of 24 “health” apps found that 19 of
them</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data to third parties</a>, which can use it
for invasive advertising or discriminating against people in poor
medical condition.</p>
<p>Whenever user “consent” is sought, it is buried in
- lengthy terms of service</em></ins></span> that <span
class="removed"><del><strong>they are nearby. Once your
- Internet devices</strong></del></span> are <span
class="removed"><del><strong>paired with your TV, advertisers can
- correlate ads</strong></del></span> <span
class="inserted"><ins><em>difficult to understand. In any case,
+ lengthy terms of service that are difficult to understand. In any case,
“consent” is not sufficient to legitimize snooping.</p>
</li>
@@ -3081,7 +3087,7 @@
<p>You can bet Facebook will implement the maximum possible
surveillance on Oculus Rift devices. The moral is, never trust a VR
- system</em></ins></span> with <span class="inserted"><ins><em>nonfree
software in it.</p>
+ system with nonfree software in it.</p>
</li>
</ul>
@@ -3093,7 +3099,7 @@
</div>
<div style="clear: left;"></div>
-<p>In addition, many web sites spy on their visitors.</em></ins></span>
Web <span class="removed"><del><strong>activity,</strong></del></span> <span
class="inserted"><ins><em>sites are not
+<p>In addition, many web sites spy on their visitors. Web sites are not
programs, so it
<a href="/philosophy/network-services-arent-free-or-nonfree.html">
makes no sense to call them “free” or
“proprietary”</a>,
@@ -3107,7 +3113,7 @@
unscrupulous tracking anti-feature</a> that <a
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
users when they follow ping links</a> in Apple Safari, Google Chrome,
- Opera, Microsoft Edge and also in the upcoming Microsoft Edge that is
+ Opera, Microsoft Edge</em></ins></span> and <span
class="removed"><del><strong>listening</strong></del></span> <span
class="inserted"><ins><em>also in the upcoming Microsoft Edge that is
going to be based on Chromium.</p>
</li>
@@ -3156,32 +3162,27 @@
</li>
<li id="M201208210">
- <p>Many web sites report all their visitors
+ <p>Many web sites report</em></ins></span> all <span
class="inserted"><ins><em>their visitors
to Google by using the Google Analytics service, which <a
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
- tells Google the IP address</em></ins></span> and <span
class="inserted"><ins><em>the page that was visited</a>.</p>
+ tells Google the IP address and the page that was
visited</a>.</p>
</li>
<li id="M201200000">
<p>Many web sites try to collect users' address books (the user's
list
- of other people's phone numbers or email addresses). This violates
- the privacy of those</em></ins></span> other <span
class="removed"><del><strong><a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
+ of other people's phone numbers or email addresses). This
violates</em></ins></span>
+ the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>privacy of those other
people.</p></em></ins></span>
</li>
- <li><p>Vizio “smart” TVs recognize and
- <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people are watching</a>,
- even if it isn't a TV channel.</p></strong></del></span> <span
class="inserted"><ins><em>people.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
<span class="inserted"><ins><em><li id="M201110040">
- <p>Pages that contain “Like” buttons</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching and listening all the
time</a>.</p></strong></del></span>
+ <p>Pages that contain “Like” buttons</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on the internet</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
- enable Facebook to track visitors to those pages</a>—even users
- that don't have Facebook accounts.</p></em></ins></span>
+ enable Facebook</em></ins></span> to <span
class="removed"><del><strong>another
+ company, Nuance</a>. Nuance can save it and would
then</strong></del></span> <span class="inserted"><ins><em>track visitors to
those pages</a>—even users
+ that don't</em></ins></span> have <span class="inserted"><ins><em>Facebook
accounts.</p>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -3191,12 +3192,11 @@
<ul class="blurbs">
<li id="M201811270">
- <p>Many web sites use JavaScript code</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on the internet</strong></del></span>
- <span
class="inserted"><ins><em>href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"></em></ins></span>
- to <span class="removed"><del><strong>another
- company, Nuance</a>. Nuance can save it and would
then</strong></del></span> <span class="inserted"><ins><em>snoop on information
that users</em></ins></span> have <span class="inserted"><ins><em>typed into a
- form but not sent</a>, in order</em></ins></span> to
- <span class="removed"><del><strong>give it to the US
or</strong></del></span> <span class="inserted"><ins><em>learn their identity.
Some are <a
+ <p>Many web sites use JavaScript code <a
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"></em></ins></span>
+ to
+ <span class="removed"><del><strong>give it</strong></del></span> <span
class="inserted"><ins><em>snoop on information that users have typed into a
+ form but not sent</a>, in order</em></ins></span> to <span
class="removed"><del><strong>the US or</strong></del></span> <span
class="inserted"><ins><em>learn their identity. Some are <a
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
getting sued</a> for this.</p>
@@ -3322,26 +3322,27 @@
<!-- #SpywareOnTheWeb -->
<div class="big-section">
- <h3 id="SpywareOnTheWeb">Spyware on the Web</h3>
+ <h3 id="SpywareOnTheWeb">Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704131">
+ <p>Low-priced Chromebooks for schools are <a
+ href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
+ collecting far more data</em></ins></span> on <span
class="inserted"><ins><em>students than is necessary, and store
+ it indefinitely</a>. Parents and students complain
about</em></ins></span> the <span class="removed"><del><strong>Web</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnTheWeb">#SpywareOnTheWeb</a>)</span>
</div>
<div style="clear: left;"></div>
-<p>In addition, many web sites spy on their visitors. Web
sites</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704131">
- <p>Low-priced Chromebooks for schools</em></ins></span> are <span
class="removed"><del><strong>not
- programs, so it</strong></del></span> <a <span
class="removed"><del><strong>href="/philosophy/network-services-arent-free-or-nonfree.html">
+<p>In addition, many web sites spy</strong></del></span> <span
class="inserted"><ins><em>lack
+ of transparency</em></ins></span> on <span
class="removed"><del><strong>their visitors. Web sites are not
+ programs, so it
+ <a href="/philosophy/network-services-arent-free-or-nonfree.html">
makes no sense to call them “free” or
“proprietary”</a>,
- but the surveillance</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
- collecting far more data on students than</em></ins></span> is <span
class="removed"><del><strong>an abuse all</strong></del></span> <span
class="inserted"><ins><em>necessary, and store
- it indefinitely</a>. Parents and students complain
about</em></ins></span> the <span class="removed"><del><strong>same.</p>
+ but</strong></del></span> the <span
class="removed"><del><strong>surveillance is an abuse all</strong></del></span>
<span class="inserted"><ins><em>part of both</em></ins></span> the <span
class="removed"><del><strong>same.</p>
<ul>
- <li><p>Online sales, with tracking</strong></del></span> <span
class="inserted"><ins><em>lack
- of transparency on the part of both the educational
services</em></ins></span> and <span
class="removed"><del><strong>surveillance</strong></del></span> <span
class="inserted"><ins><em>the
+ <li><p>Online sales, with tracking</strong></del></span> <span
class="inserted"><ins><em>educational services</em></ins></span> and <span
class="removed"><del><strong>surveillance</strong></del></span> <span
class="inserted"><ins><em>the
schools, the difficulty</em></ins></span> of <span
class="removed"><del><strong>customers, <a
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
businesses to show different people different prices</a>.
Most</strong></del></span> <span class="inserted"><ins><em>opting
out</em></ins></span> of <span class="inserted"><ins><em>these services,
and</em></ins></span> the <span
class="removed"><del><strong>tracking</strong></del></span> <span
class="inserted"><ins><em>lack
of proper privacy policies, among other things.</p>
@@ -3428,16 +3429,16 @@
<span class="removed"><del><strong><li><p>Flash is also used
for</strong></del></span>
<span class="inserted"><ins><em><li id="M201308040">
- <p>Google Chrome <a
- href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/">
+ <p>Google Chrome</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ “fingerprinting” devices </a> to identify
users.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/">
spies on browser history, affiliations</a>, and other installed
software.</p>
</li>
<li id="M200809060">
- <p>Google Chrome contains a key logger that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices </a> to identify
users.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/">
+ <p>Google Chrome contains a key logger that <a
+
href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/">
sends Google every URL typed in</a>, one key at a
time.</p></em></ins></span>
</li>
</ul>
@@ -3458,20 +3459,26 @@
<span class="removed"><del><strong><ul>
<li><p>The natural extension of monitoring people through
- “their” phones is</strong></del></span>
+ “their” phones</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201905281">
- <p>Microsoft</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software</strong></del></span>
- <span
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
- people to give their phone number</a> in order</em></ins></span> to
<span class="removed"><del><strong>make sure they can't “fool” the
- monitoring</a>.</p>
- </li>
-
- <li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
- Intel devices will</strong></del></span> be able to <span
class="removed"><del><strong>listen for speech all</strong></del></span> <span
class="inserted"><ins><em>create an account on</em></ins></span>
+ <li id="M202009070">
+ <p>While the world</em></ins></span> is <span
class="inserted"><ins><em>still
+ struggling with COVID-19 coronavirus, many</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/">people
+ are in danger of surveillance</a> and their computers are infected
+ with malware as a result of installing</em></ins></span> proprietary <span
class="removed"><del><strong>software to make sure they can't
“fool” the
+ monitoring</a>.</p></strong></del></span> <span
class="inserted"><ins><em>software.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
+ Intel devices will</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905281">
+ <p>Microsoft <a
+
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces
+ people to give their phone number</a> in order to</em></ins></span>
be able to <span class="removed"><del><strong>listen for speech
all</strong></del></span> <span class="inserted"><ins><em>create an account
on</em></ins></span>
the <span class="removed"><del><strong>time, even when
“off.”</a></p>
</li>
</ul>
@@ -3578,7 +3585,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © <span class="removed"><del><strong>2015, 2016,
2017</strong></del></span> <span
class="inserted"><ins><em>2015-2020</em></ins></span> Free Software Foundation,
Inc.</p>
+<p>Copyright © <span class="removed"><del><strong>2015, 2016,
2017</strong></del></span> <span
class="inserted"><ins><em>2015-2021</em></ins></span> Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -3589,7 +3596,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/12/30 10:33:46 $
+$Date: 2021/01/04 10:03:02 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.358
retrieving revision 1.359
diff -u -b -r1.358 -r1.359
--- proprietary-surveillance.ja.po 30 Dec 2020 10:33:47 -0000 1.358
+++ proprietary-surveillance.ja.po 4 Jan 2021 10:03:03 -0000 1.359
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-12-30 10:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -4252,6 +4252,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
@@ -4361,7 +4369,7 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid "Copyright © 2015 Free Software Foundation, Inc."
-msgid "Copyright © 2015-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2015-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2015 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.297
retrieving revision 1.298
diff -u -b -r1.297 -r1.298
--- proprietary-surveillance.pot 30 Dec 2020 10:33:47 -0000 1.297
+++ proprietary-surveillance.pot 4 Jan 2021 10:03:03 -0000 1.298
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-12-30 10:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -3449,6 +3449,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a "
+"href=\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people
"
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft <a "
"href=\"https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces
"
"people to give their phone number</a> in order to be able to create an "
@@ -3531,7 +3539,7 @@
msgstr ""
#. type: Content of: <div><p>
-msgid "Copyright © 2015-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2015-2021 Free Software Foundation, Inc."
msgstr ""
#. type: Content of: <div><p>
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.663
retrieving revision 1.664
diff -u -b -r1.663 -r1.664
--- proprietary-surveillance.ru.po 30 Dec 2020 11:32:11 -0000 1.663
+++ proprietary-surveillance.ru.po 4 Jan 2021 10:03:03 -0000 1.664
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-12-30 10:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-04 09:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -5096,6 +5097,14 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Microsoft <a href=\"https://answers.microsoft.com/en-us/outlook_com/forum/"
"all/why-does-my-new-e-mail-account-need-a-phone-"
"number/70049eaf-3b66-4d02-87cc-79dc73c2ea08\">forces people to give their "
@@ -5210,7 +5219,10 @@
"translations.html\">“Ð ÑководÑÑве по
пеÑеводам”</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2015-2020 Free Software Foundation, Inc."
+# | Copyright © 2015-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2015-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2015-2021 Free Software Foundation, Inc."
msgstr "Copyright © 2015-2020 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.207
retrieving revision 1.208
diff -u -b -r1.207 -r1.208
--- proprietary.de-diff.html 27 Dec 2020 14:30:56 -0000 1.207
+++ proprietary.de-diff.html 4 Jan 2021 10:03:03 -0000 1.208
@@ -27,10 +27,10 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -57,16 +57,16 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
-->
</style>
<style type="text/css" media="print,screen">
@@ -125,18 +125,18 @@
</tr>
<tr>
<td>
- <ul class="columns"></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
- <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <ul class="columns">
+ <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
<li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
@@ -212,6 +212,23 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202101040">
+ <p>The personal finance management software "Quicken" <a
+
href="https://www.quicken.com/support/quicken-discontinuation-policy">has
+ a discontinuation policy aka planned obsolescence</a> which is an
+ injustice to users. A free (as in freedom) program would let users'
+ to control the software but when you use a proprietary software,
+ you won't be in control.</p>
+ </li>
+
+ <li id="M202009070">
+ <p>While the world is still
+ struggling with COVID-19 coronavirus, many <a
+
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/">people
+ are in danger of surveillance</a> and their computers are infected
+ with malware as a result of installing proprietary software.</p>
+ </li>
+
<li id="M202011050">
<p>HP tricked users into installing
a mischievous update in their printers that <a
@@ -239,39 +256,6 @@
get passwords out of an iMonster</a>, use the microphone and camera,
and other things.</p>
</li>
-
- <li id="M202012190">
- <p><a
-
href="https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-china-surveillance/">
- A Zoom executive carried out snooping and censorship for
- China</a>.</p>
-
- <p>This abuse of Zoom's power shows how dangerous that power is. The
- root problem is not the surveillance and censorship, but rather the
- power that Zoom has. It gets that power partly from the use of its
- server, but also partly from the nonfree client program.</p>
- </li>
-
- <li id="M202011230">
- <p>Some Wavelink and JetStream wifi routers have
- universal back doors that enable unauthenticated
- users to remotely control not only the routers, but
- also any devices connected to the network. There is evidence that <a
-
href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/">
- this vulnerability is actively exploited</a>.</p>
-
- <p>If you consider buying a router, we encourage you to get one
- that <a href="https://ryf.fsf.org/categories/routers">runs on free
- software</a>. Any attempts at introducing malicious functionalities
in
- it (e.g., through a firmware update) will be detected by the community,
- and soon corrected.</p>
-
- <p>If unfortunately you own a router that runs on
- proprietary software, don't panic! You may be able to
- replace its firmware with a free operating system such as <a
- href="https://librecmc.org">libreCMC</a>. If you don't know how,
- you can get help from a nearby GNU/Linux user group.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -323,7 +307,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2014, 2015, 2016, 2017, <span
class="removed"><del><strong>2018</strong></del></span> <span
class="inserted"><ins><em>2018, 2019, 2020</em></ins></span>
+<p>Copyright © 2013, 2014, 2015, 2016, 2017, <span
class="removed"><del><strong>2018</strong></del></span> <span
class="inserted"><ins><em>2018, 2019, 2020, 2021</em></ins></span>
Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
@@ -335,7 +319,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/12/27 14:30:56 $
+$Date: 2021/01/04 10:03:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.245
retrieving revision 1.246
diff -u -b -r1.245 -r1.246
--- proprietary.de.po 27 Dec 2020 14:30:56 -0000 1.245
+++ proprietary.de.po 4 Jan 2021 10:03:03 -0000 1.246
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -465,6 +465,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"HP tricked users into installing a mischievous update in their printers that "
"<a href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-"
"soul-digital-freedom-taking-place-inside-your-printer\">made the devices "
@@ -507,47 +524,6 @@
"and camera, and other things."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-"
-"china-surveillance/\"> A Zoom executive carried out snooping and censorship "
-"for China</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-"
-"china-contain-backdoors-to-control-devices/\"> this vulnerability is "
-"actively exploited</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a href="
-"\"https://ryf.fsf.org/categories/routers\">runs on free software</a>. Any "
-"attempts at introducing malicious functionalities in it (e.g., through a "
-"firmware update) will be detected by the community, and soon corrected."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\">libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
@@ -616,13 +592,13 @@
#. type: Content of: <div><p>
# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
+# | 2020, 2021+} Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
#| "Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr "Copyright © 2013-2018 Free Software Foundation, Inc."
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.370
retrieving revision 1.371
diff -u -b -r1.370 -r1.371
--- proprietary.es.po 28 Dec 2020 09:41:25 -0000 1.370
+++ proprietary.es.po 4 Jan 2021 10:03:03 -0000 1.371
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-04 09:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -319,6 +320,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"HP tricked users into installing a mischievous update in their printers that "
"<a href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-"
"soul-digital-freedom-taking-place-inside-your-printer\">made the devices "
@@ -370,70 +388,6 @@
"researchers-say\">obtener las contraseñas de los iMonstruos</a>, utilizar el
"
"micrófono y la cámara, y más cosas."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-"
-"china-surveillance/\"> A Zoom executive carried out snooping and censorship "
-"for China</a>."
-msgstr ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-"
-"china-surveillance/\">Un ejecutivo de Zoom ha sido descubierto espiando y "
-"censurando para el gobierno chino</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-"Este abuso del poder de Zoom muestra lo peligroso que es ese poder. El "
-"problema de fondo no es la vigilancia y la censura, sino el poder del que "
-"dispone Zoom. Obtiene ese poder en parte gracias al uso de su servidor, pero "
-"en parte también gracias al programa cliente privativo."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-"
-"china-contain-backdoors-to-control-devices/\"> this vulnerability is "
-"actively exploited</a>."
-msgstr ""
-"Algunos enrutadores wifi Wavelink y JetStream contienen puertas traseras "
-"universales que permiten a usuarios no autentificados controlar no solo el "
-"enrutador, sino también cualquier dispositivo conectado a la red. Hay "
-"pruebas de que <a href=\"https://cybernews.com/security/walmart-exclusive-"
-"routers-others-made-in-china-contain-backdoors-to-control-devices/\">está "
-"vulnerabilidad está siendo aprovechada</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a href="
-"\"https://ryf.fsf.org/categories/routers\">runs on free software</a>. Any "
-"attempts at introducing malicious functionalities in it (e.g., through a "
-"firmware update) will be detected by the community, and soon corrected."
-msgstr ""
-"Si tiene intención de adquirir un enrutador, le exhortamos a que busque uno "
-"que <a href=\"https://ryf.fsf.org/categories/routers\">funcione con software "
-"libre</a>. Cualquier intento de introducir en él funcionalidades maliciosas "
-"(por ejemplo, mediante una actualización del <cite>firmware</cite> será "
-"detectado por la comunidad y corregido enseguida."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\">libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-"Si por desgracia posee un enrutador que funciona con software que no es "
-"libre, no se alarme. Puede sustituir su <cite>firmware</cite> con un sistema "
-"operativo libre como <a href=\"https://librecmc.org\">libreCMC</a>. Si no "
-"sabe cómo hacerlo, puede pedir ayuda a algún grupo de usuarios de GNU/Linux
"
-"cercano."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -484,8 +438,14 @@
"coordinación y el envÃo de traducciones de las páginas de este sitio web."
#. type: Content of: <div><p>
+# | Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, [-2020-]
+# | {+2020, 2021+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
@@ -513,3 +473,63 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima actualización:"
+
+#~ msgid ""
+#~ "<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-"
+#~ "helped-china-surveillance/\"> A Zoom executive carried out snooping and "
+#~ "censorship for China</a>."
+#~ msgstr ""
+#~ "<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-"
+#~ "helped-china-surveillance/\">Un ejecutivo de Zoom ha sido descubierto "
+#~ "espiando y censurando para el gobierno chino</a>."
+
+#~ msgid ""
+#~ "This abuse of Zoom's power shows how dangerous that power is. The root "
+#~ "problem is not the surveillance and censorship, but rather the power that "
+#~ "Zoom has. It gets that power partly from the use of its server, but also "
+#~ "partly from the nonfree client program."
+#~ msgstr ""
+#~ "Este abuso del poder de Zoom muestra lo peligroso que es ese poder. El "
+#~ "problema de fondo no es la vigilancia y la censura, sino el poder del que "
+#~ "dispone Zoom. Obtiene ese poder en parte gracias al uso de su servidor, "
+#~ "pero en parte también gracias al programa cliente privativo."
+
+#~ msgid ""
+#~ "Some Wavelink and JetStream wifi routers have universal back doors that "
+#~ "enable unauthenticated users to remotely control not only the routers, "
+#~ "but also any devices connected to the network. There is evidence that <a "
+#~ "href=\"https://cybernews.com/security/walmart-exclusive-routers-others-"
+#~ "made-in-china-contain-backdoors-to-control-devices/\"> this vulnerability "
+#~ "is actively exploited</a>."
+#~ msgstr ""
+#~ "Algunos enrutadores wifi Wavelink y JetStream contienen puertas traseras "
+#~ "universales que permiten a usuarios no autentificados controlar no solo "
+#~ "el enrutador, sino también cualquier dispositivo conectado a la red. Hay "
+#~ "pruebas de que <a href=\"https://cybernews.com/security/walmart-exclusive-"
+#~ "routers-others-made-in-china-contain-backdoors-to-control-devices/\">está
"
+#~ "vulnerabilidad está siendo aprovechada</a>."
+
+#~ msgid ""
+#~ "If you consider buying a router, we encourage you to get one that <a href="
+#~ "\"https://ryf.fsf.org/categories/routers\">runs on free software</a>. Any "
+#~ "attempts at introducing malicious functionalities in it (e.g., through a "
+#~ "firmware update) will be detected by the community, and soon corrected."
+#~ msgstr ""
+#~ "Si tiene intención de adquirir un enrutador, le exhortamos a que busque "
+#~ "uno que <a href=\"https://ryf.fsf.org/categories/routers\">funcione con "
+#~ "software libre</a>. Cualquier intento de introducir en él funcionalidades
"
+#~ "maliciosas (por ejemplo, mediante una actualización del <cite>firmware</"
+#~ "cite> será detectado por la comunidad y corregido enseguida."
+
+#~ msgid ""
+#~ "If unfortunately you own a router that runs on proprietary software, "
+#~ "don't panic! You may be able to replace its firmware with a free "
+#~ "operating system such as <a href=\"https://librecmc.org\">libreCMC</a>. "
+#~ "If you don't know how, you can get help from a nearby GNU/Linux user "
+#~ "group."
+#~ msgstr ""
+#~ "Si por desgracia posee un enrutador que funciona con software que no es "
+#~ "libre, no se alarme. Puede sustituir su <cite>firmware</cite> con un "
+#~ "sistema operativo libre como <a href=\"https://librecmc.org\">libreCMC</"
+#~ "a>. Si no sabe cómo hacerlo, puede pedir ayuda a algún grupo de usuarios
"
+#~ "de GNU/Linux cercano."
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.415
retrieving revision 1.416
diff -u -b -r1.415 -r1.416
--- proprietary.fr.po 27 Dec 2020 19:16:01 -0000 1.415
+++ proprietary.fr.po 4 Jan 2021 10:03:03 -0000 1.416
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
"PO-Revision-Date: 2020-12-27 20:14+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-04 09:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -315,6 +316,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"HP tricked users into installing a mischievous update in their printers that "
"<a href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-"
"soul-digital-freedom-taking-place-inside-your-printer\">made the devices "
@@ -363,72 +381,6 @@
"for-months-researchers-say\">extraire les mots de passe des iMonstres</a> et "
"d'utiliser le micro et la caméra, entre autres choses."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-"
-"china-surveillance/\"> A Zoom executive carried out snooping and censorship "
-"for China</a>."
-msgstr ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-"
-"china-surveillance/\">Un dirigeant de Zoom a fait de la surveillance et de "
-"la censure pour le compte de la Chine</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-"Cet abus de pouvoir de la part de Zoom montre à quel point ce pouvoir est "
-"dangereux. Le fond du problème n'est pas la surveillance ou la censure, mais
"
-"plutôt le pouvoir que possède Zoom. Cette société tire son pouvoir pour "
-"partie de l'utilisation de son serveur, mais aussi, pour une autre partie, "
-"de son programme client non libre."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-"
-"china-contain-backdoors-to-control-devices/\"> this vulnerability is "
-"actively exploited</a>."
-msgstr ""
-"Les routeurs wifi Wavelink et JetStream ont des portes dérobées
universelles "
-"qui permettent à des personnes non authentifiés, non seulement de les "
-"contrôler à distance, mais aussi de contrôler n'importe quel appareil "
-"connecté au réseau. Il est prouvé que <a href=\"https://cybernews.com/"
-"security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-"
-"control-devices/\">cette vulnérabilité est activement exploitée</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a href="
-"\"https://ryf.fsf.org/categories/routers\">runs on free software</a>. Any "
-"attempts at introducing malicious functionalities in it (e.g., through a "
-"firmware update) will be detected by the community, and soon corrected."
-msgstr ""
-"Si vous envisagez d'acheter un routeur, nous vous invitons à en choisir un "
-"qui <a href=\"https://ryf.fsf.org/categories/routers\">fonctionne avec du "
-"logiciel libre</a>. Toute tentative d'y introduire une fonctionnalité "
-"malveillante (par exemple à l'occasion d'une mise à jour du micrologiciel) "
-"sera détectée par la communauté et vite corrigée."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\">libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-"Si malheureusement vous possédez un routeur qui fonctionne avec du logiciel "
-"privateur, pas de panique ! Il est peut-être possible de remplacer son "
-"micrologiciel avec un système d'exploitation libre comme <a href=\"https://"
-"librecmc.org\">libreCMC</a>. Si vous ne savez pas comment faire, vous pouvez "
-"trouver de l'aide auprès d'un groupe d'utilisateurs GNU/Linux de votre "
-"région."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -475,8 +427,14 @@
"README.translations.html\">guide de traduction</a>."
#. type: Content of: <div><p>
+# | Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, [-2020-]
+# | {+2020, 2021+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr "Copyright © 2013-2020 Free Software Foundation, Inc."
@@ -503,6 +461,69 @@
msgstr "Dernière mise à jour :"
#~ msgid ""
+#~ "<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-"
+#~ "helped-china-surveillance/\"> A Zoom executive carried out snooping and "
+#~ "censorship for China</a>."
+#~ msgstr ""
+#~ "<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-"
+#~ "helped-china-surveillance/\">Un dirigeant de Zoom a fait de la "
+#~ "surveillance et de la censure pour le compte de la Chine</a>."
+
+#~ msgid ""
+#~ "This abuse of Zoom's power shows how dangerous that power is. The root "
+#~ "problem is not the surveillance and censorship, but rather the power that "
+#~ "Zoom has. It gets that power partly from the use of its server, but also "
+#~ "partly from the nonfree client program."
+#~ msgstr ""
+#~ "Cet abus de pouvoir de la part de Zoom montre à quel point ce pouvoir est
"
+#~ "dangereux. Le fond du problème n'est pas la surveillance ou la censure, "
+#~ "mais plutôt le pouvoir que possède Zoom. Cette société tire son
pouvoir "
+#~ "pour partie de l'utilisation de son serveur, mais aussi, pour une autre "
+#~ "partie, de son programme client non libre."
+
+#~ msgid ""
+#~ "Some Wavelink and JetStream wifi routers have universal back doors that "
+#~ "enable unauthenticated users to remotely control not only the routers, "
+#~ "but also any devices connected to the network. There is evidence that <a "
+#~ "href=\"https://cybernews.com/security/walmart-exclusive-routers-others-"
+#~ "made-in-china-contain-backdoors-to-control-devices/\"> this vulnerability "
+#~ "is actively exploited</a>."
+#~ msgstr ""
+#~ "Les routeurs wifi Wavelink et JetStream ont des portes dérobées "
+#~ "universelles qui permettent à des personnes non authentifiés, non "
+#~ "seulement de les contrôler à distance, mais aussi de contrôler
n'importe "
+#~ "quel appareil connecté au réseau. Il est prouvé que <a href=\"https://"
+#~ "cybernews.com/security/walmart-exclusive-routers-others-made-in-china-"
+#~ "contain-backdoors-to-control-devices/\">cette vulnérabilité est "
+#~ "activement exploitée</a>."
+
+#~ msgid ""
+#~ "If you consider buying a router, we encourage you to get one that <a href="
+#~ "\"https://ryf.fsf.org/categories/routers\">runs on free software</a>. Any "
+#~ "attempts at introducing malicious functionalities in it (e.g., through a "
+#~ "firmware update) will be detected by the community, and soon corrected."
+#~ msgstr ""
+#~ "Si vous envisagez d'acheter un routeur, nous vous invitons à en choisir "
+#~ "un qui <a href=\"https://ryf.fsf.org/categories/routers\">fonctionne avec "
+#~ "du logiciel libre</a>. Toute tentative d'y introduire une fonctionnalité "
+#~ "malveillante (par exemple à l'occasion d'une mise à jour du "
+#~ "micrologiciel) sera détectée par la communauté et vite corrigée."
+
+#~ msgid ""
+#~ "If unfortunately you own a router that runs on proprietary software, "
+#~ "don't panic! You may be able to replace its firmware with a free "
+#~ "operating system such as <a href=\"https://librecmc.org\">libreCMC</a>. "
+#~ "If you don't know how, you can get help from a nearby GNU/Linux user "
+#~ "group."
+#~ msgstr ""
+#~ "Si malheureusement vous possédez un routeur qui fonctionne avec du "
+#~ "logiciel privateur, pas de panique ! Il est peut-être possible de "
+#~ "remplacer son micrologiciel avec un système d'exploitation libre comme <a
"
+#~ "href=\"https://librecmc.org\">libreCMC</a>. Si vous ne savez pas comment "
+#~ "faire, vous pouvez trouver de l'aide auprès d'un groupe d'utilisateurs "
+#~ "GNU/Linux de votre région."
+
+#~ msgid ""
#~ "Baidu apps were <a href=\"https://www.zdnet.com/article/baidus-android-"
#~ "apps-caught-collecting-sensitive-user-details/\">caught collecting "
#~ "sensitive personal data</a> that can be used for lifetime tracking of "
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- proprietary.it-diff.html 27 Dec 2020 14:30:56 -0000 1.219
+++ proprietary.it-diff.html 4 Jan 2021 10:03:03 -0000 1.220
@@ -27,10 +27,10 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -57,16 +57,16 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
-->
</style>
<style type="text/css" media="print,screen">
@@ -125,18 +125,18 @@
</tr>
<tr>
<td>
- <ul class="columns"></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
- <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <ul class="columns">
+ <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
<li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
@@ -211,6 +211,23 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202101040">
+ <p>The personal finance management software "Quicken" <a
+
href="https://www.quicken.com/support/quicken-discontinuation-policy">has
+ a discontinuation policy aka planned obsolescence</a> which is an
+ injustice to users. A free (as in freedom) program would let users'
+ to control the software but when you use a proprietary software,
+ you won't be in control.</p>
+ </li>
+
+ <li id="M202009070">
+ <p>While the world is still
+ struggling with COVID-19 coronavirus, many <a
+
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/">people
+ are in danger of surveillance</a> and their computers are infected
+ with malware as a result of installing proprietary software.</p>
+ </li>
+
<li id="M202011050">
<p>HP tricked users into installing
a mischievous update in their printers that <a
@@ -238,39 +255,6 @@
get passwords out of an iMonster</a>, use the microphone and camera,
and other things.</p>
</li>
-
- <li id="M202012190">
- <p><a
-
href="https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-china-surveillance/">
- A Zoom executive carried out snooping and censorship for
- China</a>.</p>
-
- <p>This abuse of Zoom's power shows how dangerous that power is. The
- root problem is not the surveillance and censorship, but rather the
- power that Zoom has. It gets that power partly from the use of its
- server, but also partly from the nonfree client program.</p>
- </li>
-
- <li id="M202011230">
- <p>Some Wavelink and JetStream wifi routers have
- universal back doors that enable unauthenticated
- users to remotely control not only the routers, but
- also any devices connected to the network. There is evidence that <a
-
href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/">
- this vulnerability is actively exploited</a>.</p>
-
- <p>If you consider buying a router, we encourage you to get one
- that <a href="https://ryf.fsf.org/categories/routers">runs on free
- software</a>. Any attempts at introducing malicious functionalities
in
- it (e.g., through a firmware update) will be detected by the community,
- and soon corrected.</p>
-
- <p>If unfortunately you own a router that runs on
- proprietary software, don't panic! You may be able to
- replace its firmware with a free operating system such as <a
- href="https://librecmc.org">libreCMC</a>. If you don't know how,
- you can get help from a nearby GNU/Linux user group.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -322,7 +306,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2014, 2015, 2016, 2017, <span
class="removed"><del><strong>2018</strong></del></span> <span
class="inserted"><ins><em>2018, 2019, 2020</em></ins></span>
+<p>Copyright © 2013, 2014, 2015, 2016, 2017, <span
class="removed"><del><strong>2018</strong></del></span> <span
class="inserted"><ins><em>2018, 2019, 2020, 2021</em></ins></span>
Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
@@ -334,7 +318,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/12/27 14:30:56 $
+$Date: 2021/01/04 10:03:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.254
retrieving revision 1.255
diff -u -b -r1.254 -r1.255
--- proprietary.it.po 27 Dec 2020 14:30:56 -0000 1.254
+++ proprietary.it.po 4 Jan 2021 10:03:03 -0000 1.255
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -470,6 +470,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"HP tricked users into installing a mischievous update in their printers that "
"<a href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-"
"soul-digital-freedom-taking-place-inside-your-printer\">made the devices "
@@ -501,47 +518,6 @@
"and camera, and other things."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-"
-"china-surveillance/\"> A Zoom executive carried out snooping and censorship "
-"for China</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-"
-"china-contain-backdoors-to-control-devices/\"> this vulnerability is "
-"actively exploited</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a href="
-"\"https://ryf.fsf.org/categories/routers\">runs on free software</a>. Any "
-"attempts at introducing malicious functionalities in it (e.g., through a "
-"firmware update) will be detected by the community, and soon corrected."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\">libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -590,13 +566,13 @@
#. type: Content of: <div><p>
# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
+# | 2020, 2021+} Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
#| "Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.224
retrieving revision 1.225
diff -u -b -r1.224 -r1.225
--- proprietary.ja-diff.html 27 Dec 2020 14:30:56 -0000 1.224
+++ proprietary.ja-diff.html 4 Jan 2021 10:03:03 -0000 1.225
@@ -27,10 +27,10 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -62,8 +62,8 @@
color: #004caa;
text-decoration: none;
}
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none; }
-#TOC a:hover { text-decoration: underline;</em></ins></span> }
+#TOC a { text-decoration: none; }
+#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -210,6 +210,23 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202101040">
+ <p>The personal finance management software "Quicken" <a
+
href="https://www.quicken.com/support/quicken-discontinuation-policy">has
+ a discontinuation policy aka planned obsolescence</a> which is an
+ injustice to users. A free (as in freedom) program would let users'
+ to control the software but when you use a proprietary software,
+ you won't be in control.</p>
+ </li>
+
+ <li id="M202009070">
+ <p>While the world is still
+ struggling with COVID-19 coronavirus, many <a
+
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/">people
+ are in danger of surveillance</a> and their computers are infected
+ with malware as a result of installing proprietary software.</p>
+ </li>
+
<li id="M202011050">
<p>HP tricked users into installing
a mischievous update in their printers that <a
@@ -237,39 +254,6 @@
get passwords out of an iMonster</a>, use the microphone and camera,
and other things.</p>
</li>
-
- <li id="M202012190">
- <p><a
-
href="https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-china-surveillance/">
- A Zoom executive carried out snooping and censorship for
- China</a>.</p>
-
- <p>This abuse of Zoom's power shows how dangerous that power is. The
- root problem is not the surveillance and censorship, but rather the
- power that Zoom has. It gets that power partly from the use of its
- server, but also partly from the nonfree client program.</p>
- </li>
-
- <li id="M202011230">
- <p>Some Wavelink and JetStream wifi routers have
- universal back doors that enable unauthenticated
- users to remotely control not only the routers, but
- also any devices connected to the network. There is evidence that <a
-
href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/">
- this vulnerability is actively exploited</a>.</p>
-
- <p>If you consider buying a router, we encourage you to get one
- that <a href="https://ryf.fsf.org/categories/routers">runs on free
- software</a>. Any attempts at introducing malicious functionalities
in
- it (e.g., through a firmware update) will be detected by the community,
- and soon corrected.</p>
-
- <p>If unfortunately you own a router that runs on
- proprietary software, don't panic! You may be able to
- replace its firmware with a free operating system such as <a
- href="https://librecmc.org">libreCMC</a>. If you don't know how,
- you can get help from a nearby GNU/Linux user group.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -321,7 +305,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2014, 2015, 2016, <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017, 2018, 2019, 2020</em></ins></span>
+<p>Copyright © 2013, 2014, 2015, 2016, <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017, 2018, 2019, 2020, 2021</em></ins></span>
Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
@@ -333,7 +317,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/12/27 14:30:56 $
+$Date: 2021/01/04 10:03:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.238
retrieving revision 1.239
diff -u -b -r1.238 -r1.239
--- proprietary.ja.po 27 Dec 2020 14:30:56 -0000 1.238
+++ proprietary.ja.po 4 Jan 2021 10:03:03 -0000 1.239
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -328,6 +328,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"HP tricked users into installing a mischievous update in their printers that "
"<a href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-"
"soul-digital-freedom-taking-place-inside-your-printer\">made the devices "
@@ -359,47 +376,6 @@
"and camera, and other things."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-"
-"china-surveillance/\"> A Zoom executive carried out snooping and censorship "
-"for China</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-"
-"china-contain-backdoors-to-control-devices/\"> this vulnerability is "
-"actively exploited</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a href="
-"\"https://ryf.fsf.org/categories/routers\">runs on free software</a>. Any "
-"attempts at introducing malicious functionalities in it (e.g., through a "
-"firmware update) will be detected by the community, and soon corrected."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\">libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -447,7 +423,7 @@
#| "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
#| "Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.220
retrieving revision 1.221
diff -u -b -r1.220 -r1.221
--- proprietary.nl-diff.html 27 Dec 2020 14:30:56 -0000 1.220
+++ proprietary.nl-diff.html 4 Jan 2021 10:03:03 -0000 1.221
@@ -27,10 +27,10 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -57,16 +57,16 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
-->
</style>
<style type="text/css" media="print,screen">
@@ -125,19 +125,19 @@
</tr>
<tr>
<td>
- <ul class="columns"></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-phones.html">Malware
in phones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
- <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
+ <ul class="columns">
+ <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-phones.html">Malware
in phones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
@@ -211,6 +211,23 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202101040">
+ <p>The personal finance management software "Quicken" <a
+
href="https://www.quicken.com/support/quicken-discontinuation-policy">has
+ a discontinuation policy aka planned obsolescence</a> which is an
+ injustice to users. A free (as in freedom) program would let users'
+ to control the software but when you use a proprietary software,
+ you won't be in control.</p>
+ </li>
+
+ <li id="M202009070">
+ <p>While the world is still
+ struggling with COVID-19 coronavirus, many <a
+
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/">people
+ are in danger of surveillance</a> and their computers are infected
+ with malware as a result of installing proprietary software.</p>
+ </li>
+
<li id="M202011050">
<p>HP tricked users into installing
a mischievous update in their printers that <a
@@ -238,39 +255,6 @@
get passwords out of an iMonster</a>, use the microphone and camera,
and other things.</p>
</li>
-
- <li id="M202012190">
- <p><a
-
href="https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-china-surveillance/">
- A Zoom executive carried out snooping and censorship for
- China</a>.</p>
-
- <p>This abuse of Zoom's power shows how dangerous that power is. The
- root problem is not the surveillance and censorship, but rather the
- power that Zoom has. It gets that power partly from the use of its
- server, but also partly from the nonfree client program.</p>
- </li>
-
- <li id="M202011230">
- <p>Some Wavelink and JetStream wifi routers have
- universal back doors that enable unauthenticated
- users to remotely control not only the routers, but
- also any devices connected to the network. There is evidence that <a
-
href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/">
- this vulnerability is actively exploited</a>.</p>
-
- <p>If you consider buying a router, we encourage you to get one
- that <a href="https://ryf.fsf.org/categories/routers">runs on free
- software</a>. Any attempts at introducing malicious functionalities
in
- it (e.g., through a firmware update) will be detected by the community,
- and soon corrected.</p>
-
- <p>If unfortunately you own a router that runs on
- proprietary software, don't panic! You may be able to
- replace its firmware with a free operating system such as <a
- href="https://librecmc.org">libreCMC</a>. If you don't know how,
- you can get help from a nearby GNU/Linux user group.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -322,7 +306,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2014, 2015, 2016, <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017, 2018, 2019, 2020</em></ins></span>
+<p>Copyright © 2013, 2014, 2015, 2016, <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017, 2018, 2019, 2020, 2021</em></ins></span>
Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
@@ -334,7 +318,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/12/27 14:30:56 $
+$Date: 2021/01/04 10:03:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.228
retrieving revision 1.229
diff -u -b -r1.228 -r1.229
--- proprietary.nl.po 27 Dec 2020 14:30:56 -0000 1.228
+++ proprietary.nl.po 4 Jan 2021 10:03:03 -0000 1.229
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -373,6 +373,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"HP tricked users into installing a mischievous update in their printers that "
"<a href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-"
"soul-digital-freedom-taking-place-inside-your-printer\">made the devices "
@@ -404,47 +421,6 @@
"and camera, and other things."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-"
-"china-surveillance/\"> A Zoom executive carried out snooping and censorship "
-"for China</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-"
-"china-contain-backdoors-to-control-devices/\"> this vulnerability is "
-"actively exploited</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a href="
-"\"https://ryf.fsf.org/categories/routers\">runs on free software</a>. Any "
-"attempts at introducing malicious functionalities in it (e.g., through a "
-"firmware update) will be detected by the community, and soon corrected."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\">libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -489,13 +465,13 @@
#. type: Content of: <div><p>
# | Copyright © 2013, 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
+# | 2020, 2021+} Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
#| "Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.237
retrieving revision 1.238
diff -u -b -r1.237 -r1.238
--- proprietary.pl-diff.html 27 Dec 2020 14:30:56 -0000 1.237
+++ proprietary.pl-diff.html 4 Jan 2021 10:03:03 -0000 1.238
@@ -28,9 +28,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -56,10 +56,10 @@
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
+#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
- #skiplinks a, #skiplinks a:visited {
- color: #004caa;
+ #skiplinks a, #skiplinks a:visited</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span>
+ <span class="inserted"><ins><em>color: #004caa;
text-decoration: none;
}
#TOC a { text-decoration: none; }
@@ -154,19 +154,19 @@
<td></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li>
+ <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
- <ul>
- <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
- <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
- <li><a
href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <ul></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
+ <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -210,6 +210,23 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202101040">
+ <p>The personal finance management software "Quicken" <a
+
href="https://www.quicken.com/support/quicken-discontinuation-policy">has
+ a discontinuation policy aka planned obsolescence</a> which is an
+ injustice to users. A free (as in freedom) program would let users'
+ to control the software but when you use a proprietary software,
+ you won't be in control.</p>
+ </li>
+
+ <li id="M202009070">
+ <p>While the world is still
+ struggling with COVID-19 coronavirus, many <a
+
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/">people
+ are in danger of surveillance</a> and their computers are infected
+ with malware as a result of installing proprietary software.</p>
+ </li>
+
<li id="M202011050">
<p>HP tricked users into installing
a mischievous update in their printers that <a
@@ -237,39 +254,6 @@
get passwords out of an iMonster</a>, use the microphone and camera,
and other things.</p>
</li>
-
- <li id="M202012190">
- <p><a
-
href="https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-china-surveillance/">
- A Zoom executive carried out snooping and censorship for
- China</a>.</p>
-
- <p>This abuse of Zoom's power shows how dangerous that power is. The
- root problem is not the surveillance and censorship, but rather the
- power that Zoom has. It gets that power partly from the use of its
- server, but also partly from the nonfree client program.</p>
- </li>
-
- <li id="M202011230">
- <p>Some Wavelink and JetStream wifi routers have
- universal back doors that enable unauthenticated
- users to remotely control not only the routers, but
- also any devices connected to the network. There is evidence that <a
-
href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/">
- this vulnerability is actively exploited</a>.</p>
-
- <p>If you consider buying a router, we encourage you to get one
- that <a href="https://ryf.fsf.org/categories/routers">runs on free
- software</a>. Any attempts at introducing malicious functionalities
in
- it (e.g., through a firmware update) will be detected by the community,
- and soon corrected.</p>
-
- <p>If unfortunately you own a router that runs on
- proprietary software, don't panic! You may be able to
- replace its firmware with a free operating system such as <a
- href="https://librecmc.org">libreCMC</a>. If you don't know how,
- you can get help from a nearby GNU/Linux user group.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -321,7 +305,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2014, <span
class="removed"><del><strong>2015</strong></del></span> <span
class="inserted"><ins><em>2015, 2016, 2017, 2018, 2019, 2020</em></ins></span>
+<p>Copyright © 2013, 2014, <span
class="removed"><del><strong>2015</strong></del></span> <span
class="inserted"><ins><em>2015, 2016, 2017, 2018, 2019, 2020,
2021</em></ins></span>
Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
@@ -333,7 +317,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/12/27 14:30:56 $
+$Date: 2021/01/04 10:03:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.221
retrieving revision 1.222
diff -u -b -r1.221 -r1.222
--- proprietary.pl.po 27 Dec 2020 14:30:56 -0000 1.221
+++ proprietary.pl.po 4 Jan 2021 10:03:03 -0000 1.222
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -554,6 +554,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"HP tricked users into installing a mischievous update in their printers that "
"<a href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-"
"soul-digital-freedom-taking-place-inside-your-printer\">made the devices "
@@ -585,47 +602,6 @@
"and camera, and other things."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-"
-"china-surveillance/\"> A Zoom executive carried out snooping and censorship "
-"for China</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-"
-"china-contain-backdoors-to-control-devices/\"> this vulnerability is "
-"actively exploited</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a href="
-"\"https://ryf.fsf.org/categories/routers\">runs on free software</a>. Any "
-"attempts at introducing malicious functionalities in it (e.g., through a "
-"firmware update) will be detected by the community, and soon corrected."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\">libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -674,11 +650,11 @@
#. type: Content of: <div><p>
# | Copyright © 2013, 2014, [-2015-] {+2015, 2016, 2017, 2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
+# | 2020, 2021+} Free Software Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.218
retrieving revision 1.219
diff -u -b -r1.218 -r1.219
--- proprietary.pot 27 Dec 2020 14:30:56 -0000 1.218
+++ proprietary.pot 4 Jan 2021 10:03:03 -0000 1.219
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -263,6 +263,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a "
+"href=\"https://www.quicken.com/support/quicken-discontinuation-policy\">has "
+"a discontinuation policy aka planned obsolescence</a> which is an injustice "
+"to users. A free (as in freedom) program would let users' to control the "
+"software but when you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a "
+"href=\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people
"
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"HP tricked users into installing a mischievous update in their printers that "
"<a "
"href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-soul-digital-freedom-taking-place-inside-your-printer\">made
"
@@ -294,47 +311,6 @@
"other things."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a "
-"href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-china-surveillance/\">
"
-"A Zoom executive carried out snooping and censorship for China</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a "
-"href=\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/\">
"
-"this vulnerability is actively exploited</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a "
-"href=\"https://ryf.fsf.org/categories/routers\">runs on free "
-"software</a>. Any attempts at introducing malicious functionalities in it "
-"(e.g., through a firmware update) will be detected by the community, and "
-"soon corrected."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\">libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -372,7 +348,7 @@
#. type: Content of: <div><p>
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr ""
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.363
retrieving revision 1.364
diff -u -b -r1.363 -r1.364
--- proprietary.pt-br.po 29 Dec 2020 16:54:46 -0000 1.363
+++ proprietary.pt-br.po 4 Jan 2021 10:03:03 -0000 1.364
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
"PO-Revision-Date: 2020-12-29 13:36-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-04 09:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1)\n"
"X-Generator: Gtranslator 3.38.0\n"
@@ -313,6 +314,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"HP tricked users into installing a mischievous update in their printers that "
"<a href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-"
"soul-digital-freedom-taking-place-inside-your-printer\">made the devices "
@@ -364,70 +382,6 @@
"researchers-say\"> obter senhas de um iMonstros</a>, usar o microfone e a "
"câmera, entre outras coisas."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-"
-"china-surveillance/\"> A Zoom executive carried out snooping and censorship "
-"for China</a>."
-msgstr ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-"
-"china-surveillance/\"> Um executivo da Zoom realizou espionagem e censura "
-"para a China</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-"Esse abuso do poder do Zoom mostra o quão perigoso é esse poder. A raiz do "
-"problema não é a vigilância e a censura, mas sim o poder que o Zoom tem.
Ele "
-"obtém esse poder em parte do uso de seu servidor, mas também em parte do "
-"programa cliente não livre."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-"
-"china-contain-backdoors-to-control-devices/\"> this vulnerability is "
-"actively exploited</a>."
-msgstr ""
-"Alguns roteadores wi-fi Wavelink e JetStream têm <i lang=\"en\">back doors</"
-"i> universais que permitem que usuários não autenticados controlem "
-"remotamente não apenas os roteadores, mas também quaisquer dispositivos "
-"conectados à rede. Há evidências de que <a href=\"https://cybernews.com/"
-"security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-"
-"control-devices/\"> esta vulnerabilidade é explorada ativamente</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a href="
-"\"https://ryf.fsf.org/categories/routers\">runs on free software</a>. Any "
-"attempts at introducing malicious functionalities in it (e.g., through a "
-"firmware update) will be detected by the community, and soon corrected."
-msgstr ""
-"Se você considerar a compra de um roteador, recomendamos que compre um que "
-"<a href=\"https://ryf.fsf.org/categories/routers\">execute software livre </"
-"a>. Qualquer tentativa de introdução de funcionalidades maliciosas nele
(por "
-"exemplo, por meio de uma atualização de firmware) será detectada pela "
-"comunidade e logo corrigida."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\">libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-"Se, infelizmente, você possui um roteador que executa software
proprietário, "
-"não entre em pânico! Você pode substituir seu firmware por um sistema "
-"operacional livre, como o <a href=\"https://librecmc.org\">libreCMC</a>. Se "
-"você não sabe como, pode obter ajuda de um grupo de usuários GNU/Linux "
-"próximo."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -473,8 +427,12 @@
"envio de traduções das páginas deste site."
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
@@ -503,6 +461,66 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-"
+#~ "helped-china-surveillance/\"> A Zoom executive carried out snooping and "
+#~ "censorship for China</a>."
+#~ msgstr ""
+#~ "<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-"
+#~ "helped-china-surveillance/\"> Um executivo da Zoom realizou espionagem e "
+#~ "censura para a China</a>."
+
+#~ msgid ""
+#~ "This abuse of Zoom's power shows how dangerous that power is. The root "
+#~ "problem is not the surveillance and censorship, but rather the power that "
+#~ "Zoom has. It gets that power partly from the use of its server, but also "
+#~ "partly from the nonfree client program."
+#~ msgstr ""
+#~ "Esse abuso do poder do Zoom mostra o quão perigoso é esse poder. A raiz "
+#~ "do problema não é a vigilância e a censura, mas sim o poder que o Zoom "
+#~ "tem. Ele obtém esse poder em parte do uso de seu servidor, mas também em
"
+#~ "parte do programa cliente não livre."
+
+#~ msgid ""
+#~ "Some Wavelink and JetStream wifi routers have universal back doors that "
+#~ "enable unauthenticated users to remotely control not only the routers, "
+#~ "but also any devices connected to the network. There is evidence that <a "
+#~ "href=\"https://cybernews.com/security/walmart-exclusive-routers-others-"
+#~ "made-in-china-contain-backdoors-to-control-devices/\"> this vulnerability "
+#~ "is actively exploited</a>."
+#~ msgstr ""
+#~ "Alguns roteadores wi-fi Wavelink e JetStream têm <i lang=\"en\">back "
+#~ "doors</i> universais que permitem que usuários não autenticados
controlem "
+#~ "remotamente não apenas os roteadores, mas também quaisquer dispositivos "
+#~ "conectados à rede. Há evidências de que <a
href=\"https://cybernews.com/"
+#~ "security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-"
+#~ "to-control-devices/\"> esta vulnerabilidade é explorada ativamente</a>."
+
+#~ msgid ""
+#~ "If you consider buying a router, we encourage you to get one that <a href="
+#~ "\"https://ryf.fsf.org/categories/routers\">runs on free software</a>. Any "
+#~ "attempts at introducing malicious functionalities in it (e.g., through a "
+#~ "firmware update) will be detected by the community, and soon corrected."
+#~ msgstr ""
+#~ "Se você considerar a compra de um roteador, recomendamos que compre um "
+#~ "que <a href=\"https://ryf.fsf.org/categories/routers\">execute software "
+#~ "livre </a>. Qualquer tentativa de introdução de funcionalidades "
+#~ "maliciosas nele (por exemplo, por meio de uma atualização de firmware) "
+#~ "será detectada pela comunidade e logo corrigida."
+
+#~ msgid ""
+#~ "If unfortunately you own a router that runs on proprietary software, "
+#~ "don't panic! You may be able to replace its firmware with a free "
+#~ "operating system such as <a href=\"https://librecmc.org\">libreCMC</a>. "
+#~ "If you don't know how, you can get help from a nearby GNU/Linux user "
+#~ "group."
+#~ msgstr ""
+#~ "Se, infelizmente, você possui um roteador que executa software "
+#~ "proprietário, não entre em pânico! Você pode substituir seu firmware
por "
+#~ "um sistema operacional livre, como o <a href=\"https://librecmc.org"
+#~ "\">libreCMC</a>. Se você não sabe como, pode obter ajuda de um grupo de "
+#~ "usuários GNU/Linux próximo."
+
+#~ msgid ""
#~ "Baidu apps were <a href=\"https://www.zdnet.com/article/baidus-android-"
#~ "apps-caught-collecting-sensitive-user-details/\">caught collecting "
#~ "sensitive personal data</a> that can be used for lifetime tracking of "
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.441
retrieving revision 1.442
diff -u -b -r1.441 -r1.442
--- proprietary.ru.po 27 Dec 2020 14:30:56 -0000 1.441
+++ proprietary.ru.po 4 Jan 2021 10:03:03 -0000 1.442
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-04 09:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -318,6 +319,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"HP tricked users into installing a mischievous update in their printers that "
"<a href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-"
"soul-digital-freedom-taking-place-inside-your-printer\">made the devices "
@@ -367,71 +385,6 @@
"researchers-say\"> извлекаÑÑ Ð¿Ð°Ñоли из ай-ÑÑдиÑ</a>,
иÑполÑзоваÑÑ Ð¼Ð¸ÐºÑоÑон и "
"камеÑÑ Ð¸ Ñ.д."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-"
-"china-surveillance/\"> A Zoom executive carried out snooping and censorship "
-"for China</a>."
-msgstr ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-"
-"china-surveillance/\"> Ð ÑководиÑÐµÐ»Ñ Zoom пÑоводил
ÑензÑÑÑ Ð¸ ÑÐ»ÐµÐ¶ÐºÑ Ð´Ð»Ñ "
-"ÐиÑаÑ</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-"ÐÑо злоÑпоÑÑебление влаÑÑÑÑ Zoom
показÑваеÑ, как опаÑна ÑÑа влаÑÑÑ. ÐÑоблема
"
-"коÑениÑÑÑ Ð½Ðµ в Ñлежке и ÑензÑÑе, а во
влаÑÑи, коÑоÑой Ð¾Ð±Ð»Ð°Ð´Ð°ÐµÑ Zoom. Ðн "
-"полÑÑÐ°ÐµÑ ÑÑÑ Ð²Ð»Ð°ÑÑÑ ÑаÑÑиÑно из-за
полÑÐ·Ð¾Ð²Ð°Ð½Ð¸Ñ ÐµÐ³Ð¾ ÑеÑвеÑом, но ÑаÑÑиÑно "
-"Ñакже из-за неÑвободной
пÑогÑаммÑ-клиенÑа."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-"
-"china-contain-backdoors-to-control-devices/\"> this vulnerability is "
-"actively exploited</a>."
-msgstr ""
-"РнекоÑоÑÑÑ
беÑпÑоводнÑÑ
маÑÑÑÑÑизаÑоÑаÑ
Wavelink и JetStream еÑÑÑ "
-"ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од, коÑоÑÑй
позволÑÐµÑ Ð½ÐµÐ¸Ð´ÐµÐ½ÑиÑиÑиÑованнÑм "
-"полÑзоваÑелÑм Ñдаленно конÑÑолиÑоваÑÑ Ð½Ðµ
ÑолÑко ÑÑи маÑÑÑÑÑизаÑоÑÑ, но Ñакже "
-"лÑбÑе ÑÑÑÑойÑÑва, подклÑÑеннÑе к ÑеÑи.
ÐÑÑÑ ÑвидеÑелÑÑÑво, ÑÑо <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-"
-"china-contain-backdoors-to-control-devices/\"> ÑÑа ÑÑзвимоÑÑÑ
акÑивно "
-"ÑкÑплÑаÑиÑÑеÑÑÑ</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a href="
-"\"https://ryf.fsf.org/categories/routers\">runs on free software</a>. Any "
-"attempts at introducing malicious functionalities in it (e.g., through a "
-"firmware update) will be detected by the community, and soon corrected."
-msgstr ""
-"ÐÑли Ð²Ñ Ð¿Ð¾Ð´ÑмÑваеÑе о покÑпке
маÑÑÑÑÑизаÑоÑа, Ð¼Ñ ÑовеÑÑем вам
оÑÑановиÑÑÑÑ "
-"на одном из <a
href=\"https://ryf.fsf.org/categories/routers\">ÑабоÑаÑÑиÑ
"
-"под ÑпÑавлением ÑвободнÑÑ
пÑогÑамм</a>.
ÐÑбÑе попÑÑки ввода в него "
-"вÑедоноÑнÑÑ
ÑÑнкÑий (напÑ., ÑеÑез
обновление пÑогÑамм в ниÑ
) бÑÐ´ÐµÑ "
-"обнаÑÑжено ÑообÑеÑÑвом и вÑкоÑе
иÑпÑавлено."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\">libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-"ÐÑли вам не поÑÑаÑÑливилоÑÑ Ð¸Ð¼ÐµÑÑ
маÑÑÑÑÑизаÑоÑ, ÑабоÑаÑÑий на неÑвободнÑÑ
"
-"пÑогÑаммаÑ
, не оÑÑаивайÑеÑÑ! Ðозможно, вам
ÑдаÑÑÑÑ Ð·Ð°Ð¼ÐµÐ½Ð¸ÑÑ ÐµÐ³Ð¾ пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° "
-"ÑвободнÑÑ Ð¾Ð¿ÐµÑаÑионнÑÑ ÑиÑÑемÑ, ÑакÑÑ ÐºÐ°Ðº
<a href=\"https://librecmc.org"
-"\">libreCMC</a>. ÐÑли Ð²Ñ Ð½Ðµ знаеÑе, как ÑÑо
делаеÑÑÑ, обÑаÑиÑеÑÑ Ð² ближайÑÑÑ "
-"гÑÑÐ¿Ð¿Ñ Ð¿Ð¾Ð»ÑзоваÑелей GNU/Linux."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -476,8 +429,14 @@
"translations.html\">“Ð ÑководÑÑве по
пеÑеводам”</a>."
#. type: Content of: <div><p>
+# | Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, [-2020-]
+# | {+2020, 2021+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
@@ -508,6 +467,67 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-"
+#~ "helped-china-surveillance/\"> A Zoom executive carried out snooping and "
+#~ "censorship for China</a>."
+#~ msgstr ""
+#~ "<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-"
+#~ "helped-china-surveillance/\"> Ð ÑководиÑÐµÐ»Ñ Zoom
пÑоводил ÑензÑÑÑ Ð¸ ÑÐ»ÐµÐ¶ÐºÑ "
+#~ "Ð´Ð»Ñ ÐиÑаÑ</a>."
+
+#~ msgid ""
+#~ "This abuse of Zoom's power shows how dangerous that power is. The root "
+#~ "problem is not the surveillance and censorship, but rather the power that "
+#~ "Zoom has. It gets that power partly from the use of its server, but also "
+#~ "partly from the nonfree client program."
+#~ msgstr ""
+#~ "ÐÑо злоÑпоÑÑебление влаÑÑÑÑ Zoom
показÑваеÑ, как опаÑна ÑÑа влаÑÑÑ. "
+#~ "ÐÑоблема коÑениÑÑÑ Ð½Ðµ в Ñлежке и
ÑензÑÑе, а во влаÑÑи, коÑоÑой Ð¾Ð±Ð»Ð°Ð´Ð°ÐµÑ "
+#~ "Zoom. Ðн полÑÑÐ°ÐµÑ ÑÑÑ Ð²Ð»Ð°ÑÑÑ ÑаÑÑиÑно из-за
полÑÐ·Ð¾Ð²Ð°Ð½Ð¸Ñ ÐµÐ³Ð¾ ÑеÑвеÑом, но "
+#~ "ÑаÑÑиÑно Ñакже из-за неÑвободной
пÑогÑаммÑ-клиенÑа."
+
+#~ msgid ""
+#~ "Some Wavelink and JetStream wifi routers have universal back doors that "
+#~ "enable unauthenticated users to remotely control not only the routers, "
+#~ "but also any devices connected to the network. There is evidence that <a "
+#~ "href=\"https://cybernews.com/security/walmart-exclusive-routers-others-"
+#~ "made-in-china-contain-backdoors-to-control-devices/\"> this vulnerability "
+#~ "is actively exploited</a>."
+#~ msgstr ""
+#~ "РнекоÑоÑÑÑ
беÑпÑоводнÑÑ
маÑÑÑÑÑизаÑоÑаÑ
Wavelink и JetStream еÑÑÑ "
+#~ "ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од, коÑоÑÑй
позволÑÐµÑ Ð½ÐµÐ¸Ð´ÐµÐ½ÑиÑиÑиÑованнÑм "
+#~ "полÑзоваÑелÑм Ñдаленно конÑÑолиÑоваÑÑ
не ÑолÑко ÑÑи маÑÑÑÑÑизаÑоÑÑ, но "
+#~ "Ñакже лÑбÑе ÑÑÑÑойÑÑва, подклÑÑеннÑе к
ÑеÑи. ÐÑÑÑ ÑвидеÑелÑÑÑво, ÑÑо <a "
+#~ "href=\"https://cybernews.com/security/walmart-exclusive-routers-others-"
+#~ "made-in-china-contain-backdoors-to-control-devices/\"> ÑÑа
ÑÑзвимоÑÑÑ "
+#~ "акÑивно ÑкÑплÑаÑиÑÑеÑÑÑ</a>."
+
+#~ msgid ""
+#~ "If you consider buying a router, we encourage you to get one that <a href="
+#~ "\"https://ryf.fsf.org/categories/routers\">runs on free software</a>. Any "
+#~ "attempts at introducing malicious functionalities in it (e.g., through a "
+#~ "firmware update) will be detected by the community, and soon corrected."
+#~ msgstr ""
+#~ "ÐÑли Ð²Ñ Ð¿Ð¾Ð´ÑмÑваеÑе о покÑпке
маÑÑÑÑÑизаÑоÑа, Ð¼Ñ ÑовеÑÑем вам "
+#~ "оÑÑановиÑÑÑÑ Ð½Ð° одном из <a
href=\"https://ryf.fsf.org/categories/routers"
+#~ "\">ÑабоÑаÑÑиÑ
под ÑпÑавлением ÑвободнÑÑ
пÑогÑамм</a>. ÐÑбÑе попÑÑки ввода "
+#~ "в него вÑедоноÑнÑÑ
ÑÑнкÑий (напÑ., ÑеÑез
обновление пÑогÑамм в ниÑ
) бÑÐ´ÐµÑ "
+#~ "обнаÑÑжено ÑообÑеÑÑвом и вÑкоÑе
иÑпÑавлено."
+
+#~ msgid ""
+#~ "If unfortunately you own a router that runs on proprietary software, "
+#~ "don't panic! You may be able to replace its firmware with a free "
+#~ "operating system such as <a href=\"https://librecmc.org\">libreCMC</a>. "
+#~ "If you don't know how, you can get help from a nearby GNU/Linux user "
+#~ "group."
+#~ msgstr ""
+#~ "ÐÑли вам не поÑÑаÑÑливилоÑÑ Ð¸Ð¼ÐµÑÑ
маÑÑÑÑÑизаÑоÑ, ÑабоÑаÑÑий на "
+#~ "неÑвободнÑÑ
пÑогÑаммаÑ
, не
оÑÑаивайÑеÑÑ! Ðозможно, вам ÑдаÑÑÑÑ
замениÑÑ "
+#~ "его пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° ÑвободнÑÑ Ð¾Ð¿ÐµÑаÑионнÑÑ
ÑиÑÑемÑ, ÑакÑÑ ÐºÐ°Ðº <a href="
+#~ "\"https://librecmc.org\">libreCMC</a>. ÐÑли Ð²Ñ Ð½Ðµ знаеÑе,
как ÑÑо "
+#~ "делаеÑÑÑ, обÑаÑиÑеÑÑ Ð² ближайÑÑÑ Ð³ÑÑппÑ
полÑзоваÑелей GNU/Linux."
+
+#~ msgid ""
#~ "Baidu apps were <a href=\"https://www.zdnet.com/article/baidus-android-"
#~ "apps-caught-collecting-sensitive-user-details/\">caught collecting "
#~ "sensitive personal data</a> that can be used for lifetime tracking of "
Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary.tr.po 27 Dec 2020 14:30:56 -0000 1.96
+++ proprietary.tr.po 4 Jan 2021 10:03:03 -0000 1.97
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
"PO-Revision-Date: 2020-12-17 18:19+0100\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -319,6 +319,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"HP tricked users into installing a mischievous update in their printers that "
"<a href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-"
"soul-digital-freedom-taking-place-inside-your-printer\">made the devices "
@@ -358,47 +375,6 @@
"and camera, and other things."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-"
-"china-surveillance/\"> A Zoom executive carried out snooping and censorship "
-"for China</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-"
-"china-contain-backdoors-to-control-devices/\"> this vulnerability is "
-"actively exploited</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a href="
-"\"https://ryf.fsf.org/categories/routers\">runs on free software</a>. Any "
-"attempts at introducing malicious functionalities in it (e.g., through a "
-"firmware update) will be detected by the community, and soon corrected."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\">libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -446,8 +422,12 @@
"\">çalıÅma sayfamızı</a> ziyaret edebilirsiniz."
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- proprietary.zh-cn.po 28 Dec 2020 10:01:20 -0000 1.121
+++ proprietary.zh-cn.po 4 Jan 2021 10:03:03 -0000 1.122
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
"PO-Revision-Date: 2020-12-28 17:42+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-01-04 09:55+0000\n"
"X-Generator: Poedit 2.3\n"
#. type: Content of: <title>
@@ -294,6 +295,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"HP tricked users into installing a mischievous update in their printers that "
"<a href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-"
"soul-digital-freedom-taking-place-inside-your-printer\">made the devices "
@@ -338,62 +356,6 @@
"theguardian.com/technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-"
"for-months-researchers-say\">ä» iMonster è·åå¯ç </a>ã"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-"
-"china-surveillance/\"> A Zoom executive carried out snooping and censorship "
-"for China</a>."
-msgstr ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-"
-"china-surveillance/\">æ Zoom é«ç®¡ä¸ºä¸å½æ§è¡å
æ¢å审æ¥ã</a>ã"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-"æ»¥ç¨ Zoom çæåå±ç¤ºäºè¿ç§æåä¼æå¤ä¹å±é©ãé®é¢çæ
¹æºä¸æ¶çæ§å审æ¥ï¼èå¨äº "
-"Zoom æè¿æ ·çæåãè¿ç§æåä¸é¨åæ¥èªäºå
¶æå¡å¨ï¼ä¹æä¸é¨åæ¥èªäºå
¶éèªç±å®¢æ·"
-"端ã"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-"
-"china-contain-backdoors-to-control-devices/\"> this vulnerability is "
-"actively exploited</a>."
-msgstr ""
-"æäº Wavelink å JetStream wifi è·¯ç±å¨å¸¦æå
¨å±åé¨ï¼å®ä»¬ä¸ä»
让æªç»ææçç¨æ·"
-"å¯ä»¥è¿ç¨æ§å¶è·¯ç±å¨ï¼èä¸è¿å¯ä»¥æ§å¶æ¥å
¥ç½ç»çä»»ä½è®¾å¤ãæè¯æ®è¡¨æ <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-"
-"china-contain-backdoors-to-control-devices/\">该æ¼æ´å·²ç»è¢«å©ç¨</a>ã"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a href="
-"\"https://ryf.fsf.org/categories/routers\">runs on free software</a>. Any "
-"attempts at introducing malicious functionalities in it (e.g., through a "
-"firmware update) will be detected by the community, and soon corrected."
-msgstr ""
-"å¦æä½ æ£æç®ä¹°è·¯ç±å¨ï¼é£ä¹æä»¬å»ºè®®ä½ ä¹° <a
href=\"https://ryf.fsf.org/"
-"categories/routers\">è¿è¡èªç±è½¯ä»¶</a>
çè·¯ç±å¨ãå¦æå®ææ¶æåè½ï¼æ¯å¦éè¿åº"
-"件ï¼ï¼ç¤¾åºé½ä¼åç°å¹¶è¿
éä¿®å¤ã"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\">libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-"å¦æä½ ä¸å¹¸å·²ç»æäºè¿è¡ä¸æ软件çè·¯ç±å¨ï¼ä¹ä¸å¿
ç´§å¼
ï¼ä½ ä¹è®¸å¯ä»¥ç¨èªç±è½¯ä»¶ <a "
-"href=\"https://librecmc.org\">libreCMC</a> æ¿ä»£å
¶ä¸ç软æ软件ãå¦æä½ ä¸ç¥éæ"
-"ä¹åï¼è¯·èç³»å½å°ç GNU/Linux ç¨æ·ç»å¯»æ±å¸®å©ã"
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -446,8 +408,12 @@
"a>ã"
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
@@ -478,6 +444,59 @@
msgstr "æåæ´æ°ï¼"
#~ msgid ""
+#~ "<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-"
+#~ "helped-china-surveillance/\"> A Zoom executive carried out snooping and "
+#~ "censorship for China</a>."
+#~ msgstr ""
+#~ "<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-"
+#~ "helped-china-surveillance/\">æ Zoom é«ç®¡ä¸ºä¸å½æ§è¡å
æ¢å审æ¥ã</a>ã"
+
+#~ msgid ""
+#~ "This abuse of Zoom's power shows how dangerous that power is. The root "
+#~ "problem is not the surveillance and censorship, but rather the power that "
+#~ "Zoom has. It gets that power partly from the use of its server, but also "
+#~ "partly from the nonfree client program."
+#~ msgstr ""
+#~ "æ»¥ç¨ Zoom çæåå±ç¤ºäºè¿ç§æåä¼æå¤ä¹å±é©ãé®é¢çæ
¹æºä¸æ¶çæ§å审æ¥ï¼èå¨"
+#~ "äº Zoom æè¿æ ·çæåãè¿ç§æåä¸é¨åæ¥èªäºå
¶æå¡å¨ï¼ä¹æä¸é¨åæ¥èªäºå
¶éèª"
+#~ "ç±å®¢æ·ç«¯ã"
+
+#~ msgid ""
+#~ "Some Wavelink and JetStream wifi routers have universal back doors that "
+#~ "enable unauthenticated users to remotely control not only the routers, "
+#~ "but also any devices connected to the network. There is evidence that <a "
+#~ "href=\"https://cybernews.com/security/walmart-exclusive-routers-others-"
+#~ "made-in-china-contain-backdoors-to-control-devices/\"> this vulnerability "
+#~ "is actively exploited</a>."
+#~ msgstr ""
+#~ "æäº Wavelink å JetStream wifi è·¯ç±å¨å¸¦æå
¨å±åé¨ï¼å®ä»¬ä¸ä»
让æªç»ææçç¨"
+#~ "æ·å¯ä»¥è¿ç¨æ§å¶è·¯ç±å¨ï¼èä¸è¿å¯ä»¥æ§å¶æ¥å
¥ç½ç»çä»»ä½è®¾å¤ãæè¯æ®è¡¨æ <a "
+#~ "href=\"https://cybernews.com/security/walmart-exclusive-routers-others-"
+#~
"made-in-china-contain-backdoors-to-control-devices/\">该æ¼æ´å·²ç»è¢«å©ç¨</"
+#~ "a>ã"
+
+#~ msgid ""
+#~ "If you consider buying a router, we encourage you to get one that <a href="
+#~ "\"https://ryf.fsf.org/categories/routers\">runs on free software</a>. Any "
+#~ "attempts at introducing malicious functionalities in it (e.g., through a "
+#~ "firmware update) will be detected by the community, and soon corrected."
+#~ msgstr ""
+#~ "å¦æä½ æ£æç®ä¹°è·¯ç±å¨ï¼é£ä¹æä»¬å»ºè®®ä½ ä¹° <a
href=\"https://ryf.fsf.org/"
+#~ "categories/routers\">è¿è¡èªç±è½¯ä»¶</a>
çè·¯ç±å¨ãå¦æå®ææ¶æåè½ï¼æ¯å¦éè¿"
+#~ "åºä»¶ï¼ï¼ç¤¾åºé½ä¼åç°å¹¶è¿
éä¿®å¤ã"
+
+#~ msgid ""
+#~ "If unfortunately you own a router that runs on proprietary software, "
+#~ "don't panic! You may be able to replace its firmware with a free "
+#~ "operating system such as <a href=\"https://librecmc.org\">libreCMC</a>. "
+#~ "If you don't know how, you can get help from a nearby GNU/Linux user "
+#~ "group."
+#~ msgstr ""
+#~ "å¦æä½ ä¸å¹¸å·²ç»æäºè¿è¡ä¸æ软件çè·¯ç±å¨ï¼ä¹ä¸å¿
ç´§å¼
ï¼ä½ ä¹è®¸å¯ä»¥ç¨èªç±è½¯ä»¶ "
+#~ "<a href=\"https://librecmc.org\">libreCMC</a> æ¿ä»£å
¶ä¸ç软æ软件ãå¦æä½ ä¸"
+#~ "ç¥éæä¹åï¼è¯·èç³»å½å°ç GNU/Linux ç¨æ·ç»å¯»æ±å¸®å©ã"
+
+#~ msgid ""
#~ "Baidu apps were <a href=\"https://www.zdnet.com/article/baidus-android-"
#~ "apps-caught-collecting-sensitive-user-details/\">caught collecting "
#~ "sensitive personal data</a> that can be used for lifetime tracking of "
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.200
retrieving revision 1.201
diff -u -b -r1.200 -r1.201
--- proprietary.zh-tw-diff.html 27 Dec 2020 14:30:57 -0000 1.200
+++ proprietary.zh-tw-diff.html 4 Jan 2021 10:03:03 -0000 1.201
@@ -27,10 +27,10 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -57,16 +57,16 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
-->
</style>
<style type="text/css" media="print,screen">
@@ -125,18 +125,18 @@
</tr>
<tr>
<td>
- <ul class="columns"></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
- <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <ul class="columns">
+ <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
<li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
@@ -212,6 +212,23 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202101040">
+ <p>The personal finance management software "Quicken" <a
+
href="https://www.quicken.com/support/quicken-discontinuation-policy">has
+ a discontinuation policy aka planned obsolescence</a> which is an
+ injustice to users. A free (as in freedom) program would let users'
+ to control the software but when you use a proprietary software,
+ you won't be in control.</p>
+ </li>
+
+ <li id="M202009070">
+ <p>While the world is still
+ struggling with COVID-19 coronavirus, many <a
+
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/">people
+ are in danger of surveillance</a> and their computers are infected
+ with malware as a result of installing proprietary software.</p>
+ </li>
+
<li id="M202011050">
<p>HP tricked users into installing
a mischievous update in their printers that <a
@@ -239,39 +256,6 @@
get passwords out of an iMonster</a>, use the microphone and camera,
and other things.</p>
</li>
-
- <li id="M202012190">
- <p><a
-
href="https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-china-surveillance/">
- A Zoom executive carried out snooping and censorship for
- China</a>.</p>
-
- <p>This abuse of Zoom's power shows how dangerous that power is. The
- root problem is not the surveillance and censorship, but rather the
- power that Zoom has. It gets that power partly from the use of its
- server, but also partly from the nonfree client program.</p>
- </li>
-
- <li id="M202011230">
- <p>Some Wavelink and JetStream wifi routers have
- universal back doors that enable unauthenticated
- users to remotely control not only the routers, but
- also any devices connected to the network. There is evidence that <a
-
href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/">
- this vulnerability is actively exploited</a>.</p>
-
- <p>If you consider buying a router, we encourage you to get one
- that <a href="https://ryf.fsf.org/categories/routers">runs on free
- software</a>. Any attempts at introducing malicious functionalities
in
- it (e.g., through a firmware update) will be detected by the community,
- and soon corrected.</p>
-
- <p>If unfortunately you own a router that runs on
- proprietary software, don't panic! You may be able to
- replace its firmware with a free operating system such as <a
- href="https://librecmc.org">libreCMC</a>. If you don't know how,
- you can get help from a nearby GNU/Linux user group.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -323,7 +307,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2014, 2015, 2016, 2017, <span
class="removed"><del><strong>2018</strong></del></span> <span
class="inserted"><ins><em>2018, 2019, 2020</em></ins></span>
+<p>Copyright © 2013, 2014, 2015, 2016, 2017, <span
class="removed"><del><strong>2018</strong></del></span> <span
class="inserted"><ins><em>2018, 2019, 2020, 2021</em></ins></span>
Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
@@ -335,7 +319,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/12/27 14:30:57 $
+$Date: 2021/01/04 10:03:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.208
retrieving revision 1.209
diff -u -b -r1.208 -r1.209
--- proprietary.zh-tw.po 27 Dec 2020 14:30:57 -0000 1.208
+++ proprietary.zh-tw.po 4 Jan 2021 10:03:04 -0000 1.209
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-12-27 14:25+0000\n"
+"POT-Creation-Date: 2021-01-04 09:55+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -443,6 +443,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"HP tricked users into installing a mischievous update in their printers that "
"<a href=\"https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-"
"soul-digital-freedom-taking-place-inside-your-printer\">made the devices "
@@ -474,47 +491,6 @@
"and camera, and other things."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-"
-"china-surveillance/\"> A Zoom executive carried out snooping and censorship "
-"for China</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"This abuse of Zoom's power shows how dangerous that power is. The root "
-"problem is not the surveillance and censorship, but rather the power that "
-"Zoom has. It gets that power partly from the use of its server, but also "
-"partly from the nonfree client program."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Some Wavelink and JetStream wifi routers have universal back doors that "
-"enable unauthenticated users to remotely control not only the routers, but "
-"also any devices connected to the network. There is evidence that <a href="
-"\"https://cybernews.com/security/walmart-exclusive-routers-others-made-in-"
-"china-contain-backdoors-to-control-devices/\"> this vulnerability is "
-"actively exploited</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If you consider buying a router, we encourage you to get one that <a href="
-"\"https://ryf.fsf.org/categories/routers\">runs on free software</a>. Any "
-"attempts at introducing malicious functionalities in it (e.g., through a "
-"firmware update) will be detected by the community, and soon corrected."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"If unfortunately you own a router that runs on proprietary software, don't "
-"panic! You may be able to replace its firmware with a free operating system "
-"such as <a href=\"https://librecmc.org\">libreCMC</a>. If you don't know "
-"how, you can get help from a nearby GNU/Linux user group."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -557,8 +533,14 @@
"å®ã"
#. type: Content of: <div><p>
+# | Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, [-2020-]
+# | {+2020, 2021+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.322
retrieving revision 1.323
diff -u -b -r1.322 -r1.323
--- pt-br.po 30 Dec 2020 10:33:47 -0000 1.322
+++ pt-br.po 4 Jan 2021 10:03:04 -0000 1.323
@@ -8832,6 +8832,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The British supermarket Tesco sold tablets which were tethered to Tesco's "
"server for reinstalling default settings. Tesco <a href=\"https://www."
"theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -8844,6 +8853,16 @@
"kill-fix\"> desligou o servidor para modelos antigos</a>, então, agora, se "
"você tentar reinstalar as configurações padrão, eles serão inutilizados."
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Foundation, Inc."
+msgid "Copyright © 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr ""
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
msgstr "Software proprietário - Projeto GNU - Free Software Foundation"
@@ -9152,6 +9171,14 @@
msgid "Latest additions"
msgstr "Ãltimas adições"
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
#
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
@@ -9181,14 +9208,14 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
-#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-#| "Foundation, Inc."
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
#. type: Content of: <title>
#, fuzzy
@@ -10178,6 +10205,16 @@
"because they pass it through Microsoft."
msgstr ""
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Foundation, Inc."
+msgid "Copyright © 2015-2021 Free Software Foundation, Inc."
+msgstr ""
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
+
#. type: Content of: <title>
#, fuzzy
#| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -10439,6 +10476,17 @@
#, fuzzy
#~| msgid ""
+#~| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~| "Foundation, Inc."
+#~ msgid ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
#~| "<small>Note: this article uses the word “free” in the sense "
#~| "of “gratis.”</small>"
#~ msgid ""
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.544
retrieving revision 1.545
diff -u -b -r1.544 -r1.545
--- ru.po 30 Dec 2020 11:59:51 -0000 1.544
+++ ru.po 4 Jan 2021 10:03:04 -0000 1.545
@@ -10698,6 +10698,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The British supermarket Tesco sold tablets which were tethered to Tesco's "
"server for reinstalling default settings. Tesco <a href=\"https://www."
"theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -10711,6 +10720,14 @@
"пÑÑаеÑÑÑÑ Ð¿ÐµÑеÑÑÑановиÑÑ Ð¸ÑÑ
однÑе
наÑÑÑойки, Ñо вмеÑÑо ÑÑого планÑÐµÑ Ð²ÑÑ
Ð¾Ð´Ð¸Ñ "
"из ÑÑÑоÑ."
+#. type: Content of: <div><p>
+# | Copyright © 2019, [-2020-] {+2020, 2021+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright © 2019, 2020 Free Software Foundation, Inc."
+msgid "Copyright © 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr "Copyright © 2019, 2020 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
msgstr ""
@@ -11010,6 +11027,14 @@
msgid "Latest additions"
msgstr "ÐоÑледние добавлениÑ"
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -11035,8 +11060,14 @@
"translations.html\">“Ð ÑководÑÑве по
пеÑеводам”</a>."
#. type: Content of: <div><p>
+# | Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, [-2020-]
+# | {+2020, 2021+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
@@ -12211,6 +12242,13 @@
"ÐонкÑеÑно, ÑпеÑÑлÑжба Ð¼Ð¾Ð¶ÐµÑ Ñаким обÑазом
ÑобиÑаÑÑ ÑлекÑÑоннÑÑ Ð¿Ð¾ÑÑÑ Ñленов "
"паÑламенÑа, поÑÐ¾Ð¼Ñ ÑÑо она пÑоÑ
Ð¾Ð´Ð¸Ñ ÑеÑез
Microsoft."
+#. type: Content of: <div><p>
+# | Copyright © 2015-202[-0-]{+1+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2015-2020 Free Software Foundation, Inc."
+msgid "Copyright © 2015-2021 Free Software Foundation, Inc."
+msgstr "Copyright © 2015-2020 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
msgstr ""
@@ -12460,6 +12498,13 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
#~ msgid ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+
+#~ msgid ""
#~ "If you already own a Vizio smart TV (or any smart TV, for that matter), "
#~ "the easiest way to make sure it isn't spying on you is to disconnect it "
#~ "from the Internet, and use a terrestrial antenna instead. Unfortunately, "
Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- tr.po 30 Dec 2020 10:33:47 -0000 1.106
+++ tr.po 4 Jan 2021 10:03:04 -0000 1.107
@@ -7815,6 +7815,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The British supermarket Tesco sold tablets which were tethered to Tesco's "
"server for reinstalling default settings. Tesco <a href=\"https://www."
"theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -7822,6 +7831,12 @@
"default settings, it bricks them instead."
msgstr ""
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright © 2019, 2020 Free Software Foundation, Inc."
+msgid "Copyright © 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr "Copyright © 2019, 2020 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
msgstr "Ãzel Mülk Yazılım - GNU Projesi - Ãzgür Yazılım Vakfı"
@@ -8120,6 +8135,14 @@
msgid "Latest additions"
msgstr "Son eklenenler"
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -8148,8 +8171,12 @@
"\">çalıÅma sayfamızı</a> ziyaret edebilirsiniz."
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
@@ -9113,6 +9140,12 @@
"because they pass it through Microsoft."
msgstr ""
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright © 2019, 2020 Free Software Foundation, Inc."
+msgid "Copyright © 2015-2021 Free Software Foundation, Inc."
+msgstr "Copyright © 2019, 2020 Free Software Foundation, Inc."
+
#. type: Content of: <title>
#, fuzzy
#| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -9350,6 +9383,13 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+#~ msgid ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+
#, fuzzy
#~| msgid ""
#~| "<small>(Note that this article misuses the word “<a href=\"/"
Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- zh-cn.po 30 Dec 2020 10:33:47 -0000 1.106
+++ zh-cn.po 4 Jan 2021 10:03:04 -0000 1.107
@@ -7613,6 +7613,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The British supermarket Tesco sold tablets which were tethered to Tesco's "
"server for reinstalling default settings. Tesco <a href=\"https://www."
"theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -7620,6 +7629,16 @@
"default settings, it bricks them instead."
msgstr ""
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
+msgid "Copyright © 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr ""
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
msgstr "ä¸æ软件 - GNU å·¥ç¨ - èªç±è½¯ä»¶åºéä¼"
@@ -7901,6 +7920,14 @@
msgid "Latest additions"
msgstr "ææ°æ·»å "
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
#
#
#
@@ -7928,8 +7955,12 @@
"a>ã"
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
@@ -8876,6 +8907,16 @@
"because they pass it through Microsoft."
msgstr ""
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
+msgid "Copyright © 2015-2021 Free Software Foundation, Inc."
+msgstr ""
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
+
#. type: Content of: <title>
#, fuzzy
#| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -9162,6 +9203,13 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html\">微软</a>"
+#~ msgid ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+
#, fuzzy
#~| msgid ""
#~| "<small>(Note that this article misuses the word “<a href=\"/"
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.253
retrieving revision 1.254
diff -u -b -r1.253 -r1.254
--- zh-tw.po 30 Dec 2020 10:33:47 -0000 1.253
+++ zh-tw.po 4 Jan 2021 10:03:04 -0000 1.254
@@ -7519,6 +7519,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The personal finance management software \"Quicken\" <a href=\"https://www."
+"quicken.com/support/quicken-discontinuation-policy\">has a discontinuation "
+"policy aka planned obsolescence</a> which is an injustice to users. A free "
+"(as in freedom) program would let users' to control the software but when "
+"you use a proprietary software, you won't be in control."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The British supermarket Tesco sold tablets which were tethered to Tesco's "
"server for reinstalling default settings. Tesco <a href=\"https://www."
"theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix\"> "
@@ -7526,6 +7535,18 @@
"default settings, it bricks them instead."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © [-2013, 2014, 2015, 2016, 2017, 2018-] {+2019, 2020,
+# | 2021+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Foundation, Inc."
+msgid "Copyright © 2019, 2020, 2021 Free Software Foundation, Inc."
+msgstr ""
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
msgstr "å°æè»é« - GNU å°æ¡ - èªç±è»é«åºéæ"
@@ -7949,6 +7970,14 @@
msgid "Latest additions"
msgstr ""
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While the world is still struggling with COVID-19 coronavirus, many <a href="
+"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
+"are in danger of surveillance</a> and their computers are infected with "
+"malware as a result of installing proprietary software."
+msgstr ""
+
#
#
#
@@ -7976,18 +8005,18 @@
"README</a> ä¾ç解å調åæ交æåç網é ç¿»è¯ç¸éäºå®ã"
#. type: Content of: <div><p>
-# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
+# | Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, [-2020-]
+# | {+2020, 2021+} Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
-#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-#| "Foundation, Inc."
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#| "Software Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021 Free "
"Software Foundation, Inc."
msgstr ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-"Foundation, Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
#. type: Content of: <title>
# | Proprietary [-Software-] {+Sabotage+} - GNU Project - Free Software
@@ -8935,6 +8964,18 @@
"because they pass it through Microsoft."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © [-2013, 2014, 2015, 2016, 2017, 2018-] {+2015-2021+} Free
+# | Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Foundation, Inc."
+msgid "Copyright © 2015-2021 Free Software Foundation, Inc."
+msgstr ""
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
+
#. type: Content of: <title>
# | Proprietary [-Software-] {+Tethers+} - GNU Project - Free Software
# | Foundation
@@ -9302,6 +9343,17 @@
#, fuzzy
#~| msgid ""
+#~| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~| "Foundation, Inc."
+#~ msgid ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+#~ "Software Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~ "Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
#~| "As of April, 2017, the files in this directory list around 300 instances "
#~| "of malicious functionalities, but there are surely thousands more we "
#~| "don't know about."
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2021/01/04
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2021/01/04
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2021/01/04
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2021/01/05
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2021/01/06
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2021/01/06
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2021/01/07
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2021/01/08
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2021/01/12
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2021/01/12