[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Mon, 22 Feb 2021 05:32:00 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 21/02/22 05:31:59
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.tr.po
proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.285&r2=1.286
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.405&r2=1.406
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.503&r2=1.504
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.285&r2=1.286
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.293&r2=1.294
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.286&r2=1.287
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.285&r2=1.286
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.284&r2=1.285
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.378&r2=1.379
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.157&r2=1.158
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.607&r2=1.608
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.233&r2=1.234
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.390&r2=1.391
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.251&r2=1.252
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.372&r2=1.373
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.311&r2=1.312
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.689&r2=1.690
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.227&r2=1.228
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.263&r2=1.264
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.399&r2=1.400
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.445&r2=1.446
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.239&r2=1.240
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.272&r2=1.273
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.244&r2=1.245
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.256&r2=1.257
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.240&r2=1.241
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.246&r2=1.247
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.257&r2=1.258
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.239&r2=1.240
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.236&r2=1.237
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.388&r2=1.389
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.470&r2=1.471
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.220&r2=1.221
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.226&r2=1.227
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.356&r2=1.357
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.603&r2=1.604
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.285&r2=1.286
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.285
retrieving revision 1.286
diff -u -b -r1.285 -r1.286
--- de.po 6 Feb 2021 14:33:04 -0000 1.285
+++ de.po 22 Feb 2021 10:31:53 -0000 1.286
@@ -12804,18 +12804,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
msgstr ""
#. TRANSLATORS: Ignore the original text in this paragraph,
@@ -13619,6 +13621,22 @@
"\">#SpywareInTelephones</a>)</span>"
msgstr " "
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+
#. type: Content of: <div><div><div><h4>
msgid "iThings"
msgstr ""
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.405
retrieving revision 1.406
diff -u -b -r1.405 -r1.406
--- es.po 7 Feb 2021 10:59:45 -0000 1.405
+++ es.po 22 Feb 2021 10:31:53 -0000 1.406
@@ -13256,52 +13256,22 @@
msgstr "Añadidos recientes"
#. type: Content of: <div><ul><li><p>
-# | As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a
-# |
href=\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/\">forcing
-# | its users to [-share-] {+hand over+} sensitive personal data</a> [-with-]
-# | {+to+} its parent company. This increases Facebook's power over users, and
-# | further jeopardizes people's privacy and security.
-#, fuzzy
-#| msgid ""
-#| "As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href="
-#| "\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-"
-#| "share-your-data-with-facebook-or-well-deactivate-your-account/\">forcing "
-#| "its users to share sensitive personal data</a> with its parent company. "
-#| "This increases Facebook's power over users, and further jeopardizes "
-#| "people's privacy and security."
msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
msgstr ""
-"Desde 2021, WhatsApp (una de las filiales de Facebook) está <a href="
-"\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-"
-"share-your-data-with-facebook-or-well-deactivate-your-account/\">obligando a "
-"sus usuarios a proporcionar datos personales sensibles</a> con su empresa "
-"matriz. Esto aumenta el poder de Facebook sobre sus usuarios, comprometiendo "
-"aún más la privacidad y seguridad la gente."
#. type: Content of: <div><ul><li><p>
-# | [-People-]{+Instead of WhatsApp you+} can [-play-] {+use+} <a
-# | [-href=\"https://directory.fsf.org/wiki/Minetest\">Minetest</a> instead.
-# | Minetest-] {+href=\"https://directory.fsf.org/wiki/Jami\">GNU Jami</a>,
-# | which+} is free software and [-respects the user's computer freedom.-]
-# | {+will not collect your data.+}
-#, fuzzy
-#| msgid ""
-#| "People can play <a href=\"https://directory.fsf.org/wiki/Minetest"
-#| "\">Minetest</a> instead. Minetest is free software and respects the "
-#| "user's computer freedom."
msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
msgstr ""
-"Se puede jugar a <a href=\"https://directory.fsf.org/wiki/Minetest"
-"\">Minetest</a> en su lugar. Minetest es software libre y respeta la "
-"libertad computacional del usuario."
#
#. TRANSLATORS: Ignore the original text in this paragraph,
@@ -14078,6 +14048,54 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInTelephones"
"\">#SpywareInTelephones</a>)</span>"
+#. type: Content of: <div><div><ul><li><p>
+# | As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a
+# |
href=\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/\">forcing
+# | its users to [-share-] {+hand over+} sensitive personal data</a> [-with-]
+# | {+to+} its parent company. This increases Facebook's power over users, and
+# | further jeopardizes people's privacy and security.
+#, fuzzy
+#| msgid ""
+#| "As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href="
+#| "\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-"
+#| "share-your-data-with-facebook-or-well-deactivate-your-account/\">forcing "
+#| "its users to share sensitive personal data</a> with its parent company. "
+#| "This increases Facebook's power over users, and further jeopardizes "
+#| "people's privacy and security."
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+"Desde 2021, WhatsApp (una de las filiales de Facebook) está <a href="
+"\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-"
+"share-your-data-with-facebook-or-well-deactivate-your-account/\">obligando a "
+"sus usuarios a proporcionar datos personales sensibles</a> con su empresa "
+"matriz. Esto aumenta el poder de Facebook sobre sus usuarios, comprometiendo "
+"aún más la privacidad y seguridad la gente."
+
+#. type: Content of: <div><div><ul><li><p>
+# | [-People-]{+Instead of WhatsApp you+} can [-play-] {+use+} <a
+# | [-href=\"https://directory.fsf.org/wiki/Minetest\">Minetest</a> instead.
+# | Minetest-] {+href=\"https://directory.fsf.org/wiki/Jami\">GNU Jami</a>,
+# | which+} is free software and [-respects the user's computer freedom.-]
+# | {+will not collect your data.+}
+#, fuzzy
+#| msgid ""
+#| "People can play <a href=\"https://directory.fsf.org/wiki/Minetest"
+#| "\">Minetest</a> instead. Minetest is free software and respects the "
+#| "user's computer freedom."
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+"Se puede jugar a <a href=\"https://directory.fsf.org/wiki/Minetest"
+"\">Minetest</a> en su lugar. Minetest es software libre y respeta la "
+"libertad computacional del usuario."
+
#. type: Content of: <div><div><div><h4>
msgid "iThings"
msgstr "iCosas"
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.503
retrieving revision 1.504
diff -u -b -r1.503 -r1.504
--- fr.po 6 Feb 2021 16:22:45 -0000 1.503
+++ fr.po 22 Feb 2021 10:31:54 -0000 1.504
@@ -11314,28 +11314,21 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
msgstr ""
-"Ã compter de 2021, WhatsApp (l'une des filiales de Facebook) <a href="
-"\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-"
-"share-your-data-with-facebook-or-well-deactivate-your-account/\">force ses "
-"utilisateurs à communiquer des données personnelles sensibles</a> à la "
-"maison-mère. Ceci accroît le pouvoir de Facebook sur les utilisateurs et "
-"compromet un peu plus leur vie privée et leur sécurité."
#. type: Content of: <div><ul><li><p>
msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
msgstr ""
-"Ã la place de WhatsApp, vous pouvez utiliser <a
href=\"https://directory.fsf."
-"org/wiki/Jami\">GNU Jami</a>, qui est un logiciel libre et respecte les "
-"libertés numériques de l'utilisateur."
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
@@ -11963,6 +11956,31 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInTelephones"
"\">#SpywareInTelephones</a>)</span>"
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+"Ã compter de 2021, WhatsApp (l'une des filiales de Facebook) <a href="
+"\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-"
+"share-your-data-with-facebook-or-well-deactivate-your-account/\">force ses "
+"utilisateurs à communiquer des données personnelles sensibles</a> à la "
+"maison-mère. Ceci accroît le pouvoir de Facebook sur les utilisateurs et "
+"compromet un peu plus leur vie privée et leur sécurité."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+"Ã la place de WhatsApp, vous pouvez utiliser <a
href=\"https://directory.fsf."
+"org/wiki/Jami\">GNU Jami</a>, qui est un logiciel libre et respecte les "
+"libertés numériques de l'utilisateur."
+
#. type: Content of: <div><div><div><h4>
msgid "iThings"
msgstr "iTrucs"
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.285
retrieving revision 1.286
diff -u -b -r1.285 -r1.286
--- it.po 6 Feb 2021 14:33:04 -0000 1.285
+++ it.po 22 Feb 2021 10:31:56 -0000 1.286
@@ -11927,18 +11927,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
msgstr ""
#. TRANSLATORS: Ignore the original text in this paragraph,
@@ -12707,6 +12709,22 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInTelephones"
"\">#SpywareInTelephones</a>)</span>"
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+
#. type: Content of: <div><div><div><h4>
msgid "iThings"
msgstr ""
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.293
retrieving revision 1.294
diff -u -b -r1.293 -r1.294
--- ja.po 6 Feb 2021 14:33:04 -0000 1.293
+++ ja.po 22 Feb 2021 10:31:56 -0000 1.294
@@ -9402,18 +9402,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
msgstr ""
#. TRANSLATORS: Ignore the original text in this paragraph,
@@ -10048,6 +10050,22 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInTelephones"
"\">#SpywareInTelephones</a>)</span>"
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+
#. type: Content of: <div><div><div><h4>
#, fuzzy
#| msgid "Spyware in iThings"
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.286
retrieving revision 1.287
diff -u -b -r1.286 -r1.287
--- nl.po 6 Feb 2021 14:33:05 -0000 1.286
+++ nl.po 22 Feb 2021 10:31:56 -0000 1.287
@@ -8721,18 +8721,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
msgstr ""
#. TRANSLATORS: Ignore the original text in this paragraph,
@@ -9326,6 +9328,22 @@
"\">#SpywareInTelephones</a>)</span>"
msgstr ""
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+
#. type: Content of: <div><div><div><h4>
msgid "iThings"
msgstr ""
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.285
retrieving revision 1.286
diff -u -b -r1.285 -r1.286
--- pl.po 6 Feb 2021 14:33:05 -0000 1.285
+++ pl.po 22 Feb 2021 10:31:57 -0000 1.286
@@ -8221,18 +8221,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
msgstr ""
#. TRANSLATORS: Ignore the original text in this paragraph,
@@ -8809,6 +8811,22 @@
"\">#SpywareInTelephones</a>)</span>"
msgstr ""
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+
#. type: Content of: <div><div><div><h4>
msgid "iThings"
msgstr ""
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.284
retrieving revision 1.285
diff -u -b -r1.284 -r1.285
--- pot 6 Feb 2021 14:33:05 -0000 1.284
+++ pot 22 Feb 2021 10:31:57 -0000 1.285
@@ -7526,18 +7526,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
msgstr ""
#
@@ -8027,6 +8029,22 @@
"\">#SpywareInTelephones</a>)</span>"
msgstr ""
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+
#. type: Content of: <div><div><div><h4>
msgid "iThings"
msgstr ""
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- proprietary-surveillance.de-diff.html 6 Feb 2021 16:03:04 -0000
1.167
+++ proprietary-surveillance.de-diff.html 22 Feb 2021 10:31:57 -0000
1.168
@@ -1707,12 +1707,12 @@
<p>Google could demand the source code for these apps, and study
the source code somehow to determine whether they mistreat users in
- various ways. If it did a good job of this, it could more or less
+ various ways. If it did a good job of <span
class="removed"><del><strong>this,</strong></del></span> <span
class="inserted"><ins><em>this, it could more or less
prevent such snooping, except when the app developers are clever
enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We must <span class="removed"><del><strong>demand
release</strong></del></span> <span class="inserted"><ins><em>demand release of
source code to the
+ Google to protect us. We must demand release of source code to the
public, so we can depend on each other.</p>
</li>
@@ -1776,15 +1776,20 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
pre-install
+ announced an opt-in proprietary search app that</em></ins></span> it <span
class="removed"><del><strong>could more or less
+ prevent such snooping, except</strong></del></span> <span
class="inserted"><ins><em>will</a> pre-install
on some of its phones. The app will give Verizon the same information
- about the users' searches that Google normally gets when they use
+ about the users' searches that Google normally gets</em></ins></span> when
<span class="inserted"><ins><em>they use
its search engine.</p>
- <p>Currently, the app is <a
+ <p>Currently,</em></ins></span> the app <span
class="removed"><del><strong>developers are clever
+ enough to outsmart</strong></del></span> <span
class="inserted"><ins><em>is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and the user must
- explicitly opt-in before the app takes effect. However, the app
+ being pre-installed on only one phone</a>, and</em></ins></span> the
<span class="removed"><del><strong>checking.</p>
+
+ <p>But since Google itself develops malicious apps, we cannot trust
+ Google to protect us. We</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> must <span
class="removed"><del><strong>demand release</strong></del></span>
+ <span class="inserted"><ins><em>explicitly opt-in before the app takes
effect. However, the app
remains spyware—an “optional” piece</em></ins></span> of
<span class="removed"><del><strong>source code</strong></del></span> <span
class="inserted"><ins><em>spyware is
still spyware.</p>
</li>
@@ -1858,55 +1863,18 @@
<dt>WiFi Protector VPN</dt>
<dd>Injects JavaScript code into HTML pages, and also uses roughly
<span class="removed"><del><strong>5</strong></del></span>
<span class="inserted"><ins><em>five</em></ins></span> tracking
libraries. Developers of this app have confirmed that
- the non-premium version of <span class="removed"><del><strong>the app
does
- JavaScript injection for tracking and display ads.</dd>
+ the non-premium version of the app does JavaScript injection for
+ tracking <span class="inserted"><ins><em>the user</em></ins></span> and
<span class="removed"><del><strong>display</strong></del></span> <span
class="inserted"><ins><em>displaying</em></ins></span> ads.</dd>
</dl>
-</li>
-<li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of the top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries. For
- the paid proprietary apps, it was only 60%.</p>
-
- <p>The article confusingly describes gratis apps as “free”,
- but most of them are not in fact
- <a href="/philosophy/free-sw.html">free software</a>.
- It also uses the ugly word “monetize”. A good replacement
- for that word is “exploit”; nearly always that will fit
- perfectly.</p>
-</li>
-
-<li>
- <p>Apps for BART
- <a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With proprietary apps, one can only hope that they don't.</p>
-</li>
-
-<li>
- <p>A study found 234 Android apps that track users by
- <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
programs</a>.
- </p>
-
-</li>
-
-<li>
- <p>Pairs of Android apps can collude to transmit users' personal
- data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that
collude</a>.</p></strong></del></span> <span
class="inserted"><ins><em>the app does JavaScript injection for
- tracking the user and displaying ads.</dd>
- </dl></em></ins></span>
</li>
-
<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends</strong></del></span>
+ <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study</strong></del></span>
<span class="inserted"><ins><em><li id="M201609210">
<!--#set var="DATE" value='<small
class="date-tag">2016-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google's new voice messaging</em></ins></span> app <span
class="removed"><del><strong>developers</strong></del></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ <p>Google's new voice messaging app <a
+
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
all conversations</a>.</p>
</li>
@@ -1916,113 +1884,148 @@
<p>Facebook's new Magic Photo app <a
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections for known faces</a>,
- and suggests you circulate</em></ins></span> the <span
class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>picture you take
according to who is
- in</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
-
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>frame.</p>
+ and suggests you circulate the picture you take according to who
is</em></ins></span>
+ in <span class="removed"><del><strong>2015</a> found that 90%
of</strong></del></span> the <span class="removed"><del><strong>top-ranked
gratis
+ proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span> <span class="inserted"><ins><em>frame.</p>
<p>This spyware feature seems to require online access to some
- known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>“consent” of users is not
enough</strong></del></span> <span class="inserted"><ins><em>pictures are
likely</em></ins></span> to <span class="removed"><del><strong>legitimize
actions like this. At this point, most users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>be
- sent across</em></ins></span> the <span
class="removed"><del><strong>“Terms</strong></del></span> <span
class="inserted"><ins><em>wire to Facebook's servers</em></ins></span> and
<span class="removed"><del><strong>Conditions” that spell out
-what they</strong></del></span> <span
class="inserted"><ins><em>face-recognition
+ known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>paid proprietary apps, it was only 60%.</p>
+
+ <p>The article confusingly describes gratis apps as “free”,
+ but most</strong></del></span> <span class="inserted"><ins><em>pictures are
likely to be
+ sent across the wire to Facebook's servers and face-recognition
algorithms.</p>
- <p>If so, none of Facebook users' pictures</em></ins></span> are
<span class="removed"><del><strong>“consenting” to. Google should
clearly
-and honestly identify</strong></del></span> <span
class="inserted"><ins><em>private anymore,
- even if</em></ins></span> the <span
class="removed"><del><strong>information</strong></del></span> <span
class="inserted"><ins><em>user didn't “upload” them to the
service.</p>
+ <p>If so, none</em></ins></span> of <span
class="removed"><del><strong>them</strong></del></span> <span
class="inserted"><ins><em>Facebook users' pictures</em></ins></span> are <span
class="removed"><del><strong>not in fact
+ <a href="/philosophy/free-sw.html">free software</a>.
+ It also uses</strong></del></span> <span class="inserted"><ins><em>private
anymore,
+ even if</em></ins></span> the <span class="removed"><del><strong>ugly word
“monetize”. A good replacement
+ for that word is “exploit”; nearly always that will fit
+ perfectly.</p></strong></del></span> <span
class="inserted"><ins><em>user didn't “upload” them to the
service.</p></em></ins></span>
</li>
- <li id="M201605310">
+<span class="removed"><del><strong><li>
+ <p>Apps for BART</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201605310">
<!--#set var="DATE" value='<small
class="date-tag">2016-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Facebook's app listens all the time, <a
-
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html">to
- snoop on what people are listening to or watching</a>. In
addition,</em></ins></span>
- it <span class="removed"><del><strong>collects</strong></del></span> <span
class="inserted"><ins><em>may be analyzing people's conversations to serve them
with targeted
- advertisements.</p>
+ <p>Facebook's app listens all the time,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html">to
+ snoop</em></ins></span> on <span
class="removed"><del><strong>users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With proprietary apps, one can only hope that they don't.</p>
+</li>
+
+<li>
+ <p>A study found 234 Android apps that track users by
+ <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
<span class="inserted"><ins><em>what people are listening</em></ins></span> to
<span class="removed"><del><strong>ultrasound from beacons placed in
stores</strong></del></span> or <span class="removed"><del><strong>played by TV
programs</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>watching</a>. In addition,
+ it may be analyzing people's conversations to serve them with targeted
+ advertisements.</p></em></ins></span>
</li>
- <li id="M201604250">
+<span class="removed"><del><strong><li>
+ <p>Pairs of Android apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201604250">
<!--#set var="DATE" value='<small
class="date-tag">2016-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A pregnancy test controller application not only can <a
-
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy</em></ins></span> on <span class="removed"><del><strong>users,
instead</strong></del></span> <span class="inserted"><ins><em>many
sorts</em></ins></span> of <span class="removed"><del><strong>hiding
it</strong></del></span> <span class="inserted"><ins><em>data</em></ins></span>
in <span class="removed"><del><strong>an obscurely worded EULA.</p>
+ <p>A pregnancy test controller application not
only</em></ins></span> can <span class="removed"><del><strong>collude to
transmit users' personal
+ data to servers.</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ spy on many sorts</em></ins></span> of <span
class="removed"><del><strong>pairs that collude</a>.</p>
+</li>
-<p>However, to truly protect people's privacy, we must prevent
Google</strong></del></span> <span class="inserted"><ins><em>the
phone,</em></ins></span> and <span class="removed"><del><strong>other companies
from getting this personal information</strong></del></span> in <span
class="removed"><del><strong>the first
-place!</p></strong></del></span> <span class="inserted"><ins><em>server
accounts,
+<li>
+<p>Google Play intentionally sends app developers <a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span class="inserted"><ins><em>data in</em></ins></span> the <span
class="removed"><del><strong>personal details of users</strong></del></span>
<span class="inserted"><ins><em>phone, and in server accounts,
it can alter them too</a>.</p>
</li>
<li id="M201601130">
<!--#set var="DATE" value='<small
class="date-tag">2016-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apps that include <a
+ <p>Apps</em></ins></span> that <span
class="removed"><del><strong>install the app</a>.</p>
+
+<p>Merely asking the “consent” of</strong></del></span>
<span class="inserted"><ins><em>include <a
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also on what users post on various sites
- such as Facebook, Google+ and Twitter.</p></em></ins></span>
+ are playing nearby</a>. Also on what</em></ins></span> users <span
class="removed"><del><strong>is not enough</strong></del></span> <span
class="inserted"><ins><em>post on various sites
+ such as Facebook, Google+ and Twitter.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Google Play (a component of Android)</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511190">
+ <li id="M201511190">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>“Cryptic communication,”
- unrelated to the app's functionality, was</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</strong></del></span>
- <span
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in</em></ins></span> the <span class="removed"><del><strong>users'
movements without their permission</a>.</p>
-
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>500 most popular gratis Android
apps</a>.</p>
-
- <p>The article should not have described these apps as
- “free”—they are not free software. The clear
way</em></ins></span>
- to <span class="removed"><del><strong>completely
stop</strong></del></span> <span class="inserted"><ins><em>say “zero
price” is “gratis.”</p>
-
- <p>The article takes for granted that</em></ins></span> the <span
class="removed"><del><strong>tracking. This</strong></del></span> <span
class="inserted"><ins><em>usual analytics tools are
- legitimate, but</em></ins></span> is
- <span class="removed"><del><strong>yet another example of nonfree software
pretending</strong></del></span> <span class="inserted"><ins><em>that valid?
Software developers have no right</em></ins></span> to <span
class="removed"><del><strong>obey the user,
- when it's actually</strong></del></span>
- <span class="inserted"><ins><em>analyze what users are</em></ins></span>
doing <span class="removed"><del><strong>something else. Such a thing would be
almost
- unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>or how. “Analytics” tools
- that snoop are just as wrong as any other
snooping.</p></em></ins></span>
+ unrelated</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this
point,</strong></del></span> <span class="inserted"><ins><em>the app's
functionality, was <a
+
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in the 500</em></ins></span> most <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>popular gratis Android apps</a>.</p>
+
+ <p>The article should not</em></ins></span> have
+<span class="removed"><del><strong>stopped reading</strong></del></span> <span
class="inserted"><ins><em>described these apps as
+ “free”—they are not free software. The clear way
+ to say “zero price” is “gratis.”</p>
+
+ <p>The article takes for granted that</em></ins></span> the <span
class="removed"><del><strong>“Terms and
Conditions”</strong></del></span> <span class="inserted"><ins><em>usual
analytics tools are
+ legitimate, but is</em></ins></span> that <span
class="removed"><del><strong>spell out</strong></del></span> <span
class="inserted"><ins><em>valid? Software developers have no right to
+ analyze</em></ins></span> what <span
class="removed"><del><strong>they</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> are <span
class="removed"><del><strong>“consenting” to. Google should clearly
+and honestly identify the information it collects on users, instead
+of hiding it in an obscurely worded EULA.</p>
+
+<p>However, to truly protect people's privacy, we must prevent Google
+and</strong></del></span> <span class="inserted"><ins><em>doing or how.
“Analytics” tools
+ that snoop are just as wrong as any</em></ins></span> other <span
class="removed"><del><strong>companies from getting this personal information
in the first
+place!</p></strong></del></span> <span
class="inserted"><ins><em>snooping.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>More</strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>Google Play (a component</strong></del></span>
<span class="inserted"><ins><em><li id="M201510300">
<!--#set var="DATE" value='<small
class="date-tag">2015-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>More</em></ins></span> than 73% <span
class="inserted"><ins><em>and 47%</em></ins></span> of <span
class="removed"><del><strong>the most popular</strong></del></span> <span
class="inserted"><ins><em>mobile applications, for</em></ins></span> Android
<span class="removed"><del><strong>apps</strong></del></span> <span
class="inserted"><ins><em>and iOS
- respectively</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share</strong></del></span>
<span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">hand
over</em></ins></span>
- personal, behavioral and location information</a> of their users
<span class="removed"><del><strong>with</strong></del></span> <span
class="inserted"><ins><em>to</em></ins></span>
- third parties.</p>
- </li>
+ <p>More than 73% and 47%</em></ins></span> of <span
class="removed"><del><strong>Android)</strong></del></span> <span
class="inserted"><ins><em>mobile applications, for Android and iOS
+ respectively</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks the users' movements without their permission</a>.</p>
- <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated</strong></del></span>
+ <p>Even if you disable Google Maps</strong></del></span> <span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">hand
over
+ personal, behavioral</em></ins></span> and location <span
class="removed"><del><strong>tracking, you must
+ disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>information</a> of their
users</em></ins></span> to <span class="removed"><del><strong>completely stop
the tracking. This</strong></del></span>
+ <span class="inserted"><ins><em>third parties.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201508210">
+ <li id="M201508210">
<!--#set var="DATE" value='<small
class="date-tag">2015-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Like most “music screaming” disservices, Spotify is
- based on proprietary malware (DRM and snooping). In August 2015 it <a
+ <p>Like most “music screaming” disservices,
Spotify</em></ins></span> is
+ <span class="removed"><del><strong>yet another example of nonfree software
pretending</strong></del></span>
+ <span class="inserted"><ins><em>based on proprietary malware (DRM and
snooping). In August 2015 it <a
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some are
starting</em></ins></span>
- to <span class="inserted"><ins><em>realize that it is nasty.</p>
+ demanded users submit</em></ins></span> to <span
class="removed"><del><strong>obey</strong></del></span> <span
class="inserted"><ins><em>increased snooping</a>, and some are starting
+ to realize that it is nasty.</p>
- <p>This article shows</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
- was</strong></del></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ <p>This article shows</em></ins></span> the <span
class="removed"><del><strong>user,
+ when it's actually doing something else. Such</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
twisted ways that they present snooping as a way to “serve”
- users better</a>—never mind whether they want that. This is a
- typical example of the attitude of the proprietary software industry
+ users better</a>—never mind whether they want that. This
is</em></ins></span> a <span class="removed"><del><strong>thing would be almost
+ unthinkable with free software.</p>
+
+ </li>
+
+ <li><p>More than 73%</strong></del></span>
+ <span class="inserted"><ins><em>typical example</em></ins></span> of the
<span class="removed"><del><strong>most popular Android apps
+ <a href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a></strong></del></span> <span
class="inserted"><ins><em>attitude</em></ins></span> of <span
class="removed"><del><strong>their users with third parties.</p>
+ </li>
+
+ <li><p>“Cryptic communication,” unrelated
to</strong></del></span> the <span class="removed"><del><strong>app's
functionality,
+ was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found</strong></del></span> <span class="inserted"><ins><em>proprietary
software industry
towards those they have subjugated.</p>
<p>Out, out, damned Spotify!</p>
@@ -2046,123 +2049,126 @@
href="/philosophy/free-sw.html">free software</a>. It also uses
the
ugly word “monetize”. A good replacement</em></ins></span> for
<span class="removed"><del><strong>granted</strong></del></span> that <span
class="removed"><del><strong>the usual analytics tools are
legitimate, but</strong></del></span> <span
class="inserted"><ins><em>word</em></ins></span>
- is <span class="inserted"><ins><em>“exploit”; nearly
always</em></ins></span> that <span class="removed"><del><strong>valid?
Software developers have no right to
- analyze what users are doing or how. “Analytics” tools that
snoop are
- just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>will fit perfectly.</p></em></ins></span>
+ is <span class="inserted"><ins><em>“exploit”; nearly
always</em></ins></span> that <span class="removed"><del><strong>valid?
Software developers have no right</strong></del></span> <span
class="inserted"><ins><em>will fit perfectly.</p>
</li>
- <span
class="removed"><del><strong><li><p>Gratis</strong></del></span>
- <span class="inserted"><ins><em><li id="M201505060">
+ <li id="M201505060">
<!--#set var="DATE" value='<small
class="date-tag">2015-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Gratis</em></ins></span> Android apps (but not <a
- href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
+ <p>Gratis Android apps (but not <a
+ href="/philosophy/free-sw.html">free software</a>)
connect</em></ins></span> to
+ <span class="removed"><del><strong>analyze what users are doing or how.
“Analytics” tools that</strong></del></span> <span
class="inserted"><ins><em>100 <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs, on the average.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware is present in
some Android devices when they are sold.
+
+ <li id="M201504060">
+ <!--#set var="DATE" value='<small
class="date-tag">2015-04</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Widely used <a
+
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps</em></ins></span> snoop <span
class="removed"><del><strong>are
+ just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>on the user</a>. This is in addition to
+ the snooping done by the phone company, and perhaps by the OS in
+ the phone.</p>
+
+ <p>Don't be distracted by the question of whether the app developers
+ get users to say “I agree”. That is no excuse for
+ malware.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li><p>Gratis
Android</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201411260">
+ <!--#set var="DATE" value='<small
class="date-tag">2014-11</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Many proprietary apps for mobile devices
+ report which other</em></ins></span> apps <span
class="removed"><del><strong>(but not <a
href="/philosophy/free-sw.html">free software</a>)
+ connect to 100</strong></del></span> <span class="inserted"><ins><em>the
user has installed.</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way that at least is visible</em></ins></span> and
<span class="removed"><del><strong>advertising</a> URLs,
+ on</strong></del></span> <span
class="inserted"><ins><em>optional</a>. Not
+ as bad as what</em></ins></span> the <span
class="removed"><del><strong>average.</p></strong></del></span> <span
class="inserted"><ins><em>others do.</p></em></ins></span>
+ </li>
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201401150.1">
+ <!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The Simeji keyboard</em></ins></span> is <span
class="removed"><del><strong>present in some Android devices when they are sold.
Some Motorola phones modify Android to
<a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
send personal data to Motorola</a>.</p>
</li>
- <li><p>Some manufacturers add a</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201504060">
- <!--#set var="DATE" value='<small
class="date-tag">2015-04</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Widely used</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ <li><p>Some manufacturers add</strong></del></span> a <span
class="inserted"><ins><em>smartphone version of Baidu's</em></ins></span> <a
<span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
hidden general surveillance package such as Carrier
IQ.</a></p>
</li>
<li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any
file</strong></del></span>
- <span
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop</em></ins></span> on the <span
class="removed"><del><strong>system.</p>
+ Samsung's back door</a> provides access to any file on the
system.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
+ title="Input Method
Editor">IME</abbr></a>.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
-<!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+<!-- #SpywareOnMobiles</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312270">
+ <!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>The nonfree Snapchat app's
principal purpose is</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+ <h3 id="SpywareOnMobiles">Spyware</strong></del></span> <span
class="inserted"><ins><em>restrict the
+ use of data</em></ins></span> on <span
class="removed"><del><strong>Mobiles</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
</div>
<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareIniThings">Spyware</strong></del></span> <span
class="inserted"><ins><em>user</a>. This is</em></ins></span> in <span
class="removed"><del><strong>iThings</h4>
+ <h4 id="SpywareIniThings">Spyware in iThings</h4>
<span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
</div>
<ul>
- <li><p>The DMCA</strong></del></span> <span
class="inserted"><ins><em>addition to
- the snooping done by the phone company,</em></ins></span> and <span
class="inserted"><ins><em>perhaps by</em></ins></span> the <span
class="removed"><del><strong>EU Copyright Directive make it <a
-href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr...apps spy on users</a>, because this
- would require circumventing</strong></del></span> <span
class="inserted"><ins><em>OS in</em></ins></span>
- the <span class="removed"><del><strong>iOS
DRM.</p></strong></del></span> <span
class="inserted"><ins><em>phone.</p>
-
- <p>Don't be distracted by the question of whether the app developers
- get users to say “I agree”. That is no excuse for
- malware.</p></em></ins></span>
+ <li><p>The DMCA and</strong></del></span> the <span
class="removed"><del><strong>EU Copyright Directive make</strong></del></span>
<span class="inserted"><ins><em>user's computer, but</em></ins></span> it <span
class="inserted"><ins><em>does surveillance too:</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries</em></ins></span> to <span class="removed"><del><strong>study how
iOS cr...apps spy on users</a>, because this
+ would require circumventing</strong></del></span> <span
class="inserted"><ins><em>get</em></ins></span> the <span
class="removed"><del><strong>iOS DRM.</p></strong></del></span> <span
class="inserted"><ins><em>user's list of other people's phone
+ numbers</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>In the latest iThings
system, “turning off” WiFi and Bluetooth</strong></del></span>
+ <span class="removed"><del><strong><li><p>In the latest iThings
system, “turning off” WiFi and Bluetooth the
+ obvious way</strong></del></span>
- <span class="inserted"><ins><em><li id="M201411260">
- <!--#set var="DATE" value='<small
class="date-tag">2014-11</small>'
+ <span class="inserted"><ins><em><li id="M201312060">
+ <!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many proprietary apps for mobile devices
- report which other apps</em></ins></span> the
- <span class="removed"><del><strong>obvious way</strong></del></span>
<span class="inserted"><ins><em>user has installed.</em></ins></span> <a
+ <p>The Brightest Flashlight app</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>.
- A more advanced</strong></del></span>
- <span
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a</em></ins></span> way <span
class="removed"><del><strong>really does turn them off—only until 5am.
- That's Apple for you—“We know you want to be spied
on”.</p></strong></del></span> <span class="inserted"><ins><em>that
at least is visible and optional</a>. Not
- as bad as what the others do.</p></em></ins></span>
+ A more advanced way really does turn them off—only until 5am.
+ That's Apple</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation,</em></ins></span> for <span
class="removed"><del><strong>you—“We know you want to be spied
on”.</p>
</li>
- <span class="removed"><del><strong><li><p>Apple
proposes</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201401150.1">
- <!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The Simeji keyboard is a smartphone version of
Baidu's</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
- title="Input Method Editor">IME</abbr></a>.</p>
- </li>
+ <li><p>Apple proposes
+ <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way to</strong></del></span> use <span
class="removed"><del><strong>it without having your fingerprints
+ taken. Users would have no way to tell whether</strong></del></span>
<span class="inserted"><ins><em>by companies</a>.</p>
- <li id="M201312270">
- <!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The nonfree Snapchat app's principal purpose is</em></ins></span>
to <span class="inserted"><ins><em>restrict the</em></ins></span>
- use <span class="inserted"><ins><em>of data on the user's computer,
but</em></ins></span> it <span class="removed"><del><strong>without having your
fingerprints
- taken. Users would have no way</strong></del></span> <span
class="inserted"><ins><em>does surveillance too: <a
-
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries</em></ins></span> to <span class="removed"><del><strong>tell
whether</strong></del></span> <span
class="inserted"><ins><em>get</em></ins></span> the <span
class="inserted"><ins><em>user's list of other people's</em></ins></span> phone
<span class="removed"><del><strong>is snooping on
+ <p>The FTC criticized this app because it asked</em></ins></span>
the <span class="removed"><del><strong>phone is snooping on
them.</p></li>
- <li><p>iPhones</strong></del></span>
- <span class="inserted"><ins><em>numbers</a>.</p>
- </li>
-
- <li id="M201312060">
- <!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The Brightest Flashlight app</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots of</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies</a>.</p>
-
- <p>The FTC criticized this app because it asked the user to
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots of</strong></del></span> <span class="inserted"><ins><em>user to
approve sending</em></ins></span> personal data to <span
class="removed"><del><strong>Apple's servers</a>. Big Brother can
get them from there.</p>
</li>
@@ -2193,7 +2199,12 @@
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>iThings automatically
upload</strong></del></span>
+ <span class="removed"><del><strong><li><p>iThings automatically
upload to Apple's servers all the photos and
+ videos they make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you take,
+ and keeps them up</strong></del></span>
<span class="inserted"><ins><em></ul>
@@ -2206,11 +2217,22 @@
<li id="M201908151">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Skype refuses</em></ins></span> to <span
class="removed"><del><strong>Apple's servers all</strong></del></span> <span
class="inserted"><ins><em>say whether it can <a
-
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
- on calls</a>.</p>
+ <p>Skype refuses</em></ins></span> to <span
class="removed"><del><strong>date on all your devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
- <p>That almost certainly means it can do so.</p>
+ <p>(From</strong></del></span> <span class="inserted"><ins><em>say
whether it can</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
+ information</a> as accessed</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop</em></ins></span>
+ on <span class="removed"><del><strong>24 Sep 2015.) The iCloud feature is
+ <a href="https://support.apple.com/en-us/HT202033">activated by the
+ startup of iOS</a>. The term
“cloud”</strong></del></span> <span
class="inserted"><ins><em>calls</a>.</p>
+
+ <p>That almost certainly</em></ins></span> means
+ <span class="removed"><del><strong>“please don't ask
where.”</p>
+
+ <p>There is a way to <a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default
so</strong></del></span> it <span class="removed"><del><strong>still counts as
a</strong></del></span> <span class="inserted"><ins><em>can do so.</p>
</li>
<li id="M201307110">
@@ -2234,54 +2256,35 @@
<li id="M202010221">
<!--#set var="DATE" value='<small
class="date-tag">2020-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft is imposing its
- surveillance on</em></ins></span> the <span
class="removed"><del><strong>photos and
- videos they make.</p>
+ <p>Microsoft is imposing its</em></ins></span>
+ surveillance <span class="removed"><del><strong>functionality.</p>
- <blockquote><p>
- iCloud Photo Library stores</strong></del></span> <span
class="inserted"><ins><em>game of Minecraft by <a
-
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring</em></ins></span>
- every <span class="removed"><del><strong>photo and video you take,
- and keeps them up</strong></del></span> <span
class="inserted"><ins><em>player</em></ins></span> to <span
class="removed"><del><strong>date</strong></del></span> <span
class="inserted"><ins><em>open an account</em></ins></span> on <span
class="inserted"><ins><em>Microsoft's network</a>. Microsoft
- has bought the game and will merge</em></ins></span> all <span
class="removed"><del><strong>your devices.
- Any edits you make are automatically updated everywhere. [...]
- </p></blockquote>
+ <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>on the game</em></ins></span> of <span
class="removed"><del><strong>this to</strong></del></span> <span
class="inserted"><ins><em>Minecraft by</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
+ every player</em></ins></span> to <span class="removed"><del><strong>get
at them, but NSA can access any of</strong></del></span> <span
class="inserted"><ins><em>open an account on Microsoft's network</a>.
Microsoft
+ has bought the game and will merge all accounts into its network,
+ which will give</em></ins></span> them <span
class="removed"><del><strong>through</strong></del></span> <span
class="inserted"><ins><em>access to people's data.</p>
- <p>(From</strong></del></span> <span
class="inserted"><ins><em>accounts into its network,
- which will give them access to people's data.</p>
+ <p>Minecraft players</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
- <p>Minecraft players</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
- information</a> as accessed on 24 Sep 2015.)</strong></del></span>
+ <li><p>Spyware in iThings:</strong></del></span>
<span
class="inserted"><ins><em>href="https://directory.fsf.org/wiki/Minetest">can
play Minetest</a>
- instead.</em></ins></span> The <span class="removed"><del><strong>iCloud
feature is
- <a href="https://support.apple.com/en-us/HT202033">activated by the
- startup</strong></del></span> <span class="inserted"><ins><em>essential
advantage</em></ins></span> of <span
class="removed"><del><strong>iOS</a>. The term “cloud” means
- “please don't ask where.”</p>
-
- <p>There</strong></del></span> <span
class="inserted"><ins><em>Minetest</em></ins></span> is <span
class="removed"><del><strong>a way to <a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by default
so</strong></del></span> <span class="inserted"><ins><em>that</em></ins></span>
it <span class="removed"><del><strong>still counts as</strong></del></span>
<span class="inserted"><ins><em>is free
- software, meaning it respects the user's computer freedom.
As</em></ins></span> a
- <span class="removed"><del><strong>surveillance functionality.</p>
-
- <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>bonus,
+ instead. The essential advantage of Minetest is that it is free
+ software, meaning it respects</em></ins></span> the <span
class="inserted"><ins><em>user's computer freedom. As a bonus,
it offers more options.</p>
</li>
<li id="M201908210">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft recorded users</em></ins></span> of <span
class="removed"><del><strong>this to</strong></del></span> <span
class="inserted"><ins><em>Xboxes and had</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
- human workers listen</em></ins></span> to <span
class="removed"><del><strong>get at them, but NSA can access any of them through
- <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware in iThings:
- the <a class="not-a-duplicate"
+ <p>Microsoft recorded users of Xboxes and had</em></ins></span>
<a <span class="removed"><del><strong>class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly
where</strong></del></span> the <span class="removed"><del><strong>iThing
is,</strong></del></span> <span
class="inserted"><ins><em>recordings</a>.</p>
+ iBeacon</a> lets stores determine exactly
where</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
+ human workers listen to</em></ins></span> the <span
class="removed"><del><strong>iThing is,</strong></del></span> <span
class="inserted"><ins><em>recordings</a>.</p>
<p>Morally, we see no difference between having human workers
listen</em></ins></span> and <span class="removed"><del><strong>get other info
too.</p></strong></del></span>
<span class="inserted"><ins><em>having speech-recognition systems listen.
Both intrude on privacy.</p></em></ins></span>
@@ -2292,52 +2295,60 @@
<span class="inserted"><ins><em><li id="M201806240">
<!--#set var="DATE" value='<small
class="date-tag">2018-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Red Shell</em></ins></span> is <span
class="removed"><del><strong>also</strong></del></span> a <span
class="removed"><del><strong>feature for web sites to track users, which is
- <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6, but
it</strong></del></span> <span class="inserted"><ins><em>spyware
that</em></ins></span>
- is <span class="removed"><del><strong>still true</strong></del></span>
<span class="inserted"><ins><em>found</em></ins></span> in <span
class="removed"><del><strong>iOS 7.)</p>
- </li>
-
- <li><p>The iThing also
- <a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though that can be
- turned off.</p>
- </li>
-
- <li><p>Apple can, and regularly does,</strong></del></span>
<span class="inserted"><ins><em>many proprietary games. It</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some</strong></del></span>
+ <p>Red Shell</em></ins></span> is <span
class="removed"><del><strong>also</strong></del></span> a <span
class="removed"><del><strong>feature for web sites to track users,
which</strong></del></span> <span class="inserted"><ins><em>spyware
that</em></ins></span>
+ is <span class="inserted"><ins><em>found in many proprietary games.
It</em></ins></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks about iOS 6,
but</strong></del></span>
<span
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks</em></ins></span> data <span class="removed"><del><strong>from
iPhones for the state</a>.</p></strong></del></span> <span
class="inserted"><ins><em>on users' computers and sends it to third
parties</a>.</p></em></ins></span>
+ tracks data on users' computers and sends</em></ins></span> it
+ <span class="removed"><del><strong>is still true in iOS
7.)</p></strong></del></span> <span class="inserted"><ins><em>to third
parties</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</strong></del></span>
+ <span class="removed"><del><strong><li><p>The iThing
also</strong></del></span>
<span class="inserted"><ins><em><li id="M201804144">
<!--#set var="DATE" value='<small
class="date-tag">2018-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>ArenaNet surreptitiously installed a spyware
- program along with an update to</em></ins></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>massive
- multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
-
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
- to</em></ins></span> snoop on all <span class="removed"><del><strong>the
data in an iThing,
- or it is totally incompetent.</a></p></strong></del></span>
<span class="inserted"><ins><em>open processes running on its user's
computer</a>.</p></em></ins></span>
+ program along with an update to the massive
+ multiplayer game Guild Wars 2. The spyware allowed
ArenaNet</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
+ to snoop on all open processes running on</em></ins></span> its <span
class="removed"><del><strong>geolocation</a> by default, though that can
be
+ turned off.</p></strong></del></span> <span
class="inserted"><ins><em>user's computer</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist</strong></del></span>
+ <span class="removed"><del><strong><li><p>Apple can, and
regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones</strong></del></span>
<span class="inserted"><ins><em><li id="M201711070">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The driver</em></ins></span> for <span
class="removed"><del><strong>no
- possible purpose other than surveillance</a>. Here is
the</strong></del></span> <span class="inserted"><ins><em>a certain gaming
keyboard</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
+ <p>The driver</em></ins></span> for <span
class="removed"><del><strong>the
state</a>.</p></strong></del></span> <span
class="inserted"><ins><em>a certain gaming keyboard <a
+
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information to China</a>.</p></em></ins></span>
</li>
-<span class="removed"><del><strong></ul>
+
+ <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps the NSA</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201512290">
+ <!--#set var="DATE" value='<small
class="date-tag">2015-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Many <a
+
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles</em></ins></span> snoop on <span
class="removed"><del><strong>all the data in an iThing,
+ or it is totally incompetent.</a></p>
+ </li>
+
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em>their users and report</em></ins></span> to <span
class="removed"><del><strong>exist for no
+ possible purpose other than surveillance</a>. Here
is</strong></del></span> the
+ <span class="removed"><del><strong><a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
+ </li>
+</ul>
<div class="big-subsection">
@@ -2347,14 +2358,7 @@
<ul>
<li><p>Tracking software in popular Android
apps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201512290">
- <!--#set var="DATE" value='<small
class="date-tag">2015-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Many <a
-
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and report to the
- internet</a>—even what their users weigh.</p>
+ <span class="inserted"><ins><em>internet</a>—even what their
users weigh.</p>
<p>A game console</em></ins></span> is <span
class="removed"><del><strong>pervasive</strong></del></span> <span
class="inserted"><ins><em>a computer,</em></ins></span> and
<span class="removed"><del><strong>sometimes very clever. Some trackers
can <a
@@ -2404,13 +2408,9 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Angry Birds <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> the <span
class="removed"><del><strong>contact list. This malware is
designed</strong></del></span> <span class="inserted"><ins><em>NSA takes
advantage</em></ins></span>
- to
- <span class="removed"><del><strong>disguise itself from
investigation.</p>
- </li>
-
- <li><p>Samsung phones come with</strong></del></span> <span
class="inserted"><ins><em>spy through it too</a>. Here's information
on</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps</strong></del></span>
- <span
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ spies for companies,</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> the <span
class="removed"><del><strong>contact list. This malware</strong></del></span>
<span class="inserted"><ins><em>NSA takes advantage
+ to spy through it too</a>. Here's information on <a
+
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
@@ -2421,30 +2421,23 @@
<li id="M200510200">
<!--#set var="DATE" value='<small
class="date-tag">2005-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Blizzard Warden is a hidden
- “cheating-prevention” program</em></ins></span> that <span
class="removed"><del><strong>users can't
delete</a>,</strong></del></span> <span class="inserted"><ins><em><a
+ <p>Blizzard Warden</em></ins></span> is <span
class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>a hidden
+ “cheating-prevention” program that <a
href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies on every process running on a gamer's computer</em></ins></span> and
<span class="removed"><del><strong>they send so much data that their
transmission is</strong></del></span> <span
class="inserted"><ins><em>sniffs</em></ins></span> a
- <span class="removed"><del><strong>substantial expense for users. Said
transmission, not wanted or
- requested by the user, clearly must constitute
spying</strong></del></span>
- <span class="inserted"><ins><em>good deal</em></ins></span> of <span
class="removed"><del><strong>some
- kind.</p></li>
-
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>personal data</a>, including lots of activities
which
- have nothing to do with cheating.</p></em></ins></span>
+ spies on every process running on a gamer's computer and sniffs a
+ good deal of personal data</a>, including lots of activities which
+ have nothing</em></ins></span> to
+ <span class="removed"><del><strong>disguise itself from
investigation.</p>
</li>
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
-<span class="inserted"><ins><em></ul>
+ <li><p>Samsung phones come</strong></del></span> <span
class="inserted"><ins><em>do</em></ins></span> with <span
class="inserted"><ins><em>cheating.</p>
+ </li>
+</ul>
<div class="big-section">
- <h3 id="SpywareInEquipment">Spyware</em></ins></span> in <span
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
- Street Journal (in an article blocked from us by a paywall)
- reports that</strong></del></span> <span
class="inserted"><ins><em>Connected Equipment</h3>
+ <h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
<span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -2453,243 +2446,278 @@
<li id="M202101050">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Most Internet connected devices in Mozilla's</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
+ <p>Most Internet connected devices in Mozilla's</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
+ and</strong></del></span>
<span
class="inserted"><ins><em>href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
Not Included”</a> list <a
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
- designed to snoop on users</a> even if they meet
+ designed to snoop on users</a> even if</em></ins></span> they <span
class="removed"><del><strong>send so much data that their transmission is a
+ substantial expense for users. Said transmission, not wanted or
+ requested by the user, clearly must constitute
spying</strong></del></span> <span class="inserted"><ins><em>meet
Mozilla's “Minimum Security Standards.” Insecure
- design of</em></ins></span> the <span class="removed"><del><strong>FBI can
remotely activate</strong></del></span> <span class="inserted"><ins><em>program
running on some of these devices <a
-
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes</em></ins></span>
- the <span class="removed"><del><strong>GPS</strong></del></span> <span
class="inserted"><ins><em>user susceptible to be snooped</em></ins></span> and
<span class="removed"><del><strong>microphone</strong></del></span> <span
class="inserted"><ins><em>exploited by crackers as
- well</a>.</p>
+ design</em></ins></span> of <span class="inserted"><ins><em>the program
running on</em></ins></span> some
+ <span class="removed"><del><strong>kind.</p></li>
+
+ <li><p>A Motorola phone</strong></del></span> <span
class="inserted"><ins><em>of these devices</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes</em></ins></span>
+ the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>user susceptible to be snooped and exploited by
crackers as
+ well</a>.</p></em></ins></span>
</li>
- <li id="M201708280">
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201708280">
<!--#set var="DATE" value='<small
class="date-tag">2017-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The bad security</em></ins></span> in <span
class="removed"><del><strong>Android
+ <p>The bad security</em></ins></span> in <span
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us by a paywall)
+ reports that</strong></del></span> <span class="inserted"><ins><em>many
Internet of Stings devices allows</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on</em></ins></span> the <span class="removed"><del><strong>FBI
can remotely activate</strong></del></span> <span
class="inserted"><ins><em>people that use them</a>.</p>
+
+ <p>Don't be a sucker—reject all</em></ins></span> the <span
class="removed"><del><strong>GPS and microphone in Android
phones and laptops</a>.
- (I suspect this means Windows laptops.) Here is</strong></del></span>
<span class="inserted"><ins><em>many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ (I suspect this means Windows laptops.) Here</strong></del></span>
<span class="inserted"><ins><em>stings.</p>
+
+ <p><small>(It</em></ins></span> is <span
class="inserted"><ins><em>unfortunate that the article uses the
term</em></ins></span> <a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p></em></ins></span>
</li>
- <li><p>Portable phones with GPS will send their GPS
location</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop</em></ins></span> on
- <span class="removed"><del><strong>remote command and users cannot stop
them:
+ <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
+ remote command</strong></del></span>
+<span class="inserted"><ins><em></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInTVSets">TV Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+</div>
+
+<p>Emo Phillips made a joke: The other day a woman came up to
me</em></ins></span> and <span class="removed"><del><strong>users cannot stop
them:
<a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require</strong></del></span> <span
class="inserted"><ins><em>the people that use them</a>.</p>
+ (The US says it will eventually require all new portable
phones</strong></del></span>
+<span class="inserted"><ins><em>said, “Didn't I see you on
television?” I said, “I
+don't know. You can't see out the other way.” Evidently that was
+before Amazon “smart” TVs.</p>
- <p>Don't be a sucker—reject</em></ins></span> all <span
class="removed"><del><strong>new portable phones
- to have GPS.)</p>
+<ul class="blurbs">
+ <li id="M202006250">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-06</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>TV manufacturers are able</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p>
</li>
- <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span> <span class="inserted"><ins><em>the
stings.</p>
+ <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span> <span class="inserted"><ins><em><a
+
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
+ every second of what the user is watching</a>.
This</em></ins></span> is <span class="inserted"><ins><em>illegal
due</em></ins></span> to <span
class="removed"><del><strong>restrict</strong></del></span>
+ the <span class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>Video Privacy Protection Act</em></ins></span> of
<span class="removed"><del><strong>data on the user's
computer,</strong></del></span> <span
class="inserted"><ins><em>1988,</em></ins></span> but <span
class="inserted"><ins><em>they're circumventing</em></ins></span>
+ it <span class="removed"><del><strong>does surveillance
+ too:</strong></del></span> <span class="inserted"><ins><em>through
EULAs.</p>
+ </li>
- <p><small>(It</em></ins></span> is <span
class="removed"><del><strong>to restrict</strong></del></span> <span
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span
class="removed"><del><strong>use of data on</strong></del></span> <span
class="inserted"><ins><em>article uses</em></ins></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
- too:</strong></del></span> <span
class="inserted"><ins><em>term</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the user's list of other people's phone
- numbers.</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p></em></ins></span>
+ <li id="M201901070">
+ <!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever</em></ins></span> the <span
class="removed"><del><strong>user's list of other people's phone
+ numbers.</a></p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInTVSets">TV
Sets</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></em></ins></span>
+ <h4 id="SpywareInMobileApps">Spyware</strong></del></span> <span
class="inserted"><ins><em>TV sees,”</a></em></ins></span> in <span
class="removed"><del><strong>Mobile Applications</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
+<ul>
<li>
- <p>The moviepass app</strong></del></span>
-
-<span class="inserted"><ins><em><p>Emo Phillips made a joke: The other
day a woman came up to me</em></ins></span> and <span
class="removed"><del><strong>dis-service spy</strong></del></span>
-<span class="inserted"><ins><em>said, “Didn't I see
you</em></ins></span> on <span class="removed"><del><strong>users even more
than users
+ <p>The moviepass app</strong></del></span> <span
class="inserted"><ins><em>the own words of the company's
+ CTO,</em></ins></span> and <span class="removed"><del><strong>dis-service
spy on users even</strong></del></span> <span class="inserted"><ins><em>this
data is sold to third parties. This is in return for
+ “better service” (meaning</em></ins></span> more <span
class="removed"><del><strong>than users
expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel</strong></del></span> <span
class="inserted"><ins><em>television?” I said, “I
-don't know. You can't see out the other way.” Evidently that
was</em></ins></span>
-before <span class="removed"><del><strong>and after
going</strong></del></span> <span class="inserted"><ins><em>Amazon
“smart” TVs.</p>
+ where they travel before</strong></del></span> <span
class="inserted"><ins><em>intrusive ads?)</em></ins></span> and <span
class="removed"><del><strong>after going</strong></del></span> <span
class="inserted"><ins><em>slightly
+ lower retail prices.</p>
-<ul class="blurbs">
- <li id="M202006250">
- <!--#set var="DATE" value='<small
class="date-tag">2020-06</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>TV manufacturers are able</em></ins></span> to <span
class="removed"><del><strong>a movie</a>.
+ <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>a movie</a>.
</p>
<p>Don't be tracked — pay cash!</p>
</li>
- <li><p>AI-powered driving apps can</strong></del></span> <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop</em></ins></span>
- every <span
class="removed"><del><strong>move</a>.</p></strong></del></span>
<span class="inserted"><ins><em>second of what the user is watching</a>.
This is illegal due to
- the Video Privacy Protection Act of 1988, but they're circumventing
- it through EULAs.</p></em></ins></span>
+ <li><p>AI-powered driving apps can
+ <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your every move</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The Sarahah
app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201901070">
- <!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever the TV sees,”</a> in the own words of
the company's
- CTO,</em></ins></span> and <span class="removed"><del><strong>email
addresses</a></strong></del></span> <span class="inserted"><ins><em>this
data is sold to third parties. This is</em></ins></span> in <span
class="removed"><del><strong>user's address
- book</strong></del></span> <span class="inserted"><ins><em>return for
- “better service” (meaning more intrusive ads?) and slightly
- lower retail prices.</p>
-
- <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>developer's server. Note
that</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> this <span
class="removed"><del><strong>article misuses the words
+ <li><p>The Sarahah app
+ <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers and email addresses</a> in user's address
+ book</strong></del></span> <span class="inserted"><ins><em>make this
spying acceptable, according</em></ins></span> to <span
class="removed"><del><strong>developer's server. Note</strong></del></span>
<span class="inserted"><ins><em>him,
+ is</em></ins></span> that <span class="removed"><del><strong>this article
misuses</strong></del></span> <span class="inserted"><ins><em>it is opt-in in
newer models. But since</em></ins></span> the <span
class="removed"><del><strong>words
“<a href="/philosophy/free-sw.html">free
software</a>”
- referring</strong></del></span> <span class="inserted"><ins><em>spying
acceptable, according</em></ins></span> to <span
class="removed"><del><strong>zero price.</p>
+ referring to zero price.</p>
</li>
<li>
- <p>Facebook's app listens</strong></del></span> <span
class="inserted"><ins><em>him,
- is that it is opt-in in newer models. But since the Vizio software is
+ <p>Facebook's app listens</strong></del></span> <span
class="inserted"><ins><em>Vizio software is
nonfree, we don't know what is actually happening behind the scenes,
- and there is no guarantee that</em></ins></span> all <span
class="inserted"><ins><em>future updates will leave</em></ins></span> the <span
class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span>
+ and there is no guarantee that</em></ins></span> all <span
class="inserted"><ins><em>future updates will leave</em></ins></span> the <span
class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
+ on what people are listening</strong></del></span>
<span class="inserted"><ins><em>settings unchanged.</p>
<p>If you already own a Vizio “smart” TV (or any
“smart” TV, for that
- matter), the easiest way to make sure it isn't spying</em></ins></span> on
<span class="removed"><del><strong>what people are
listening</strong></del></span> <span class="inserted"><ins><em>you
is</em></ins></span>
- to <span class="removed"><del><strong>or watching</a>. In
addition,</strong></del></span> <span
class="inserted"><ins><em>disconnect</em></ins></span> it <span
class="removed"><del><strong>may</strong></del></span> <span
class="inserted"><ins><em>from the Internet, and use a terrestrial antenna
+ matter), the easiest way</em></ins></span> to <span
class="removed"><del><strong>or watching</a>. In
addition,</strong></del></span> <span class="inserted"><ins><em>make
sure</em></ins></span> it <span class="removed"><del><strong>may
+ be analyzing people's conversations to serve them with targeted
+ advertisements.</p>
+ </li>
+
+ <li>
+ <p>Faceapp appears</strong></del></span> <span
class="inserted"><ins><em>isn't spying on you is</em></ins></span>
+ to <span class="removed"><del><strong>do lots of surveillance, judging by
+ <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access</strong></del></span> <span
class="inserted"><ins><em>disconnect</em></ins></span> it <span
class="removed"><del><strong>demands</strong></del></span> <span
class="inserted"><ins><em>from the Internet, and use a terrestrial antenna
instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is to get your own router (which
can</em></ins></span>
- be <span class="removed"><del><strong>analyzing people's
conversations</strong></del></span> <span class="inserted"><ins><em>an old
computer running completely free software), and set up a
- firewall</em></ins></span> to <span class="removed"><del><strong>serve
them</strong></del></span> <span class="inserted"><ins><em>block connections to
Vizio's servers. Or, as a last resort,
- you can replace your TV</em></ins></span> with <span
class="removed"><del><strong>targeted
- advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>another model.</p></em></ins></span>
+ if you are technically oriented, is to get your own router (which can
+ be an old computer running completely free software), and set up a
+ firewall</em></ins></span> to <span class="removed"><del><strong>personal
data in the device</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>block connections to Vizio's servers. Or, as a last
resort,
+ you can replace your TV with another model.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
- <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
+ <p>Verizon</strong></del></span>
<span class="inserted"><ins><em><li id="M201804010">
<!--#set var="DATE" value='<small
class="date-tag">2018-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands</strong></del></span>
+ <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades that install a surveillance app</a>.</p>
+ load downgrades</em></ins></span> that <span
class="removed"><del><strong>it will</a>
+ pre-install on some of its phones. The app will give Verizon the same
+ information about</strong></del></span> <span
class="inserted"><ins><em>install a surveillance app</a>.</p>
- <p>We link</em></ins></span> to <span
class="removed"><del><strong>personal data in</strong></del></span> the <span
class="removed"><del><strong>device</a>.
- </p>
+ <p>We link to</em></ins></span> the <span
class="removed"><del><strong>users' searches that Google normally gets when
+ they use its search engine.</p>
+
+ <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>article for</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>facts it presents. It</em></ins></span>
+ is <span class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and the
+ user must explicitly opt-in before</strong></del></span> <span
class="inserted"><ins><em>too bad that</em></ins></span> the <span
class="removed"><del><strong>app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>article finishes by
advocating</em></ins></span> the
+ <span class="removed"><del><strong>app remains spyware—an
“optional” piece</strong></del></span>
+ <span class="inserted"><ins><em>moral weakness</em></ins></span> of <span
class="removed"><del><strong>spyware is
+ still spyware.</p>
</li>
- <li>
- <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that</strong></del></span>
<span class="inserted"><ins><em>article for the facts</em></ins></span> it
<span class="removed"><del><strong>will</a>
- pre-install on some</strong></del></span> <span
class="inserted"><ins><em>presents. It
- is too bad that the article finishes by advocating the
- moral weakness</em></ins></span> of <span class="removed"><del><strong>its
phones.</strong></del></span> <span class="inserted"><ins><em>surrendering to
Netflix.</em></ins></span> The <span
class="inserted"><ins><em>Netflix</em></ins></span> app <span
class="removed"><del><strong>will give Verizon the same
- information about the users' searches</strong></del></span> <span
class="inserted"><ins><em><a
- href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ <li><p>The Meitu photo-editing</strong></del></span> <span
class="inserted"><ins><em>surrendering to Netflix. The
Netflix</em></ins></span> app <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to a Chinese company</a>.</p></li>
+
+ <li><p>A pregnancy test controller application not only
+ can</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
<li id="M201702060">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio “smart” <a
-
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything</em></ins></span> that <span
class="removed"><del><strong>Google normally gets when
- they use its search engine.</p>
+ <p>Vizio “smart”</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed</em></ins></span> on <span
class="removed"><del><strong>many sorts of data in the
phone,</strong></del></span> <span
class="inserted"><ins><em>them,</em></ins></span> and <span
class="removed"><del><strong>in server accounts, it can
+ alter them too</a>.
+ </p></li>
- <p>Currently, the app</strong></del></span> is <span
class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</strong></del></span> <span
class="inserted"><ins><em>viewed</em></ins></span> on <span
class="removed"><del><strong>only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>them,</em></ins></span> and <span
class="inserted"><ins><em>not just broadcasts and
- cable</a>. Even if</em></ins></span> the
- <span class="removed"><del><strong>user must explicitly opt-in before the
app takes effect. However,</strong></del></span> <span
class="inserted"><ins><em>image is coming from</em></ins></span> the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece</strong></del></span> <span
class="inserted"><ins><em>user's own computer,
- the TV reports what it is. The existence</em></ins></span> of <span
class="removed"><del><strong>spyware is
- still spyware.</p>
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before</strong></del></span> <span
class="inserted"><ins><em>not just broadcasts</em></ins></span> and <span
class="removed"><del><strong>after</strong></del></span>
+ <span class="inserted"><ins><em>cable</a>. Even if</em></ins></span>
the <span class="removed"><del><strong>ride</a>.</p>
+
+ <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>image is
coming from</em></ins></span> the user's <span
class="removed"><del><strong>consent”
+ for surveillance is inadequate as</strong></del></span> <span
class="inserted"><ins><em>own computer,
+ the TV reports what it is. The existence of</em></ins></span> a <span
class="removed"><del><strong>protection against massive</strong></del></span>
<span class="inserted"><ins><em>way to disable the
+ surveillance, even if it were not hidden as it was in these TVs,
+ does not legitimize the</em></ins></span> surveillance.</p>
</li>
- <li><p>The Meitu photo-editing
- app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to</strong></del></span> a <span
class="removed"><del><strong>Chinese company</a>.</p></li>
-
- <li><p>A pregnancy test controller
application</strong></del></span> <span class="inserted"><ins><em>way to
disable the
- surveillance, even if it were</em></ins></span> not <span
class="removed"><del><strong>only
- can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts of data</strong></del></span> <span
class="inserted"><ins><em>hidden as it was</em></ins></span> in <span
class="inserted"><ins><em>these TVs,
- does not legitimize</em></ins></span> the <span
class="removed"><del><strong>phone,</strong></del></span> <span
class="inserted"><ins><em>surveillance.</p>
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
</li>
- <li id="M201511130">
+ <li><p>Apps that include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511130">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some web</em></ins></span> and <span class="inserted"><ins><em>TV
advertisements play inaudible
- sounds to be picked up by proprietary malware running
- on other devices</em></ins></span> in <span
class="removed"><del><strong>server accounts, it</strong></del></span> <span
class="inserted"><ins><em>range so as to determine that they
+ <p>Some web</em></ins></span> and TV <span
class="removed"><del><strong>programs
+ are playing nearby</a>. Also on what users
post</strong></del></span> <span class="inserted"><ins><em>advertisements play
inaudible
+ sounds to be picked up by proprietary malware running</em></ins></span>
+ on <span class="removed"><del><strong>various sites
+ such</strong></del></span> <span class="inserted"><ins><em>other devices
in range so</em></ins></span> as <span class="removed"><del><strong>Facebook,
Google+</strong></del></span> <span class="inserted"><ins><em>to determine that
they
are nearby. Once your Internet devices are paired with
- your TV, advertisers</em></ins></span> can
- <span class="removed"><del><strong>alter them too</a>.
- </p></li>
-
- <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>correlate ads with Web activity, and
other</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
- cross-device tracking</a>.</p>
+ your TV, advertisers can correlate ads with Web
activity,</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>other <a
+
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
+ cross-device tracking</a>.</p></em></ins></span>
</li>
- <li id="M201511060">
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511060">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio goes a step further than other TV
- manufacturers in spying on their users: their <a
-
href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in
detail</em></ins></span> and <span class="removed"><del><strong>after the
ride</a>.</p>
+ manufacturers in spying on their users: their</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze</em></ins></span> your <span
class="removed"><del><strong>mobile phone's photo collections for known
faces</a>,</strong></del></span> <span class="inserted"><ins><em>viewing
habits in detail</em></ins></span> and <span
class="removed"><del><strong>suggests you to share the
picture</strong></del></span>
+ <span class="inserted"><ins><em>link them your IP address</a> so
that advertisers can track</em></ins></span> you <span
class="removed"><del><strong>take according to who</strong></del></span>
+ <span class="inserted"><ins><em>across devices.</p>
- <p>This example illustrates how “getting the user's
consent”
- for surveillance</strong></del></span>
- <span class="inserted"><ins><em>link them your IP address</a> so
that advertisers can track you
- across devices.</p>
+ <p>It</em></ins></span> is <span class="removed"><del><strong>in the
frame.</p>
- <p>It</em></ins></span> is <span
class="removed"><del><strong>inadequate as a protection against massive
- surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>possible to turn this off, but having it enabled by
default
- is an injustice already.</p></em></ins></span>
+ <p>This spyware feature seems</strong></del></span> <span
class="inserted"><ins><em>possible</em></ins></span> to <span
class="removed"><del><strong>require online access</strong></del></span> <span
class="inserted"><ins><em>turn this off, but having it enabled by default
+ is an injustice already.</p>
</li>
- <span
class="removed"><del><strong><li><p>Google's</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511020">
+ <li id="M201511020">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tivo's alliance with Viacom adds 2.3 million households
- to the 600 millions social media profiles the company
+ <p>Tivo's alliance with Viacom adds 2.3 million
households</em></ins></span>
+ to <span class="removed"><del><strong>some
+ known-faces database, which means</strong></del></span> the <span
class="removed"><del><strong>pictures are likely to be
+ sent across</strong></del></span> <span class="inserted"><ins><em>600
millions social media profiles</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>company
already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
information with online social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing all
- users to</em></ins></span> new <span class="removed"><del><strong>voice
messaging app</strong></del></span> <span class="inserted"><ins><em>combined
surveillance by default.</p>
+ users</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span class="inserted"><ins><em>new combined
surveillance by default.</p>
</li>
<li id="M201507240">
<!--#set var="DATE" value='<small
class="date-tag">2015-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio “smart” TVs recognize and</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are watching</a>, even if it isn't a TV
channel.</p></em></ins></span>
- </li>
+ <p>Vizio “smart” TVs recognize</em></ins></span> and
<span class="removed"><del><strong>face-recognition
+ algorithms.</p>
- <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
+ <p>If so, none of Facebook users' pictures</strong></del></span>
<span class="inserted"><ins><em><a
+ href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
+ what people</em></ins></span> are <span
class="removed"><del><strong>private
+ anymore,</strong></del></span> <span
class="inserted"><ins><em>watching</a>,</em></ins></span> even if <span
class="removed"><del><strong>the user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>it isn't a TV
channel.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201505290">
+ <li id="M201505290">
<!--#set var="DATE" value='<small
class="date-tag">2015-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops</em></ins></span> on what <span class="removed"><del><strong>radio
and TV</strong></del></span> programs
- <span class="removed"><del><strong>are playing nearby</a>.
Also</strong></del></span> <span class="inserted"><ins><em>people watch, and
even what they wanted to
+ <p>Verizon cable TV <a
+
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops on what programs people watch, and even what they wanted to
record</a>.</p>
</li>
@@ -2698,39 +2726,36 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio <a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade” to make its TVs
snoop</em></ins></span> on what
- users <span class="removed"><del><strong>post on various sites
- such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>watch</a>. The TVs did not do that when
first sold.</p></em></ins></span>
+ used a firmware “upgrade”</em></ins></span> to <span
class="removed"><del><strong>the service.</p></strong></del></span> <span
class="inserted"><ins><em>make its TVs snoop on what
+ users watch</a>. The TVs did not do that when first
sold.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
+ <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
+ is based</strong></del></span>
<span class="inserted"><ins><em><li id="M201502090">
<!--#set var="DATE" value='<small
class="date-tag">2015-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Samsung “Smart” TV</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known faces</a>,
- and suggests you to share</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>picture you take according</strong></del></span>
<span class="inserted"><ins><em>internet</em></ins></span> to <span
class="removed"><del><strong>who
- is in the frame.</p>
-
- <p>This spyware feature seems</strong></del></span> <span
class="inserted"><ins><em>another company, Nuance</a>.
- Nuance can save it and would then have</em></ins></span> to <span
class="removed"><del><strong>require online access</strong></del></span> <span
class="inserted"><ins><em>give it</em></ins></span> to <span
class="removed"><del><strong>some
- known-faces database, which means</strong></del></span> the <span
class="removed"><del><strong>pictures are likely</strong></del></span> <span
class="inserted"><ins><em>US or some
- other government.</p>
+ <p>The Samsung “Smart” TV <a
+
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice</em></ins></span> on <span
class="removed"><del><strong>proprietary malware (DRM</strong></del></span>
<span class="inserted"><ins><em>the internet to another company,
Nuance</a>.
+ Nuance can save it</em></ins></span> and <span
class="removed"><del><strong>snooping). In August
+ 2015</strong></del></span> <span class="inserted"><ins><em>would then
have to give</em></ins></span> it <span class="removed"><del><strong><a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit</strong></del></span> to <span
class="removed"><del><strong>increased snooping</a>,
and</strong></del></span> <span class="inserted"><ins><em>the US
or</em></ins></span> some
+ <span class="removed"><del><strong>are starting</strong></del></span>
+ <span class="inserted"><ins><em>other government.</p>
- <p>Speech recognition is not</em></ins></span> to be
- <span class="removed"><del><strong>sent across the
wire</strong></del></span> <span class="inserted"><ins><em>trusted unless it is
done by free
+ <p>Speech recognition is not</em></ins></span> to <span
class="removed"><del><strong>realize that</strong></del></span> <span
class="inserted"><ins><em>be trusted unless</em></ins></span> it is <span
class="removed"><del><strong>nasty.</p>
+
+ <p>This article shows the <a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways</strong></del></span> <span class="inserted"><ins><em>done
by free
software in your own computer.</p>
- <p>In its privacy policy, Samsung explicitly confirms that <a
+ <p>In its privacy policy, Samsung explicitly
confirms</em></ins></span> that <span class="removed"><del><strong>they
present</strong></del></span> <span class="inserted"><ins><em><a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be
transmitted</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers and face-recognition
- algorithms.</p>
-
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>third
+ data containing sensitive information will be transmitted to third
parties</a>.</p>
</li>
@@ -2738,8 +2763,8 @@
<!--#set var="DATE" value='<small
class="date-tag">2014-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The Amazon “Smart” TV is <a
-
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all the time</a>.</p>
+
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"></em></ins></span>
+ snooping <span class="inserted"><ins><em>all the time</a>.</p>
</li>
<li id="M201409290">
@@ -2749,54 +2774,40 @@
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
- <p>The report was as</em></ins></span> of <span
class="removed"><del><strong>Facebook</strong></del></span> <span
class="inserted"><ins><em>2014, but we don't expect this has got
+ <p>The report was</em></ins></span> as <span
class="removed"><del><strong>a way</strong></del></span> <span
class="inserted"><ins><em>of 2014, but we don't expect this has got
better.</p>
- <p>This shows that laws requiring products to get</em></ins></span>
users' <span class="removed"><del><strong>pictures</strong></del></span> <span
class="inserted"><ins><em>formal
- consent before collecting personal data</em></ins></span> are <span
class="removed"><del><strong>private
- anymore, even</strong></del></span> <span
class="inserted"><ins><em>totally inadequate.
- And what happens</em></ins></span> if <span
class="removed"><del><strong>the</strong></del></span> <span
class="inserted"><ins><em>a</em></ins></span> user <span
class="removed"><del><strong>didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>declines consent?
Probably the TV will
- say, “Without your consent</em></ins></span> to <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>service.</p></strong></del></span> <span
class="inserted"><ins><em>TV will not
- work.”</p>
+ <p>This shows that laws requiring products</em></ins></span> to
<span class="removed"><del><strong>“serve” users
better</a>—never mind
+ whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>get users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if</em></ins></span> a <span
class="removed"><del><strong>typical example of</strong></del></span> <span
class="inserted"><ins><em>user declines consent? Probably</em></ins></span> the
<span class="removed"><del><strong>attitude of</strong></del></span> <span
class="inserted"><ins><em>TV will
+ say, “Without your consent to tracking,</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
+ those they have subjugated.</p>
- <p>Proper laws would say that TVs are not allowed to report what the
- user watches—no exceptions!</p></em></ins></span>
+ <p>Out, out, damned Spotify!</p>
</li>
+ <li><p>Many proprietary apps for mobile
devices</strong></del></span> <span class="inserted"><ins><em>TV will not
+ work.”</p>
- <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
- is based on proprietary malware (DRM and snooping). In August
- 2015 it</strong></del></span>
+ <p>Proper laws would say that TVs are not allowed
to</em></ins></span> report <span class="removed"><del><strong>which other
+ apps</strong></del></span> <span class="inserted"><ins><em>what the
+ user watches—no exceptions!</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201405200">
+ <li id="M201405200">
<!--#set var="DATE" value='<small
class="date-tag">2014-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Spyware in LG “smart” TVs</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased
snooping</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches,</em></ins></span> and <span
class="removed"><del><strong>some
- are starting</strong></del></span> <span class="inserted"><ins><em>the
switch</em></ins></span> to <span
class="removed"><del><strong>realize</strong></del></span> <span
class="inserted"><ins><em>turn this off has
- no effect</a>. (The fact</em></ins></span> that <span
class="removed"><del><strong>it is nasty.</p>
-
- <p>This article shows</strong></del></span> the <span
class="removed"><del><strong><a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way
- to “serve” users better</a>—never mind
- whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>transmission reports</em></ins></span> a <span
class="removed"><del><strong>typical example of
- the attitude of</strong></del></span> <span
class="inserted"><ins><em>404 error
- really means nothing;</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
- those they have subjugated.</p>
-
- <p>Out, out, damned Spotify!</p>
- </li>
- <li><p>Many proprietary apps for mobile devices report
which</strong></del></span> <span class="inserted"><ins><em>server could save
that data anyway.)</p>
-
- <p>Even worse, it <a
-
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on</em></ins></span> other
- <span class="removed"><del><strong>apps</strong></del></span> <span
class="inserted"><ins><em>devices on</em></ins></span> the <span
class="removed"><del><strong>user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing</strong></del></span> <span class="inserted"><ins><em>user's
local network</a>.</p>
+ <p>Spyware in LG “smart” TVs <a
+
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what</em></ins></span> the user <span
class="inserted"><ins><em>watches, and the switch to turn this
off</em></ins></span> has
+ <span class="removed"><del><strong>installed.</strong></del></span>
+ <span class="inserted"><ins><em>no effect</a>. (The fact that the
transmission reports a 404 error
+ really means nothing; the server could save that data anyway.)</p>
+
+ <p>Even worse, it</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on the user's local network</a>.</p>
<p>LG later said it had installed a patch to stop this, but any
product could spy</em></ins></span> this <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>way.</p>
@@ -2964,18 +2975,25 @@
<p>The company's statement that it was anonymizing the data may be
true, but it doesn't really matter. If it had sold the data to a data
- broker, the data broker would have been able to figure out who <span
class="removed"><del><strong>the user was.</p>
+ broker, the data broker would have been able to figure out who the
+ user was.</p>
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of C$4m</a>
- to its customers.</p>
+ <p>Following this lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of C$4m</a> to its
+ customers.</p>
</li>
- <li><p> “CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
- manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way to access the data</a>
+ <span class="removed"><del><strong><li><p>
“CloudPets”</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702280">
+ <!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>“CloudPets”</em></ins></span> toys with microphones
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak</em></ins></span> childrens' conversations to the
manufacturer</a>. Guess what? <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers</em></ins></span> found <span class="removed"><del><strong>a way
to access the data</a>
collected by the manufacturer's snooping.</p>
<p>That the manufacturer and the FBI could listen to these
conversations
@@ -3001,73 +3019,80 @@
<li>
<p>An LG “smart” watch is designed
<a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else and to transmit
- conversations too</a>.</p>
+ to report its location</strong></del></span> <span
class="inserted"><ins><em>a way</em></ins></span> to <span
class="removed"><del><strong>someone else</strong></del></span> <span
class="inserted"><ins><em>access the data</a> collected by the
+ manufacturer's snooping.</p>
+
+ <p>That the manufacturer</em></ins></span> and <span
class="inserted"><ins><em>the FBI could listen</em></ins></span> to <span
class="removed"><del><strong>transmit</strong></del></span> <span
class="inserted"><ins><em>these</em></ins></span>
+ conversations <span
class="removed"><del><strong>too</a>.</p></strong></del></span>
<span class="inserted"><ins><em>was unacceptable by
itself.</p></em></ins></span>
</li>
- <li>
- <p>A very cheap “smart watch” comes with an Android app
- <a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects to an unidentified site in China</a>.</p>
- <p>The article says this is a back door, but that could be a
- misunderstanding. However, it is certainly surveillance, at
- least.</p>
+ <span class="removed"><del><strong><li>
+ <p>A very cheap “smart watch” comes with an Android
app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201612060">
+ <!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The “smart” toys My Friend Cayla and i-Que
transmit</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations</em></ins></span> to <span class="removed"><del><strong>an
unidentified site</strong></del></span> <span class="inserted"><ins><em>Nuance
Communications</a>, a speech recognition
+ company based</em></ins></span> in <span
class="removed"><del><strong>China</a>.</p>
+ <p>The article says this is</strong></del></span> <span
class="inserted"><ins><em>the U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control the toys with</em></ins></span> a <span
class="removed"><del><strong>back door, but that could be</strong></del></span>
<span class="inserted"><ins><em>mobile phone. This would enable
+ crackers to listen in on</em></ins></span> a
+ <span class="removed"><del><strong>misunderstanding. However, it is
certainly surveillance, at
+ least.</p></strong></del></span> <span
class="inserted"><ins><em>child's speech, and even speak into the
+ toys themselves.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+<!-- #SpywareAtLowLevel</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201502180">
+ <!--#set var="DATE" value='<small
class="date-tag">2015-02</small>'
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>Barbie <a
+
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
<span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
</div>
-<div style="clear: left;"></div>
+<div style="clear: left;"></div></strong></del></span> <span
class="inserted"><ins><em>children and adults</a>.</p>
+ </li>
+</ul></em></ins></span>
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
-<ul>
-<li><p></strong></del></span> <span class="inserted"><ins><em>the
- user was.</p>
-
- <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+<span class="removed"><del><strong><ul>
+<li><p>
+<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note that</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
- the <span class="removed"><del><strong>specific sabotage method Lenovo
used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>company
has been ordered to pay</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a “clean” Windows install is not really
clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in</strong></del></span> <span class="inserted"><ins><em>total of
C$4m</a> to</em></ins></span> its <span class="removed"><del><strong>own
malware</a>.
+puts in its own malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork</strong></del></span>
- <span class="inserted"><ins><em>customers.</p>
- </li>
- <li id="M201702280">
- <!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201708040">
+ <!--#set var="DATE" value='<small
class="date-tag">2017-08</small>'
--><!--#echo encoding="none" var="DATE"</em></ins></span> -->
<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>“CloudPets” toys with
microphones <a
-
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each
subsection</strong></del></span> <span class="inserted"><ins><em>the
manufacturer</a>. Guess what? <a
-
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a> collected by the
- manufacturer's snooping.</p>
-
- <p>That the manufacturer and the FBI could listen to these
- conversations was unacceptable by itself.</p>
- </li>
-
- <li id="M201612060">
- <!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+ <span class="inserted"><ins><em><p>While you're using a DJI
drone</em></ins></span>
+ to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
-<span class="removed"><del><strong><div class="big-section">
+<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
<span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
</div>
@@ -3075,166 +3100,150 @@
<ul>
<li><p>Investigation
- Shows</strong></del></span>
- <span class="inserted"><ins><em><p>The “smart” toys My
Friend Cayla and i-Que transmit</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically, it</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>, a speech recognition
- company based in the U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
- can <span class="removed"><del><strong>collect</strong></del></span> <span
class="inserted"><ins><em>remotely control</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ <p>Specifically, it can collect the emails of members of Parliament
this way, because they pass it through Microsoft.</p></li>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
- crackers to listen</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span
class="inserted"><ins><em>on a child's speech, and even speak into the
- toys themselves.</p>
- </li>
-
- <li id="M201502180">
- <!--#set var="DATE" value='<small
class="date-tag">2015-02</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>other people, DJI is</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span
class="inserted"><ins><em>many cases</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going to spy on children and adults</a>.</p></em></ins></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4>
+ <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
<li><p>Spyware in Skype:
<a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype
- <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
+ Microsoft changed Skype</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M202009270">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Many employers are using nonfree
+ software, including videoconference software, to</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
+ surveil and monitor staff working at home</a>. If the program reports
+ whether you are “active,” that is in effect a malicious
+ surveillance feature.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<!-- #SpywareOnTheRoad</strong></del></span>
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201708040">
- <!--#set var="DATE" value='<small
class="date-tag">2017-08</small>'
+ <span class="inserted"><ins><em><li id="M202008030">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
--><!--#echo encoding="none" var="DATE"</em></ins></span> -->
<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>While you're using a DJI
drone</em></ins></span>
- to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+ <span class="inserted"><ins><em><p>Google Nest <a
+
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
+ is taking over ADT</a>. Google sent out a software
+ update</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>its speaker devices
using their back door <a
+ href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that
+ listens for things like smoke alarms</a> and then notifies your phone
+ that an alarm is happening. This means the devices now listen for more
+ than just their wake words. Google says the software update was sent
+ out prematurely and</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>other people, DJI is in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
- on <span class="removed"><del><strong>The Road</h3>
+ <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>accident and Google was planning</em></ins></span> on
<span class="removed"><del><strong>The Road</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
-<div style="clear: left;"></div></strong></del></span> <span
class="inserted"><ins><em>you</a>.</p>
- </li>
-</ul></em></ins></span>
-
+<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInCameras">Spyware
in Cameras</h4>
- <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInCameras">#SpywareInCameras</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
-</div>
-
-<span class="removed"><del><strong><ul>
- <li>
- <p>Every “home security” camera, if its manufacturer can
communicate with it,</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M202009270">
- <!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Many employers are using nonfree
- software, including videoconference software, to <a
-
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
- surveil and monitor staff working at home</a>. If the program reports
- whether you are “active,” that</em></ins></span> is <span
class="inserted"><ins><em>in effect</em></ins></span> a <span
class="inserted"><ins><em>malicious</em></ins></span>
- surveillance <span
class="removed"><del><strong>device.</strong></del></span> <span
class="inserted"><ins><em>feature.</p>
- </li>
-
- <li id="M202008030">
- <!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Google Nest</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"></em></ins></span>
- is <span class="inserted"><ins><em>taking over ADT</a>. Google sent
out a software
- update to its speaker devices using their back door <a
- href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that
- listens for things like smoke alarms</a> and then notifies your phone
- that</em></ins></span> an <span
class="removed"><del><strong>example</a>.</p>
- <p>The article describes wrongdoing by</strong></del></span> <span
class="inserted"><ins><em>alarm is happening. This means</em></ins></span> the
<span class="removed"><del><strong>manufacturer, based on</strong></del></span>
<span class="inserted"><ins><em>devices now listen for more
- than just their wake words. Google says</em></ins></span> the <span
class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>software update was sent
- out prematurely and on accident and Google was planning on disclosing
+ <h4 id="SpywareInCameras">Spyware</strong></del></span> <span
class="inserted"><ins><em>disclosing
this new feature and offering it to customers who pay for it.</p>
</li>
<li id="M202006300">
<!--#set var="DATE" value='<small
class="date-tag">2020-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>“Bossware” is malware</em></ins></span> that <span
class="inserted"><ins><em>bosses <a
+ <p>“Bossware” is malware that bosses <a
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
- coerce workers into installing in their own computers</a>,
so</em></ins></span> the <span
class="removed"><del><strong>device</strong></del></span>
- <span class="inserted"><ins><em>bosses can spy on them.</p>
+ coerce workers into installing</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>Every “home security” camera, if its
manufacturer</strong></del></span> <span class="inserted"><ins><em>their own
computers</a>, so the
+ bosses</em></ins></span> can <span
class="removed"><del><strong>communicate with it,</strong></del></span> <span
class="inserted"><ins><em>spy on them.</p>
- <p>This shows why requiring the user's
“consent”</em></ins></span> is <span
class="removed"><del><strong>tethered</strong></del></span> <span
class="inserted"><ins><em>not
+ <p>This shows why requiring the user's
“consent”</em></ins></span> is <span class="inserted"><ins><em>not
an adequate basis for protecting digital privacy. The boss can coerce
- most workers into consenting</em></ins></span> to <span
class="removed"><del><strong>a server.</p>
- <p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But</strong></del></span> <span class="inserted"><ins><em>almost
anything, even probable exposure
+ most workers into consenting to almost anything, even probable exposure
to contagious disease that can be fatal. Software like this should
- be illegal and bosses that demand</em></ins></span> it <span
class="removed"><del><strong>also demonstrates</strong></del></span> <span
class="inserted"><ins><em>should be prosecuted for it.</p>
+ be illegal and bosses that demand it should be prosecuted for it.</p>
</li>
<li id="M201911190">
<!--#set var="DATE" value='<small
class="date-tag">2019-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Internet-tethered Amazon Ring had
- a security vulnerability</em></ins></span> that <span
class="inserted"><ins><em>enabled attackers to <a
-
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
- access</em></ins></span> the <span class="removed"><del><strong>device
gives</strong></del></span> <span class="inserted"><ins><em>user's wifi
password</a>, and snoop on</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>household
+ <p>Internet-tethered Amazon Ring had</em></ins></span>
+ a <span class="removed"><del><strong>surveillance
device.</strong></del></span> <span class="inserted"><ins><em>security
vulnerability that enabled attackers to</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+ Canary camera is an example</a>.</p>
+ <p>The article describes wrongdoing by</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access</em></ins></span> the <span
class="removed"><del><strong>manufacturer, based</strong></del></span> <span
class="inserted"><ins><em>user's wifi password</a>, and
snoop</em></ins></span> on the <span class="removed"><del><strong>fact
+ that</strong></del></span> <span class="inserted"><ins><em>household
through connected surveillance devices.</p>
- <p>Knowledge of the wifi password would not be sufficient to carry
- out any significant</em></ins></span> surveillance <span
class="removed"><del><strong>capability.</p></strong></del></span> <span
class="inserted"><ins><em>if the devices implemented proper
+ <p>Knowledge of</em></ins></span> the <span
class="removed"><del><strong>device</strong></del></span> <span
class="inserted"><ins><em>wifi password would not be sufficient to carry
+ out any significant surveillance if the devices implemented proper
security, including encryption. But many devices with proprietary
software lack this. Of course, they are also used by their
- manufacturers for snooping.</p></em></ins></span>
+ manufacturers for snooping.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>The Nest Cam “smart” camera</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201907210">
+ <li id="M201907210">
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Google “Assistant” records users' conversations <a
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
- when it is not supposed to listen</a>. Thus, when one of Google's
- subcontractors discloses a thousand confidential voice recordings,
+ when it</em></ins></span> is <span
class="removed"><del><strong>tethered</strong></del></span> <span
class="inserted"><ins><em>not supposed</em></ins></span> to <span
class="inserted"><ins><em>listen</a>. Thus, when one of Google's
+ subcontractors discloses</em></ins></span> a <span
class="removed"><del><strong>server.</p>
+ <p><a href="/proprietary/proprietary-tethers.html">More
about</strong></del></span> <span class="inserted"><ins><em>thousand
confidential voice recordings,
users were easily identified from these recordings.</p>
- <p>Since Google “Assistant” uses proprietary software,
there</em></ins></span> is <span class="removed"><del><strong><a
- href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when the “owner”
switches</strong></del></span> <span class="inserted"><ins><em>no
- way to see or control what</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>records or sends.</p>
+ <p>Since Google “Assistant” uses</em></ins></span>
proprietary <span class="removed"><del><strong>tethering</a>.</p>
+ <p>But</strong></del></span> <span
class="inserted"><ins><em>software, there is no
+ way to see or control what</em></ins></span> it <span
class="removed"><del><strong>also demonstrates that</strong></del></span> <span
class="inserted"><ins><em>records or sends.</p>
+
+ <p>Rather than trying to better control</em></ins></span> the <span
class="removed"><del><strong>device gives</strong></del></span> <span
class="inserted"><ins><em>use of recordings, Google
+ should not record or listen to</em></ins></span> the <span
class="removed"><del><strong>company
+ surveillance capability.</p></strong></del></span> <span
class="inserted"><ins><em>person's voice. It should only
+ get commands that the user wants to send to some Google
service.</p></em></ins></span>
+ </li>
- <p>Rather than trying to better control</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using it</strong></del></span>
<span class="inserted"><ins><em>use of recordings, Google
- should not record or listen</em></ins></span> to <span
class="removed"><del><strong>outsmart
+ <span class="removed"><del><strong><li>
+ <p>The Nest Cam “smart” camera</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905061">
+ <!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Amazon Alexa collects a lot more information from users
+ than</em></ins></span> is <span class="removed"><del><strong><a
+ href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when the “owner”
switches</strong></del></span> <span class="inserted"><ins><em>necessary for
correct functioning (time, location,
+ recordings made without a legitimate prompt), and sends</em></ins></span>
+ it <span class="removed"><del><strong>“off.”</p>
+ <p>A “smart” device means the manufacturer is
using</strong></del></span> <span class="inserted"><ins><em>to Amazon's
servers, which store it indefinitely. Even
+ worse, Amazon forwards</em></ins></span> it to <span
class="removed"><del><strong>outsmart
you.</p>
</li>
</ul>
@@ -3246,21 +3255,24 @@
<ul>
<li><p>E-books can contain JavaScript code,
- and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ and</strong></del></span> <span class="inserted"><ins><em>third-party
companies. Thus,
+ even if users request deletion of their data from Amazon's
servers,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
this code snoops on readers</a>.</p>
</li>
- <li><p>Spyware in many e-readers—not
only</strong></del></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span> <span
class="inserted"><ins><em>person's voice. It should only
- get commands that</em></ins></span> the user <span
class="removed"><del><strong>reads at what time</a>.</p>
+ <li><p>Spyware in many e-readers—not
only</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
+ the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"></strong></del></span>
<span class="inserted"><ins><em>data remain on other servers</a>,
where</em></ins></span> they <span class="removed"><del><strong>report even
which page</strong></del></span> <span class="inserted"><ins><em>can be
accessed by
+ advertising companies and government agencies. In other words,
+ deleting</em></ins></span> the <span class="removed"><del><strong>user
reads at what time</a>.</p>
</li>
- <li><p>Adobe made “Digital Editions,” the e-reader
used
+ <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span
class="inserted"><ins><em>collected information doesn't
cancel</em></ins></span> the <span class="removed"><del><strong>e-reader used
by most US libraries,
<a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data</strong></del></span> <span
class="inserted"><ins><em>wants</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
- needed</strong></del></span> <span
class="inserted"><ins><em>send</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
+ send lots</strong></del></span> <span
class="inserted"><ins><em>wrong</em></ins></span> of <span
class="removed"><del><strong>data to Adobe</a>. Adobe's
“excuse”: it's
+ needed to check DRM!</p>
</li>
</ul>
@@ -3270,108 +3282,92 @@
</div>
<ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
- snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>some Google service.</p></em></ins></span>
+<li><p>Computerized cars with nonfree
software</strong></del></span>
+ <span class="inserted"><ins><em>collecting it.</p>
+
+ <p>Data collected by devices such as the Nest thermostat, the Philips
+ Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+ speakers</em></ins></span> are
+ <span class="removed"><del><strong><a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ snooping devices</a>.</p>
</li>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>id="M201905061">
- <!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Amazon Alexa collects</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
+ <li id="nissan-modem"><p>The Nissan Leaf</strong></del></span>
<span class="inserted"><ins><em>likewise stored longer than necessary on the
servers
+ the devices are tethered to. Moreover, they are made available to
+ Alexa. As a result, Amazon</em></ins></span> has a <span
class="removed"><del><strong>built-in cell phone modem which allows
effectively
anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely</strong></del></span> <span
class="inserted"><ins><em>lot more information from users
- than is necessary for correct functioning (time, location,
- recordings made without a legitimate prompt),</em></ins></span> and <span
class="removed"><del><strong>make changes in various
+ access its computers remotely and make changes</strong></del></span> <span
class="inserted"><ins><em>very precise picture of users' life
+ at home, not only</em></ins></span> in <span
class="removed"><del><strong>various
settings</a>.</p>
- <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>sends
- it</em></ins></span> to <span class="removed"><del><strong>do because the
system has no authentication when
- accessed through the modem. However,</strong></del></span> <span
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
- worse, Amazon forwards it to third-party companies. Thus,</em></ins></span>
- even if <span class="removed"><del><strong>it asked for
- authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>users request deletion of their data from Amazon's
servers, <a
-
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
- the data remain on other servers</a>, where they
can</em></ins></span> be <span class="removed"><del><strong>confident that
Nissan has no
- access. The software in</strong></del></span> <span
class="inserted"><ins><em>accessed by
- advertising companies and government agencies. In other words,
- deleting</em></ins></span> the <span class="removed"><del><strong>car is
+ <p>That's easy to do because</strong></del></span> the <span
class="removed"><del><strong>system has no authentication when
+ accessed through</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
+ authentication, you couldn't be confident that Nissan has no
+ access. The software</strong></del></span> <span
class="inserted"><ins><em>past (and, who knows,</em></ins></span>
+ in the <span class="removed"><del><strong>car is
proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
means it demands blind faith from its users</a>.</p>
- <p>Even if no one connects to</strong></del></span> <span
class="inserted"><ins><em>collected information doesn't
cancel</em></ins></span> the <span class="removed"><del><strong>car
remotely,</strong></del></span> <span class="inserted"><ins><em>wrong of
- collecting it.</p>
-
- <p>Data collected by devices such as</em></ins></span> the <span
class="removed"><del><strong>cell phone
- modem enables</strong></del></span> <span class="inserted"><ins><em>Nest
thermostat,</em></ins></span> the <span class="removed"><del><strong>phone
company to track</strong></del></span> <span class="inserted"><ins><em>Philips
- Hue-connected lights,</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>Chamberlain MyQ garage opener and</em></ins></span>
the <span class="removed"><del><strong>time; it is possible to physically
remove</strong></del></span> <span class="inserted"><ins><em>Sonos
- speakers are likewise stored longer than necessary on</em></ins></span>
the <span class="removed"><del><strong>cell phone modem
- though.</p>
- </li>
-
- <li id="records-drivers"><p>Proprietary software in cars
- <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is</strong></del></span> <span class="inserted"><ins><em>servers
- the devices are tethered to. Moreover, they are</em></ins></span> made
available to <span class="removed"><del><strong>car manufacturers, insurance
companies, and
- others.</p>
-
- <p>The case</strong></del></span>
- <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very
precise picture</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems, mentioned in this
article, is</strong></del></span> <span class="inserted"><ins><em>users' life
- at home,</em></ins></span> not
- <span class="removed"><del><strong>really a matter</strong></del></span>
<span class="inserted"><ins><em>only in the present, but in the past (and, who
knows,
- in the future too?)</p>
+ <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>future too?)</p>
</li>
<li id="M201904240">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some</em></ins></span> of <span
class="removed"><del><strong>proprietary surveillance. These
systems</strong></del></span> <span class="inserted"><ins><em>users' commands
to the Alexa service</em></ins></span> are <span class="removed"><del><strong>an
- intolerable invasion of privacy,</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Some of users' commands</em></ins></span> to the <span
class="removed"><del><strong>car remotely, the cell phone
+ modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>Alexa service are <a
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees to listen to</a>. The
Google</em></ins></span> and <span class="removed"><del><strong>should be
replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>Apple
+ recorded for Amazon employees</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>listen to</a>. The Google and Apple
voice assistants do similar things.</p>
- <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware.
The</strong></del></span> <span class="inserted"><ins><em>Alexa service staff
even has access to <a
+ <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even has access to <a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
- location and</em></ins></span> other
- <span class="removed"><del><strong>cases mentioned
are</strong></del></span> <span class="inserted"><ins><em>personal
data</a>.</p>
+ location and other personal data</a>.</p>
- <p>Since the client program is nonfree, and data processing
is</em></ins></span> done <span class="removed"><del><strong>by proprietary
malware in</strong></del></span>
- <span class="inserted"><ins><em>“<a
href="/philosophy/words-to-avoid.html#CloudComputing">in</em></ins></span>
- the <span class="removed"><del><strong>car.</p></li>
-
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>cloud</a>” (a soothing way of saying
“We won't
+ <p>Since</em></ins></span> the <span
class="removed"><del><strong>time; it</strong></del></span> <span
class="inserted"><ins><em>client program</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>nonfree, and data processing is done
+ “<a href="/philosophy/words-to-avoid.html#CloudComputing">in
+ the cloud</a>” (a soothing way of saying “We won't
tell you how and where it's done”), users have no way
- to know what happens to</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>recordings unless human eavesdroppers <a
+ to know what happens</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> the <span
class="removed"><del><strong>cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>recordings unless human eavesdroppers <a
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure agreements</a>.</p>
+ break their non-disclosure
agreements</a>.</p></em></ins></span>
</li>
- <li id="M201902080">
+ <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201902080">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The HP <a
- href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ <p>The HP</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>extract data remotely</strong></del></span> <span
class="inserted"><ins><em>make sure the user is still
- paying for the subscription,</em></ins></span> and
- <span class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>hasn't printed more pages than were
+ communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
+ others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this
article,</strong></del></span> <span class="inserted"><ins><em>make sure the
user</em></ins></span> is <span class="removed"><del><strong>not
+ really a matter of proprietary surveillance. These systems are an
+ intolerable invasion of privacy,</strong></del></span> <span
class="inserted"><ins><em>still
+ paying for the subscription,</em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>hasn't printed more pages than were
paid for.</p>
- <p>Even though</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>ink subscription program may be cheaper in some
+ <p>Even though</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
+ cases mentioned are done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>ink subscription program may be cheaper in some
specific cases, it spies on users, and involves totally unacceptable
- restrictions in the use of ink cartridges that would otherwise be in
+ restrictions</em></ins></span> in the <span
class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow the company</strong></del></span> <span
class="inserted"><ins><em>use of ink cartridges that would otherwise be in
working order.</p>
</li>
<li id="M201808120">
<!--#set var="DATE" value='<small
class="date-tag">2018-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Crackers found a way to break the security of an Amazon
device,</em></ins></span>
+ <p>Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
+ determine</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
and <span class="removed"><del><strong>c.</a>). The company
says</strong></del></span> <span class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn</em></ins></span> it <span class="removed"><del><strong>doesn't
store this information, but</strong></del></span> <span
class="inserted"><ins><em>into a listening device</a> for them.</p>
@@ -3423,77 +3419,53 @@
about you for later examination.</p>
</li>
- <span class="removed"><del><strong><li><p>Nest thermometers
- send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot of data about the user</a>.</p>
- </li>
-
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy on their
renters</a>.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
-</div>
-
-<p>Emo Phillips made a joke: The other day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li>
- <p>Vizio
- “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts
- and cable</a>. Even if the image is coming from the user's own
- computer, the TV reports what it is. The existence of a way to
- disable the surveillance, even if it were not hidden as it was in
- these TVs, does not legitimize</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Nest</strong></del></span>
<span class="inserted"><ins><em><li id="M201407170">
<!--#set var="DATE" value='<small
class="date-tag">2014-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p id="nest-thermometers">Nest thermometers send <a
+ <p id="nest-thermometers">Nest</em></ins></span> thermometers send
<a
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
- data about</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>user</a>.</p></em></ins></span>
+ data about the user</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>More or less all
“smart” TVs <a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
+ <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"></strong></del></span>
<span class="inserted"><ins><em><li id="M201310260">
<!--#set var="DATE" value='<small
class="date-tag">2013-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy</em></ins></span> on their
<span class="removed"><del><strong>users</a>.</p>
-
- <p>The report was as of 2014, but we don't expect this has got
better.</p></strong></del></span> <span
class="inserted"><ins><em>renters</a>.</p>
+
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"></em></ins></span>
+ Rent-to-own computers were programmed to spy on their
renters</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareOnWearables">Wearables</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareOnWearables">#SpywareOnWearables</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareOnWearables">Wearables</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnWearables">#SpywareOnWearables</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up to me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201807260">
<!--#set var="DATE" value='<small
class="date-tag">2018-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Tommy Hilfiger clothing <a
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
- monitor how often people wear it</a>.</p></em></ins></span>
+ monitor how often people wear it</a>.</p>
- <p>This <span class="removed"><del><strong>shows that laws requiring
products</strong></del></span> <span class="inserted"><ins><em>will teach the
sheeple</em></ins></span> to <span class="removed"><del><strong>get users'
formal
- consent before collecting personal data are totally inadequate.
- And</strong></del></span> <span class="inserted"><ins><em>find it normal
that companies
- monitor every aspect of</em></ins></span> what <span
class="removed"><del><strong>happens if</strong></del></span> <span
class="inserted"><ins><em>they do.</p>
+ <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>other way.” Evidently</strong></del></span>
<span class="inserted"><ins><em>sheeple to find it normal</em></ins></span>
that <span class="removed"><del><strong>was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li>
+ <p>Vizio
+ “smart”</strong></del></span> <span
class="inserted"><ins><em>companies
+ monitor every aspect of what they do.</p>
</li>
</ul>
@@ -3506,33 +3478,43 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Internet-enabled watches with proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they have</em></ins></span> a <span
class="removed"><del><strong>user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>lot of security
flaws. They <a
-
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
- permit security breakers (and unauthorized people) to
access</a></em></ins></span> the <span class="removed"><del><strong>TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>watch.</p>
-
- <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages</em></ins></span> to
<span class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>and from</em></ins></span> the <span
class="removed"><del><strong>TV will
- not work.”</p>
+ privacy. In addition, they have a lot of security flaws.
They</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
+ permit security breakers (and unauthorized people) to access</a> the
watch.</p>
- <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>watch, possibly endangering the child.</p>
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent</em></ins></span> and <span
class="removed"><del><strong>not just broadcasts</strong></del></span> <span
class="inserted"><ins><em>child and spoof messages to</em></ins></span> and
<span class="removed"><del><strong>cable</a>. Even if the image is
coming</strong></del></span> from the <span class="removed"><del><strong>user's
own
+ computer, the TV reports what it is. The existence of a way to
+ disable</strong></del></span> <span class="inserted"><ins><em>watch,
possibly endangering</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden as it was
in
+ these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>child.</p>
- <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>TVs are not allowed to report
what</strong></del></span> <span class="inserted"><ins><em>this article
misuses</em></ins></span> the <span class="removed"><del><strong>user watches
— no exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>word “<a
+ <p><small>(Note that this article misuses</em></ins></span>
the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
to mean “crackers.”)</small></p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying on
- their users: their</strong></del></span>
+
+ <span class="removed"><del><strong><li><p>More or less all
“smart” TVs</strong></del></span>
<span class="inserted"><ins><em><li id="M201603020">
<!--#set var="DATE" value='<small
class="date-tag">2016-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects to an unidentified site</em></ins></span> in <span
class="removed"><del><strong>detail and
- link them your IP address</a> so</strong></del></span> <span
class="inserted"><ins><em>China</a>.</p>
+ <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report was as of 2014, but we don't expect this has got
better.</p>
- <p>The article says this is a back door, but</em></ins></span> that
<span class="removed"><del><strong>advertisers</strong></del></span> <span
class="inserted"><ins><em>could be a
+ <p>This shows</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></em></ins></span>
+ that <span class="removed"><del><strong>laws requiring
products</strong></del></span> <span
class="inserted"><ins><em>connects</em></ins></span> to <span
class="removed"><del><strong>get users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if</strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
+
+ <p>The article says this is</em></ins></span> a <span
class="removed"><del><strong>user declines consent? Probably the TV
+ will say, “Without your consent to tracking, the TV will
+ not work.”</p>
+
+ <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>back door, but</em></ins></span> that <span
class="removed"><del><strong>TVs are not allowed</strong></del></span> <span
class="inserted"><ins><em>could be a
misunderstanding. However, it is certainly surveillance, at
least.</p>
</li>
@@ -3540,11 +3522,14 @@
<!--#set var="DATE" value='<small
class="date-tag">2014-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>An LG “smart” watch is designed <a
-
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else and to transmit conversations
- too</a>.</p>
+
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
+ to report <span class="removed"><del><strong>what
+ the user watches — no exceptions!</p></strong></del></span>
<span class="inserted"><ins><em>its location to someone else and to transmit
conversations
+ too</a>.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying on
+ their users: their</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -3556,8 +3541,10 @@
<li id="M202008181">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>New Toyotas will <a
- href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/">
+ <p>New Toyotas will</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so that
advertisers</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/">
upload data to AWS to help create custom insurance premiums</a>
based on driver behaviour.</p>
@@ -3627,12 +3614,12 @@
<p>In China,</em></ins></span> it <span
class="removed"><del><strong>isn't</strong></del></span> <span
class="inserted"><ins><em>is mandatory for electric
cars to be equipped with</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p>
</li>
- <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>terminal that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- snooping all</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>terminal that <a
+ href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
transfers technical data, including car location,
- to a government-run platform</a>. In practice, <a
- href="/proprietary/proprietary-surveillance.html#car-spying">
+ to a government-run platform</a>. In practice,</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ snooping all</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying">
manufacturers collect this data</a> as part of their own spying, then
forward it to</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>government-run
platform.</p></em></ins></span>
</li>
@@ -3765,11 +3752,11 @@
<!--#set var="DATE" value='<small
class="date-tag">2013-06</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Tesla cars allow the company to extract</em></ins></span>
- data <span class="removed"><del><strong>about their users and their users'
- friends</strong></del></span> <span
class="inserted"><ins><em>remotely</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
+ data <span class="removed"><del><strong>about their
users</strong></del></span> <span
class="inserted"><ins><em>remotely</em></ins></span> and <span
class="removed"><del><strong>their users'
+ friends</strong></del></span> <span class="inserted"><ins><em>determine
the car's location
+ at any time. (See Section 2, paragraphs b</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
- <p>Even nastier, they do</strong></del></span> <span
class="inserted"><ins><em>determine the car's location
- at any time. (See Section 2, paragraphs b and c of the <a
+ <p>Even nastier, they do</strong></del></span> <span
class="inserted"><ins><em>c of the <a
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf">
privacy statement</a>.) The company says</em></ins></span> it <span
class="removed"><del><strong>through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
information, but if the state orders it to get</em></ins></span> the data
@@ -3975,20 +3962,22 @@
</li>
<span class="removed"><del><strong><li><p><a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
- Microsoft SkyDrive allows</strong></del></span>
+ Microsoft SkyDrive allows the NSA</strong></del></span>
<span class="inserted"><ins><em><li id="M201110040">
<!--#set var="DATE" value='<small
class="date-tag">2011-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Pages that contain “Like” buttons <a
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
- enable Facebook to track visitors to those pages</a>—even users
- that don't have Facebook accounts.</p>
+ enable Facebook</em></ins></span> to <span
class="removed"><del><strong>directly examine users'
data</a>.</p></strong></del></span> <span
class="inserted"><ins><em>track visitors to those pages</a>—even
users
+ that don't have Facebook accounts.</p></em></ins></span>
</li>
</ul>
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
-<div class="big-subsection">
+
+<span class="inserted"><ins><em><div class="big-subsection">
<h4 id="SpywareInJavaScript">JavaScript</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInJavaScript">#SpywareInJavaScript</a>)</span>
</div>
@@ -4004,16 +3993,13 @@
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege">
getting sued</a> for this.</p>
- <p>The chat facilities of some customer services
use</em></ins></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>same sort of
- malware</em></ins></span> to <span class="removed"><del><strong>directly
examine users' data</a>.</p></strong></del></span> <span
class="inserted"><ins><em><a
+ <p>The chat facilities of some customer services use the same sort of
+ malware to <a
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
- read what the user is typing before it is
posted</a>.</p></em></ins></span>
+ read what the user is typing before it is posted</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- WEBMASTERS: make sure</strong></del></span>
- <span class="inserted"><ins><em><li id="M201807190">
+ <li id="M201807190">
<!--#set var="DATE" value='<small
class="date-tag">2018-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>British Airways used <a
@@ -4043,10 +4029,9 @@
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" --></em></ins></span>
<p>Some websites send
- JavaScript code to <span class="removed"><del><strong>collect all the
user's
- input,</strong></del></span> <span class="inserted"><ins><em>collect all
the user's input, <a
+ JavaScript code to collect all the user's input, <a
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
- can then be used to reproduce the whole session</a>.</p>
+ can then be used to <span
class="removed"><del><strong>reproduce</strong></del></span> <span
class="inserted"><ins><em>reproduce the whole session</a>.</p>
<p>If you use LibreJS, it will block that malicious JavaScript
code.</p>
@@ -4115,48 +4100,48 @@
<p>But complaining is not sufficient. Parents, students and teachers
should realize that the software Google uses to spy on students is
nonfree, so they can't verify what it really does. The only remedy is
- to persuade school officials to</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which</strong></del></span>
<span class="inserted"><ins><em>href="/education/edu-schools.html">
+ to persuade school officials to <a
href="/education/edu-schools.html">
exclusively use free software</a> for both education and school
- administration. If the school is run locally, parents and
teachers</em></ins></span>
- can <span class="removed"><del><strong>then
- be used to reproduce</strong></del></span> <span
class="inserted"><ins><em>mandate their representatives at</em></ins></span>
the <span class="removed"><del><strong>whole session</a>.</p>
+ administration. If the school is run locally, parents and teachers
+ can mandate their representatives at the School Board to refuse the
+ budget unless the school initiates a switch to free software. If
+ education is run nation-wide, they need to persuade legislators
+ (e.g., through free software organizations, political parties,
+ etc.) to migrate</em></ins></span> the <span
class="removed"><del><strong>whole session</a>.</p>
<p>If you use LibreJS, it will block that malicious JavaScript
code.</p>
</li>
<li><p>Many web sites use JavaScript code <a
-
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"></strong></del></span>
<span class="inserted"><ins><em>School Board</em></ins></span> to <span
class="removed"><del><strong>snoop on information that users have typed
into</strong></del></span> <span class="inserted"><ins><em>refuse the
- budget unless the school initiates</em></ins></span> a <span
class="removed"><del><strong>form but not
- sent</a>, in order</strong></del></span> <span
class="inserted"><ins><em>switch</em></ins></span> to <span
class="removed"><del><strong>learn their identity. Some are <a
-
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
- getting sued</a> for this.</p></strong></del></span> <span
class="inserted"><ins><em>free software. If
- education is run nation-wide, they need to persuade legislators
- (e.g., through free software organizations, political parties,
- etc.) to migrate the public schools to free
software.</p></em></ins></span>
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"></strong></del></span>
<span class="inserted"><ins><em>public schools</em></ins></span> to <span
class="removed"><del><strong>snoop on information that users have typed into a
form but not
+ sent</a>, in order</strong></del></span> <span
class="inserted"><ins><em>free software.</p>
</li>
- <span class="removed"><del><strong><li><p>Flash
Player's</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201507280">
+ <li id="M201507280">
<!--#set var="DATE" value='<small
class="date-tag">2015-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google Chrome makes it easy for an extension to
do</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
- cookie feature helps web sites track visitors</a>.</p>
- </li>
-
- <li><p>Flash</strong></del></span>
+ <p>Google Chrome makes it easy for an extension</em></ins></span> to
<span class="removed"><del><strong>learn their identity. Some
are</strong></del></span> <span class="inserted"><ins><em>do</em></ins></span>
<a
+ <span
class="removed"><del><strong>href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+ getting sued</a> for this.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
- snooping on the user's browsing</a>,</em></ins></span> and <span
class="removed"><del><strong>JavaScript are also used for</strong></del></span>
<span class="inserted"><ins><em>many of them do so.</p>
+ snooping on the user's browsing</a>, and many of them do
so.</p></em></ins></span>
</li>
- <li id="M201506180">
+ <span class="removed"><del><strong><li><p>Flash
Player's</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201506180">
<!--#set var="DATE" value='<small
class="date-tag">2015-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google Chrome includes a module that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices</a></strong></del></span>
+ <p>Google Chrome includes a module that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
+ cookie feature helps web sites track visitors</a>.</p>
+ </li>
+
+ <li><p>Flash</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
- activates microphones and transmits audio</em></ins></span> to <span
class="removed"><del><strong>identify users.</p></strong></del></span>
<span class="inserted"><ins><em>its
servers</a>.</p></em></ins></span>
+ activates microphones</em></ins></span> and <span
class="removed"><del><strong>JavaScript are also used for
+ <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ “fingerprinting” devices</a></strong></del></span>
<span class="inserted"><ins><em>transmits audio</em></ins></span> to <span
class="removed"><del><strong>identify users.</p></strong></del></span>
<span class="inserted"><ins><em>its
servers</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -4205,41 +4190,59 @@
<div class="big-section">
- <h3 <span class="removed"><del><strong>id="SpywareInDrones">Spyware in
Drones</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
+ <h3 <span
class="removed"><del><strong>id="SpywareInDrones">Spyware</strong></del></span>
<span
class="inserted"><ins><em>id="SpywareInNetworks">Spyware</em></ins></span>
in <span class="removed"><del><strong>Drones</h3></strong></del></span>
<span class="inserted"><ins><em>Networks</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInDrones">#SpywareInDrones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInNetworks">#SpywareInNetworks</a>)</span></em></ins></span>
</div>
<div style="clear: left;"></div>
-<ul>
+<span class="removed"><del><strong><ul>
<li>
- <p>While you're using a DJI drone to snoop on other people, DJI
is</strong></del></span> <span
class="inserted"><ins><em>id="SpywareInNetworks">Spyware</em></ins></span>
in <span class="removed"><del><strong>many
+ <p>While you're using a DJI drone to snoop on other people, DJI is
in many
cases <a
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p>
</li>
</ul>
-<!-- #SpywareEverywhere -->
-<div class="big-section">
- <h3 id="SpywareEverywhere">Spyware
Everywhere</h3></strong></del></span> <span
class="inserted"><ins><em>Networks</h3></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareEverywhere">#SpywareEverywhere</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInNetworks">#SpywareInNetworks</a>)</span></em></ins></span>
+<!-- #SpywareEverywhere</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M202012250">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareEverywhere">Spyware Everywhere</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareEverywhere">#SpywareEverywhere</a>)</span>
</div>
<div style="clear: left;"></div>
-<span class="removed"><del><strong><ul>
+<ul>
<li><p>The natural extension of monitoring people through
“their” phones</strong></del></span>
+ <span class="inserted"><ins><em><p>The HonorLock online exam
+ proctoring program</em></ins></span> is <span class="inserted"><ins><em>a
surveillance tool that</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps">tracks
+ students and collects data</a> such as face, driving license, and
+ network information, among others, in blatant violation of students'
+ privacy.</p>
+
+ <p>Preventing students from cheating should not be an excuse for
+ running malware/spyware on their computers, and it's good that students
+ are protesting. But their petitions overlook a crucial issue, namely,
+ the injustice of being forced to run nonfree</em></ins></span> software
<span class="inserted"><ins><em>in order</em></ins></span> to <span
class="removed"><del><strong>make sure they can't
“fool”</strong></del></span>
+ <span class="inserted"><ins><em>get an education.</p>
+ </li>
-<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202009070">
<!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>While the world</em></ins></span> is <span
class="inserted"><ins><em>still
- struggling with COVID-19 coronavirus, many</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/">people
+ <p>While</em></ins></span> the
+ <span
class="removed"><del><strong>monitoring</a>.</p></strong></del></span>
<span class="inserted"><ins><em>world is still
+ struggling with COVID-19 coronavirus, many <a
+
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/">people
are in danger of surveillance</a> and their computers are infected
- with malware as a result of installing</em></ins></span> proprietary <span
class="removed"><del><strong>software to make sure they can't
“fool” the
- monitoring</a>.</p></strong></del></span> <span
class="inserted"><ins><em>software.</p></em></ins></span>
+ with malware as a result of installing proprietary
software.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
@@ -4373,7 +4376,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/02/06 16:03:04 $
+$Date: 2021/02/22 10:31:57 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.378
retrieving revision 1.379
diff -u -b -r1.378 -r1.379
--- proprietary-surveillance.de.po 6 Feb 2021 14:33:05 -0000 1.378
+++ proprietary-surveillance.de.po 22 Feb 2021 10:31:57 -0000 1.379
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -5766,6 +5766,24 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"While the world is still struggling with COVID-19 coronavirus, many <a href="
"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
"are in danger of surveillance</a> and their computers are infected with "
Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.157
retrieving revision 1.158
diff -u -b -r1.157 -r1.158
--- proprietary-surveillance.es.po 7 Feb 2021 10:59:46 -0000 1.157
+++ proprietary-surveillance.es.po 22 Feb 2021 10:31:57 -0000 1.158
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
"PO-Revision-Date: 2021-02-07 11:21+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-22 10:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -5214,6 +5215,24 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"While the world is still struggling with COVID-19 coronavirus, many <a href="
"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
"are in danger of surveillance</a> and their computers are infected with "
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.607
retrieving revision 1.608
diff -u -b -r1.607 -r1.608
--- proprietary-surveillance.fr.po 6 Feb 2021 16:31:37 -0000 1.607
+++ proprietary-surveillance.fr.po 22 Feb 2021 10:31:57 -0000 1.608
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
"PO-Revision-Date: 2021-02-06 17:22+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-22 10:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -5230,6 +5231,24 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"While the world is still struggling with COVID-19 coronavirus, many <a href="
"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
"are in danger of surveillance</a> and their computers are infected with "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.233
retrieving revision 1.234
diff -u -b -r1.233 -r1.234
--- proprietary-surveillance.it-diff.html 6 Feb 2021 16:03:04 -0000
1.233
+++ proprietary-surveillance.it-diff.html 22 Feb 2021 10:31:57 -0000
1.234
@@ -630,40 +630,16 @@
<li id="M201509220">
<!--#set var="DATE" value='<small
class="date-tag">2015-09</small>'
--><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p><a <span
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found</strong></del></span>
+ <p><a <span
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware and spyware via
- BIOS</a> on Windows installs. Note</em></ins></span> that <span
class="removed"><del><strong>90% of the top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span> the <span class="removed"><del><strong>paid
proprietary apps, it was only 60%.</p>
-
- <p>The article confusingly describes gratis apps as “free”,
- but most of them are</strong></del></span> <span
class="inserted"><ins><em>specific
- sabotage method Lenovo used did</em></ins></span> not <span
class="removed"><del><strong>in fact
- <a href="/philosophy/free-sw.html">free software</a>.
- It also uses the ugly word “monetize”. A good replacement
- for that word</strong></del></span> <span class="inserted"><ins><em>affect
GNU/Linux; also, a
- “clean” Windows install</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always that will fit
- perfectly.</p>
-</li>
-
-<li>
- <p>Apps for BART
- <a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With proprietary apps, one can only hope that they don't.</p>
-</li>
-
-<li>
- <p>A study found 234 Android apps that track users
by</strong></del></span> <span class="inserted"><ins><em>not really clean
since</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft
puts</em></ins></span> in <span class="removed"><del><strong>stores or played
by TV programs</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>its
- own malware</a>.</p></em></ins></span>
+ BIOS</a> on Windows installs. Note that the specific
+ sabotage method Lenovo used did not affect GNU/Linux; also, a
+ “clean” Windows install is not really clean since <a
+ href="/proprietary/malware-microsoft.html">Microsoft puts in its
+ own malware</a>.</p>
</li>
-
-<span class="removed"><del><strong><li>
- <p>Pairs</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
@@ -682,179 +658,93 @@
<li id="M202101080">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>As</em></ins></span> of <span
class="removed"><del><strong>Android apps can collude</strong></del></span>
<span class="inserted"><ins><em>2021, WhatsApp (one of Facebook's subsidiaries)
is <a
+ <p>As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/">forcing
- its users</em></ins></span> to <span class="removed"><del><strong>transmit
users'</strong></del></span> <span class="inserted"><ins><em>hand over
sensitive</em></ins></span> personal
- <span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>data</a></em></ins></span> to <span
class="removed"><del><strong>servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands</strong></del></span> <span
class="inserted"><ins><em>its parent
+ its users to hand over sensitive personal data</a> to its parent
company. This increases Facebook's power over users, and further
jeopardizes people's privacy and security.</p>
- <p>Instead</em></ins></span> of <span
class="removed"><del><strong>pairs that collude</a>.</p>
-</li>
-
-<li>
-<p>Google Play intentionally sends app developers</strong></del></span>
<span class="inserted"><ins><em>WhatsApp you can use</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details of users that install the app</a>.</p>
-
-<p>Merely asking the “consent” of users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://directory.fsf.org/wiki/Jami">GNU
Jami</a>, which</em></ins></span> is
- <span class="inserted"><ins><em>free software and will</em></ins></span>
not <span class="removed"><del><strong>enough
-to legitimize actions</strong></del></span> <span
class="inserted"><ins><em>collect your data.</p>
+ <p>Instead of WhatsApp you can use <a
+ href="https://directory.fsf.org/wiki/Jami">GNU Jami</a>, which is
+ free software and will not collect your data.</p>
</li>
<li id="M202006260">
<!--#set var="DATE" value='<small
class="date-tag">2020-06</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Most apps are malware, but
- Trump's campaign app,</em></ins></span> like <span
class="removed"><del><strong>this. At this point, most</strong></del></span>
<span class="inserted"><ins><em>Modi's campaign app, is <a
+ Trump's campaign app, like Modi's campaign app, is <a
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
- especially nasty malware, helping companies snoop on</em></ins></span>
users <span class="removed"><del><strong>have
-stopped reading the “Terms and Conditions” that spell out
-what they are “consenting” to. Google should clearly
-and honestly identify the information it collects</strong></del></span> <span
class="inserted"><ins><em>as well
- as snooping</em></ins></span> on <span class="removed"><del><strong>users,
instead
-of hiding</strong></del></span> <span class="inserted"><ins><em>them
itself</a>.</p>
+ especially nasty malware, helping companies snoop on users as well
+ as snooping on them itself</a>.</p>
<p>The article says that Biden's app has a less manipulative overall
- approach, but that does not tell us whether</em></ins></span> it <span
class="removed"><del><strong>in an obscurely worded EULA.</p>
-
-<p>However, to truly protect people's privacy,</strong></del></span>
<span class="inserted"><ins><em>has functionalities</em></ins></span> we <span
class="removed"><del><strong>must prevent Google
-and other companies from getting this personal information
in</strong></del></span>
- <span class="inserted"><ins><em>consider malicious, such as sending
data</em></ins></span> the <span class="removed"><del><strong>first
-place!</p></strong></del></span> <span class="inserted"><ins><em>user
has not explicitly
- asked to send.</p></em></ins></span>
+ approach, but that does not tell us whether it has functionalities we
+ consider malicious, such as sending data the user has not explicitly
+ asked to send.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Google Play (a component</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201601110">
+ <li id="M201601110">
<!--#set var="DATE" value='<small
class="date-tag">2016-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>Android) <a
-
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without their permission</a>.</p>
-
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself to completely stop the tracking.
This</strong></del></span> <span class="inserted"><ins><em>monitoring
- people through “their” phones</em></ins></span> is
- <span class="removed"><del><strong>yet another example of
nonfree</strong></del></span> <span class="inserted"><ins><em><a
+ <p>The natural extension of monitoring
+ people through “their” phones is <a
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary</em></ins></span> software <span
class="removed"><del><strong>pretending</strong></del></span> to <span
class="removed"><del><strong>obey</strong></del></span> <span
class="inserted"><ins><em>make sure they can't
“fool”</em></ins></span>
- the <span class="removed"><del><strong>user,
- when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p></em></ins></span>
+ proprietary software to make sure they can't “fool”
+ the monitoring</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>More than 73% of the
most popular Android apps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201510050">
+ <li id="M201510050">
<!--#set var="DATE" value='<small
class="date-tag">2015-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>According to Edward Snowden,</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233">agencies
can take over
+ <p>According to Edward Snowden, <a
+ href="http://www.bbc.com/news/uk-34444233">agencies can take over
smartphones</a> by sending hidden text messages which enable
- them to turn the phones on</em></ins></span> and <span
class="removed"><del><strong>location information</a> of their users with
third parties.</p>
- </li>
-
- <li><p>“Cryptic communication,”
unrelated</strong></del></span> <span class="inserted"><ins><em>off,
listen</em></ins></span> to the <span class="removed"><del><strong>app's
functionality,
- was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in</strong></del></span> <span class="inserted"><ins><em>microphone,
- retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>500 most popular gratis Android
apps</a>.</p>
-
- <p>The article should not have described these apps as
- “free”—they are not free software. The clear way to say
- “zero price” is “gratis.”</p>
-
- <p>The article takes for granted that</strong></del></span> <span
class="inserted"><ins><em>GPS, take photographs, read
+ them to turn the phones on and off, listen to the microphone,
+ retrieve geo-location data from the GPS, take photographs, read
text messages, read call, location and web browsing history, and
- read</em></ins></span> the <span class="removed"><del><strong>usual
analytics tools are
- legitimate, but</strong></del></span> <span
class="inserted"><ins><em>contact list. This malware</em></ins></span> is <span
class="removed"><del><strong>that valid? Software developers have no
right</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to
- <span class="removed"><del><strong>analyze what users are doing or how.
“Analytics” tools that snoop are
- just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>disguise itself
- from investigation.</p></em></ins></span>
+ read the contact list. This malware is designed to disguise itself
+ from investigation.</p>
</li>
- <span class="removed"><del><strong><li><p>Gratis Android apps
(but</strong></del></span>
- <span class="inserted"><ins><em><li id="M201311120">
+ <li id="M201311120">
<!--#set var="DATE" value='<small
class="date-tag">2013-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones,
- Android, and BlackBerry</a>. While there is</em></ins></span> not
<span class="inserted"><ins><em>much
+ Android, and BlackBerry</a>. While there is not much
detail here, it seems that this does not operate via
the universal back door that we know nearly all portable
- phones have. It may involve exploiting various bugs. There
are</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>)
- connect to 100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
- on</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots of bugs in</em></ins></span> the <span
class="removed"><del><strong>average.</p></strong></del></span> <span
class="inserted"><ins><em>phones' radio
software</a>.</p></em></ins></span>
+ phones have. It may involve exploiting various bugs. There are <a
+
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ lots of bugs in the phones' radio software</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware is present in
some Android devices when they are sold.
- Some Motorola</strong></del></span>
- <span class="inserted"><ins><em><li id="M201307000">
+ <li id="M201307000">
<!--#set var="DATE" value='<small
class="date-tag">2013-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Portable</em></ins></span> phones <span
class="removed"><del><strong>modify Android to</strong></del></span> <span
class="inserted"><ins><em>with GPS</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will</em></ins></span> send <span class="removed"><del><strong>personal
data to Motorola</a>.</p>
- </li>
-
- <li><p>Some manufacturers add a
- <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p>
- </li>
-
- <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any
file</strong></del></span> <span class="inserted"><ins><em>their GPS
location</em></ins></span> on <span class="removed"><del><strong>the
system.</p></strong></del></span> <span class="inserted"><ins><em>remote
command, and users cannot stop
+ <p>Portable phones with GPS <a
+
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+ will send their GPS location on remote command, and users cannot stop
them</a>. (The US says it will eventually require all new portable
phones
- to have GPS.)</p></em></ins></span>
+ to have GPS.)</p>
</li>
</ul>
-
-<span class="removed"><del><strong><!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
-</div>
-<div style="clear: left;"></div></strong></del></span>
-
-
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareIniThings">Spyware
in iThings</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareIniThings">iThings</h4></em></ins></span>
+ <h4 id="SpywareIniThings">iThings</h4>
<span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Apple proposes</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202009183">
<!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Facebook</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without having your
fingerprints
- taken. Users would have no way to tell whether the phone is
snooping</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops</em></ins></span>
- on
- <span class="removed"><del><strong>them.</p></li>
-
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots of personal data to Apple's servers</a>. Big Brother can
- get them from there.</p>
- </li>
-
- <li><p>The iMessage app</strong></del></span> <span
class="inserted"><ins><em>Instagram</a> users by surreptitously
turning</em></ins></span> on <span
class="removed"><del><strong>iThings</strong></del></span> <span
class="inserted"><ins><em>the device's
+ <p>Facebook <a
+
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops
+ on Instagram</a> users by surreptitously turning on the device's
camera.</p>
</li>
@@ -862,74 +752,47 @@
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Apple whistleblower Thomas Le Bonniec reports that Apple
- made a practice of surreptitiously activating the Siri software
to</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf">
+ made a practice of surreptitiously activating the Siri software to <a
+
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf">
record users' conversations when they had not activated Siri</a>.
This was not just occasional, it was systematic practice.</p>
- <p>His job was to listen to these recordings, in</em></ins></span> a
<span class="removed"><del><strong>server every phone
number</strong></del></span> <span class="inserted"><ins><em>group that made
+ <p>His job was to listen to these recordings, in a group that made
transcripts of them. He does not believes that Apple has ceased this
practice.</p>
- <p>The only reliable way to prevent this is, for the
program</em></ins></span> that
- <span class="inserted"><ins><em>controls access to the microphone to
decide when</em></ins></span> the user <span class="removed"><del><strong>types
into it</a>;</strong></del></span> <span class="inserted"><ins><em>has
- “activated” any service, to be free software,
and</em></ins></span> the <span class="removed"><del><strong>server records
these numbers for at least 30
- days.</p>
- </li>
-
- <li><p>Users cannot</strong></del></span>
- <span class="inserted"><ins><em>operating system under it free as well.
This way, users could</em></ins></span> make <span
class="removed"><del><strong>an</strong></del></span>
- <span class="inserted"><ins><em>sure</em></ins></span> Apple <span
class="removed"><del><strong>ID</strong></del></span> <span
class="inserted"><ins><em>can't listen to them.</p>
+ <p>The only reliable way to prevent this is, for the program that
+ controls access to the microphone to decide when the user has
+ “activated” any service, to be free software, and the
+ operating system under it free as well. This way, users could make
+ sure Apple can't listen to them.</p>
</li>
<li id="M201910131">
<!--#set var="DATE" value='<small
class="date-tag">2019-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Safari occasionally</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
- sends browsing data from Apple devices in China</em></ins></span> to <span
class="removed"><del><strong>install even gratis apps)</a>
- without giving a valid email address and receiving</strong></del></span>
the <span class="removed"><del><strong>code Apple
- sends</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
- Browsing service</a>,</em></ins></span> to <span
class="removed"><del><strong>it.</p>
- </li>
-
- <li><p>Around 47% of</strong></del></span> <span
class="inserted"><ins><em>check URLs that possibly correspond to
+ <p>Safari occasionally <a
+
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing data from Apple devices in China to the Tencent Safe
+ Browsing service</a>, to check URLs that possibly correspond to
“fraudulent” websites. Since Tencent collaborates
- with</em></ins></span> the <span class="inserted"><ins><em>Chinese
government, its Safe Browsing black list</em></ins></span> most <span
class="removed"><del><strong>popular iOS apps
- <a class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a></strong></del></span>
<span class="inserted"><ins><em>certainly
- contains the websites</em></ins></span> of <span
class="inserted"><ins><em>political opponents. By linking the requests
+ with the Chinese government, its Safe Browsing black list most certainly
+ contains the websites of political opponents. By linking the requests
originating from single IP addresses, the government can identify
- dissenters in China and Hong Kong, thus endangering</em></ins></span>
their <span class="removed"><del><strong>users with third
parties.</p></strong></del></span> <span
class="inserted"><ins><em>lives.</p></em></ins></span>
+ dissenters in China and Hong Kong, thus endangering their lives.</p>
</li>
- <span class="removed"><del><strong><li><p>iThings automatically
upload to</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905280">
+ <li id="M201905280">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>In spite of</em></ins></span> Apple's <span
class="removed"><del><strong>servers all the photos and
- videos they make.</p>
-
- <blockquote><p>
- iCloud Photo Library stores every photo and video you take,
- and keeps them up</strong></del></span> <span
class="inserted"><ins><em>supposed commitment</em></ins></span> to <span
class="removed"><del><strong>date on all your devices.
- Any edits you make</strong></del></span>
- <span class="inserted"><ins><em>privacy, iPhone apps contain trackers
that</em></ins></span> are <span class="removed"><del><strong>automatically
updated everywhere. [...]
- </p></blockquote>
-
- <p>(From</strong></del></span> <span class="inserted"><ins><em>busy
at night</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
- information</a> as accessed on 24 Sep 2015.)</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers that are busy at night <a
+
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
sending users' personal information to third parties</a>.</p>
<p>The article mentions specific examples: Microsoft OneDrive,
- Intuitâs Mint, Nike, Spotify,</em></ins></span> The <span
class="removed"><del><strong>iCloud feature is
- <a
href="https://support.apple.com/en-us/HT202033">activated</strong></del></span>
<span class="inserted"><ins><em>Washington Post, The Weather
- Channel (owned</em></ins></span> by <span
class="inserted"><ins><em>IBM),</em></ins></span> the
- <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
- “please</strong></del></span> <span
class="inserted"><ins><em>crime-alert service Citizen, Yelp
+ Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
+ Channel (owned by IBM), the crime-alert service Citizen, Yelp
and DoorDash. But it is likely that most nonfree apps contain
trackers. Some of these send personally identifying data such as phone
fingerprint, exact location, email address, phone number or even
@@ -999,7 +862,7 @@
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
information</a> as accessed on 24 Sep 2015.) The iCloud feature is
<a href="https://support.apple.com/en-us/HT202033">activated by the
- startup of iOS</a>. The term “cloud” means
“please</em></ins></span>
+ startup of iOS</a>. The term “cloud” means “please
don't ask where.”</p>
<p>There is a way to
@@ -1010,14 +873,8 @@
<p>Unknown people apparently took advantage of this to <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA can access any of them through <a
<span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware in iThings:
- the <a class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+ security to get at them, but NSA can access any of them through <a
+
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
</li>
<li id="M201409220">
@@ -1050,13 +907,11 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The <a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores</em></ins></span> determine exactly where
the iThing is, and
+ iBeacon</a> lets stores determine exactly where the iThing is, and
get other info too.</p>
</li>
- <span
class="removed"><del><strong><li><p>There</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201312300">
+ <li id="M201312300">
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
@@ -1077,67 +932,40 @@
<li id="M201210170">
<!--#set var="DATE" value='<small
class="date-tag">2012-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>There</em></ins></span> is also a feature for web sites to track
users, which is <a
+ <p>There is also a feature for web sites to track users, which is
<a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it is
still true in iOS 7.)</p>
</li>
- <span class="removed"><del><strong><li><p>The iThing also
- <a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201204280">
+ <li id="M201204280">
<!--#set var="DATE" value='<small
class="date-tag">2012-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Users cannot make an</em></ins></span> Apple <span
class="removed"><del><strong>its geolocation</a> by default, though that
can be
- turned off.</p>
- </li>
-
- <li><p>Apple can,</strong></del></span> <span
class="inserted"><ins><em>ID (<a
+ <p>Users cannot make an Apple ID (<a
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary
to install even gratis apps</a>) without giving a valid
- email address</em></ins></span> and <span
class="removed"><del><strong>regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>receiving</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p>
- </li>
-
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either</strong></del></span> <span
class="inserted"><ins><em>verification code</em></ins></span> Apple <span
class="removed"><del><strong>helps the NSA snoop on all the data in an iThing,
- or it is totally incompetent.</a></p>
- </li>
-
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em>sends</em></ins></span>
- to <span class="removed"><del><strong>exist for no
- possible purpose other than surveillance</a>. Here is the
- <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>it.</p></em></ins></span>
+ email address and receiving the verification code Apple sends
+ to it.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware
in</strong></del></span> <span
class="inserted"><ins><em>id="SpywareInAndroid">Android</em></ins></span>
Telephones</h4>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInAndroid">#SpywareInAndroid</a>)</span></em></ins></span>
+ <h4 id="SpywareInAndroid">Android Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInAndroid">#SpywareInAndroid</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>According to Edward Snowden,</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202012070">
<!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Baidu apps were</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/">
- caught collecting sensitive personal data</a> that</em></ins></span>
can <span class="removed"><del><strong>take over smartphones</a>
- by sending hidden text messages which enable</strong></del></span> <span
class="inserted"><ins><em>be used for
- lifetime tracking of users, and putting</em></ins></span> them <span
class="inserted"><ins><em>in danger. More than 1.4
+ <p>Baidu apps were <a
+
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/">
+ caught collecting sensitive personal data</a> that can be used for
+ lifetime tracking of users, and putting them in danger. More than 1.4
billion people worldwide are affected by these proprietary apps, and
users' privacy is jeopardized by this surveillance tool. Data collected
- by Baidu may be handed over</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> the <span
class="inserted"><ins><em>Chinese government, possibly
+ by Baidu may be handed over to the Chinese government, possibly
putting Chinese people in danger.</p>
</li>
@@ -1153,19 +981,18 @@
<li id="M202004300">
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Xiaomi</em></ins></span> phones
- <span class="removed"><del><strong>on</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Xiaomi phones <a
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
many actions the user takes</a>: starting an app, looking at a
folder,
visiting a website, listening to a song. They send device identifying
information too.</p>
- <p>Other nonfree programs snoop too. For instance,
Spotify</em></ins></span> and <span class="removed"><del><strong>off,
listen</strong></del></span>
- <span class="inserted"><ins><em>other streaming dis-services make a
dossier about each user, and <a
+ <p>Other nonfree programs snoop too. For instance, Spotify and
+ other streaming dis-services make a dossier about each user, and <a
href="/malware/proprietary-surveillance.html#M201508210"> they make
- users identify themselves</em></ins></span> to <span
class="inserted"><ins><em>pay</a>. Out, out, damned Spotify!</p>
+ users identify themselves to pay</a>. Out, out, damned
Spotify!</p>
- <p>Forbes exonerates</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location
data</strong></del></span> <span class="inserted"><ins><em>same wrongs when the
culprits are not Chinese,
+ <p>Forbes exonerates the same wrongs when the culprits are not
Chinese,
but we condemn this no matter who does it.</p>
</li>
@@ -1174,7 +1001,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Facebook's app got “consent” to <a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
- upload call logs automatically</em></ins></span> from <span
class="inserted"><ins><em>Android phones</a> while disguising
+ upload call logs automatically from Android phones</a> while
disguising
what the “consent” was for.</p>
</li>
@@ -1182,12 +1009,10 @@
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>An Android phone was observed to track location even while
- in airplane mode. It didn't send</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call,</strong></del></span> location <span
class="inserted"><ins><em>data while in
+ in airplane mode. It didn't send the location data while in
airplane mode. Instead, <a
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up the data,</em></ins></span> and <span
class="removed"><del><strong>web
- browsing history,</strong></del></span> <span
class="inserted"><ins><em>sent them all later</a>.</p>
+ it saved up the data, and sent them all later</a>.</p>
</li>
<li id="M201711210">
@@ -1214,35 +1039,25 @@
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
tracks the users' movements without their permission</a>.</p>
- <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>location tracking, you must
- disable Google Play itself to completely stop</em></ins></span> the <span
class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>tracking.</em></ins></span> This <span
class="removed"><del><strong>malware</strong></del></span> is <span
class="removed"><del><strong>designed</strong></del></span>
- <span class="inserted"><ins><em>yet another example of nonfree software
pretending</em></ins></span> to
- <span class="removed"><del><strong>disguise itself from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>obey the user,
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself to completely stop the tracking. This is
+ yet another example of nonfree software pretending to obey the user,
when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p></em></ins></span>
+ unthinkable with free software.</p>
</li>
- <span
class="removed"><del><strong><li><p>Samsung</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201507030">
+ <li id="M201507030">
<!--#set var="DATE" value='<small
class="date-tag">2015-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Samsung</em></ins></span> phones come with <a
+ <p>Samsung phones come with <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>, and they send so much data that their
transmission is a substantial expense for users. Said transmission,
not wanted or requested by the user, clearly must constitute spying
- of some
- <span class="removed"><del><strong>kind.</p></li>
-
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>kind.</p></em></ins></span>
+ of some kind.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware in Android
phones</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201403120">
+ <li id="M201403120">
<!--#set var="DATE" value='<small
class="date-tag">2014-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a href="/proprietary/proprietary-back-doors.html#samsung">
@@ -1252,33 +1067,25 @@
<li id="M201308010">
<!--#set var="DATE" value='<small
class="date-tag">2013-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Spyware in Android phones</em></ins></span> (and Windows?
laptops): The Wall Street
+ <p>Spyware in Android phones (and Windows? laptops): The Wall Street
Journal (in an article blocked from us by a paywall) reports that <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
the FBI can remotely activate the GPS and microphone in Android phones
- and <span class="removed"><del><strong>laptops</a>.
- (I suspect this means</strong></del></span> <span
class="inserted"><ins><em>laptops</a> (presumably</em></ins></span>
Windows <span class="removed"><del><strong>laptops.)</strong></del></span>
<span class="inserted"><ins><em>laptops).</em></ins></span> Here is <a
+ and laptops</a> (presumably Windows laptops). Here is <a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
- remote command and users cannot stop them:</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201307280">
+ <li id="M201307280">
<!--#set var="DATE" value='<small
class="date-tag">2013-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Spyware is present in some Android devices when they are
sold. Some Motorola phones, made when this company was owned
- by Google, use a modified version of Android that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable
phones</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal data</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p></em></ins></span>
+ by Google, use a modified version of Android that <a
+
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ sends personal data to Motorola</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201307250">
+ <li id="M201307250">
<!--#set var="DATE" value='<small
class="date-tag">2013-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>A Motorola phone <a
@@ -1293,16 +1100,14 @@
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
the personal details of users that install the app</a>.</p>
- <p>Merely asking the “consent” of
users</em></ins></span> is <span class="inserted"><ins><em>not
enough</em></ins></span> to <span
class="removed"><del><strong>restrict</strong></del></span>
- <span class="inserted"><ins><em>legitimize actions like this. At this
point, most users have stopped
- reading</em></ins></span> the <span class="removed"><del><strong>use of
data on</strong></del></span> <span class="inserted"><ins><em>“Terms and
Conditions” that spell out what
+ <p>Merely asking the “consent” of users is not enough to
+ legitimize actions like this. At this point, most users have stopped
+ reading the “Terms and Conditions” that spell out what
they are “consenting” to. Google should clearly and
- honestly identify</em></ins></span> the <span
class="removed"><del><strong>user's computer, but</strong></del></span> <span
class="inserted"><ins><em>information</em></ins></span> it <span
class="removed"><del><strong>does surveillance
- too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"></strong></del></span>
<span class="inserted"><ins><em>collects on users, instead of
- hiding</em></ins></span> it <span
class="removed"><del><strong>tries</strong></del></span> <span
class="inserted"><ins><em>in an obscurely worded EULA.</p>
+ honestly identify the information it collects on users, instead of
+ hiding it in an obscurely worded EULA.</p>
- <p>However,</em></ins></span> to <span
class="removed"><del><strong>get the user's list of other</strong></del></span>
<span class="inserted"><ins><em>truly protect</em></ins></span> people's <span
class="removed"><del><strong>phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>privacy, we must prevent Google
+ <p>However, to truly protect people's privacy, we must prevent Google
and other companies from getting this personal information in the
first place!</p>
</li>
@@ -1312,81 +1117,48 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Some manufacturers add a <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ</a>.</p></em></ins></span>
+ hidden general surveillance package such as Carrier IQ</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
+ <h4 id="SpywareInElectronicReaders">E-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li>
- <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201603080">
<!--#set var="DATE" value='<small
class="date-tag">2016-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>E-books can contain JavaScript code, and</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data in the
device</a>.
- </p>
- </li>
-
- <li>
- <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
- pre-install</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops</em></ins></span> on <span
class="removed"><del><strong>some of its phones. The app will give Verizon the
same
- information about the users' searches that Google normally gets when
- they use its search engine.</p>
-
- <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>readers</a>.</p>
+ <p>E-books can contain JavaScript code, and <a
+
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops on readers</a>.</p>
</li>
<li id="M201410080">
<!--#set var="DATE" value='<small
class="date-tag">2014-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Adobe made “Digital Editions,”</em></ins></span>
- the <span class="removed"><del><strong>app is</strong></del></span> <span
class="inserted"><ins><em>e-reader used by most US libraries,</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and the
- user must explicitly opt-in before the app takes effect. However, the
- app remains spyware—an “optional”
piece</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</em></ins></span> of <span class="removed"><del><strong>spyware
is
- still spyware.</p>
- </li>
-
- <li><p>The Meitu photo-editing
- app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user</strong></del></span> data to <span class="removed"><del><strong>a
Chinese company</a>.</p></li>
-
- <li><p>A pregnancy test controller application
not</strong></del></span> <span class="inserted"><ins><em>Adobe</a>.
Adobe's “excuse”: it's
+ <p>Adobe made “Digital Editions,”
+ the e-reader used by most US libraries, <a
+
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
needed to check DRM!</p>
</li>
<li id="M201212030">
<!--#set var="DATE" value='<small
class="date-tag">2012-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Spyware in many e-readers—not</em></ins></span> only
- <span class="removed"><del><strong>can</strong></del></span> <span
class="inserted"><ins><em>the Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts of data in</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
- report even which page</em></ins></span> the <span
class="removed"><del><strong>phone, and</strong></del></span> <span
class="inserted"><ins><em>user reads at what time</a>.</p>
+ <p>Spyware in many e-readers—not only the Kindle: <a
+ href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
+ report even which page the user reads at what time</a>.</p>
</li>
</ul>
<div class="big-section">
- <h3 id="SpywareInApplications">Spyware</em></ins></span> in <span
class="removed"><del><strong>server accounts, it can
- alter them too</a>.
- </p></li>
-
- <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>Applications</h3>
+ <h3 id="SpywareInApplications">Spyware in Applications</h3>
<span class="anchor-reference-id">(<a
href="#SpywareInApplications">#SpywareInApplications</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -1400,45 +1172,25 @@
<li id="M202011260">
<!--#set var="DATE" value='<small
class="date-tag">2020-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft's Office 365 suite enables employers</em></ins></span>
<a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
-
- <p>This example illustrates how “getting the user's
consent”
- for surveillance is inadequate as</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance">to
- snoop on each employee</a>. After</em></ins></span>
- a <span class="removed"><del><strong>protection against massive
- surveillance.</p>
- </li>
-
- <li><p>Google's new voice messaging app</strong></del></span>
<span class="inserted"><ins><em>public outburst, Microsoft stated
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance">it
- would remove this capability</a>. Let's hope
so.</p></em></ins></span>
+ <p>Microsoft's Office 365 suite enables employers <a
+
href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance">to
+ snoop on each employee</a>. After
+ a public outburst, Microsoft stated that <a
+
href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance">it
+ would remove this capability</a>. Let's hope so.</p>
</li>
- <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201912190">
+ <li id="M201912190">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Some Avast and AVG extensions
- for Firefox and Chrome were found to</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"></em></ins></span>
- snoop on <span class="removed"><del><strong>what
radio</strong></del></span> <span class="inserted"><ins><em>users' detailed
browsing habits</a>. Mozilla</em></ins></span> and <span
class="removed"><del><strong>TV programs</strong></del></span> <span
class="inserted"><ins><em>Google
+ for Firefox and Chrome were found to <a
+
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
+ snoop on users' detailed browsing habits</a>. Mozilla and Google
removed the problematic extensions from their stores, but this shows
- once more how unsafe nonfree software can be. Tools that</em></ins></span>
are <span class="removed"><del><strong>playing nearby</a>. Also on what
users post on various sites
- such as Facebook, Google+ and Twitter.</p>
- </li>
-
- <li><p>Facebook's new Magic Photo app
- <a
-href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known faces</a>,
- and suggests you</strong></del></span> <span
class="inserted"><ins><em>supposed</em></ins></span>
- to <span class="removed"><del><strong>share</strong></del></span> <span
class="inserted"><ins><em>protect a proprietary system are, instead, infecting
it with
- additional malware (the system itself being</em></ins></span> the <span
class="removed"><del><strong>picture you take according</strong></del></span>
<span class="inserted"><ins><em>original malware).</p>
+ once more how unsafe nonfree software can be. Tools that are supposed
+ to protect a proprietary system are, instead, infecting it with
+ additional malware (the system itself being the original
malware).</p>
</li>
<li id="M201811020">
@@ -1446,13 +1198,13 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Foundry's graphics software <a
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information</em></ins></span> to <span
class="inserted"><ins><em>identify</em></ins></span> who is <span
class="removed"><del><strong>in the frame.</p></strong></del></span>
<span class="inserted"><ins><em>running it</a>. The result is
+ reports information to identify who is running it</a>. The result is
often a legal threat demanding a lot of money.</p>
<p>The fact that this is used for repression of forbidden sharing
- makes it even more vicious.</p></em></ins></span>
+ makes it even more vicious.</p>
- <p>This <span class="removed"><del><strong>spyware feature seems to
require online access</strong></del></span> <span
class="inserted"><ins><em>illustrates that making unauthorized copies of
nonfree software
+ <p>This illustrates that making unauthorized copies of nonfree
software
is not a cure for the injustice of nonfree software. It may avoid
paying for the nasty thing, but cannot make it less nasty.</p>
</li>
@@ -1470,33 +1222,23 @@
<p>Many cr…apps, developed by various
companies for various organizations, do <a
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth">
- location tracking unknown</em></ins></span> to <span
class="inserted"><ins><em>those companies and those
- organizations</a>. It's actually</em></ins></span> some
- <span class="removed"><del><strong>known-faces database, which
means</strong></del></span> <span class="inserted"><ins><em>widely used
libraries that do</em></ins></span>
- the <span class="removed"><del><strong>pictures are
likely</strong></del></span> <span class="inserted"><ins><em>tracking.</p>
+ location tracking unknown to those companies and those
+ organizations</a>. It's actually some widely used libraries that do
+ the tracking.</p>
<p>What's unusual here is that proprietary software developer A
tricks
proprietary software developers B1 … B50 into making platforms for
- A</em></ins></span> to <span class="removed"><del><strong>be
- sent across</strong></del></span> <span
class="inserted"><ins><em>mistreat</em></ins></span> the <span
class="removed"><del><strong>wire to Facebook's servers and face-recognition
- algorithms.</p>
-
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>end user.</p>
+ A to mistreat the end user.</p>
</li>
<li id="M202003260">
<!--#set var="DATE" value='<small
class="date-tag">2020-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Apple iOS version</em></ins></span> of <span
class="removed"><del><strong>Facebook</strong></del></span> <span
class="inserted"><ins><em>Zoom <a
+ <p>The Apple iOS version of Zoom <a
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account">is
- sending</em></ins></span> users' <span
class="removed"><del><strong>pictures are private
- anymore,</strong></del></span> <span class="inserted"><ins><em>data to
Facebook</a></em></ins></span> even if the user <span
class="removed"><del><strong>didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>doesn't have
- a Facebook account. According</em></ins></span> to the <span
class="removed"><del><strong>service.</p>
- </li>
-
- <li><p>Like most “music screaming” disservices,
Spotify
- is based</strong></del></span> <span class="inserted"><ins><em>article,
Zoom and Facebook
- don't even mention this surveillance</em></ins></span> on <span
class="removed"><del><strong>proprietary malware (DRM</strong></del></span>
<span class="inserted"><ins><em>their privacy policy page,
+ sending users' data to Facebook</a> even if the user doesn't have
+ a Facebook account. According to the article, Zoom and Facebook
+ don't even mention this surveillance on their privacy policy page,
making this an obvious violation of people's privacy even in their
own terms.</p>
</li>
@@ -1505,17 +1247,9 @@
<!--#set var="DATE" value='<small
class="date-tag">2020-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The Alipay Health Code app
- estimates whether the user has Covid-19</em></ins></span> and <span
class="removed"><del><strong>snooping). In August
- 2015 it</strong></del></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some
- are starting to realize that it is nasty.</p>
-
- <p>This article shows</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
- tells</em></ins></span> the <span class="removed"><del><strong><a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping</strong></del></span> <span
class="inserted"><ins><em>cops directly</a>.</p>
+ estimates whether the user has Covid-19 and <a
+
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
+ tells the cops directly</a>.</p>
</li>
<li id="M202001290">
@@ -1523,93 +1257,63 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Amazon Ring app does <a
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
- surveillance for other companies</em></ins></span> as <span
class="removed"><del><strong>a way</strong></del></span> <span
class="inserted"><ins><em>well as for Amazon</a>.</p>
+ surveillance for other companies as well as for Amazon</a>.</p>
</li>
<li id="M201912220">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The ToToc messaging app seems</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
- whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>be</em></ins></span> a <span
class="removed"><del><strong>typical example of</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>The ToToc messaging app seems to be a <a
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
- spying tool for</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>government</em></ins></span> of the <span
class="removed"><del><strong>proprietary</strong></del></span> <span
class="inserted"><ins><em>United Arab Emirates</a>.
+ spying tool for the government of the United Arab Emirates</a>.
Any nonfree program could be doing this, and that is a good
- reason to use free</em></ins></span> software <span
class="removed"><del><strong>industry towards
- those they have subjugated.</p>
-
- <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>instead.</p>
+ reason to use free software instead.</p>
<p><small>Note: this article uses the word “free”
in
- the sense of
“gratis.”</small></p></em></ins></span>
+ the sense of “gratis.”</small></p>
</li>
- <span class="removed"><del><strong><li><p>Many proprietary
apps</strong></del></span>
- <span class="inserted"><ins><em><li id="M201912090">
+ <li id="M201912090">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>iMonsters and Android phones,
- when used</em></ins></span> for <span class="removed"><del><strong>mobile
devices report which other
- apps the user has
- installed.</strong></del></span> <span class="inserted"><ins><em>work,
give employers powerful</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
+ when used for work, give employers powerful <a
+
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
snooping and sabotage capabilities</a> if they install their own
software on the device. Many employers demand to do this. For the
- employee,</em></ins></span> this <span class="removed"><del><strong>in a
way that at least</strong></del></span> is <span
class="removed"><del><strong>visible</strong></del></span> <span
class="inserted"><ins><em>simply nonfree software, as fundamentally
unjust</em></ins></span>
- and
- <span class="removed"><del><strong>optional</a>.
Not</strong></del></span> as <span
class="removed"><del><strong>bad</strong></del></span> <span
class="inserted"><ins><em>dangerous</em></ins></span> as <span
class="removed"><del><strong>what the others do.</p>
+ employee, this is simply nonfree software, as fundamentally unjust
+ and as dangerous as any other nonfree software.</p>
</li>
- <li><p>FTC says most mobile apps for children don't respect
privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>any other nonfree
software.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201910130">
+ <li id="M201910130">
<!--#set var="DATE" value='<small
class="date-tag">2019-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Chinese Communist Party's “Study</em></ins></span>
- the <span class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>Great
Nation” app requires users to grant it <a
+ <p>The Chinese Communist Party's “Study
+ the Great Nation” app requires users to grant it <a
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access</em></ins></span> to the <span
class="removed"><del><strong>snooping done by</strong></del></span> <span
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts,
and
- internet history</a>, and</em></ins></span> the <span
class="removed"><del><strong>phone company,</strong></del></span> <span
class="inserted"><ins><em>Android version was found to contain a
+ access to the phone's microphone, photos, text messages, contacts, and
+ internet history</a>, and the Android version was found to contain a
back-door allowing developers to run any code they wish in the users'
- phone, as “superusers.” Downloading</em></ins></span> and
<span class="removed"><del><strong>perhaps by</strong></del></span> <span
class="inserted"><ins><em>using this
+ phone, as “superusers.” Downloading and using this
app is mandatory at some workplaces.</p>
<p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of</em></ins></span> the <span
class="removed"><del><strong>OS</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated, but
- readable after copy-pasting</em></ins></span> in <span
class="inserted"><ins><em>a text editor) includes a clarification
- saying that</em></ins></span> the
- <span class="removed"><del><strong>phone.</p>
-
- <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>tests were only performed on</em></ins></span> the
<span class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em>Android version</em></ins></span>
- of <span class="removed"><del><strong>whether</strong></del></span> the
<span class="removed"><del><strong>app developers get
- users</strong></del></span> <span class="inserted"><ins><em>app, and
that, according</em></ins></span> to <span class="removed"><del><strong>say
“I agree”. That is no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>Apple,
“this kind of
+ Washington Post version of the article</a> (partly obfuscated, but
+ readable after copy-pasting in a text editor) includes a clarification
+ saying that the tests were only performed on the Android version
+ of the app, and that, according to Apple, “this kind of
‘superuser’ surveillance could not be conducted on
- Apple's operating system.”</p></em></ins></span>
+ Apple's operating system.”</p>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201909091">
+ <li id="M201909091">
<!--#set var="DATE" value='<small
class="date-tag">2019-09</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p>The <span class="removed"><del><strong>FTC criticized
this</strong></del></span> <span
class="inserted"><ins><em>Facebook</em></ins></span> app <span
class="removed"><del><strong>because</strong></del></span> <span
class="inserted"><ins><em><a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The Facebook app <a
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks users even when</em></ins></span> it <span
class="removed"><del><strong>asked the user to
- approve sending personal data to</strong></del></span> <span
class="inserted"><ins><em>is turned off</a>, after tricking them
- into giving</em></ins></span> the app <span
class="removed"><del><strong>developer but did not
- ask about sending it</strong></del></span> <span
class="inserted"><ins><em>broad permissions in order</em></ins></span> to <span
class="removed"><del><strong>other companies. This shows the
- weakness</strong></del></span> <span class="inserted"><ins><em>use
one</em></ins></span> of <span class="removed"><del><strong>the
reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should a flashlight
- app</strong></del></span> <span class="inserted"><ins><em>its
+ tracks users even when it is turned off</a>, after tricking them
+ into giving the app broad permissions in order to use one of its
functionalities.</p>
</li>
@@ -1617,8 +1321,8 @@
<!--#set var="DATE" value='<small
class="date-tag">2019-09</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Some nonfree period-tracking apps including MIA Fem and Maya <a
-
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"></em></ins></span>
- send <span class="removed"><del><strong>any
information</strong></del></span> <span class="inserted"><ins><em>intimate
details of users' lives</em></ins></span> to <span
class="removed"><del><strong>anyone?</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
+
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
+ send intimate details of users' lives to Facebook</a>.</p>
</li>
<li id="M201909060">
@@ -1627,33 +1331,21 @@
<p>Keeping track of who downloads a proprietary
program is a form of surveillance. There is a
proprietary program for adjusting a certain telescopic rifle sight. <a
-
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"></em></ins></span>
- A <span class="inserted"><ins><em>US prosecutor has demanded the list of
all the 10,000 or more people
+
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded the list of all the 10,000 or more people
who have installed it</a>.</p>
- <p>With a</em></ins></span> free <span
class="removed"><del><strong>software flashlight
- app</strong></del></span> <span class="inserted"><ins><em>program
there</em></ins></span> would <span
class="removed"><del><strong>not.</p></strong></del></span> <span
class="inserted"><ins><em>not be a list of who has installed
- it.</p></em></ins></span>
+ <p>With a free program there would not be a list of who has installed
+ it.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware in Games</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
-</div>
-
-<ul>
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
- <span class="inserted"><ins><em><li id="M201907081">
+ <li id="M201907081">
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many unscrupulous mobile-app developers keep finding ways
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
- bypass user's settings</a>, regulations,</em></ins></span> and <span
class="removed"><del><strong>then sends personal</strong></del></span> <span
class="inserted"><ins><em>privacy-enhancing features
- of the operating system, in order to gather as much
private</em></ins></span> data <span
class="removed"><del><strong>about</strong></del></span> <span
class="inserted"><ins><em>as
+ <p>Many unscrupulous mobile-app developers keep finding ways to <a
+
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations, and privacy-enhancing
features
+ of the operating system, in order to gather as much private data as
they possibly can.</p>
<p>Thus, we can't trust rules against spying. What we can trust is
@@ -1666,198 +1358,91 @@
<p>Many Android apps can track
users' movements even when the user says <a
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow</em></ins></span> them <span
class="inserted"><ins><em>access</em></ins></span> to
- <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>locations</a>.</p>
+ not to allow them access to locations</a>.</p>
<p>This involves an apparently unintentional weakness in Android,
- exploited intentionally by malicious apps.</p></em></ins></span>
+ exploited intentionally by malicious apps.</p>
</li>
- <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905300">
+ <li id="M201905300">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Femm “fertility” app is secretly
a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
- tool</em></ins></span> for <span class="removed"><del><strong>companies,
and the NSA takes advantage to spy through it too</a>.
- Here's information</strong></del></span> <span
class="inserted"><ins><em>propaganda</a> by natalist Christians. It
spreads distrust
+ <p>The Femm “fertility” app is secretly a <a
+
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
+ tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
- <p>It snoops</em></ins></span> on
- <span class="removed"><del><strong><a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>users, too, as you must expect from nonfree
- programs.</p></em></ins></span>
+ <p>It snoops on users, too, as you must expect from nonfree
+ programs.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>The “smart” toys My Friend Cayla and i-Que
transmit</strong></del></span>
- <span class="inserted"><ins><em><li id="M201905060">
+ <li id="M201905060">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement</em></ins></span> to <span class="removed"><del><strong>Nuance
Communications</a>,</strong></del></span> <span
class="inserted"><ins><em>run</em></ins></span> a <span
class="removed"><del><strong>speech recognition company based in the
U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</strong></del></span> <span
class="inserted"><ins><em>proprietary phone app</a> to be allowed
into</em></ins></span>
- the <span class="removed"><del><strong>toys with</strong></del></span>
<span class="inserted"><ins><em>event.</p>
-
- <p>This app is</em></ins></span> a <span
class="removed"><del><strong>mobile phone. This would
- enable crackers to listen in</strong></del></span> <span
class="inserted"><ins><em>spyware that can snoop</em></ins></span> on a <span
class="removed"><del><strong>child's speech,</strong></del></span> <span
class="inserted"><ins><em>lot of
- sensitive data, including user's location</em></ins></span> and <span
class="removed"><del><strong>even speak
- into the toys themselves.</p>
- </li>
-
- <li>
- <p>A computerized vibrator</strong></del></span> <span
class="inserted"><ins><em>contact list, and has</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
-
- <p>The app was reporting the temperature of</strong></del></span>
- <span
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether it was
surrounded</strong></del></span> <span
class="inserted"><ins><em>phone.</p>
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a proprietary phone app</a> to be allowed into
+ the event.</p>
+
+ <p>This app is a spyware that can snoop on a lot of
+ sensitive data, including user's location and contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over the phone.</p>
</li>
<li id="M201904131">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Data collected</em></ins></span> by <span
class="removed"><del><strong>a person's
- body), as well as the vibration frequency.</p>
-
- <p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about
- their products, rather than free software which users could have
- checked</strong></del></span> <span
class="inserted"><ins><em>menstrual</em></ins></span> and <span
class="removed"><del><strong>changed.</p>
-
- <p>The company that made the vibrator</strong></del></span> <span
class="inserted"><ins><em>pregnancy monitoring apps is often</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how
- people used it</a>.</p>
-
- <p>The company's statement that it was
anonymizing</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>. Even
though</em></ins></span> the
- data <span class="removed"><del><strong>may be
- true, but it doesn't really matter. If</strong></del></span> <span
class="inserted"><ins><em>is “anonymized and
aggregated,”</em></ins></span> it <span class="removed"><del><strong>had
sold the data</strong></del></span> <span class="inserted"><ins><em>can easily
be
- traced back</em></ins></span> to <span class="removed"><del><strong>a
- data broker,</strong></del></span> the <span
class="removed"><del><strong>data broker would have been able to figure
out</strong></del></span> <span
class="inserted"><ins><em>woman</em></ins></span> who <span
class="inserted"><ins><em>uses</em></ins></span> the <span
class="removed"><del><strong>user was.</p>
-
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company</strong></del></span> <span
class="inserted"><ins><em>app.</p>
-
- <p>This</em></ins></span> has <span
class="removed"><del><strong>been ordered</strong></del></span> <span
class="inserted"><ins><em>harmful implications for women's
rights</em></ins></span> to <span class="removed"><del><strong>pay a total of
C$4m</a></strong></del></span> <span class="inserted"><ins><em>equal
employment
- and freedom</em></ins></span> to <span class="removed"><del><strong>its
customers.</p>
- </li>
-
- <li><p> “CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span> <span
class="inserted"><ins><em>make their own pregnancy choices. Don't use
- these apps, even if someone offers you a reward</em></ins></span> to <span
class="inserted"><ins><em>do so. A
- free-software app that does more or less</em></ins></span> the
- <span class="removed"><del><strong>manufacturer</a>. Guess
what?</strong></del></span> <span class="inserted"><ins><em>same thing without
- spying on you is available from</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span>
- <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,
and <a
-
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"></em></ins></span>
- a <span class="removed"><del><strong>way to access the data</a>
- collected by the manufacturer's snooping.</p>
-
- <p>That</strong></del></span> <span class="inserted"><ins><em>new
one is being developed</a>.</p>
+ <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
+
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
+ available to employers and insurance companies</a>. Even though the
+ data is “anonymized and aggregated,” it can easily be
+ traced back to the woman who uses the app.</p>
+
+ <p>This has harmful implications for women's rights to equal
employment
+ and freedom to make their own pregnancy choices. Don't use
+ these apps, even if someone offers you a reward to do so. A
+ free-software app that does more or less the same thing without
+ spying on you is available from <a
+ href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
+
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
+ a new one is being developed</a>.</p>
</li>
<li id="M201904130">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google tracks</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>movements of Android phones and iPhones
- running Google apps,</em></ins></span> and <span
class="inserted"><ins><em>sometimes <a
+ <p>Google tracks the movements of Android phones and iPhones
+ running Google apps, and sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves</em></ins></span> the <span class="removed"><del><strong>FBI could
listen</strong></del></span> <span class="inserted"><ins><em>data for
years</a>.</p>
+ saves the data for years</a>.</p>
- <p>Nonfree software in the phone has</em></ins></span> to <span
class="removed"><del><strong>these conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span class="inserted"><ins><em>be responsible for
sending
- the location data</em></ins></span> to <span
class="removed"><del><strong>spy on children and
adults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Google.</p></em></ins></span>
+ <p>Nonfree software in the phone has to be responsible for sending
+ the location data to Google.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items on top under each
subsection</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201903251">
+ <li id="M201903251">
<!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
-
-<ul>
-<li><p></strong></del></span>
- <span class="inserted"><ins><em><p>Many Android phones come with a
huge number of</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Many Android phones come with a huge number of <a
+
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
preinstalled nonfree apps that have access to sensitive data without
users' knowledge</a>. These hidden apps may either call home with
- the data, or pass it</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>to user-installed
apps</em></ins></span> that <span class="inserted"><ins><em>have access
to</em></ins></span>
- the <span class="removed"><del><strong>specific sabotage method Lenovo
used did not affect
-GNU/Linux; also, a “clean” Windows install is not really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>network but no direct access</em></ins></span> to
<span class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>the data. This results in massive
- surveillance</em></ins></span> on <span class="removed"><del><strong>top
under each subsection</strong></del></span> <span
class="inserted"><ins><em>which the user has absolutely no control.</p>
+ the data, or pass it on to user-installed apps that have access to
+ the network but no direct access to the data. This results in massive
+ surveillance on which the user has absolutely no control.</p>
</li>
<li id="M201903201">
<!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically,</strong></del></span>
- <span class="inserted"><ins><em><p>A study of 24
“health” apps found that 19 of them <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A study of 24 “health” apps found that 19 of them
<a
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
send sensitive personal data to third parties</a>, which can use it
for invasive advertising or discriminating against people in poor
medical condition.</p>
- <p>Whenever user “consent” is sought,</em></ins></span>
it <span class="inserted"><ins><em>is buried in
+ <p>Whenever user “consent” is sought, it is buried in
lengthy terms of service that are difficult to understand. In any case,
“consent” is not sufficient to legitimize snooping.</p>
</li>
@@ -1872,8 +1457,8 @@
way and released them, apparently not realizing that all the personal
data they collected would go to Facebook as well.</p>
- <p>It shows that no one</em></ins></span> can <span
class="removed"><del><strong>collect</strong></del></span> <span
class="inserted"><ins><em>trust a nonfree program, not even</em></ins></span>
the <span class="removed"><del><strong>emails</strong></del></span>
- <span class="inserted"><ins><em>developers</em></ins></span> of <span
class="removed"><del><strong>members</strong></del></span> <span
class="inserted"><ins><em>other nonfree programs.</p>
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p>
</li>
<li id="M201902140">
@@ -1881,68 +1466,38 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The AppCensus database gives information on <a
href="https://www.appcensus.mobi"> how Android apps use and
- misuse users' personal data</a>. As</em></ins></span> of <span
class="removed"><del><strong>Parliament</strong></del></span> <span
class="inserted"><ins><em>March 2019, nearly
+ misuse users' personal data</a>. As of March 2019, nearly
78,000 have been analyzed, of which 24,000 (31%) transmit the <a
href="/proprietary/proprietary-surveillance.html#M201812290">
Advertising ID</a> to other companies, and <a
href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link</em></ins></span> this <span
class="removed"><del><strong>way, because they pass it through
Microsoft.</p></li>
-
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>ID to hardware identifiers</a>,
+ 18,000 (23% of the total) link this ID to hardware identifiers</a>,
so that users cannot escape tracking by resetting it.</p>
- <p>Collecting hardware identifiers is</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware</strong></del></span> <span
class="inserted"><ins><em>apparent violation of
+ <p>Collecting hardware identifiers is in apparent violation of
Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was</em></ins></span> in <span
class="removed"><del><strong>Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>no hurry to take action. This proves
+ and, once informed, was in no hurry to take action. This proves
that the policies of a development platform are ineffective at
- preventing nonfree software developers from including
malware</em></ins></span> in <span class="removed"><del><strong>Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype
- <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span>
- <span class="inserted"><ins><em>their programs.</p>
+ preventing nonfree software developers from including malware in
+ their programs.</p>
</li>
<li id="M201902060">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many nonfree apps have a surveillance feature</em></ins></span>
for <span
class="removed"><del><strong>spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em><a
+ <p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p></em></ins></span>
+ recording all the users' actions</a> in interacting with the
app.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareOnTheRoad</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902041.1">
+ <li id="M201902041.1">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>Twenty nine “beauty
camera” apps that used</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span>
- <span class="inserted"><ins><em>be</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>Google Play had one or more malicious
functionalities, such as <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Twenty nine “beauty camera” apps that used to
+ be on Google Play had one or more malicious functionalities, such as <a
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted and often malicious ads</em></ins></span> on <span
class="removed"><del><strong>The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span></strong></del></span>
<span class="inserted"><ins><em>users, and redirecting
+ pushing unwanted and often malicious ads on users, and redirecting
them to phishing sites that stole their credentials. Furthermore,
the user interface of most of them was designed to make uninstallation
difficult.</p>
@@ -2395,7 +1950,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf">
- A study in 2015</a> found that 90% of the top-ranked gratis
proprietary
+ A study</em></ins></span> in 2015</a> found that 90% of the
top-ranked gratis proprietary
Android apps contained recognizable tracking libraries. For the paid
proprietary apps, it was only 60%.</p>
@@ -2406,26 +1961,53 @@
is “exploit”; nearly always that will fit perfectly.</p>
</li>
- <li id="M201505060">
- <!--#set var="DATE" value='<small
class="date-tag">2015-05</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Gratis Android apps (but not <a
- href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
-
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
- and advertising</a> URLs, on the average.</p>
- </li>
+<span class="removed"><del><strong><li>
+ <p>Apps for BART
+ <a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With proprietary apps, one can only hope that they don't.</p>
+</li>
- <li id="M201504060">
+<li>
+ <p>A study found 234 Android apps that track users by
+ <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed in stores or played by TV
programs</a>.
+ </p>
+
+</li>
+
+<li>
+ <p>Pairs of</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505060">
+ <!--#set var="DATE" value='<small
class="date-tag">2015-05</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Gratis</em></ins></span> Android apps <span
class="removed"><del><strong>can collude to transmit users' personal
+ data</strong></del></span> <span class="inserted"><ins><em>(but not
<a
+ href="/philosophy/free-sw.html">free software</a>)
connect</em></ins></span> to <span
class="removed"><del><strong>servers.</strong></del></span> <span
class="inserted"><ins><em>100</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands of pairs that
collude</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
+ and advertising</a> URLs, on the average.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends app developers</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201504060">
<!--#set var="DATE" value='<small
class="date-tag">2015-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Widely used <a
-
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This is in addition to
- the snooping done by the phone company, and perhaps by the OS in
+ <p>Widely used</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on</em></ins></span> the <span
class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>user</a>.
This is in addition to</em></ins></span>
+ the <span class="removed"><del><strong>app</a>.</p>
+
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>snooping done by</em></ins></span> the <span
class="removed"><del><strong>“consent”</strong></del></span> <span
class="inserted"><ins><em>phone company, and perhaps by the OS in
the phone.</p>
- <p>Don't be distracted by the question of whether the app developers
- get users to say “I agree”. That is no excuse for
+ <p>Don't be distracted by the question</em></ins></span> of <span
class="inserted"><ins><em>whether the app developers
+ get</em></ins></span> users <span class="removed"><del><strong>is not
enough</strong></del></span> to <span class="removed"><del><strong>legitimize
actions like this. At this point, most users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>say
“I agree”. That is no excuse for
malware.</p>
</li>
@@ -2433,16 +2015,17 @@
<!--#set var="DATE" value='<small
class="date-tag">2014-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many proprietary apps for mobile devices
- report which other apps the user has installed. <a
+ report which other apps</em></ins></span> the <span
class="removed"><del><strong>“Terms and
Conditions”</strong></del></span> <span class="inserted"><ins><em>user
has installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible and optional</a>. Not
- as bad as what the others do.</p>
+ is doing this in a way</em></ins></span> that <span
class="removed"><del><strong>spell out
+what they are “consenting” to. Google should
clearly</strong></del></span> <span class="inserted"><ins><em>at least is
visible</em></ins></span> and <span class="removed"><del><strong>honestly
identify</strong></del></span> <span
class="inserted"><ins><em>optional</a>. Not
+ as bad as what</em></ins></span> the <span
class="removed"><del><strong>information it collects on users,
instead</strong></del></span> <span class="inserted"><ins><em>others
do.</p>
</li>
<li id="M201401150.1">
<!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Simeji keyboard is a smartphone version of Baidu's <a
+ <p>The Simeji keyboard is a smartphone version</em></ins></span> of
<span class="removed"><del><strong>hiding</strong></del></span> <span
class="inserted"><ins><em>Baidu's <a
href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
title="Input Method Editor">IME</abbr></a>.</p>
</li>
@@ -2451,35 +2034,61 @@
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The nonfree Snapchat app's principal purpose is to restrict the
- use of data on the user's computer, but it does surveillance too: <a
+ use of data on the user's computer, but</em></ins></span> it <span
class="removed"><del><strong>in an obscurely worded EULA.</p>
+
+<p>However,</strong></del></span> <span class="inserted"><ins><em>does
surveillance too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the user's list of other people's phone
+ it tries</em></ins></span> to <span class="removed"><del><strong>truly
protect people's privacy, we must prevent Google
+and other companies from getting this personal information
in</strong></del></span> <span class="inserted"><ins><em>get</em></ins></span>
the <span class="removed"><del><strong>first
+place!</p>
+</li>
+
+ <li>
+ <p>Google Play (a component</strong></del></span> <span
class="inserted"><ins><em>user's list</em></ins></span> of <span
class="removed"><del><strong>Android)</strong></del></span> <span
class="inserted"><ins><em>other people's phone
numbers</a>.</p>
</li>
<li id="M201312060">
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Brightest Flashlight app <a
-
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ <p>The Brightest Flashlight app</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
sends user data, including geolocation, for use by
companies</a>.</p>
- <p>The FTC criticized this app because it asked the user to
- approve sending personal data to the app developer but did not ask
- about sending it to other companies. This shows the weakness of
- the reject-it-if-you-dislike-snooping “solution” to
- surveillance: why should a flashlight app send any information to
- anyone? A free software flashlight app would not.</p>
+ <p>The FTC criticized this app because it asked</em></ins></span>
the <span class="removed"><del><strong>users' movements without their
permission</a>.</p>
+
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>user to
+ approve sending personal data</em></ins></span> to <span
class="removed"><del><strong>completely stop</strong></del></span> the <span
class="removed"><del><strong>tracking.</strong></del></span> <span
class="inserted"><ins><em>app developer but did not ask
+ about sending it to other companies.</em></ins></span> This <span
class="removed"><del><strong>is
+ yet another example</strong></del></span> <span
class="inserted"><ins><em>shows the weakness</em></ins></span> of <span
class="removed"><del><strong>nonfree software pretending to
obey</strong></del></span>
+ the <span class="removed"><del><strong>user,
+ when it's actually doing something else. Such</strong></del></span> <span
class="inserted"><ins><em>reject-it-if-you-dislike-snooping
“solution” to
+ surveillance: why should</em></ins></span> a <span
class="removed"><del><strong>thing would be almost
+ unthinkable with</strong></del></span> <span
class="inserted"><ins><em>flashlight app send any information to
+ anyone? A</em></ins></span> free <span
class="removed"><del><strong>software.</p></strong></del></span> <span
class="inserted"><ins><em>software flashlight app would
not.</p></em></ins></span>
</li>
- <li id="M201212100">
+ <span class="removed"><del><strong><li><p>More than 73% of
the</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201212100">
<!--#set var="DATE" value='<small
class="date-tag">2012-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>FTC says most mobile apps for children don't respect privacy:
<a
-
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ <p>FTC says</em></ins></span> most <span
class="removed"><del><strong>popular Android</strong></del></span> <span
class="inserted"><ins><em>mobile</em></ins></span> apps <span
class="inserted"><ins><em>for children don't respect privacy:</em></ins></span>
<a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral and location information</a> of their users with third
parties.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated to the app's functionality,
+ was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in the 500 most popular gratis Android apps</a>.</p>
+
+ <p>The article should not have described these apps as
+ “free”—they are not free software. The clear
way</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -2491,7 +2100,10 @@
<li id="M201908151">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Skype refuses to say whether it can <a
+ <p>Skype refuses</em></ins></span> to say
+ <span class="removed"><del><strong>“zero price” is
“gratis.”</p>
+
+ <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>whether it can <a
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
on calls</a>.</p>
@@ -2505,7 +2117,8 @@
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
Microsoft changed Skype <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
+ specifically</em></ins></span> for <span
class="removed"><del><strong>granted that the usual analytics tools are
+ legitimate, but</strong></del></span> <span
class="inserted"><ins><em>spying</a>.</p>
</li>
</ul>
@@ -2519,65 +2132,107 @@
<li id="M202010221">
<!--#set var="DATE" value='<small
class="date-tag">2020-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft is imposing its
+ <p>Microsoft</em></ins></span> is <span
class="removed"><del><strong>that valid? Software developers have no
right</strong></del></span> <span class="inserted"><ins><em>imposing its
surveillance on the game of Minecraft by <a
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
- every player to open an account on Microsoft's network</a>. Microsoft
+ every player</em></ins></span> to
+ <span class="removed"><del><strong>analyze what users are doing or how.
“Analytics” tools</strong></del></span> <span
class="inserted"><ins><em>open an account on Microsoft's network</a>.
Microsoft
has bought the game and will merge all accounts into its network,
which will give them access to people's data.</p>
<p>Minecraft players <a
href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
- instead. The essential advantage of Minetest is that it is free
+ instead. The essential advantage of Minetest is</em></ins></span> that
<span class="removed"><del><strong>snoop are
+ just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>it is free
software, meaning it respects the user's computer freedom. As a bonus,
- it offers more options.</p>
+ it offers more options.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Gratis Android apps
(but not</strong></del></span>
- <li id="M201908210">
+ <span class="inserted"><ins><em><li id="M201908210">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft recorded users of Xboxes and had <a
-
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
- human workers listen to the recordings</a>.</p>
+ <p>Microsoft recorded users of Xboxes and had</em></ins></span>
<a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>)
+ connect</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
+ human workers listen</em></ins></span> to <span
class="removed"><del><strong>100
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>the recordings</a>.</p>
- <p>Morally, we see no difference between having human workers listen
and
- having speech-recognition systems listen. Both intrude on
privacy.</p>
+ <p>Morally, we see no difference between having human workers
listen</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,</strong></del></span>
+ <span class="inserted"><ins><em>having speech-recognition systems listen.
Both intrude</em></ins></span> on <span class="removed"><del><strong>the
average.</p></strong></del></span> <span
class="inserted"><ins><em>privacy.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
- <li id="M201806240">
+ <span class="inserted"><ins><em><li id="M201806240">
<!--#set var="DATE" value='<small
class="date-tag">2018-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Red Shell is a spyware that
- is found in many proprietary games. It <a
-
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data on users' computers and sends it to third
parties</a>.</p>
+ <p>Red Shell</em></ins></span> is <span
class="removed"><del><strong>present</strong></del></span> <span
class="inserted"><ins><em>a spyware that
+ is found</em></ins></span> in <span class="removed"><del><strong>some
Android devices when they are sold.
+ Some Motorola phones modify Android to</strong></del></span> <span
class="inserted"><ins><em>many proprietary games. It</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
+ tracks</em></ins></span> data <span class="inserted"><ins><em>on users'
computers and sends it</em></ins></span> to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
<span class="inserted"><ins><em>third
parties</a>.</p></em></ins></span>
</li>
- <li id="M201804144">
+ <span class="removed"><del><strong><li><p>Some manufacturers
add</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804144">
<!--#set var="DATE" value='<small
class="date-tag">2018-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>ArenaNet surreptitiously installed a spyware
+ <p>ArenaNet surreptitiously installed</em></ins></span> a <span
class="inserted"><ins><em>spyware
program along with an update to the massive
- multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
-
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
- to snoop on all open processes running on its user's
computer</a>.</p>
+ multiplayer game Guild Wars 2. The spyware allowed
ArenaNet</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p>
+ </li>
+
+ <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"></em></ins></span>
+ to <span class="removed"><del><strong>any file</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>the system.</p></strong></del></span> <span
class="inserted"><ins><em>all open processes running on its user's
computer</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
- <li id="M201711070">
+
+<!-- #SpywareOnMobiles</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711070">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The driver for a certain gaming keyboard <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>The driver for a certain gaming
keyboard <a
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
- information to China</a>.</p>
+ information</em></ins></span> to <span class="removed"><del><strong>place
new items on top under each subsection</strong></del></span> <span
class="inserted"><ins><em>China</a>.</p>
</li>
<li id="M201512290">
<!--#set var="DATE" value='<small
class="date-tag">2015-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Many <a
-
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and report to the
- internet</a>—even what their users weigh.</p>
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareIniThings">Spyware in iThings</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+</div>
+
+<ul>
+ <li><p>Apple proposes</strong></del></span>
+ <span class="inserted"><ins><em><p>Many</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way to use it without having your
fingerprints
+ taken. Users would have no way</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users and report</em></ins></span> to
<span class="removed"><del><strong>tell whether</strong></del></span> the <span
class="removed"><del><strong>phone is snooping on
+ them.</p></li>
+
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots of personal</strong></del></span>
+ <span class="inserted"><ins><em>internet</a>—even what their
users weigh.</p>
<p>A game console is a computer, and you can't trust a computer with
a nonfree operating system.</p>
@@ -2595,22 +2250,49 @@
collected by various cr…apps and sites made by different
companies.</p>
- <p>They use this data to manipulate people to buy things, and hunt
for
- “whales” who can be led to spend a lot of money. They also
- use a back door to manipulate the game play for specific players.</p>
+ <p>They use this</em></ins></span> data to <span
class="removed"><del><strong>Apple's servers</a>. Big
Brother</strong></del></span> <span class="inserted"><ins><em>manipulate people
to buy things, and hunt for
+ “whales” who</em></ins></span> can
+ <span class="removed"><del><strong>get them from there.</p>
+ </li>
+
+ <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells</strong></del></span>
<span class="inserted"><ins><em>be led to spend</em></ins></span> a <span
class="removed"><del><strong>server every phone number that the user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>lot of
money. They also
+ use a back door to manipulate</em></ins></span> the <span
class="removed"><del><strong>server records these numbers</strong></del></span>
<span class="inserted"><ins><em>game play</em></ins></span> for <span
class="removed"><del><strong>at least 30
+ days.</p>
+ </li>
- <p>While the article describes gratis games, games that cost money
- can use the same tactics.</p>
+ <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even</strong></del></span> <span class="inserted"><ins><em>specific
players.</p>
+
+ <p>While the article describes</em></ins></span> gratis <span
class="removed"><del><strong>apps)</a>
+ without giving a valid email address and receiving</strong></del></span>
<span class="inserted"><ins><em>games, games that cost money
+ can use</em></ins></span> the <span class="removed"><del><strong>code Apple
+ sends to it.</p></strong></del></span> <span
class="inserted"><ins><em>same tactics.</p></em></ins></span>
</li>
- <li id="M201401280">
+ <span class="removed"><del><strong><li><p>Around 47% of the most
popular iOS apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201401280">
<!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Angry Birds <a
-
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and the NSA takes advantage
- to spy through it too</a>. Here's information on <a
-
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ <p>Angry Birds</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies,</em></ins></span> and <span
class="removed"><del><strong>location information</a> of their users with
third parties.</p>
+ </li>
+
+ <li><p>iThings automatically upload to Apple's servers
all</strong></del></span> the <span class="removed"><del><strong>photos and
+ videos they make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you take,
+ and keeps them up</strong></del></span> <span
class="inserted"><ins><em>NSA takes advantage</em></ins></span>
+ to <span class="removed"><del><strong>date</strong></del></span> <span
class="inserted"><ins><em>spy through it too</a>. Here's
information</em></ins></span> on <span class="removed"><del><strong>all your
devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
+
+ <p>(From</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
+ information</a> as accessed on 24 Sep 2015.) The iCloud
feature</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
@@ -2621,12 +2303,23 @@
<li id="M200510200">
<!--#set var="DATE" value='<small
class="date-tag">2005-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Blizzard Warden is a hidden
- “cheating-prevention” program that <a
- href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies on every process running on a gamer's computer and sniffs a
- good deal of personal data</a>, including lots of activities which
- have nothing to do with cheating.</p>
+ <p>Blizzard Warden</em></ins></span> is <span
class="inserted"><ins><em>a hidden
+ “cheating-prevention” program that</em></ins></span> <a
<span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033">activated
by the
+ startup of iOS</a>. The term “cloud” means
+ “please don't ask where.”</p>
+
+ <p>There is</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
+ spies on every process running on</em></ins></span> a <span
class="removed"><del><strong>way to <a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default so it still
counts as</strong></del></span> <span class="inserted"><ins><em>gamer's
computer and sniffs</em></ins></span> a
+ <span class="removed"><del><strong>surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage</strong></del></span>
+ <span class="inserted"><ins><em>good deal</em></ins></span> of <span
class="removed"><del><strong>this to
+ <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos</strong></del></span> <span
class="inserted"><ins><em>personal data</a>, including
lots</em></ins></span> of <span class="removed"><del><strong>many
celebrities</a>. They needed</strong></del></span> <span
class="inserted"><ins><em>activities which
+ have nothing</em></ins></span> to <span class="removed"><del><strong>break
Apple's
+ security</strong></del></span> <span class="inserted"><ins><em>do with
cheating.</p>
</li>
</ul>
@@ -2646,37 +2339,82 @@
href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
Not Included”</a> list <a
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
- designed to snoop on users</a> even if they meet
+ designed</em></ins></span> to <span class="removed"><del><strong>get at
them, but NSA can access any</strong></del></span> <span
class="inserted"><ins><em>snoop on users</a> even if they meet
Mozilla's “Minimum Security Standards.” Insecure
- design of the program running on some of these devices <a
-
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes
- the user susceptible to be snooped and exploited by crackers as
- well</a>.</p>
+ design</em></ins></span> of <span class="removed"><del><strong>them through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p>Spyware in iThings:</strong></del></span> the <span
class="inserted"><ins><em>program running on some of these
devices</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly
where</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes</em></ins></span>
+ the <span class="removed"><del><strong>iThing is,
+ and get other info too.</p>
+ </li>
+
+ <li><p>There is also a feature for web
sites</strong></del></span> <span class="inserted"><ins><em>user
susceptible</em></ins></span> to <span class="removed"><del><strong>track
users, which is
+ <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks about iOS 6, but it
+ is still true in iOS 7.)</p>
+ </li>
+
+ <li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default, though that
can</strong></del></span> be
+ <span class="removed"><del><strong>turned off.</p>
+ </li>
+
+ <li><p>Apple can,</strong></del></span> <span
class="inserted"><ins><em>snooped</em></ins></span> and <span
class="removed"><del><strong>regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for the
state</a>.</p></strong></del></span> <span
class="inserted"><ins><em>exploited by crackers as
+ well</a>.</p></em></ins></span>
</li>
- <li id="M201708280">
+ <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps the NSA</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201708280">
<!--#set var="DATE" value='<small
class="date-tag">2017-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The bad security in many Internet of Stings devices allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on the people that use them</a>.</p>
+ to</em></ins></span> snoop on <span class="inserted"><ins><em>the people
that use them</a>.</p>
+
+ <p>Don't be a sucker—reject</em></ins></span> all the <span
class="removed"><del><strong>data in an iThing,
+ or it is totally incompetent.</a></p>
+ </li>
- <p>Don't be a sucker—reject all the stings.</p>
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem to exist for no
+ possible purpose other than surveillance</a>.
Here</strong></del></span> <span class="inserted"><ins><em>stings.</p>
- <p><small>(It is unfortunate that the article uses the term
<a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p>
+ <p><small>(It</em></ins></span> is <span
class="inserted"><ins><em>unfortunate that the article uses</em></ins></span>
the <span class="inserted"><ins><em>term</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInTVSets">TV Sets</h4>
+ <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware in
Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+</div>
+
+<ul>
+ <li><p>According to Edward Snowden,
+ <a href="http://www.bbc.com/news/uk-34444233">agencies can take
over smartphones</a>
+ by sending hidden text messages which enable them</strong></del></span>
<span class="inserted"><ins><em>id="SpywareInTVSets">TV Sets</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<p>Emo Phillips made a joke: The other day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
+<p>Emo Phillips made a joke: The other day a woman came
up</em></ins></span> to <span class="removed"><del><strong>turn the phones
+ on</strong></del></span> <span
class="inserted"><ins><em>me</em></ins></span> and <span
class="removed"><del><strong>off, listen to the microphone, retrieve
geo-location data from</strong></del></span>
+<span class="inserted"><ins><em>said, “Didn't I see you on
television?” I said, “I
+don't know. You can't see out</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
+ browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>other way.” Evidently that was
before Amazon “smart” TVs.</p>
<ul class="blurbs">
@@ -2685,125 +2423,254 @@
--><!--#echo encoding="none" var="DATE" -->
<p>TV manufacturers are able to <a
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
- every second of what the user is watching</a>. This is illegal due to
- the Video Privacy Protection Act of 1988, but they're circumventing
+ every second of what</em></ins></span> the <span
class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>user is watching</a>.</em></ins></span> This
<span class="removed"><del><strong>malware</strong></del></span> is <span
class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>illegal due</em></ins></span> to
+ <span class="removed"><del><strong>disguise itself from
investigation.</p>
+ </li>
+
+ <li><p>Samsung phones come with
+ <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
+ and they send so much data that their transmission is a
+ substantial expense for users. Said transmission, not wanted or
+ requested by</strong></del></span>
+ the <span class="removed"><del><strong>user, clearly must constitute
spying</strong></del></span> <span class="inserted"><ins><em>Video Privacy
Protection Act</em></ins></span> of <span class="removed"><del><strong>some
+ kind.</p></li>
+
+ <li><p>A Motorola phone</strong></del></span> <span
class="inserted"><ins><em>1988, but they're circumventing
it through EULAs.</p>
</li>
<li id="M201901070">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio TVs <a
-
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever the TV sees,”</a> in the own words of
the company's
- CTO, and this data is sold to third parties. This is in return for
- “better service” (meaning more intrusive ads?) and slightly
+ <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+ </li>
+
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>TV sees,”</a></em></ins></span> in <span
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us by a paywall)
+ reports that
+ <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
the <span class="removed"><del><strong>FBI can remotely
activate</strong></del></span> <span class="inserted"><ins><em>own words
of</em></ins></span> the <span
class="removed"><del><strong>GPS</strong></del></span> <span
class="inserted"><ins><em>company's
+ CTO,</em></ins></span> and <span
class="removed"><del><strong>microphone</strong></del></span> <span
class="inserted"><ins><em>this data is sold to third parties. This
is</em></ins></span> in <span class="removed"><del><strong>Android
+ phones</strong></del></span> <span class="inserted"><ins><em>return for
+ “better service” (meaning more intrusive
ads?)</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
+ (I suspect</strong></del></span> <span class="inserted"><ins><em>slightly
lower retail prices.</p>
- <p>What is supposed to make this spying acceptable, according to him,
- is that it is opt-in in newer models. But since the Vizio software is
+ <p>What is supposed to make</em></ins></span> this <span
class="removed"><del><strong>means Windows laptops.)
Here</strong></del></span> <span class="inserted"><ins><em>spying acceptable,
according to him,</em></ins></span>
+ is
+ <span class="removed"><del><strong><a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ </li>
+
+ <li><p>Portable phones with GPS will send their GPS location on
+ remote command and users cannot stop them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> it <span
class="removed"><del><strong>will eventually require</strong></del></span>
<span class="inserted"><ins><em>is opt-in in newer models. But since the Vizio
software is
nonfree, we don't know what is actually happening behind the scenes,
- and there is no guarantee that all future updates will leave the
+ and there is no guarantee that</em></ins></span> all <span
class="removed"><del><strong>new portable phones</strong></del></span> <span
class="inserted"><ins><em>future updates will leave the
settings unchanged.</p>
<p>If you already own a Vizio “smart” TV (or any
“smart” TV, for that
- matter), the easiest way to make sure it isn't spying on you is
- to disconnect it from the Internet, and use a terrestrial antenna
+ matter), the easiest way</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p>
+ </li>
+
+ <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span> <span class="inserted"><ins><em>make sure it
isn't spying on you</em></ins></span> is
+ to <span class="removed"><del><strong>restrict</strong></del></span> <span
class="inserted"><ins><em>disconnect it from</em></ins></span> the <span
class="inserted"><ins><em>Internet, and</em></ins></span> use <span
class="removed"><del><strong>of data on the user's computer, but it does
surveillance
+ too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries</strong></del></span> <span class="inserted"><ins><em>a
terrestrial antenna
instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is to get your own router (which can
+ if you are technically oriented, is</em></ins></span> to get <span
class="removed"><del><strong>the user's list of other people's phone
+ numbers.</a></p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>Faceapp appears</strong></del></span> <span
class="inserted"><ins><em>your own router (which can
be an old computer running completely free software), and set up a
- firewall to block connections to Vizio's servers. Or, as a last resort,
- you can replace your TV with another model.</p>
+ firewall</em></ins></span> to <span class="removed"><del><strong>do lots
of surveillance, judging by
+ <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands</strong></del></span> <span
class="inserted"><ins><em>block connections</em></ins></span> to <span
class="removed"><del><strong>personal data in the device</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>Vizio's servers. Or, as a last resort,
+ you can replace your TV with another model.</p></em></ins></span>
</li>
- <li id="M201804010">
+ <span class="removed"><del><strong><li>
+ <p>Verizon</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804010">
<!--#set var="DATE" value='<small
class="date-tag">2018-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some “Smart” TVs automatically <a
-
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades that install a surveillance app</a>.</p>
-
- <p>We link to the article for the facts it presents. It
- is too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix app <a
- href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ load downgrades</em></ins></span> that <span
class="removed"><del><strong>it will</a>
+ pre-install on some of its phones. The app will give Verizon the same
+ information about</strong></del></span> <span
class="inserted"><ins><em>install a surveillance app</a>.</p>
+
+ <p>We link to</em></ins></span> the <span
class="removed"><del><strong>users' searches that Google normally gets when
+ they use its search engine.</p>
+
+ <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>article for</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>facts it presents. It</em></ins></span>
+ is <span class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and the
+ user must explicitly opt-in before</strong></del></span> <span
class="inserted"><ins><em>too bad that</em></ins></span> the <span
class="removed"><del><strong>app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>article finishes by
advocating</em></ins></span> the
+ <span class="removed"><del><strong>app remains spyware—an
“optional” piece</strong></del></span>
+ <span class="inserted"><ins><em>moral weakness</em></ins></span> of <span
class="removed"><del><strong>spyware is
+ still spyware.</p>
+ </li>
+
+ <li><p>The Meitu photo-editing</strong></del></span> <span
class="inserted"><ins><em>surrendering to Netflix. The
Netflix</em></ins></span> app <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to a Chinese company</a>.</p></li>
+
+ <li><p>A pregnancy test controller application not only
+ can</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
<li id="M201702060">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio “smart” <a
-
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts and
- cable</a>. Even if the image is coming from the user's own computer,
- the TV reports what it is. The existence of a way to disable the
+ <p>Vizio “smart”</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed</em></ins></span> on <span
class="removed"><del><strong>many sorts of data in the
phone,</strong></del></span> <span
class="inserted"><ins><em>them,</em></ins></span> and <span
class="removed"><del><strong>in server accounts, it can
+ alter them too</a>.
+ </p></li>
+
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before</strong></del></span> <span
class="inserted"><ins><em>not just broadcasts</em></ins></span> and <span
class="removed"><del><strong>after</strong></del></span>
+ <span class="inserted"><ins><em>cable</a>. Even if</em></ins></span>
the <span class="removed"><del><strong>ride</a>.</p>
+
+ <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>image is
coming from</em></ins></span> the user's <span
class="removed"><del><strong>consent”
+ for surveillance is inadequate as</strong></del></span> <span
class="inserted"><ins><em>own computer,
+ the TV reports what it is. The existence of</em></ins></span> a <span
class="removed"><del><strong>protection against massive</strong></del></span>
<span class="inserted"><ins><em>way to disable the
surveillance, even if it were not hidden as it was in these TVs,
- does not legitimize the surveillance.</p>
+ does not legitimize the</em></ins></span> surveillance.</p>
</li>
- <li id="M201511130">
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
+ </li>
+
+ <li><p>Apps that include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511130">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some web and TV advertisements play inaudible
- sounds to be picked up by proprietary malware running
- on other devices in range so as to determine that they
+ <p>Some web</em></ins></span> and TV <span
class="removed"><del><strong>programs
+ are playing nearby</a>. Also on what users
post</strong></del></span> <span class="inserted"><ins><em>advertisements play
inaudible
+ sounds to be picked up by proprietary malware running</em></ins></span>
+ on <span class="removed"><del><strong>various sites
+ such</strong></del></span> <span class="inserted"><ins><em>other devices
in range so</em></ins></span> as <span class="removed"><del><strong>Facebook,
Google+</strong></del></span> <span class="inserted"><ins><em>to determine that
they
are nearby. Once your Internet devices are paired with
- your TV, advertisers can correlate ads with Web activity, and other <a
+ your TV, advertisers can correlate ads with Web
activity,</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
- cross-device tracking</a>.</p>
+ cross-device tracking</a>.</p></em></ins></span>
</li>
- <li id="M201511060">
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511060">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio goes a step further than other TV
- manufacturers in spying on their users: their <a
-
href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so that advertisers can track you
- across devices.</p>
+ manufacturers in spying on their users: their</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze</em></ins></span> your <span
class="removed"><del><strong>mobile phone's photo collections for known
faces</a>,</strong></del></span> <span class="inserted"><ins><em>viewing
habits in detail</em></ins></span> and <span
class="removed"><del><strong>suggests you to share the
picture</strong></del></span>
+ <span class="inserted"><ins><em>link them your IP address</a> so
that advertisers can track</em></ins></span> you <span
class="removed"><del><strong>take according to who
+ is in the frame.</p>
+
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means the pictures are likely to be
+ sent</strong></del></span>
+ across <span class="removed"><del><strong>the wire</strong></del></span>
<span class="inserted"><ins><em>devices.</p>
+
+ <p>It is possible</em></ins></span> to <span
class="removed"><del><strong>Facebook's servers and face-recognition
+ algorithms.</p>
- <p>It is possible to turn this off, but having it enabled by default
+ <p>If so, none of Facebook users' pictures are private
+ anymore, even if the user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>turn this off, but
having it enabled by default
is an injustice already.</p>
</li>
<li id="M201511020">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tivo's alliance with Viacom adds 2.3 million households
- to the 600 millions social media profiles the company
+ <p>Tivo's alliance with Viacom adds 2.3 million
households</em></ins></span>
+ to the <span class="removed"><del><strong>service.</p>
+ </li>
+
+ <li><p>Like most “music screaming” disservices,
Spotify
+ is based on proprietary malware (DRM and snooping). In August
+ 2015 it</strong></del></span> <span class="inserted"><ins><em>600
millions social media profiles the company
already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can now <a
- href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
- correlate TV advertisement with online purchases</a>, exposing all
- users to new combined surveillance by default.</p>
+ information with online social media participation, Tivo can
now</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ correlate TV advertisement with online purchases</a>, exposing
all</em></ins></span>
+ users <span class="removed"><del><strong>submit</strong></del></span> to
<span class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em>new
combined surveillance by default.</p>
</li>
<li id="M201507240">
<!--#set var="DATE" value='<small
class="date-tag">2015-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio “smart” TVs recognize and <a
+ <p>Vizio “smart” TVs recognize</em></ins></span> and
<span class="removed"><del><strong>some</strong></del></span> <span
class="inserted"><ins><em><a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are watching</a>, even if it isn't a TV
channel.</p>
+ what people</em></ins></span> are <span
class="removed"><del><strong>starting to realize that</strong></del></span>
<span class="inserted"><ins><em>watching</a>, even if</em></ins></span>
it <span class="removed"><del><strong>is nasty.</p>
+
+ <p>This article shows the <a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as a way
+ to “serve” users better</a>—never mind
+ whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>isn't</em></ins></span> a <span
class="removed"><del><strong>typical example of
+ the attitude of the proprietary software industry towards
+ those they have subjugated.</p>
+
+ <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>TV channel.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other
+ apps the user has
+ installed.</strong></del></span>
- <li id="M201505290">
+ <span class="inserted"><ins><em><li id="M201505290">
<!--#set var="DATE" value='<small
class="date-tag">2015-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Verizon cable TV <a
-
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch, and even what they wanted to
- record</a>.</p>
+ <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way that at least is visible</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops on what programs people watch,</em></ins></span> and
+ <span class="removed"><del><strong>optional</a>. Not as bad
as</strong></del></span> <span class="inserted"><ins><em>even</em></ins></span>
what <span class="removed"><del><strong>the others
do.</p></strong></del></span> <span class="inserted"><ins><em>they wanted
to
+ record</a>.</p></em></ins></span>
</li>
- <li id="M201504300">
+ <span class="removed"><del><strong><li><p>FTC says most mobile
apps for children don't respect privacy:</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201504300">
<!--#set var="DATE" value='<small
class="date-tag">2015-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio <a
-
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade” to make its TVs snoop on what
+ <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ </li>
+
+ <li><p>Widely</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"></em></ins></span>
+ used <span class="removed"><del><strong><a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps</strong></del></span> <span
class="inserted"><ins><em>a firmware “upgrade” to make its
TVs</em></ins></span> snoop on <span class="inserted"><ins><em>what
users watch</a>. The TVs did not do that when first sold.</p>
</li>
@@ -2813,41 +2680,51 @@
<p>The Samsung “Smart” TV <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
transmits users' voice on the internet to another company,
Nuance</a>.
- Nuance can save it and would then have to give it to the US or some
+ Nuance can save it and would then have to give it to</em></ins></span> the
<span class="removed"><del><strong>user</a>. This</strong></del></span>
<span class="inserted"><ins><em>US or some
other government.</p>
- <p>Speech recognition is not to be trusted unless it is done by free
- software in your own computer.</p>
+ <p>Speech recognition</em></ins></span> is <span
class="removed"><del><strong>in addition</strong></del></span> <span
class="inserted"><ins><em>not</em></ins></span> to
+ <span class="removed"><del><strong>the snooping</strong></del></span>
<span class="inserted"><ins><em>be trusted unless it is</em></ins></span> done
by <span class="removed"><del><strong>the phone company, and perhaps by the
OS</strong></del></span> <span class="inserted"><ins><em>free
+ software</em></ins></span> in <span class="removed"><del><strong>the
+ phone.</p>
+
+ <p>Don't</strong></del></span> <span
class="inserted"><ins><em>your own computer.</p>
<p>In its privacy policy, Samsung explicitly confirms that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be transmitted to third
+ data containing sensitive information will</em></ins></span> be <span
class="removed"><del><strong>distracted by the question of whether the app
developers get
+ users</strong></del></span> <span
class="inserted"><ins><em>transmitted</em></ins></span> to <span
class="removed"><del><strong>say “I agree”.
That</strong></del></span> <span class="inserted"><ins><em>third
parties</a>.</p>
</li>
<li id="M201411090">
<!--#set var="DATE" value='<small
class="date-tag">2014-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Amazon “Smart” TV is <a
+ <p>The Amazon “Smart” TV</em></ins></span> is <span
class="removed"><del><strong>no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em><a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all the time</a>.</p>
+ snooping all the time</a>.</p></em></ins></span>
</li>
- <li id="M201409290">
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201409290">
<!--#set var="DATE" value='<small
class="date-tag">2014-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>More or less all “smart” TVs <a
-
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
+ <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p></em></ins></span>
- <p>The report was as of 2014, but we don't expect this has got
+ <p>The <span class="removed"><del><strong>FTC
criticized</strong></del></span> <span class="inserted"><ins><em>report was as
of 2014, but we don't expect</em></ins></span> this <span
class="removed"><del><strong>app because it asked the
user</strong></del></span> <span class="inserted"><ins><em>has got
better.</p>
- <p>This shows that laws requiring products to get users' formal
- consent before collecting personal data are totally inadequate.
+ <p>This shows that laws requiring products</em></ins></span> to
+ <span class="removed"><del><strong>approve sending</strong></del></span>
<span class="inserted"><ins><em>get users' formal
+ consent before collecting</em></ins></span> personal data <span
class="inserted"><ins><em>are totally inadequate.
And what happens if a user declines consent? Probably the TV will
- say, “Without your consent to tracking, the TV will not
- work.”</p>
+ say, “Without your consent</em></ins></span> to <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>app developer but did</strong></del></span> <span
class="inserted"><ins><em>TV will</em></ins></span> not
+ <span class="removed"><del><strong>ask about sending
it</strong></del></span>
+ <span class="inserted"><ins><em>work.”</p>
<p>Proper laws would say that TVs are not allowed to report what the
user watches—no exceptions!</p>
@@ -2858,20 +2735,22 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Spyware in LG “smart” TVs <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches, and the switch to turn this off has
+ reports what the user watches, and the switch</em></ins></span> to <span
class="inserted"><ins><em>turn this off has
no effect</a>. (The fact that the transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
<p>Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network</a>.</p>
+ snoops on</em></ins></span> other <span
class="removed"><del><strong>companies. This shows</strong></del></span> <span
class="inserted"><ins><em>devices on</em></ins></span> the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
<p>LG later said it had installed a patch to stop this, but any
product could spy this way.</p>
<p>Meanwhile, LG TVs <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots of spying anyway</a>.</p>
+ do lots</em></ins></span> of <span class="removed"><del><strong>the
reject-it-if-you-dislike-snooping
+ “solution”</strong></del></span> <span
class="inserted"><ins><em>spying anyway</a>.</p>
</li>
<li id="M201212170">
@@ -2879,24 +2758,31 @@
--><!--#echo encoding="none" var="DATE" -->
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a “smart”
TV</a>
- and use its camera to watch the people who are watching TV.</p>
+ Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>break security on</em></ins></span> a <span
class="removed"><del><strong>flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>“smart” TV</a>
+ and use its camera</em></ins></span> to <span
class="removed"><del><strong>anyone? A free software flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>watch the people who are watching
TV.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInCameras">Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInGames">Spyware in
Games</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInGames">#SpywareInGames</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><ul>
+ <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
+
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201901100">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Amazon Ring “security” devices <a
-
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture to Amazon servers</a>, which save it
+ <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about
them</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send the video they capture</em></ins></span> to
+ <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Amazon servers</a>, which save it
long-term.</p>
<p>In many cases, the video shows everyone that comes near, or merely
@@ -2905,46 +2791,67 @@
<p>The article focuses on how Ring used to let individual employees
look
at the videos freely. It appears Amazon has tried to prevent that
secondary abuse, but the primary abuse—that Amazon gets the
- video—Amazon expects society to surrender to.</p>
+ video—Amazon expects society to surrender
to.</p></em></ins></span>
</li>
- <li id="M201810300">
+ <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810300">
<!--#set var="DATE" value='<small
class="date-tag">2018-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Nearly all “home security cameras” <a
-
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy of everything they
+ <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give</em></ins></span> the <span class="removed"><del><strong>NSA takes
advantage</strong></del></span> <span class="inserted"><ins><em>manufacturer an
unencrypted copy of everything they
see</a>. “Home insecurity camera” would be a better
name!</p>
<p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not to look at what's in the videos. That's not
+ manufacturers promise not</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>look at what's in the videos. That's not
security for your home. Security means making sure they don't get to
- see through your camera.</p>
+ see</em></ins></span> through <span class="removed"><del><strong>it
too</a>.
+ Here's information on</strong></del></span> <span
class="inserted"><ins><em>your camera.</p>
</li>
<li id="M201603220">
<!--#set var="DATE" value='<small
class="date-tag">2016-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Over 70 brands of network-connected surveillance cameras have
<a
-
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone to watch through them</a>.</p>
+ <p>Over 70 brands of network-connected surveillance cameras
have</em></ins></span> <a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ security bugs that allow anyone to watch through
them</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201511250">
+
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
+
+<ul>
+ <li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511250">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The Nest Cam “smart” camera is <a
- href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when the “owner” switches it “off.”</p>
+ --><!--#echo encoding="none" var="DATE" --></em></ins></span>
+ <p>The <span class="inserted"><ins><em>Nest Cam</em></ins></span>
“smart” <span class="removed"><del><strong>toys My Friend Cayla and
i-Que transmit</strong></del></span> <span class="inserted"><ins><em>camera
is</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
+ a speech recognition company based in</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
+ even when</em></ins></span> the <span
class="removed"><del><strong>U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</strong></del></span> <span
class="inserted"><ins><em>“owner” switches it
“off.”</p>
<p>A “smart” device means the manufacturer is using it
to outsmart you.</p>
</li>
-</ul></em></ins></span>
+</ul>
-<div <span class="removed"><del><strong>style="clear:
left;"></div></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+<div class="big-subsection">
<h4 id="SpywareInToys">Toys</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
@@ -2955,9 +2862,10 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Furby Connect has a <a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If the product as shipped doesn't act as a
- listening device, remote changes to the code could surely convert it
- into one.</p>
+ universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>toys with</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as</em></ins></span> a
<span class="removed"><del><strong>mobile phone. This would
+ enable crackers</strong></del></span>
+ <span class="inserted"><ins><em>listening device, remote
changes</em></ins></span> to <span class="removed"><del><strong>listen in on a
child's speech, and even speak</strong></del></span> <span
class="inserted"><ins><em>the code could surely convert it</em></ins></span>
+ into <span class="inserted"><ins><em>one.</p>
</li>
<li id="M201711100">
@@ -2965,12 +2873,14 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of the conversation between two users</a>.</p>
+ recordings of</em></ins></span> the <span
class="removed"><del><strong>toys themselves.</p></strong></del></span>
<span class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
</li>
- <li id="M201703140">
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201703140">
<!--#set var="DATE" value='<small
class="date-tag">2017-03</small>'
- --><!--#echo encoding="none" var="DATE" -->
+ --><!--#echo encoding="none" var="DATE" --></em></ins></span>
<p>A computerized vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
was snooping on its users through the proprietary control
app</a>.</p>
@@ -3000,70 +2910,146 @@
customers.</p>
</li>
- <li id="M201702280">
+ <span class="removed"><del><strong><li><p>
“CloudPets”</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702280">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>“CloudPets” toys with microphones <a
-
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess what?
<a
-
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a> collected by the
+ <p>“CloudPets”</em></ins></span> toys with microphones
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak</em></ins></span> childrens' conversations to the
manufacturer</a>. Guess what? <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers</em></ins></span> found a way to access the data</a>
collected by the
manufacturer's snooping.</p>
<p>That the manufacturer and the FBI could listen to these
- conversations was unacceptable by itself.</p>
+ conversations was unacceptable by <span
class="removed"><del><strong>itself.</p></li>
+
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>itself.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201612060">
+
+<!-- #SpywareAtLowLevel</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201612060">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>The “smart” toys My
Friend Cayla and i-Que transmit <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>, a speech recognition
- company based in the U.S.</p>
+ conversations</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>Nuance Communications</a>, a speech recognition
+ company based</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p>
+<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
+Note that</strong></del></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would enable
- crackers to listen in on a child's speech, and even speak into the
- toys themselves.</p>
+ can remotely control the toys with</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>mobile phone. This would enable
+ crackers</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>listen
in</em></ins></span> on <span class="removed"><del><strong>top under each
subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect</strong></del></span> <span
class="inserted"><ins><em>a child's speech, and even speak
into</em></ins></span> the <span class="removed"><del><strong>emails of members
of Parliament
+ this way, because they pass it through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
+ <span class="inserted"><ins><em>toys themselves.</p>
</li>
<li id="M201502180">
<!--#set var="DATE" value='<small
class="date-tag">2015-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Barbie <a
-
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going to spy on children and adults</a>.</p>
+ <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going to spy on children and adults</a>.</p></em></ins></span>
</li>
-</ul></em></ins></span>
+</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInCameras">Spyware
in Cameras</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInCameras">#SpywareInCameras</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
- <li>
- <p>The</strong></del></span>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype
+ <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
+ </li>
+</ul>
+
+
+
+<!-- #SpywareOnTheRoad</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708040">
<!--#set var="DATE" value='<small
class="date-tag">2017-08</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>While you're using a DJI drone
- to snoop on other people, DJI is in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p>
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>While you're using a DJI
drone</em></ins></span>
+ to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>other people, DJI is in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
+ on <span class="removed"><del><strong>The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div></strong></del></span> <span
class="inserted"><ins><em>you</a>.</p>
</li>
-</ul>
+</ul></em></ins></span>
<div class="big-subsection">
- <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInCameras">Spyware
in Cameras</h4>
+ <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInCameras">#SpywareInCameras</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li>
+ <p>The</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202009270">
<!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -3079,120 +3065,85 @@
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Google</em></ins></span> Nest <span
class="removed"><del><strong>Cam “smart”
camera</strong></del></span> <span class="inserted"><ins><em><a
-
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
- is taking over ADT</a>. Google sent out a software
- update to its speaker devices using their back door <a
- href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that
+
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"></em></ins></span>
+ is <span class="inserted"><ins><em>taking over ADT</a>. Google sent
out a software
+ update to its speaker devices using their back door</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when the “owner” switches it
“off.”</p>
+ <p>A “smart” device</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.protocol.com/google-smart-speaker-alarm-adt">
that
listens for things like smoke alarms</a> and then notifies your phone
- that an alarm is happening. This means the devices now listen for more
+ that an alarm is happening. This</em></ins></span> means the <span
class="removed"><del><strong>manufacturer is using</strong></del></span> <span
class="inserted"><ins><em>devices now listen for more
than just their wake words. Google says the software update was sent
out prematurely and on accident and Google was planning on disclosing
- this new feature and offering it to customers who pay for it.</p>
+ this new feature and offering</em></ins></span> it to <span
class="removed"><del><strong>outsmart
+ you.</p></strong></del></span> <span
class="inserted"><ins><em>customers who pay for it.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M202006300">
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202006300">
<!--#set var="DATE" value='<small
class="date-tag">2020-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>“Bossware”</em></ins></span> is <span
class="inserted"><ins><em>malware that bosses</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
- coerce workers into installing in their own computers</a>, so the
- bosses can spy on them.</p>
+ <p>“Bossware” is malware that bosses <a
+
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
+ coerce workers into installing</em></ins></span> in <span
class="removed"><del><strong>e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul>
+ <li><p>E-books</strong></del></span> <span
class="inserted"><ins><em>their own computers</a>, so the
+ bosses</em></ins></span> can <span class="removed"><del><strong>contain
Javascript code,</strong></del></span> <span class="inserted"><ins><em>spy on
them.</p>
<p>This shows why requiring the user's “consent” is not
an adequate basis for protecting digital privacy. The boss can coerce
- most workers into consenting to almost anything,</em></ins></span> even
<span class="inserted"><ins><em>probable exposure
+ most workers into consenting to almost anything, even probable exposure
to contagious disease that can be fatal. Software like this should
- be illegal and bosses that demand it should be prosecuted for it.</p>
+ be illegal</em></ins></span> and <span class="inserted"><ins><em>bosses
that demand it should be prosecuted for it.</p>
</li>
<li id="M201911190">
<!--#set var="DATE" value='<small
class="date-tag">2019-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Internet-tethered Amazon Ring had
- a security vulnerability that enabled attackers to <a
-
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
- access the user's wifi password</a>, and snoop on the household
+ a security vulnerability that enabled attackers to</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access the user's wifi password</a>, and snoop</em></ins></span> on
<span class="removed"><del><strong>readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not
only</strong></del></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>household
through connected surveillance devices.</p>
- <p>Knowledge of the wifi password would not be sufficient to carry
- out any significant surveillance if the devices implemented proper
+ <p>Knowledge of</em></ins></span> the <span
class="removed"><del><strong>user reads at what time</a>.</p>
+ </li>
+
+ <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>wifi
password would not be sufficient to carry
+ out any significant surveillance if</em></ins></span> the <span
class="removed"><del><strong>e-reader</strong></del></span> <span
class="inserted"><ins><em>devices implemented proper
security, including encryption. But many devices with proprietary
- software lack this. Of course, they are also used by their
+ software lack this. Of course, they are also</em></ins></span> used by
<span class="removed"><del><strong>most US libraries,</strong></del></span>
<span class="inserted"><ins><em>their
manufacturers for snooping.</p>
</li>
<li id="M201907210">
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google “Assistant” records users' conversations <a
-
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
- when it is not supposed to listen</a>. Thus,</em></ins></span> when
<span class="inserted"><ins><em>one of Google's
+ <p>Google “Assistant” records users'
conversations</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
+ when it is not supposed to listen</a>. Thus, when
one</em></ins></span> of <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>Google's
subcontractors discloses a thousand confidential voice recordings,
users were easily identified from these recordings.</p>
<p>Since Google “Assistant” uses proprietary software,
there is no
- way to see or control what it records or sends.</p>
+ way</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
+ needed</strong></del></span> <span class="inserted"><ins><em>see or
control what it records or sends.</p>
- <p>Rather than trying to better control the use of recordings, Google
- should not record or listen to the person's voice. It should only
- get commands that the user wants to send to some Google service.</p>
- </li>
-
- <li id="M201905061">
- <!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Amazon Alexa collects a lot more information from users
- than is necessary for correct functioning (time, location,
- recordings made without a legitimate prompt), and sends
- it to Amazon's servers, which store it indefinitely. Even
- worse, Amazon forwards it to third-party companies. Thus,
- even if users request deletion of their data from Amazon's servers, <a
-
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
- the data remain on other servers</a>, where they can be accessed by
- advertising companies and government agencies. In other words,
- deleting the collected information doesn't cancel the wrong of
- collecting it.</p>
-
- <p>Data collected by devices such as the Nest thermostat, the Philips
- Hue-connected lights, the Chamberlain MyQ garage opener
and</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>Sonos
- speakers are likewise stored longer than necessary on</em></ins></span>
the <span class="removed"><del><strong>manufacturer is using
it</strong></del></span> <span class="inserted"><ins><em>servers
- the devices are tethered to. Moreover, they are made
available</em></ins></span> to <span class="removed"><del><strong>outsmart
- you.</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware</strong></del></span>
- <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very
precise picture of users' life
- at home, not only</em></ins></span> in <span
class="removed"><del><strong>e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-
-<ul>
- <li><p>E-books can contain Javascript code,
- and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
- </li>
-
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>the present, but</em></ins></span> in <span
class="removed"><del><strong>many e-readers—not
only</strong></del></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span> <span
class="inserted"><ins><em>past (and, who knows,
- in</em></ins></span> the <span class="removed"><del><strong>user reads at
what time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>future too?)</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used
- by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201904240">
- <!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Some</em></ins></span> of <span class="removed"><del><strong>data
to Adobe</a>. Adobe's “excuse”: it's
- needed</strong></del></span> <span class="inserted"><ins><em>users'
commands</em></ins></span> to <span class="removed"><del><strong>check
DRM!</p>
+ <p>Rather than trying</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
</li>
</ul>
@@ -3202,39 +3153,68 @@
</div>
<ul>
-<li><p>Computerized cars with nonfree
software</strong></del></span> <span class="inserted"><ins><em>the Alexa
service</em></ins></span> are <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p>
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>better control the use of recordings, Google
+ should not record or listen to the person's voice. It should only
+ get commands that the user wants to send to some Google
service.</p></em></ins></span>
</li>
- <li id="nissan-modem"><p>The Nissan Leaf has a built-in cell
phone modem which allows
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>id="M201905061">
+ <!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Amazon Alexa collects</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
effectively
anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in various
+ access its computers remotely</strong></del></span> <span
class="inserted"><ins><em>lot more information from users
+ than is necessary for correct functioning (time, location,
+ recordings made without a legitimate prompt),</em></ins></span> and <span
class="removed"><del><strong>make changes in various
settings</a>.</p>
- <p>That's easy</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees</em></ins></span> to <span
class="inserted"><ins><em>listen to</a>. The Google and Apple
- voice assistants</em></ins></span> do <span
class="removed"><del><strong>because the system has no authentication when
- accessed through</strong></del></span> <span
class="inserted"><ins><em>similar things.</p>
-
- <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>modem. However,</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff</em></ins></span> even <span
class="removed"><del><strong>if it asked for
- authentication, you couldn't be confident that
Nissan</strong></del></span> has <span class="removed"><del><strong>no
- access. The software in the car is
+ <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>sends
+ it</em></ins></span> to <span class="removed"><del><strong>do because the
system has no authentication when
+ accessed through the modem. However,</strong></del></span> <span
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
+ worse, Amazon forwards it to third-party companies. Thus,</em></ins></span>
+ even if <span class="removed"><del><strong>it asked for
+ authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>users request deletion of their data from Amazon's
servers, <a
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
+ the data remain on other servers</a>, where they
can</em></ins></span> be <span class="removed"><del><strong>confident that
Nissan</strong></del></span> <span class="inserted"><ins><em>accessed by
+ advertising companies and government agencies. In other words,
+ deleting the collected information doesn't cancel the wrong of
+ collecting it.</p>
+
+ <p>Data collected by devices such as the Nest thermostat, the Philips
+ Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+ speakers are likewise stored longer than necessary on the servers
+ the devices are tethered to. Moreover, they are made available to
+ Alexa. As a result, Amazon</em></ins></span> has <span
class="removed"><del><strong>no
+ access. The software</strong></del></span> <span
class="inserted"><ins><em>a very precise picture of users' life
+ at home, not only</em></ins></span> in the <span
class="removed"><del><strong>car is
proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
means it demands blind faith from its users</a>.</p>
- <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>access</em></ins></span> to <span
class="inserted"><ins><em><a
+ <p>Even if no one connects to</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>past (and, who knows,
+ in</em></ins></span> the <span class="removed"><del><strong>cell phone
+ modem enables</strong></del></span> <span class="inserted"><ins><em>future
too?)</p>
+ </li>
+
+ <li id="M201904240">
+ <!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Some of users' commands to</em></ins></span> the <span
class="removed"><del><strong>phone company</strong></del></span> <span
class="inserted"><ins><em>Alexa service are <a
+
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>listen to</a>. The Google and Apple
+ voice assistants do similar things.</p>
+
+ <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even has access to <a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
location and other personal data</a>.</p>
- <p>Since</em></ins></span> the <span
class="removed"><del><strong>car remotely, the cell phone
- modem enables</strong></del></span> <span class="inserted"><ins><em>client
program is nonfree, and data processing is done
- “<a
href="/philosophy/words-to-avoid.html#CloudComputing">in</em></ins></span>
- the <span class="removed"><del><strong>phone company</strong></del></span>
<span class="inserted"><ins><em>cloud</a>” (a soothing way of
saying “We won't
- tell you how and where it's done”), users have no
way</em></ins></span>
- to <span class="removed"><del><strong>track the car's movements all
- the time; it is possible</strong></del></span> <span
class="inserted"><ins><em>know what happens</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> the <span
class="removed"><del><strong>cell phone modem
+ <p>Since</em></ins></span> the <span
class="removed"><del><strong>time; it</strong></del></span> <span
class="inserted"><ins><em>client program</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>nonfree, and data processing is done
+ “<a href="/philosophy/words-to-avoid.html#CloudComputing">in
+ the cloud</a>” (a soothing way of saying “We won't
+ tell you how and where it's done”), users have no way
+ to know what happens</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> the <span
class="removed"><del><strong>cell phone modem
though.</p></strong></del></span> <span
class="inserted"><ins><em>recordings unless human eavesdroppers <a
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
break their non-disclosure
agreements</a>.</p></em></ins></span>
@@ -3247,44 +3227,44 @@
which is made available</strong></del></span>
<span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance
companies,</strong></del></span> <span class="inserted"><ins><em>make sure the
user is still
- paying for the subscription,</em></ins></span> and
- <span class="removed"><del><strong>others.</p>
+ communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
+ others.</p>
- <p>The case</strong></del></span> <span
class="inserted"><ins><em>hasn't printed more pages than were
+ <p>The case of toll-collection systems, mentioned in this
article,</strong></del></span> <span class="inserted"><ins><em>make sure the
user</em></ins></span> is <span class="removed"><del><strong>not
+ really a matter of proprietary surveillance. These systems are an
+ intolerable invasion of privacy,</strong></del></span> <span
class="inserted"><ins><em>still
+ paying for the subscription,</em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>hasn't printed more pages than were
paid for.</p>
- <p>Even though the ink subscription program may be cheaper in some
+ <p>Even though</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
+ cases mentioned are done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>ink subscription program may be cheaper in some
specific cases, it spies on users, and involves totally unacceptable
- restrictions in the use</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span class="inserted"><ins><em>ink cartridges
that would otherwise be</em></ins></span> in <span
class="removed"><del><strong>this article, is not
- really</strong></del></span>
- <span class="inserted"><ins><em>working order.</p>
+ restrictions</em></ins></span> in the <span
class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow the company</strong></del></span> <span
class="inserted"><ins><em>use of ink cartridges that would otherwise be in
+ working order.</p>
</li>
<li id="M201808120">
<!--#set var="DATE" value='<small
class="date-tag">2018-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>matter</strong></del></span> <span
class="inserted"><ins><em>way to break the security</em></ins></span> of <span
class="removed"><del><strong>proprietary surveillance. These systems
are</strong></del></span> an
- <span class="removed"><del><strong>intolerable invasion of
privacy,</strong></del></span> <span class="inserted"><ins><em>Amazon
device,</em></ins></span>
- and <span class="removed"><del><strong>should</strong></del></span> <span
class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ <p>Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
+ determine</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
+ and <span
class="removed"><del><strong>c.</a>).</strong></del></span> <span
class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
- <p>It was very difficult for them to do this. The job
would</em></ins></span> be <span class="removed"><del><strong>replaced with
anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>much
- easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>invasion isn't done
by malware. The other
- cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>US
- told Amazon to do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
-
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>product in that country,
- do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>moral fiber</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
- determine the car's location at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The company says it doesn't
- store this information,</strong></del></span> <span
class="inserted"><ins><em>say no?</p>
+ <p>It was very difficult for them to do this.</em></ins></span> The
<span class="removed"><del><strong>company says it doesn't
+ store this information, but</strong></del></span> <span
class="inserted"><ins><em>job would be much
+ easier for Amazon. And</em></ins></span> if <span
class="inserted"><ins><em>some government such as China or</em></ins></span>
the <span class="removed"><del><strong>state orders it</strong></del></span>
<span class="inserted"><ins><em>US
+ told Amazon</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell the product in that country,
+ do you think Amazon would have</em></ins></span> the <span
class="inserted"><ins><em>moral fiber to say no?</p>
- <p><small>(These crackers are probably hackers
too,</em></ins></span> but <span class="removed"><del><strong>if the state
orders it</strong></del></span> <span class="inserted"><ins><em>please <a
+ <p><small>(These crackers are probably hackers too, but please
<a
href="https://stallman.org/articles/on-hacking.html"> don't use
- “hacking”</em></ins></span> to <span
class="removed"><del><strong>get the</strong></del></span> <span
class="inserted"><ins><em>mean “breaking
security”</a>.)</small></p>
+ “hacking” to mean “breaking
security”</a>.)</small></p>
</li>
<li id="M201804140">
@@ -3351,40 +3331,24 @@
<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up to me and
said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li>
- <p>Vizio
- “smart”</strong></del></span>
+don't know. You can't see out</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201807260">
<!--#set var="DATE" value='<small
class="date-tag">2018-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tommy Hilfiger clothing</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts
- and cable</a>. Even if the image is coming from the user's own
- computer,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
+ <p>Tommy Hilfiger clothing <a
+
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
monitor how often people wear it</a>.</p>
- <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>TV reports what it is. The existence of a
way</strong></del></span> <span
class="inserted"><ins><em>sheeple</em></ins></span> to
- <span class="removed"><del><strong>disable the surveillance, even if it
were not hidden as</strong></del></span> <span
class="inserted"><ins><em>find</em></ins></span> it <span
class="removed"><del><strong>was in
- these TVs, does not legitimize the surveillance.</p>
- </li>
-
- <li><p>More or less all “smart” TVs <a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
-
- <p>The report was as of 2014, but we don't expect this has got
better.</p>
+ <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>other way.” Evidently</strong></del></span>
<span class="inserted"><ins><em>sheeple to find it normal</em></ins></span>
that <span class="removed"><del><strong>was
+before Amazon “smart” TVs.</p>
- <p>This shows</strong></del></span> <span
class="inserted"><ins><em>normal</em></ins></span> that <span
class="removed"><del><strong>laws requiring products to get users' formal
- consent before collecting personal data are totally inadequate.
- And</strong></del></span> <span class="inserted"><ins><em>companies
- monitor every aspect of</em></ins></span> what <span
class="removed"><del><strong>happens if</strong></del></span> <span
class="inserted"><ins><em>they do.</p>
+<ul>
+ <li>
+ <p>Vizio
+ “smart”</strong></del></span> <span
class="inserted"><ins><em>companies
+ monitor every aspect of what they do.</p>
</li>
</ul>
@@ -3397,59 +3361,58 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Internet-enabled watches with proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they have</em></ins></span> a <span
class="removed"><del><strong>user declines consent? Probably the TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>lot of security flaws. They <a
-
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
- permit security breakers (and unauthorized people)</em></ins></span> to
<span class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>access</a></em></ins></span> the <span
class="removed"><del><strong>TV will
- not work.”</p>
-
- <p>Proper laws would say that TVs are not
allowed</strong></del></span> <span class="inserted"><ins><em>watch.</p>
-
- <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages</em></ins></span> to
<span class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>and from</em></ins></span> the <span
class="removed"><del><strong>user watches — no
exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>watch, possibly endangering the child.</p>
+ privacy. In addition, they have a lot of security flaws.
They</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
+ permit security breakers (and unauthorized people) to access</a> the
watch.</p>
+
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent</em></ins></span> and <span
class="removed"><del><strong>not just broadcasts</strong></del></span> <span
class="inserted"><ins><em>child and spoof messages to</em></ins></span> and
<span class="removed"><del><strong>cable</a>. Even if the image is
coming</strong></del></span> from the <span class="removed"><del><strong>user's
own
+ computer, the TV reports what it is. The existence of a way to
+ disable</strong></del></span> <span class="inserted"><ins><em>watch,
possibly endangering</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden as it was
in
+ these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>child.</p>
- <p><small>(Note that this article misuses the word “<a
+ <p><small>(Note that this article misuses</em></ins></span>
the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
to mean “crackers.”)</small></p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying on
- their users: their</strong></del></span>
+
+ <span class="removed"><del><strong><li><p>More or less all
“smart” TVs</strong></del></span>
<span class="inserted"><ins><em><li id="M201603020">
<!--#set var="DATE" value='<small
class="date-tag">2016-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so</strong></del></span>
+ <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report was as of 2014, but we don't expect this has got
better.</p>
+
+ <p>This shows</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></em></ins></span>
- that <span class="removed"><del><strong>advertisers can track you
- across devices.</p>
+ that <span class="removed"><del><strong>laws requiring
products</strong></del></span> <span
class="inserted"><ins><em>connects</em></ins></span> to <span
class="removed"><del><strong>get users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if</strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
- <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>connects</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
+ <p>The article says this is</em></ins></span> a <span
class="removed"><del><strong>user declines consent? Probably the TV
+ will say, “Without your consent to tracking, the TV will
+ not work.”</p>
- <p>The article says</em></ins></span> this <span
class="removed"><del><strong>off,</strong></del></span> <span
class="inserted"><ins><em>is a back door,</em></ins></span> but <span
class="removed"><del><strong>having</strong></del></span> <span
class="inserted"><ins><em>that could be a
- misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>certainly surveillance, at
least.</p></em></ins></span>
+ <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>back door, but</em></ins></span> that <span
class="removed"><del><strong>TVs are not allowed</strong></del></span> <span
class="inserted"><ins><em>could be a
+ misunderstanding. However, it is certainly surveillance, at
least.</p>
</li>
- <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to
- the 600 millions social media profiles the company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201407090">
+ <li id="M201407090">
<!--#set var="DATE" value='<small
class="date-tag">2014-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>An LG “smart” watch is designed</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
- to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>report its location to someone else</em></ins></span>
and <span class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> to <span class="removed"><del><strong>be
- picked up by proprietary malware running on other devices in
- range so as</strong></del></span> <span
class="inserted"><ins><em>transmit conversations
- too</a>.</p>
+ <p>An LG “smart” watch is designed <a
+
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
+ to report <span class="removed"><del><strong>what
+ the user watches — no exceptions!</p></strong></del></span>
<span class="inserted"><ins><em>its location to someone else and to transmit
conversations
+ too</a>.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying on
+ their users: their</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -3461,17 +3424,20 @@
<li id="M202008181">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>New Toyotas will <a
- href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/">
- upload data</em></ins></span> to <span
class="removed"><del><strong>determine that they are nearby. Once your
- Internet devices are paired with your TV,
advertisers</strong></del></span> <span class="inserted"><ins><em>AWS to help
create custom insurance premiums</a>
+ <p>New Toyotas will</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so that
advertisers</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/">
+ upload data to AWS to help create custom insurance premiums</a>
based on driver behaviour.</p>
- <p>Before you buy a “connected” car, make sure
you</em></ins></span> can
- <span class="removed"><del><strong>correlate ads</strong></del></span>
- <span class="inserted"><ins><em>disconnect its cellular antenna and its
GPS antenna. If you want
+ <p>Before you buy a “connected” car, make sure
you</em></ins></span> can <span
class="removed"><del><strong>track</strong></del></span>
+ <span class="inserted"><ins><em>disconnect its cellular antenna and its
GPS antenna. If</em></ins></span> you
+ <span class="removed"><del><strong>across devices.</p>
+
+ <p>It</strong></del></span> <span class="inserted"><ins><em>want
GPS navigation, get a separate navigator which runs free software
- and works</em></ins></span> with <span class="removed"><del><strong>Web
activity,</strong></del></span> <span class="inserted"><ins><em>Open Street
Map.</p>
+ and works with Open Street Map.</p>
</li>
<li id="M201912171">
@@ -3480,87 +3446,101 @@
<p>Most modern cars now <a
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
record and send various kinds of data to the manufacturer</a>. For
- the user, access to the data is nearly impossible, as it involves
- cracking the car's computer, which is always hidden</em></ins></span> and
- <span class="removed"><del><strong>other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>running with
- proprietary software.</p></em></ins></span>
+ the user, access to the data</em></ins></span> is <span
class="removed"><del><strong>possible to turn this off, but
having</strong></del></span> <span class="inserted"><ins><em>nearly impossible,
as</em></ins></span> it <span class="removed"><del><strong>enabled by
default</strong></del></span> <span class="inserted"><ins><em>involves
+ cracking the car's computer, which</em></ins></span> is <span
class="removed"><del><strong>an injustice already.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize</strong></del></span>
- <span class="inserted"><ins><em><li id="M201903290">
+ <li><p>Tivo's alliance</strong></del></span> <span
class="inserted"><ins><em>always hidden and running</em></ins></span> with
<span class="removed"><del><strong>Viacom adds 2.3 million
households</strong></del></span>
+ <span class="inserted"><ins><em>proprietary software.</p>
+ </li>
+
+ <li id="M201903290">
<!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tesla cars collect lots of personal data,</em></ins></span> and
<a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
- even if it isn't</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
- when they go to</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p>
- </li>
- <li><p>The Amazon “Smart” TV
- <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching and listening all</strong></del></span> <span
class="inserted"><ins><em>junkyard</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>driver's personal data goes with
- them</a>.</p></em></ins></span>
+ <p>Tesla cars collect lots of personal data, and <a
+
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
+ when they go</em></ins></span> to <span class="inserted"><ins><em>a
junkyard</em></ins></span> the <span class="removed"><del><strong>600 millions
social media profiles the company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>driver's personal data goes</em></ins></span>
with <span class="removed"><del><strong>online
+ social media participation, Tivo can now</strong></del></span>
+ <span class="inserted"><ins><em>them</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
- <span class="inserted"><ins><em><li id="M201902011">
+ <li id="M201902011">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The FordPass Connect feature of some Ford vehicles
has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
+ <p>The FordPass Connect feature of some Ford vehicles
has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all
users</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access to</em></ins></span> the <span
class="removed"><del><strong>internet</strong></del></span> <span
class="inserted"><ins><em>internal car network</a>. It is constantly
- connected</em></ins></span> to <span class="removed"><del><strong>another
- company, Nuance</a>. Nuance can save it</strong></del></span> <span
class="inserted"><ins><em>the cellular phone network</em></ins></span> and
<span class="removed"><del><strong>would then</strong></del></span> <span
class="inserted"><ins><em>sends Ford a lot of data,
+ near-complete access</em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>the internal car
network</a>. It is constantly
+ connected</em></ins></span> to <span class="removed"><del><strong>be
+ picked up</strong></del></span> <span class="inserted"><ins><em>the
cellular phone network and sends Ford a lot of data,
including car location. This feature operates even when the ignition
key is removed, and users report that they can't disable it.</p>
- <p>If you own one of these cars,</em></ins></span> have <span
class="removed"><del><strong>to
- give it to</strong></del></span> <span class="inserted"><ins><em>you
succeeded in breaking</em></ins></span> the <span
class="removed"><del><strong>US</strong></del></span>
- <span class="inserted"><ins><em>connectivity by disconnecting the cellular
modem,</em></ins></span> or <span class="removed"><del><strong>some other
government.</p>
- <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>wrapping the
- antenna in aluminum foil?</p>
+ <p>If you own one of these cars, have you succeeded in breaking the
+ connectivity</em></ins></span> by <span
class="removed"><del><strong>proprietary malware running on other
devices</strong></del></span> <span class="inserted"><ins><em>disconnecting the
cellular modem, or wrapping the
+ antenna</em></ins></span> in
+ <span class="removed"><del><strong>range so as</strong></del></span>
<span class="inserted"><ins><em>aluminum foil?</p>
</li>
<li id="M201811300">
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>In China, it</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>mandatory for electric
- cars</em></ins></span> to be <span class="removed"><del><strong>trusted
unless it is done
- by free software in your own computer.</p>
-
- <p>In its privacy policy, Samsung explicitly
confirms</strong></del></span> <span class="inserted"><ins><em>equipped with a
terminal</em></ins></span> that <a <span
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be
transmitted</strong></del></span>
+ <p>In China, it is mandatory for electric
+ cars</em></ins></span> to <span class="removed"><del><strong>determine
that they are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads</strong></del></span> <span class="inserted"><ins><em>be
equipped</em></ins></span> with <span class="removed"><del><strong>Web
activity, and
+ other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
+ </li>
+ <li><p>Vizio “smart” TVs recognize
and</strong></del></span> <span class="inserted"><ins><em>a terminal
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if it isn't</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
- transfers technical data, including car location,</em></ins></span>
- to
- <span class="removed"><del><strong>third parties</a>.</p>
+ transfers technical data, including car location,
+ to</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p>
</li>
- <li><p>Spyware in</strong></del></span> <span
class="inserted"><ins><em>a government-run platform</a>. In
practice,</em></ins></span> <a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports what</strong></del></span>
+ <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>government-run platform</a>. In
practice,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching and listening all</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying">
manufacturers collect this data</a> as part of their own spying, then
- forward it to</em></ins></span> the <span
class="removed"><del><strong>user watches, and</strong></del></span> <span
class="inserted"><ins><em>government-run platform.</p>
+ forward it to</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>government-run
platform.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
- <li id="M201810230">
+ <span class="inserted"><ins><em><li id="M201810230">
<!--#set var="DATE" value='<small
class="date-tag">2018-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>GM <a
- href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked</em></ins></span> the <span class="removed"><del><strong>switch to
turn this off has no effect. (The fact</strong></del></span> <span
class="inserted"><ins><em>choices of radio programs</a> in its
+ <p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
+ tracked</em></ins></span> the <span class="removed"><del><strong>internet
to another
+ company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>choices of radio programs</a> in its
“connected” cars, minute by minute.</p>
- <p>GM did not get users' consent, but it could have
got</em></ins></span> that <span class="inserted"><ins><em>easily by
- sneaking it into</em></ins></span> the
- <span class="removed"><del><strong>transmission reports a 404
error</strong></del></span> <span class="inserted"><ins><em>contract that users
sign for some digital service
- or other. A requirement for consent is effectively no protection.</p>
-
- <p>The cars can also collect lots of other data: listening to you,
- watching you, following your movements, tracking passengers' cell
- phones. <em>All</em> such data collection should be
forbidden.</p>
-
- <p>But if you</em></ins></span> really <span
class="removed"><del><strong>means nothing;</strong></del></span> <span
class="inserted"><ins><em>want to be safe, we must make sure</em></ins></span>
the <span class="removed"><del><strong>server
- could save</strong></del></span> <span class="inserted"><ins><em>car's
- hardware cannot collect any of that data, or</em></ins></span> that <span
class="removed"><del><strong>data anyway.)</p>
+ <p>GM did not get users' consent, but</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>could</em></ins></span> have <span
class="removed"><del><strong>to
+ give</strong></del></span> <span class="inserted"><ins><em>got that
easily by
+ sneaking</em></ins></span> it <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>into</em></ins></span> the <span
class="removed"><del><strong>US or</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for</em></ins></span> some
<span class="removed"><del><strong>other government.</p>
+ <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>digital service
+ or other. A requirement for consent</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>effectively no protection.</p>
+
+ <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="removed"><del><strong>be trusted
unless it is done
+ by free software in</strong></del></span> <span
class="inserted"><ins><em>you,
+ watching you, following</em></ins></span> your <span
class="removed"><del><strong>own computer.</p>
+
+ <p>In its privacy policy, Samsung explicitly confirms
+ that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice</strong></del></span>
<span class="inserted"><ins><em>movements, tracking passengers' cell
+ phones. <em>All</em> such</em></ins></span> data <span
class="removed"><del><strong>containing sensitive information
will</strong></del></span> <span class="inserted"><ins><em>collection
should</em></ins></span> be <span
class="removed"><del><strong>transmitted</strong></del></span> <span
class="inserted"><ins><em>forbidden.</p>
+
+ <p>But if you really want</em></ins></span> to
+ <span class="removed"><del><strong>third parties</a>.</p>
+ </li>
+ <li><p>Spyware in
+ <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a> reports what the user watches,
and</strong></del></span> <span class="inserted"><ins><em>be safe, we must make
sure</em></ins></span> the <span class="removed"><del><strong>switch to turn
this off has no effect. (The fact</strong></del></span> <span
class="inserted"><ins><em>car's
+ hardware cannot collect any of</em></ins></span> that <span
class="removed"><del><strong>the
+ transmission reports a 404 error really means nothing; the server
+ could save</strong></del></span> <span class="inserted"><ins><em>data,
or</em></ins></span> that <span class="removed"><del><strong>data
anyway.)</p>
<p>Even worse, it
<a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
@@ -3598,38 +3578,38 @@
<ul>
<li><p>Users</strong></del></span>
- <span class="inserted"><ins><em><p id="car-spying">Computerized cars
with nonfree software</em></ins></span> are <span
class="removed"><del><strong>suing Bose for</strong></del></span> <a
-<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
-distributing</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ <span class="inserted"><ins><em><p id="car-spying">Computerized cars
with nonfree software</em></ins></span> are <span
class="removed"><del><strong>suing Bose</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
snooping devices</a>.</p>
</li>
<li id="M201602240">
<!--#set var="DATE" value='<small
class="date-tag">2016-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p id="nissan-modem">The Nissan Leaf has</em></ins></span> a <span
class="removed"><del><strong>spyware app for</strong></del></span> <span
class="inserted"><ins><em>built-in
+ <p id="nissan-modem">The Nissan Leaf has a built-in
cell phone modem which allows effectively anyone to <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
- access</em></ins></span> its <span
class="removed"><del><strong>headphones</a>.
-Specifically,</strong></del></span> <span class="inserted"><ins><em>computers
remotely and make changes in various
+ access its computers remotely and make changes in various
settings</a>.</p>
- <p>That's easy to do because</em></ins></span> the <span
class="removed"><del><strong>app would record</strong></del></span> <span
class="inserted"><ins><em>system has no authentication
- when accessed through</em></ins></span> the <span
class="removed"><del><strong>names of</strong></del></span> <span
class="inserted"><ins><em>modem. However, even if it asked
- for authentication, you couldn't be confident that Nissan
- has no access. The software in</em></ins></span> the <span
class="removed"><del><strong>audio files
-users listen</strong></del></span> <span class="inserted"><ins><em>car is
proprietary, <a
- href="/philosophy/free-software-even-more-important.html">which means
- it demands blind faith from its users</a>.</p>
-
- <p>Even if no one connects</em></ins></span> to <span
class="removed"><del><strong>along with</strong></del></span> the <span
class="removed"><del><strong>headphone's unique serial number.
+ <p>That's easy to do because the system has no authentication
+ when accessed through the modem. However, even if it
asked</em></ins></span>
+ for <span class="inserted"><ins><em>authentication, you couldn't be
confident that Nissan
+ has no access. The software in the car is proprietary,</em></ins></span>
<a
+<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+distributing a spyware app for</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
means
+ it demands blind faith from</em></ins></span> its <span
class="removed"><del><strong>headphones</a>.
+Specifically,</strong></del></span> <span
class="inserted"><ins><em>users</a>.</p>
+
+ <p>Even if no one connects to</em></ins></span> the <span
class="removed"><del><strong>app would record</strong></del></span> <span
class="inserted"><ins><em>car remotely,</em></ins></span> the <span
class="removed"><del><strong>names of</strong></del></span> <span
class="inserted"><ins><em>cell phone modem
+ enables</em></ins></span> the <span class="removed"><del><strong>audio
files
+users listen</strong></del></span> <span class="inserted"><ins><em>phone
company</em></ins></span> to <span class="removed"><del><strong>along with the
headphone's unique serial number.
</p>
-<p>The suit accuses that this was done without</strong></del></span>
<span class="inserted"><ins><em>car remotely,</em></ins></span> the <span
class="removed"><del><strong>users' consent.
-If</strong></del></span> <span class="inserted"><ins><em>cell phone modem
- enables</em></ins></span> the <span class="removed"><del><strong>fine
print of</strong></del></span> <span class="inserted"><ins><em>phone company to
track</em></ins></span> the <span class="removed"><del><strong>app said that
users gave consent for this,
-would that make</strong></del></span> <span class="inserted"><ins><em>car's
movements all the time;</em></ins></span>
+<p>The suit accuses that this was done without the users' consent.
+If</strong></del></span> <span
class="inserted"><ins><em>track</em></ins></span> the <span
class="removed"><del><strong>fine print of</strong></del></span> <span
class="inserted"><ins><em>car's movements all</em></ins></span> the <span
class="removed"><del><strong>app said that users gave consent for this,
+would that make</strong></del></span> <span
class="inserted"><ins><em>time;</em></ins></span>
it <span class="removed"><del><strong>acceptable? No way! It should be
flat out
<a href="/philosophy/surveillance-vs-democracy.html">
illegal</strong></del></span> <span class="inserted"><ins><em>is
possible</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>physically remove</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>cell phone modem, though.</p>
@@ -3663,14 +3643,14 @@
<!--#set var="DATE" value='<small
class="date-tag">2013-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p id="records-drivers">Proprietary software in
cars</em></ins></span> <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data</strong></del></span>
+ collect</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
- records information</em></ins></span> about <span
class="removed"><del><strong>their users</strong></del></span> <span
class="inserted"><ins><em>drivers' movements</a>, which is made
- available to car manufacturers, insurance companies,</em></ins></span> and
<span class="removed"><del><strong>their users'
- friends</strong></del></span> <span
class="inserted"><ins><em>others.</p>
+ records information about drivers' movements</a>, which is made
+ available to car manufacturers, insurance companies, and others.</p>
<p>The case of toll-collection systems, mentioned in this article,
- is not really a matter of proprietary surveillance. These systems
+ is not really</em></ins></span> a <span class="removed"><del><strong>wide
range</strong></del></span> <span
class="inserted"><ins><em>matter</em></ins></span> of <span
class="removed"><del><strong>data about their users and their users'
+ friends</strong></del></span> <span
class="inserted"><ins><em>proprietary surveillance. These systems
are an intolerable invasion of privacy,</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
<p>Even nastier, they do it through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>should be replaced
with
@@ -3780,23 +3760,20 @@
to the page, and makes the page's URL available to <span
class="removed"><del><strong>Facebook</a>.
</p></li>
- <li><p>Online</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
+ <li><p>Online sales, with tracking and surveillance of
customers,</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
</li>
<li id="M201612064">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Online</em></ins></span> sales, with tracking and surveillance of
customers, <a
+ <p>Online sales, with tracking and surveillance of customers, <a
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
businesses to show different people different prices</a>. Most of
the tracking is done by recording interactions with servers, but
proprietary software contributes.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
- Baidu's Japanese-input</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201405140">
+ <li id="M201405140">
<!--#set var="DATE" value='<small
class="date-tag">2014-05</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
@@ -3821,7 +3798,7 @@
<p>Many web sites report all their visitors
to Google by using the Google Analytics service, which <a
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
- tells Google the IP address</em></ins></span> and <span
class="removed"><del><strong>Chinese-input apps spy on
users.</a></p></strong></del></span> <span
class="inserted"><ins><em>the page that was visited</a>.</p>
+ tells Google the IP address and the page that was
visited</a>.</p>
</li>
<li id="M201200000">
@@ -3829,22 +3806,18 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Many web sites try to collect users' address books (the user's
list
of other people's phone numbers or email addresses). This violates
- the privacy of those other people.</p></em></ins></span>
+ the privacy of those other people.</p>
</li>
- <span
class="removed"><del><strong><li><p>Pages</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201110040">
+ <li id="M201110040">
<!--#set var="DATE" value='<small
class="date-tag">2011-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Pages</em></ins></span> that contain “Like” buttons
<a <span
class="removed"><del><strong>href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"></em></ins></span>
+ <p>Pages that contain “Like” buttons <a
+
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
enable Facebook to track visitors to those pages</a>—even users
that don't have Facebook accounts.</p>
</li>
-
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -3856,17 +3829,14 @@
<li id="M201811270">
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many</em></ins></span> web sites <span
class="removed"><del><strong>rat their visitors</strong></del></span> <span
class="inserted"><ins><em>use JavaScript code <a
-
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"></em></ins></span>
- to <span class="removed"><del><strong>advertising
networks</strong></del></span> <span class="inserted"><ins><em>snoop on
information</em></ins></span> that <span class="removed"><del><strong>track
- users. Of the top 1000 web sites,</strong></del></span> <span
class="inserted"><ins><em>users have typed into a
- form but not sent</a>, in order to learn their identity. Some
are</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
- (as</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege">
+ <p>Many web sites use JavaScript code <a
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
+ to snoop on information that users have typed into a
+ form but not sent</a>, in order to learn their identity. Some are
<a
+
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege">
getting sued</a> for this.</p>
- <p>The chat facilities</em></ins></span> of <span
class="removed"><del><strong>5/17/2012) fed their visitors third-party cookies,
allowing</strong></del></span> <span class="inserted"><ins><em>some customer
services use the same sort of
+ <p>The chat facilities of some customer services use the same sort of
malware to <a
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
read what the user is typing before it is posted</a>.</p>
@@ -3877,8 +3847,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
- JavaScript on its web site to give</em></ins></span> other
- <span class="removed"><del><strong>sites</strong></del></span> <span
class="inserted"><ins><em>companies personal data on
+ JavaScript on its web site to give other companies personal data on
its customers</a>.</p>
</li>
@@ -3894,14 +3863,20 @@
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Some websites send
- JavaScript code</em></ins></span> to <span
class="removed"><del><strong>track
them</a>.</p></strong></del></span> <span
class="inserted"><ins><em>collect all the user's input, <a
-
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
- can then be used to reproduce the whole session</a>.</p>
+ JavaScript code to collect all the user's input,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
+ businesses</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
+ can then be used</em></ins></span> to <span
class="removed"><del><strong>show different people different prices</a>.
Most
+ of</strong></del></span> <span
class="inserted"><ins><em>reproduce</em></ins></span> the <span
class="removed"><del><strong>tracking is done by recording interactions with
+ servers, but proprietary software
contributes.</p></strong></del></span> <span
class="inserted"><ins><em>whole session</a>.</p>
<p>If you use LibreJS, it will block that malicious JavaScript
- code.</p>
+ code.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
+ Baidu's Japanese-input</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -3913,9 +3888,14 @@
<li id="M201310110">
<!--#set var="DATE" value='<small
class="date-tag">2013-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Flash and JavaScript are used for <a
-
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices</a> to identify
users.</p></em></ins></span>
+ <p>Flash</em></ins></span> and <span
class="removed"><del><strong>Chinese-input apps spy on
users.</a></p>
+ </li>
+
+ <li><p>Pages that contain “Like”
buttons</strong></del></span> <span class="inserted"><ins><em>JavaScript are
used for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
+ enable Facebook to track visitors</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ “fingerprinting” devices</a></em></ins></span> to <span
class="removed"><del><strong>those pages</a>—even
+ users that don't have Facebook accounts.</p></strong></del></span>
<span class="inserted"><ins><em>identify users.</p></em></ins></span>
</li>
<span
class="removed"><del><strong><li><p>Many</strong></del></span>
@@ -3925,7 +3905,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Flash Player's <a
href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/">
- cookie feature helps</em></ins></span> web sites <span
class="inserted"><ins><em>track visitors</a>.</p>
+ cookie feature helps</em></ins></span> web sites <span
class="removed"><del><strong>rat their visitors to advertising networks
that</strong></del></span> track
+ <span class="removed"><del><strong>users. Of the top 1000 web
sites,</strong></del></span> <span
class="inserted"><ins><em>visitors</a>.</p>
</li>
</ul>
@@ -3939,17 +3920,23 @@
<li id="M201906220">
<!--#set var="DATE" value='<small
class="date-tag">2019-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google Chrome is an <a
-
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/">
- instrument of surveillance</a>. It lets thousands of trackers invade
- users' computers and</em></ins></span> report <span
class="inserted"><ins><em>the sites they visit to advertising and
- data companies, first of</em></ins></span> all <span
class="inserted"><ins><em>to Google. Moreover, if users have a
- Gmail account, Chrome automatically logs them in to the browser for
- more convenient profiling. On Android, Chrome also
reports</em></ins></span> their <span
class="removed"><del><strong>visitors</strong></del></span>
- <span class="inserted"><ins><em>location</em></ins></span> to <span
class="removed"><del><strong>Google by using</strong></del></span> <span
class="inserted"><ins><em>Google.</p>
+ <p>Google Chrome is an</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
+ (as</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/">
+ instrument</em></ins></span> of <span
class="removed"><del><strong>5/17/2012) fed their visitors third-party cookies,
allowing other</strong></del></span> <span
class="inserted"><ins><em>surveillance</a>. It lets thousands of trackers
invade
+ users' computers and report the</em></ins></span> sites <span
class="inserted"><ins><em>they visit</em></ins></span> to <span
class="removed"><del><strong>track them</a>.</p>
+ </li>
- <p>The best way to escape surveillance is to switch to <a
- href="/software/icecat/">IceCat</a>, a modified version of Firefox
+ <li><p>Many web sites report</strong></del></span> <span
class="inserted"><ins><em>advertising and
+ data companies, first of</em></ins></span> all <span
class="removed"><del><strong>their visitors</strong></del></span> to <span
class="removed"><del><strong>Google by using</strong></del></span> <span
class="inserted"><ins><em>Google. Moreover, if users have a
+ Gmail account, Chrome automatically logs them in to</em></ins></span> the
<span class="removed"><del><strong>Google Analytics service,
which</strong></del></span> <span class="inserted"><ins><em>browser for
+ more convenient profiling. On Android, Chrome also reports their
+ location to Google.</p>
+
+ <p>The best way to escape surveillance is to switch
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
+ tells Google</strong></del></span>
+ <span
class="inserted"><ins><em>href="/software/icecat/">IceCat</a>, a
modified version of Firefox
with several changes to protect users' privacy.</p>
</li>
@@ -3959,10 +3946,8 @@
<p>Low-priced Chromebooks for schools are <a
href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
collecting far more data on students than is necessary, and store
- it indefinitely</a>. Parents and students complain
about</em></ins></span> the <span class="removed"><del><strong>Google Analytics
service, which
- <a
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
- tells Google</strong></del></span> <span class="inserted"><ins><em>lack
- of transparency on</em></ins></span> the <span
class="removed"><del><strong>IP address</strong></del></span> <span
class="inserted"><ins><em>part of both the educational
services</em></ins></span> and the <span class="removed"><del><strong>page that
was visited.</a></p>
+ it indefinitely</a>. Parents and students complain
about</em></ins></span> the <span class="removed"><del><strong>IP
address</strong></del></span> <span class="inserted"><ins><em>lack
+ of transparency on the part of both the educational
services</em></ins></span> and the <span class="removed"><del><strong>page that
was visited.</a></p>
</li>
<li><p>Many web sites try to collect users' address books (the
@@ -4075,16 +4060,34 @@
“their” phones</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M202012250">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The HonorLock online exam
+ proctoring program</em></ins></span> is <span class="inserted"><ins><em>a
surveillance tool that</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps">tracks
+ students and collects data</a> such as face, driving license, and
+ network information, among others, in blatant violation of students'
+ privacy.</p>
+
+ <p>Preventing students from cheating should not be an excuse for
+ running malware/spyware on their computers, and it's good that students
+ are protesting. But their petitions overlook a crucial issue, namely,
+ the injustice of being forced to run nonfree</em></ins></span> software
<span class="inserted"><ins><em>in order</em></ins></span> to <span
class="removed"><del><strong>make sure they can't
“fool”</strong></del></span>
+ <span class="inserted"><ins><em>get an education.</p>
+ </li>
+
<li id="M202009070">
<!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>While the world</em></ins></span> is <span
class="inserted"><ins><em>still
- struggling with COVID-19 coronavirus, many</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/">people
+ <p>While</em></ins></span> the
+ <span
class="removed"><del><strong>monitoring</a>.</p></strong></del></span>
<span class="inserted"><ins><em>world is still
+ struggling with COVID-19 coronavirus, many <a
+
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/">people
are in danger of surveillance</a> and their computers are infected
- with malware as a result of installing</em></ins></span> proprietary <span
class="removed"><del><strong>software to make sure they can't
“fool” the
- monitoring</a>.</p></strong></del></span> <span
class="inserted"><ins><em>software.</p></em></ins></span>
+ with malware as a result of installing proprietary
software.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
@@ -4218,7 +4221,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/02/06 16:03:04 $
+$Date: 2021/02/22 10:31:57 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.390
retrieving revision 1.391
diff -u -b -r1.390 -r1.391
--- proprietary-surveillance.it.po 6 Feb 2021 14:33:05 -0000 1.390
+++ proprietary-surveillance.it.po 22 Feb 2021 10:31:57 -0000 1.391
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -5408,6 +5408,24 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"While the world is still struggling with COVID-19 coronavirus, many <a href="
"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
"are in danger of surveillance</a> and their computers are infected with "
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.251
retrieving revision 1.252
diff -u -b -r1.251 -r1.252
--- proprietary-surveillance.ja-diff.html 6 Feb 2021 16:03:04 -0000
1.251
+++ proprietary-surveillance.ja-diff.html 22 Feb 2021 10:31:57 -0000
1.252
@@ -2032,7 +2032,7 @@
<!--#set var="DATE" value='<small
class="date-tag">2014-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many proprietary apps for mobile devices
- report which other apps the user has installed. <a
+ report which other apps the</em></ins></span> user <span
class="removed"><del><strong>types</strong></del></span> <span
class="inserted"><ins><em>has installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
is doing this in a way that at least is visible and optional</a>. Not
as bad as what the others do.</p>
@@ -2122,17 +2122,20 @@
surveillance on the game of Minecraft by <a
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
every player to open an account on Microsoft's network</a>. Microsoft
- has bought the game and will merge all accounts into its network,
+ has bought the game and will merge all accounts</em></ins></span> into
<span class="removed"><del><strong>it</a>;</strong></del></span> <span
class="inserted"><ins><em>its network,
which will give them access to people's data.</p>
<p>Minecraft players <a
href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
instead. The essential advantage of Minetest is that it is free
- software, meaning it respects the user's computer freedom. As a bonus,
- it offers more options.</p>
+ software, meaning it respects</em></ins></span> the <span
class="removed"><del><strong>server records these numbers for at least 30
+ days.</p></strong></del></span> <span
class="inserted"><ins><em>user's computer freedom. As a bonus,
+ it offers more options.</p></em></ins></span>
</li>
- <li id="M201908210">
+ <span class="removed"><del><strong><li><p>Users cannot
make</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201908210">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Microsoft recorded users of Xboxes and had <a
@@ -2156,10 +2159,10 @@
<!--#set var="DATE" value='<small
class="date-tag">2018-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>ArenaNet surreptitiously installed a spyware
- program along with an update to the massive
- multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
-
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
- to snoop on all open processes running on its user's
computer</a>.</p>
+ program along with</em></ins></span> an <span
class="removed"><del><strong>Apple ID</strong></del></span> <span
class="inserted"><ins><em>update to the massive
+ multiplayer game Guild Wars 2. The spyware allowed
ArenaNet</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"></em></ins></span>
+ to <span class="removed"><del><strong>install even</strong></del></span>
<span class="inserted"><ins><em>snoop on all open processes running on its
user's computer</a>.</p>
</li>
<li id="M201711070">
@@ -2185,16 +2188,18 @@
<li id="M201509160">
<!--#set var="DATE" value='<small
class="date-tag">2015-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Modern gratis game cr…apps <a
+ <p>Modern</em></ins></span> gratis <span
class="removed"><del><strong>apps)</a>
+ without giving</strong></del></span> <span
class="inserted"><ins><em>game cr…apps <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data about their users and their users'
+ collect</em></ins></span> a <span class="removed"><del><strong>valid email
address</strong></del></span> <span class="inserted"><ins><em>wide range of
data about their users</em></ins></span> and <span
class="removed"><del><strong>receiving</strong></del></span> <span
class="inserted"><ins><em>their users'
friends and associates</a>.</p>
- <p>Even nastier, they do it through ad networks that merge the data
+ <p>Even nastier, they do it through ad networks that
merge</em></ins></span> the <span class="removed"><del><strong>code Apple
+ sends</strong></del></span> <span class="inserted"><ins><em>data
collected by various cr…apps and sites made by different
companies.</p>
- <p>They use this data to manipulate people to buy things, and hunt
for
+ <p>They use this data</em></ins></span> to <span
class="removed"><del><strong>it.</p></strong></del></span> <span
class="inserted"><ins><em>manipulate people to buy things, and hunt for
“whales” who can be led to spend a lot of money. They also
use a back door to manipulate the game play for specific players.</p>
@@ -2214,20 +2219,25 @@
<p><a
href="https://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
+ More about NSA app spying</a>.</p></em></ins></span>
</li>
- <li id="M200510200">
+ <span class="removed"><del><strong><li><p>Around 47% of the most
popular iOS apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M200510200">
<!--#set var="DATE" value='<small
class="date-tag">2005-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Blizzard Warden is a hidden
- “cheating-prevention” program that <a
- href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies on every process running on a gamer's computer and sniffs a
- good deal of personal data</a>, including lots of activities which
- have nothing to do with cheating.</p>
+ “cheating-prevention” program that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
+ spies on every process running on a gamer's computer</em></ins></span> and
<span class="removed"><del><strong>location
information</a></strong></del></span> <span
class="inserted"><ins><em>sniffs a
+ good deal</em></ins></span> of <span class="removed"><del><strong>their
users</strong></del></span> <span class="inserted"><ins><em>personal
data</a>, including lots of activities which
+ have nothing to do</em></ins></span> with <span
class="removed"><del><strong>third parties.</p></strong></del></span>
<span class="inserted"><ins><em>cheating.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>iThings automatically
upload</strong></del></span>
+<span class="inserted"><ins><em></ul>
@@ -2245,12 +2255,22 @@
href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
Not Included”</a> list <a
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
- designed to snoop on users</a> even if they meet
+ designed</em></ins></span> to <span class="removed"><del><strong>Apple's
servers all the photos and
+ videos</strong></del></span> <span class="inserted"><ins><em>snoop on
users</a> even if</em></ins></span> they <span
class="removed"><del><strong>make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you take,
+ and keeps them up to date</strong></del></span> <span
class="inserted"><ins><em>meet
Mozilla's “Minimum Security Standards.” Insecure
- design of the program running on some of these devices <a
-
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes
- the</em></ins></span> user <span class="removed"><del><strong>types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>susceptible
to be snooped and exploited by crackers as
- well</a>.</p>
+ design of the program running</em></ins></span> on <span
class="removed"><del><strong>all your devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
+
+ <p>(From</strong></del></span> <span class="inserted"><ins><em>some
of these devices</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
+ information</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes
+ the user susceptible to be snooped and exploited by
crackers</em></ins></span> as <span
class="removed"><del><strong>accessed</strong></del></span>
+ <span class="inserted"><ins><em>well</a>.</p>
</li>
<li id="M201708280">
@@ -2258,12 +2278,18 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The bad security in many Internet of Stings devices allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on the people that use them</a>.</p>
+ to snoop</em></ins></span> on <span class="removed"><del><strong>24 Sep
2015.) The iCloud feature</strong></del></span> <span
class="inserted"><ins><em>the people that use them</a>.</p>
<p>Don't be a sucker—reject all the stings.</p>
- <p><small>(It is unfortunate that the article uses the term
<a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p>
+ <p><small>(It</em></ins></span> is
+ <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span> <span class="inserted"><ins><em>unfortunate that the
article uses</em></ins></span> the
+ <span class="removed"><del><strong>startup of iOS</a>.
The</strong></del></span> term <span
class="removed"><del><strong>“cloud” means
+ “please don't ask where.”</p>
+
+ <p>There is a way to</strong></del></span> <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default so it still
counts as</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p>
</li>
</ul>
@@ -2273,7 +2299,12 @@
<span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<p>Emo Phillips made a joke: The other day a woman came up to me and
+<p>Emo Phillips made</em></ins></span> a
+ <span class="removed"><del><strong>surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage of
this</strong></del></span> <span class="inserted"><ins><em>joke: The other day
a woman came up</em></ins></span> to
+ <span class="removed"><del><strong><a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They
needed</strong></del></span> <span class="inserted"><ins><em>me and
said, “Didn't I see you on television?” I said, “I
don't know. You can't see out the other way.” Evidently that was
before Amazon “smart” TVs.</p>
@@ -2282,40 +2313,83 @@
<li id="M202006250">
<!--#set var="DATE" value='<small
class="date-tag">2020-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>TV manufacturers are able to <a
+ <p>TV manufacturers are able</em></ins></span> to <span
class="removed"><del><strong>break Apple's
+ security</strong></del></span> <span class="inserted"><ins><em><a
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
- every second of what the user is watching</a>. This is illegal due to
- the Video Privacy Protection Act of 1988, but they're circumventing
- it through EULAs.</p>
+ every second of what the user is watching</a>. This is illegal
due</em></ins></span> to <span class="removed"><del><strong>get at them, but
NSA can access any</strong></del></span>
+ <span class="inserted"><ins><em>the Video Privacy Protection
Act</em></ins></span> of <span
class="removed"><del><strong>them</strong></del></span> <span
class="inserted"><ins><em>1988, but they're circumventing
+ it</em></ins></span> through <span
class="inserted"><ins><em>EULAs.</p>
</li>
<li id="M201901070">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio TVs <a
-
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever the TV sees,”</a> in the own words of
the company's
- CTO, and this data is sold to third parties. This is in return for
- “better service” (meaning more intrusive ads?) and slightly
+ <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p>Spyware</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever the TV sees,”</a></em></ins></span> in
<span class="removed"><del><strong>iThings:</strong></del></span> the <span
class="removed"><del><strong><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly
where</strong></del></span> <span class="inserted"><ins><em>own words
of</em></ins></span> the <span class="removed"><del><strong>iThing
is,</strong></del></span> <span class="inserted"><ins><em>company's
+ CTO,</em></ins></span> and <span class="removed"><del><strong>get other
info too.</p>
+ </li>
+
+ <li><p>There</strong></del></span> <span
class="inserted"><ins><em>this data</em></ins></span> is <span
class="removed"><del><strong>also a feature</strong></del></span> <span
class="inserted"><ins><em>sold to third parties. This is in
return</em></ins></span> for <span class="removed"><del><strong>web
sites</strong></del></span>
+ <span class="inserted"><ins><em>“better service” (meaning more
intrusive ads?) and slightly
lower retail prices.</p>
- <p>What is supposed to make this spying acceptable, according to him,
- is that it is opt-in in newer models. But since</em></ins></span> the
<span class="removed"><del><strong>server records these
numbers</strong></del></span> <span class="inserted"><ins><em>Vizio software is
- nonfree, we don't know what is actually happening behind the scenes,
- and there is no guarantee that all future updates will leave the
- settings unchanged.</p>
-
- <p>If you already own a Vizio “smart” TV (or any
“smart” TV,</em></ins></span> for <span
class="removed"><del><strong>at least 30
- days.</p>
+ <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>track users, which</strong></del></span> <span
class="inserted"><ins><em>make this spying acceptable, according to
him,</em></ins></span>
+ is
+ <span class="removed"><del><strong><a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks about iOS 6,
but</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> it is <span
class="removed"><del><strong>still true</strong></del></span> <span
class="inserted"><ins><em>opt-in</em></ins></span> in <span
class="removed"><del><strong>iOS 7.)</p>
+ </li>
+
+ <li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default, though that can be
+ turned off.</p>
+ </li>
+
+ <li><p>Apple can, and regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>newer models. But since</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p>
+ </li>
+
+ <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps</strong></del></span> <span
class="inserted"><ins><em>Vizio software is
+ nonfree, we don't know what is actually happening behind</em></ins></span>
the <span class="removed"><del><strong>NSA snoop on</strong></del></span> <span
class="inserted"><ins><em>scenes,
+ and there is no guarantee that</em></ins></span> all <span
class="inserted"><ins><em>future updates will leave</em></ins></span> the <span
class="removed"><del><strong>data in an iThing,
+ or</strong></del></span>
+ <span class="inserted"><ins><em>settings unchanged.</p>
+
+ <p>If you already own a Vizio “smart” TV (or any
“smart” TV, for that
+ matter), the easiest way to make sure</em></ins></span> it <span
class="inserted"><ins><em>isn't spying on you</em></ins></span> is <span
class="removed"><del><strong>totally incompetent.</a></p>
+ </li>
+
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem</strong></del></span>
+ to <span class="removed"><del><strong>exist for no
+ possible purpose other than surveillance</a>. Here
is</strong></del></span> <span class="inserted"><ins><em>disconnect it
from</em></ins></span> the
+ <span class="removed"><del><strong><a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
</li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+</div>
- <li><p>Users cannot</strong></del></span> <span
class="inserted"><ins><em>that
- matter), the easiest way to</em></ins></span> make <span
class="inserted"><ins><em>sure it isn't spying on you is
- to disconnect it from the Internet, and use a terrestrial antenna
+<ul>
+ <li><p>According</strong></del></span> <span
class="inserted"><ins><em>Internet, and use a terrestrial antenna
instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is to get your own router (which can
- be</em></ins></span> an <span class="removed"><del><strong>Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
<span class="inserted"><ins><em>old computer running completely free
software), and set up a
- firewall to block connections</em></ins></span> to <span
class="inserted"><ins><em>Vizio's servers. Or, as a last resort,
+ if you are technically oriented, is</em></ins></span> to <span
class="removed"><del><strong>Edward Snowden,
+ <a
href="http://www.bbc.com/news/uk-34444233">agencies</strong></del></span>
<span class="inserted"><ins><em>get your own router (which</em></ins></span>
can <span class="removed"><del><strong>take over smartphones</a>
+ by sending hidden text messages which enable them</strong></del></span>
+ <span class="inserted"><ins><em>be an old computer running completely free
software), and set up a
+ firewall to block connections to Vizio's servers. Or, as a last resort,
you can replace your TV with another model.</p>
</li>
@@ -2324,47 +2398,56 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Some “Smart” TVs automatically <a
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades that</em></ins></span> install <span
class="removed"><del><strong>even gratis apps)</a>
- without giving</strong></del></span> a <span
class="removed"><del><strong>valid email address and
receiving</strong></del></span> <span class="inserted"><ins><em>surveillance
app</a>.</p>
+ load downgrades that install a surveillance app</a>.</p>
- <p>We link to</em></ins></span> the <span
class="removed"><del><strong>code Apple
- sends</strong></del></span> <span class="inserted"><ins><em>article for
the facts it presents. It
- is too bad that the article finishes by advocating the
- moral weakness of surrendering</em></ins></span> to <span
class="removed"><del><strong>it.</p></strong></del></span> <span
class="inserted"><ins><em>Netflix. The Netflix app <a
+ <p>We link</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> the <span
class="removed"><del><strong>phones
+ on and off, listen to</strong></del></span> <span
class="inserted"><ins><em>article for</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location data
from</strong></del></span> <span class="inserted"><ins><em>facts it presents. It
+ is too bad that</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
+ browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>article finishes by advocating</em></ins></span> the
<span class="removed"><del><strong>contact list. This malware is
designed</strong></del></span>
+ <span class="inserted"><ins><em>moral weakness of
surrendering</em></ins></span> to
+ <span class="removed"><del><strong>disguise itself from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>Netflix. The Netflix app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Around 47% of the most
popular iOS apps</strong></del></span>
+ <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
<span class="inserted"><ins><em><li id="M201702060">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio “smart”</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral</strong></del></span>
+ <p>Vizio “smart”</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
+ and they send so much data</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them,</em></ins></span> and <span
class="removed"><del><strong>location
information</a></strong></del></span> <span class="inserted"><ins><em>not
just broadcasts and
- cable</a>. Even if the image is coming from the user's own computer,
- the TV reports what it is. The existence</em></ins></span> of <span
class="removed"><del><strong>their users with third parties.</p>
+ report everything</em></ins></span> that <span
class="removed"><del><strong>their transmission</strong></del></span> is <span
class="removed"><del><strong>a
+ substantial expense for users. Said transmission,</strong></del></span>
<span class="inserted"><ins><em>viewed on them, and</em></ins></span> not <span
class="removed"><del><strong>wanted or
+ requested by</strong></del></span> <span class="inserted"><ins><em>just
broadcasts and
+ cable</a>. Even if</em></ins></span> the <span
class="removed"><del><strong>user, clearly must constitute
spying</strong></del></span> <span class="inserted"><ins><em>image is coming
from the user's own computer,
+ the TV reports what it is. The existence</em></ins></span> of <span
class="removed"><del><strong>some
+ kind.</p></li>
+
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</strong></del></span> <span
class="inserted"><ins><em>a way to disable</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
</li>
- <li><p>iThings automatically upload</strong></del></span> <span
class="inserted"><ins><em>a way</em></ins></span> to <span
class="removed"><del><strong>Apple's servers all</strong></del></span> <span
class="inserted"><ins><em>disable</em></ins></span> the <span
class="removed"><del><strong>photos</strong></del></span>
- <span class="inserted"><ins><em>surveillance, even if it were not hidden
as it was in these TVs,
+ <li><p>Spyware</strong></del></span>
+ <span class="inserted"><ins><em>surveillance, even if it were not hidden
as it was</em></ins></span> in <span class="removed"><del><strong>Android
phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us</strong></del></span>
<span class="inserted"><ins><em>these TVs,
does not legitimize the surveillance.</p>
</li>
<li id="M201511130">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some web</em></ins></span> and
- <span class="removed"><del><strong>videos</strong></del></span> <span
class="inserted"><ins><em>TV advertisements play inaudible
- sounds to be picked up by proprietary malware running
- on other devices in range so as to determine that</em></ins></span> they
<span class="removed"><del><strong>make.</p>
-
- <blockquote><p>
- iCloud Photo Library stores every photo</strong></del></span>
- <span class="inserted"><ins><em>are nearby. Once your Internet devices
are paired with
- your TV, advertisers can correlate ads with Web
activity,</em></ins></span> and <span class="removed"><del><strong>video you
take,</strong></del></span> <span class="inserted"><ins><em>other <a
+ <p>Some web and TV advertisements play inaudible
+ sounds to be picked up</em></ins></span> by <span
class="removed"><del><strong>a paywall)
+ reports</strong></del></span> <span
class="inserted"><ins><em>proprietary malware running
+ on other devices in range so as to determine</em></ins></span> that
+ <span class="removed"><del><strong><a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI</strong></del></span> <span class="inserted"><ins><em>they
+ are nearby. Once your Internet devices are paired with
+ your TV, advertisers</em></ins></span> can <span
class="removed"><del><strong>remotely activate the GPS</strong></del></span>
<span class="inserted"><ins><em>correlate ads with Web
activity,</em></ins></span> and <span
class="removed"><del><strong>microphone</strong></del></span> <span
class="inserted"><ins><em>other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
cross-device tracking</a>.</p>
</li>
@@ -2373,115 +2456,132 @@
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio goes a step further than other TV
- manufacturers in spying on their users: their <a
+ manufacturers</em></ins></span> in <span
class="removed"><del><strong>Android
+ phones</strong></del></span> <span class="inserted"><ins><em>spying on
their users: their <a
href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in
detail</em></ins></span> and <span
class="removed"><del><strong>keeps</strong></del></span>
- <span class="inserted"><ins><em>link</em></ins></span> them <span
class="removed"><del><strong>up to date on all</strong></del></span> your <span
class="removed"><del><strong>devices.
- Any edits</strong></del></span> <span class="inserted"><ins><em>IP
address</a> so that advertisers can track</em></ins></span> you <span
class="removed"><del><strong>make are automatically updated everywhere. [...]
- </p></blockquote>
-
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud
feature</strong></del></span>
- <span class="inserted"><ins><em>across devices.</p>
-
- <p>It</em></ins></span> is
- <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT202033">activated</strong></del></span>
<span class="inserted"><ins><em>possible to turn this off, but having it
enabled</em></ins></span> by <span class="removed"><del><strong>the
- startup of iOS</a>. The term “cloud” means
- “please don't ask where.”</p>
+ “smart” TVs analyze your viewing habits in
detail</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
+ (I suspect</strong></del></span>
+ <span class="inserted"><ins><em>link them your IP address</a> so
that advertisers can track you
+ across devices.</p>
- <p>There</strong></del></span> <span
class="inserted"><ins><em>default</em></ins></span>
- is <span class="removed"><del><strong>a way</strong></del></span> <span
class="inserted"><ins><em>an injustice already.</p>
+ <p>It is possible to turn</em></ins></span> this <span
class="removed"><del><strong>means Windows laptops.)
Here</strong></del></span> <span class="inserted"><ins><em>off, but having it
enabled by default</em></ins></span>
+ is
+ <span class="removed"><del><strong><a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span> <span
class="inserted"><ins><em>an injustice already.</p></em></ins></span>
</li>
- <li id="M201511020">
+ <span class="removed"><del><strong><li><p>Portable
phones</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511020">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tivo's alliance with Viacom adds 2.3 million
households</em></ins></span>
- to <span class="inserted"><ins><em>the 600 millions social media profiles
the company
+ <p>Tivo's alliance</em></ins></span> with <span
class="removed"><del><strong>GPS will send their GPS location on
+ remote command and users cannot stop them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable phones
+ to have GPS.)</p>
+ </li>
+
+ <li><p>The nonfree Snapchat app's principal purpose
is</strong></del></span> <span class="inserted"><ins><em>Viacom adds 2.3
million households</em></ins></span>
+ to <span class="removed"><del><strong>restrict</strong></del></span> the
<span class="removed"><del><strong>use of data on</strong></del></span> <span
class="inserted"><ins><em>600 millions social media profiles</em></ins></span>
the <span class="removed"><del><strong>user's computer, but it does surveillance
+ too:</strong></del></span> <span class="inserted"><ins><em>company
already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can
now</em></ins></span> <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active</strong></del></span>
+ information with online social media participation, Tivo can
now</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing all
- users to new combined surveillance</em></ins></span> by <span
class="removed"><del><strong>default so</strong></del></span> <span
class="inserted"><ins><em>default.</p>
+ users</em></ins></span> to <span class="removed"><del><strong>get the
user's list of other people's phone
+ numbers.</a></p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
+
+<ul>
+
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after the ride</a>.</p>
+
+ <p>This example illustrates how “getting the user's
consent”
+ for</strong></del></span> <span class="inserted"><ins><em>new
combined</em></ins></span> surveillance <span class="removed"><del><strong>is
inadequate as a protection against massive
+ surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>by default.</p></em></ins></span>
</li>
- <li id="M201507240">
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201507240">
<!--#set var="DATE" value='<small
class="date-tag">2015-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio “smart” TVs recognize and <a
- href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are watching</a>, even if</em></ins></span> it <span
class="removed"><del><strong>still counts as</strong></del></span> <span
class="inserted"><ins><em>isn't</em></ins></span> a
- <span class="removed"><del><strong>surveillance functionality.</p>
-
- <p>Unknown</strong></del></span> <span class="inserted"><ins><em>TV
channel.</p>
+ <p>Vizio “smart” TVs recognize and</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
+ what people are watching</a>, even if it isn't a TV
channel.</p></em></ins></span>
</li>
- <li id="M201505290">
+ <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505290">
<!--#set var="DATE" value='<small
class="date-tag">2015-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Verizon cable TV <a
-
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs</em></ins></span> people <span
class="removed"><del><strong>apparently took advantage of
this</strong></del></span> <span class="inserted"><ins><em>watch, and even what
they wanted</em></ins></span> to
- <span class="inserted"><ins><em>record</a>.</p>
+ <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops</em></ins></span> on what <span class="removed"><del><strong>radio
and TV</strong></del></span> programs
+ <span class="removed"><del><strong>are playing nearby</a>. Also
on what users post on various sites
+ such as Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>people watch,</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>even what they wanted to
+ record</a>.</p></em></ins></span>
</li>
- <li id="M201504300">
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201504300">
<!--#set var="DATE" value='<small
class="date-tag">2015-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security</strong></del></span>
+ <p>Vizio</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known faces</a>,
+ and suggests you</strong></del></span>
<span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade”</em></ins></span> to <span
class="removed"><del><strong>get at them, but NSA can access any of them through
- <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware in iThings:
- the</strong></del></span> <span class="inserted"><ins><em>make its TVs
snoop on what
+ used a firmware “upgrade”</em></ins></span> to <span
class="removed"><del><strong>share</strong></del></span> <span
class="inserted"><ins><em>make its TVs snoop on what
users watch</a>. The TVs did not do that when first sold.</p>
</li>
<li id="M201502090">
<!--#set var="DATE" value='<small
class="date-tag">2015-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Samsung “Smart” TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly
where</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>iThing is,</strong></del></span> <span
class="inserted"><ins><em>internet to another company, Nuance</a>.
- Nuance can save it</em></ins></span> and <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>would then have to give it to the US or
some</em></ins></span>
- other <span class="removed"><del><strong>info too.</p>
- </li>
+ <p>The Samsung “Smart” TV <a
+
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>picture you take according</strong></del></span>
<span class="inserted"><ins><em>internet</em></ins></span> to <span
class="removed"><del><strong>who
+ is in the frame.</p>
+
+ <p>This spyware feature seems</strong></del></span> <span
class="inserted"><ins><em>another company, Nuance</a>.
+ Nuance can save it and would then have</em></ins></span> to <span
class="removed"><del><strong>require online access</strong></del></span> <span
class="inserted"><ins><em>give it</em></ins></span> to <span
class="removed"><del><strong>some
+ known-faces database, which means</strong></del></span> the <span
class="removed"><del><strong>pictures are likely</strong></del></span> <span
class="inserted"><ins><em>US or some
+ other government.</p>
+
+ <p>Speech recognition is not</em></ins></span> to be
+ <span class="removed"><del><strong>sent across the
wire</strong></del></span> <span class="inserted"><ins><em>trusted unless it is
done by free
+ software in your own computer.</p>
- <li><p>There</strong></del></span> <span
class="inserted"><ins><em>government.</p>
-
- <p>Speech recognition</em></ins></span> is <span
class="removed"><del><strong>also a feature for web sites</strong></del></span>
<span class="inserted"><ins><em>not</em></ins></span> to <span
class="removed"><del><strong>track users, which is
- <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6,
but</strong></del></span> <span class="inserted"><ins><em>be trusted
unless</em></ins></span> it is <span class="removed"><del><strong>still
true</strong></del></span> <span class="inserted"><ins><em>done by free
- software</em></ins></span> in <span class="removed"><del><strong>iOS
7.)</p>
- </li>
-
- <li><p>The iThing also
- <a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple</strong></del></span> <span class="inserted"><ins><em>your
own computer.</p>
-
- <p>In</em></ins></span> its <span
class="removed"><del><strong>geolocation</a> by default,
though</strong></del></span> <span class="inserted"><ins><em>privacy policy,
Samsung explicitly confirms</em></ins></span> that <span
class="removed"><del><strong>can</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>In its privacy policy, Samsung explicitly confirms that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will</em></ins></span> be
- <span class="removed"><del><strong>turned
off.</p></strong></del></span> <span
class="inserted"><ins><em>transmitted to third
- parties</a>.</p></em></ins></span>
- </li>
+ data containing sensitive information will be
transmitted</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers and face-recognition
+ algorithms.</p>
- <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>third
+ parties</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201411090">
+ <li id="M201411090">
<!--#set var="DATE" value='<small
class="date-tag">2014-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Amazon “Smart” TV is</em></ins></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ <p>The Amazon “Smart” TV is <a
+
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
snooping all the time</a>.</p>
</li>
@@ -2492,240 +2592,243 @@
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
- <p>The report was as of 2014, but we don't expect this has got
+ <p>The report was as</em></ins></span> of <span
class="removed"><del><strong>Facebook</strong></del></span> <span
class="inserted"><ins><em>2014, but we don't expect this has got
better.</p>
- <p>This shows that laws requiring products to get users' formal
- consent before collecting personal</em></ins></span> data <span
class="removed"><del><strong>from iPhones for</strong></del></span> <span
class="inserted"><ins><em>are totally inadequate.
- And what happens if a user declines consent? Probably</em></ins></span>
the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>TV will
- say, “Without your consent to tracking, the TV will not
+ <p>This shows that laws requiring products to get</em></ins></span>
users' <span class="removed"><del><strong>pictures</strong></del></span> <span
class="inserted"><ins><em>formal
+ consent before collecting personal data</em></ins></span> are <span
class="removed"><del><strong>private
+ anymore, even</strong></del></span> <span
class="inserted"><ins><em>totally inadequate.
+ And what happens</em></ins></span> if <span
class="removed"><del><strong>the</strong></del></span> <span
class="inserted"><ins><em>a</em></ins></span> user <span
class="removed"><del><strong>didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>declines consent?
Probably the TV will
+ say, “Without your consent</em></ins></span> to <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>service.</p></strong></del></span> <span
class="inserted"><ins><em>TV will not
work.”</p>
<p>Proper laws would say that TVs are not allowed to report what the
user watches—no exceptions!</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</strong></del></span>
+ <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
+ is based on proprietary malware (DRM and snooping). In August
+ 2015 it</strong></del></span>
<span class="inserted"><ins><em><li id="M201405200">
<!--#set var="DATE" value='<small
class="date-tag">2014-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Spyware in LG “smart” TVs <a
-
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what</em></ins></span> the <span class="removed"><del><strong>NSA
snoop</strong></del></span> <span class="inserted"><ins><em>user watches, and
the switch to turn this off has
+ <p>Spyware in LG “smart” TVs</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased
snooping</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what the user watches,</em></ins></span> and <span
class="removed"><del><strong>some
+ are starting</strong></del></span> <span class="inserted"><ins><em>the
switch</em></ins></span> to <span
class="removed"><del><strong>realize</strong></del></span> <span
class="inserted"><ins><em>turn this off has
no effect</a>. (The fact that the transmission reports a 404 error
- really means nothing; the server could save that data anyway.)</p>
+ really means nothing; the server could save</em></ins></span> that <span
class="inserted"><ins><em>data anyway.)</p>
- <p>Even worse, it <a
-
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices</em></ins></span> on <span
class="removed"><del><strong>all</strong></del></span> the <span
class="removed"><del><strong>data in an iThing,
- or</strong></del></span> <span class="inserted"><ins><em>user's local
network</a>.</p>
+ <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>is nasty.</p>
- <p>LG later said</em></ins></span> it <span
class="removed"><del><strong>is totally incompetent.</a></p>
- </li>
-
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</strong></del></span> <span
class="inserted"><ins><em>had installed a patch to stop this, but any
+ <p>This article shows the</strong></del></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on the user's local network</a>.</p>
+
+ <p>LG later said it had installed</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>patch</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
+ whether they want that. This is a typical example of
+ the attitude</strong></del></span> <span class="inserted"><ins><em>stop
this, but any
product could spy this way.</p>
<p>Meanwhile, LG TVs <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots</em></ins></span> of <span class="removed"><del><strong>iOS
seem</strong></del></span> <span class="inserted"><ins><em>spying
anyway</a>.</p>
+ do lots</em></ins></span> of <span class="removed"><del><strong>the
proprietary software industry towards
+ those they have subjugated.</p>
+
+ <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>spying anyway</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other
+ apps the user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in</strong></del></span>
- <li id="M201212170">
+ <span class="inserted"><ins><em><li id="M201212170">
<!--#set var="DATE" value='<small
class="date-tag">2012-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>exist for no
- possible purpose other than surveillance</a>. Here
is</strong></del></span> <span class="inserted"><ins><em>break security on a
“smart” TV</a>
- and use its camera to watch</em></ins></span> the
- <span class="removed"><del><strong><a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>people who are watching
TV.</p></em></ins></span>
+ Crackers found</em></ins></span> a way <span
class="removed"><del><strong>that at least is visible</strong></del></span>
<span class="inserted"><ins><em>to break security on a “smart”
TV</a></em></ins></span>
+ and
+ <span class="removed"><del><strong>optional</a>. Not as bad as
what</strong></del></span> <span class="inserted"><ins><em>use its camera to
watch</em></ins></span> the <span class="removed"><del><strong>others
do.</p>
</li>
-</ul>
+
+ <li><p>FTC says most mobile apps for children don't respect
privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>people who are watching
TV.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware in
Telephones</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+ <h4 id="SpywareInCameras">Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>According to Edward Snowden,</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201901100">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages which enable them to
turn</strong></del></span>
+ <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send</em></ins></span> the <span class="removed"><del><strong>phones
- on and off, listen</strong></del></span> <span
class="inserted"><ins><em>video they capture</em></ins></span> to <span
class="inserted"><ins><em>Amazon servers</a>, which save it
+ send</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>video they
capture</em></ins></span> to <span class="inserted"><ins><em>Amazon
servers</a>, which save it
long-term.</p>
- <p>In many cases,</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location data
from</strong></del></span> <span class="inserted"><ins><em>video shows everyone
that comes near, or merely
- passes by,</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
- browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>user's front door.</p>
+ <p>In many cases,</em></ins></span> the <span
class="removed"><del><strong>snooping done by the phone company, and perhaps
by</strong></del></span> <span class="inserted"><ins><em>video shows everyone
that comes near, or merely
+ passes by,</em></ins></span> the <span class="removed"><del><strong>OS
in</strong></del></span> <span class="inserted"><ins><em>user's front
door.</p>
<p>The article focuses on how Ring used to let individual employees
look
- at</em></ins></span> the <span class="removed"><del><strong>contact list.
This malware is designed</strong></del></span> <span
class="inserted"><ins><em>videos freely. It appears Amazon has
tried</em></ins></span> to
- <span class="removed"><del><strong>disguise itself from
investigation.</p>
+ at</em></ins></span> the
+ <span class="removed"><del><strong>phone.</p>
+
+ <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>videos freely. It appears Amazon has tried to
prevent that
+ secondary abuse, but</em></ins></span> the <span
class="removed"><del><strong>question of whether</strong></del></span> <span
class="inserted"><ins><em>primary abuse—that Amazon
gets</em></ins></span> the <span class="removed"><del><strong>app developers get
+ users to say “I agree”. That is no excuse for
malware.</p>
</li>
- <li><p>Samsung phones come with
- <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
- and they send so much data</strong></del></span> <span
class="inserted"><ins><em>prevent</em></ins></span> that <span
class="removed"><del><strong>their transmission is a
- substantial expense for users. Said transmission, not wanted or
- requested by</strong></del></span>
- <span class="inserted"><ins><em>secondary abuse, but</em></ins></span> the
<span class="removed"><del><strong>user, clearly must constitute spying of some
- kind.</p></li>
+ <li><p>The Brightest Flashlight app
+ <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p>
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice</strong></del></span> <span
class="inserted"><ins><em>primary abuse—that Amazon gets the
- video—Amazon expects society to surrender to.</p>
+ <p>The FTC criticized this app because it
asked</strong></del></span>
+ <span class="inserted"><ins><em>video—Amazon expects society to
surrender to.</p>
</li>
<li id="M201810300">
<!--#set var="DATE" value='<small
class="date-tag">2018-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Nearly</em></ins></span> all <span
class="inserted"><ins><em>“home security cameras” <a
+ <p>Nearly all “home security cameras” <a
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
- </li>
-
- <li><p>Spyware in Android phones (and Windows? laptops): The Wall
- Street Journal (in</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> an <span
class="removed"><del><strong>article blocked from us by</strong></del></span>
<span class="inserted"><ins><em>unencrypted copy of everything they
- see</a>. “Home insecurity camera” would
be</em></ins></span> a <span class="removed"><del><strong>paywall)
- reports that
- <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate the GPS and
microphone</strong></del></span> <span class="inserted"><ins><em>better
+ give</em></ins></span> the <span class="removed"><del><strong>user to
+ approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>manufacturer an unencrypted copy of everything they
+ see</a>. “Home insecurity camera” would be a better
name!</p>
<p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not to look at what's</em></ins></span> in <span
class="removed"><del><strong>Android
- phones and laptops</a>.
- (I suspect this</strong></del></span> <span
class="inserted"><ins><em>the videos. That's not
- security for your home. Security</em></ins></span> means <span
class="removed"><del><strong>Windows laptops.) Here is
- <a href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span> <span
class="inserted"><ins><em>making sure they don't get to
- see through your camera.</p></em></ins></span>
+ manufacturers promise not</em></ins></span> to <span
class="inserted"><ins><em>look at what's in</em></ins></span> the <span
class="removed"><del><strong>app developer but did</strong></del></span> <span
class="inserted"><ins><em>videos. That's</em></ins></span> not
+ <span class="removed"><del><strong>ask about sending
it</strong></del></span>
+ <span class="inserted"><ins><em>security for your home. Security means
making sure they don't get</em></ins></span> to <span
class="removed"><del><strong>other companies. This shows the
+ weakness</strong></del></span>
+ <span class="inserted"><ins><em>see through your camera.</p>
</li>
- <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
- remote command and users cannot stop them:</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201603220">
+ <li id="M201603220">
<!--#set var="DATE" value='<small
class="date-tag">2016-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Over 70 brands of network-connected surveillance cameras
have</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable
phones</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>watch through
them</a>.</p></em></ins></span>
+ <p>Over 70 brands</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+ “solution”</strong></del></span> <span
class="inserted"><ins><em>network-connected surveillance cameras have <a
+
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ security bugs that allow anyone</em></ins></span> to <span
class="removed"><del><strong>surveillance: why should a flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>watch through them</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511250">
+ <li id="M201511250">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Nest Cam “smart” camera</em></ins></span> is
<span class="removed"><del><strong>to restrict
- the use of data on</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>The Nest Cam “smart” camera is <a
href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when</em></ins></span> the <span class="removed"><del><strong>user's
computer, but</strong></del></span> <span
class="inserted"><ins><em>“owner” switches</em></ins></span> it
<span class="removed"><del><strong>does surveillance
- too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"></strong></del></span>
<span class="inserted"><ins><em>“off.”</p>
+ even when the “owner” switches it “off.”</p>
- <p>A “smart” device means the manufacturer is
using</em></ins></span> it <span
class="removed"><del><strong>tries</strong></del></span>
- to <span class="removed"><del><strong>get the user's list of other
people's phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p></em></ins></span>
+ <p>A “smart” device means the manufacturer is using
it</em></ins></span>
+ to <span class="removed"><del><strong>anyone? A free software flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInGames">Spyware in
Games</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInGames">#SpywareInGames</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
-
- <li><p>The Uber app tracks</strong></del></span>
+ <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711244">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
-
- <p>This example illustrates how
“getting</strong></del></span>
+ <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about
them</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>user's consent”
- for surveillance is inadequate</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act</em></ins></span> as a
<span class="removed"><del><strong>protection against massive
- surveillance.</p></strong></del></span>
- <span class="inserted"><ins><em>listening device, remote changes to the
code could surely convert it
+ universal back door</a>. If the product as shipped doesn't act as a
+ listening device, remote changes</em></ins></span> to
+ <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>the code could surely convert it
into one.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Google's new voice
messaging app</strong></del></span>
+ <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
<span class="inserted"><ins><em><li id="M201711100">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></strong></del></span>
+ <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of the conversation between two
users</a>.</p></em></ins></span>
+ recordings of</em></ins></span> the <span class="removed"><del><strong>NSA
takes advantage to spy</strong></del></span> <span
class="inserted"><ins><em>conversation between two users</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201703140">
+ <li id="M201703140">
<!--#set var="DATE" value='<small
class="date-tag">2017-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping</em></ins></span> on <span
class="removed"><del><strong>what</strong></del></span> <span
class="inserted"><ins><em>its users through the proprietary control
app</a>.</p>
+ <p>A computerized vibrator <a
+
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users</em></ins></span> through <span
class="inserted"><ins><em>the proprietary control app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether it was surrounded by a person's
+ minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>too</a>.
+ Here's information on
+ <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More</strong></del></span> <span class="inserted"><ins><em>was
surrounded by a person's
body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about their
- products, rather than free software which</em></ins></span> users <span
class="removed"><del><strong>post on various sites
- such as Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>could have checked</em></ins></span>
- and <span class="removed"><del><strong>Twitter.</p>
+ standard with which manufacturers would make statements</em></ins></span>
about <span class="removed"><del><strong>NSA app spying</a>.</p>
</li>
+</ul>
- <li><p>Facebook's new Magic Photo app</strong></del></span>
<span class="inserted"><ins><em>changed.</p>
- <p>The company that made the vibrator</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections</strong></del></span>
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
+
+<ul>
+
+ <li><p>A</strong></del></span> <span
class="inserted"><ins><em>their
+ products, rather than free software which users could have checked
+ and changed.</p>
+
+ <p>The</em></ins></span> company that <span
class="removed"><del><strong>makes internet-controlled
vibrators</strong></del></span> <span class="inserted"><ins><em>made the
vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
+ being</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued</em></ins></span> for <span class="removed"><del><strong>known
faces</a>,
- and suggests you</strong></del></span> <span
class="inserted"><ins><em>collecting lots of personal information about how
people
- used it</a>.</p>
-
- <p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the
data</em></ins></span> to <span
class="removed"><del><strong>share</strong></del></span> <span
class="inserted"><ins><em>a data
- broker,</em></ins></span> the <span class="removed"><del><strong>picture
you take according</strong></del></span> <span class="inserted"><ins><em>data
broker would have been able</em></ins></span> to <span
class="inserted"><ins><em>figure out</em></ins></span> who
- <span class="removed"><del><strong>is in</strong></del></span> the <span
class="removed"><del><strong>frame.</p>
-
- <p>This spyware feature seems</strong></del></span>
- <span class="inserted"><ins><em>user was.</p>
-
- <p>Following this lawsuit, <a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered</em></ins></span> to <span
class="removed"><del><strong>require online access</strong></del></span> <span
class="inserted"><ins><em>pay a total of C$4m</a> to its
+ was</em></ins></span> sued for collecting lots of personal information
about how people <span class="removed"><del><strong>use</strong></del></span>
+ <span class="inserted"><ins><em>used</em></ins></span>
it</a>.</p>
+
+ <p>The company's statement that it <span
class="removed"><del><strong>anonymizes</strong></del></span> <span
class="inserted"><ins><em>was anonymizing</em></ins></span> the data may be
+ true, but it doesn't really matter. If it <span
class="removed"><del><strong>sells</strong></del></span> <span
class="inserted"><ins><em>had sold</em></ins></span> the data to a data
+ broker, the data broker <span
class="removed"><del><strong>can</strong></del></span> <span
class="inserted"><ins><em>would have been able to</em></ins></span> figure out
who the
+ user <span class="removed"><del><strong>is.</p>
+ </li>
+
+ <li><p>A computerized
+ vibrator</strong></del></span> <span
class="inserted"><ins><em>was.</p>
+
+ <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops
+ on its users through the proprietary control app</a>.</p>
+
+ <p>The app reports</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
+ the <span class="removed"><del><strong>temperature</strong></del></span>
<span class="inserted"><ins><em>company has been ordered to pay a
total</em></ins></span> of <span class="inserted"><ins><em>C$4m</a> to its
customers.</p>
</li>
@@ -2734,45 +2837,40 @@
--><!--#echo encoding="none" var="DATE" -->
<p>“CloudPets” toys with microphones <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>some
- known-faces database, which means</strong></del></span> the <span
class="removed"><del><strong>pictures are likely</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what? <a
+ leak childrens' conversations to</em></ins></span> the <span
class="removed"><del><strong>vibrator minute</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what? <a
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>be
- sent across</strong></del></span> <span
class="inserted"><ins><em>access</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>data</a> collected by the
+ Crackers found a way to access the data</a>
collected</em></ins></span> by
+ <span class="removed"><del><strong>minute (thus, indirectly, whether it
is surrounded</strong></del></span> <span class="inserted"><ins><em>the
manufacturer's snooping.</p>
- <p>That the manufacturer and the FBI could listen</em></ins></span>
to <span class="removed"><del><strong>Facebook's servers</strong></del></span>
<span class="inserted"><ins><em>these
- conversations was unacceptable by itself.</p>
+ <p>That the manufacturer and the FBI could listen to these
+ conversations was unacceptable</em></ins></span> by <span
class="removed"><del><strong>a person's
+ body),</strong></del></span> <span
class="inserted"><ins><em>itself.</p>
</li>
<li id="M201612060">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>face-recognition
- algorithms.</p>
-
- <p>If so, none of Facebook users' pictures are private
- anymore, even if</strong></del></span> <span
class="inserted"><ins><em>i-Que transmit <a
+ <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="inserted"><ins><em>i-Que transmit <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>, a speech recognition
- company based in</em></ins></span> the <span
class="removed"><del><strong>user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>U.S.</p>
+ company based in</em></ins></span> the <span
class="removed"><del><strong>vibration frequency.</p>
+
+ <p>Note</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would enable
- crackers</em></ins></span> to <span class="inserted"><ins><em>listen in on
a child's speech, and even speak into</em></ins></span> the <span
class="removed"><del><strong>service.</p></strong></del></span>
- <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
+ can remotely control</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
+ standard</strong></del></span> <span
class="inserted"><ins><em>toys</em></ins></span> with <span
class="removed"><del><strong>which manufacturers</strong></del></span> <span
class="inserted"><ins><em>a mobile phone. This</em></ins></span> would <span
class="removed"><del><strong>make statements about</strong></del></span> <span
class="inserted"><ins><em>enable
+ crackers to listen in on a child's speech, and even speak into the
+ toys themselves.</p>
</li>
- <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
- is based</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201502180">
+ <li id="M201502180">
<!--#set var="DATE" value='<small
class="date-tag">2015-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Barbie <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going to spy</em></ins></span> on <span
class="removed"><del><strong>proprietary malware (DRM</strong></del></span>
<span class="inserted"><ins><em>children</em></ins></span> and <span
class="removed"><del><strong>snooping). In August
- 2015 it</strong></del></span> <span
class="inserted"><ins><em>adults</a>.</p>
+ going to spy on children and adults</a>.</p>
</li>
</ul>
@@ -2787,10 +2885,8 @@
<!--#set var="DATE" value='<small
class="date-tag">2017-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>While you're using a DJI drone
- to snoop on other people, DJI is in many cases</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ to snoop on other people, DJI is in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p>
</li>
</ul>
@@ -2805,16 +2901,10 @@
<!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many employers are using nonfree
- software, including videoconference software,</em></ins></span> to <span
class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em><a
+ software, including videoconference software, to <a
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
- surveil</em></ins></span> and <span
class="removed"><del><strong>some</strong></del></span> <span
class="inserted"><ins><em>monitor staff working at home</a>. If the
program reports
- whether you</em></ins></span> are <span
class="removed"><del><strong>starting to realize</strong></del></span> <span
class="inserted"><ins><em>“active,”</em></ins></span> that <span
class="removed"><del><strong>it</strong></del></span> is <span
class="removed"><del><strong>nasty.</p>
-
- <p>This article shows the <a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as</strong></del></span> <span
class="inserted"><ins><em>in effect</em></ins></span> a <span
class="removed"><del><strong>way
- to “serve” users better</a>—never mind
- whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>malicious
+ surveil and monitor staff working at home</a>. If the program reports
+ whether you are “active,” that is in effect a malicious
surveillance feature.</p>
</li>
@@ -2822,227 +2912,295 @@
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Google Nest <a
-
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"></em></ins></span>
- is <span class="inserted"><ins><em>taking over ADT</a>. Google sent
out</em></ins></span> a <span class="removed"><del><strong>typical example of
- the attitude of the proprietary</strong></del></span> software <span
class="removed"><del><strong>industry towards
- those they have subjugated.</p>
-
- <p>Out, out, damned Spotify!</p>
- </li>
- <li><p>Many proprietary apps for mobile</strong></del></span>
- <span class="inserted"><ins><em>update to its speaker</em></ins></span>
devices <span class="removed"><del><strong>report which other
- apps the user has
- installed.</strong></del></span> <span class="inserted"><ins><em>using
their back door</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.protocol.com/google-smart-speaker-alarm-adt"></em></ins></span>
that <span class="removed"><del><strong>at least is
visible</strong></del></span>
- <span class="inserted"><ins><em>listens for things like smoke
alarms</a></em></ins></span> and
- <span class="removed"><del><strong>optional</a>. Not as bad as
what</strong></del></span> <span class="inserted"><ins><em>then notifies your
phone
- that an alarm is happening. This means</em></ins></span> the <span
class="removed"><del><strong>others do.</p>
- </li>
-
- <li><p>FTC</strong></del></span> <span
class="inserted"><ins><em>devices now listen for more
- than just their wake words. Google</em></ins></span> says <span
class="removed"><del><strong>most mobile apps</strong></del></span> <span
class="inserted"><ins><em>the software update was sent
- out prematurely and on accident and Google was planning on disclosing
- this new feature and offering it to customers who pay</em></ins></span>
for <span class="removed"><del><strong>children don't respect privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>it.</p></em></ins></span>
+
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
+ is taking over ADT</a>. Google sent out a software
+ update to its speaker devices using</em></ins></span> their <span
class="removed"><del><strong>products, rather</strong></del></span> <span
class="inserted"><ins><em>back door <a
+ href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that
+ listens for things like smoke alarms</a> and then notifies your phone
+ that an alarm is happening. This means the devices now listen for
more</em></ins></span>
+ than <span class="removed"><del><strong>free</strong></del></span> <span
class="inserted"><ins><em>just their wake words. Google says
the</em></ins></span> software <span class="removed"><del><strong>which users
can check</strong></del></span> <span class="inserted"><ins><em>update was sent
+ out prematurely and on accident</em></ins></span> and <span
class="removed"><del><strong>change.</p></strong></del></span> <span
class="inserted"><ins><em>Google was planning on disclosing
+ this new feature and offering it to customers who pay for
it.</p></em></ins></span>
</li>
-
- <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
<span class="inserted"><ins><em><li id="M202006300">
<!--#set var="DATE" value='<small
class="date-tag">2020-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>“Bossware” is malware that bosses</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop</strong></del></span>
+ <p>“Bossware” is malware that bosses</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
coerce workers into installing in their own computers</a>, so the
- bosses can spy</em></ins></span> on <span
class="inserted"><ins><em>them.</p>
+ bosses can</em></ins></span> spy on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>them.</p>
- <p>This shows why requiring</em></ins></span> the <span
class="removed"><del><strong>user</a>. This</strong></del></span> <span
class="inserted"><ins><em>user's “consent”</em></ins></span> is
<span class="removed"><del><strong>in addition</strong></del></span> <span
class="inserted"><ins><em>not
+ <p>This shows why requiring the user's “consent” is not
an adequate basis for protecting digital privacy. The boss can coerce
- most workers into consenting</em></ins></span> to
- <span class="removed"><del><strong>the snooping done by the phone
company,</strong></del></span> <span class="inserted"><ins><em>almost anything,
even probable exposure
+ most workers into consenting to almost anything, even probable exposure
to contagious disease that can be fatal. Software like this should
- be illegal</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in the
- phone.</p>
-
- <p>Don't</strong></del></span> <span
class="inserted"><ins><em>bosses that demand it should</em></ins></span> be
<span class="removed"><del><strong>distracted by</strong></del></span> <span
class="inserted"><ins><em>prosecuted for it.</p>
+ be illegal</em></ins></span> and <span
class="removed"><del><strong>adults.</a>.</p></strong></del></span>
<span class="inserted"><ins><em>bosses that demand it should be prosecuted for
it.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201911190">
+
+<!-- #SpywareAtLowLevel</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201911190">
<!--#set var="DATE" value='<small
class="date-tag">2019-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Internet-tethered Amazon Ring had
- a security vulnerability that enabled attackers to <a
-
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
- access</em></ins></span> the <span
class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em>user's wifi password</a>, and snoop on the
household
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>Internet-tethered Amazon Ring had
+ a security vulnerability that enabled attackers</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p></strong></del></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access the user's wifi password</a>,</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a></strong></del></span>
<span class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
+Note that</strong></del></span> the <span
class="removed"><del><strong>specific sabotage method
Lenovo</strong></del></span> <span class="inserted"><ins><em>household
through connected surveillance devices.</p>
- <p>Knowledge</em></ins></span> of <span
class="removed"><del><strong>whether</strong></del></span> the <span
class="removed"><del><strong>app developers get
- users</strong></del></span> <span class="inserted"><ins><em>wifi
password would not be sufficient</em></ins></span> to <span
class="removed"><del><strong>say “I agree”. That is no
excuse</strong></del></span> <span class="inserted"><ins><em>carry
+ <p>Knowledge of the wifi password would not be sufficient to carry
out any significant surveillance if the devices implemented proper
security, including encryption. But many devices with proprietary
- software lack this. Of course, they are also used by their
- manufacturers</em></ins></span> for <span
class="removed"><del><strong>malware.</p></strong></del></span> <span
class="inserted"><ins><em>snooping.</p></em></ins></span>
+ software lack this. Of course, they are also</em></ins></span> used <span
class="removed"><del><strong>did</strong></del></span> <span
class="inserted"><ins><em>by their
+ manufacturers for snooping.</p>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201907210">
+ <li id="M201907210">
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google “Assistant” records users'
conversations</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p>
-
- <p>The FTC criticized this app because</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
- when</em></ins></span> it <span class="removed"><del><strong>asked the
user</strong></del></span> <span class="inserted"><ins><em>is not
supposed</em></ins></span> to
- <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>listen</a>.
Thus, when one of Google's
- subcontractors discloses a thousand confidential voice recordings,
+ <p>Google “Assistant” records users' conversations <a
+
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
+ when it is</em></ins></span> not <span class="removed"><del><strong>affect
+GNU/Linux; also,</strong></del></span> <span
class="inserted"><ins><em>supposed to listen</a>. Thus, when one of
Google's
+ subcontractors discloses</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>thousand
confidential voice recordings,
users were easily identified from these recordings.</p>
- <p>Since Google “Assistant” uses proprietary software,
there is no
- way</em></ins></span> to <span class="removed"><del><strong>the app
developer but did not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>see or control what</em></ins></span> it <span
class="inserted"><ins><em>records or sends.</p>
-
- <p>Rather than trying</em></ins></span> to <span
class="removed"><del><strong>other companies. This shows</strong></del></span>
<span class="inserted"><ins><em>better control</em></ins></span> the
- <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
- “solution”</strong></del></span> <span
class="inserted"><ins><em>recordings, Google
- should not record or listen</em></ins></span> to <span
class="removed"><del><strong>surveillance: why</strong></del></span> <span
class="inserted"><ins><em>the person's voice. It</em></ins></span> should
<span class="removed"><del><strong>a flashlight
- app</strong></del></span> <span class="inserted"><ins><em>only
- get commands that the user wants to</em></ins></span> send <span
class="removed"><del><strong>any information</strong></del></span> to <span
class="removed"><del><strong>anyone? A free software flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>some Google service.</p></em></ins></span>
+ <p>Since Google “Assistant” uses proprietary software,
there</em></ins></span> is <span class="inserted"><ins><em>no
+ way to see or control what it records or sends.</p>
+
+ <p>Rather than trying to better control the use of recordings, Google
+ should</em></ins></span> not <span class="removed"><del><strong>really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>record or listen</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each
subsection</strong></del></span> <span class="inserted"><ins><em>the person's
voice. It should only
+ get commands that the user wants to send to some Google service.</p>
</li>
-<span class="removed"><del><strong></ul>
+ <li id="M201905061">
+ <!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware in Games</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
</div>
+<div style="clear: left;"></div>
<ul>
- <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes</strong></del></span>
+ <li><p>Investigation
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
- <span class="inserted"><ins><em><li id="M201905061">
- <!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Amazon Alexa collects a lot more information
from</em></ins></span> users <span class="removed"><del><strong>identify
themselves</strong></del></span>
- <span class="inserted"><ins><em>than is necessary for correct functioning
(time, location,
- recordings made without a legitimate prompt),</em></ins></span> and <span
class="removed"><del><strong>then</strong></del></span> sends <span
class="removed"><del><strong>personal</strong></del></span>
- <span class="inserted"><ins><em>it to Amazon's servers, which store it
indefinitely. Even
- worse, Amazon forwards it to third-party companies. Thus,
- even if users request deletion of their</em></ins></span> data <span
class="removed"><del><strong>about them</strong></del></span> <span
class="inserted"><ins><em>from Amazon's servers, <a
+ <p>Specifically,</strong></del></span>
+ <span class="inserted"><ins><em><p>Amazon Alexa collects a lot more
information from users
+ than is necessary for correct functioning (time, location,
+ recordings made without a legitimate prompt), and sends
+ it to Amazon's servers, which store it indefinitely. Even
+ worse, Amazon forwards</em></ins></span> it <span
class="inserted"><ins><em>to third-party companies. Thus,
+ even if users request deletion of their data from Amazon's servers, <a
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
- the data remain on other servers</a>, where they can be accessed by
+ the data remain on other servers</a>, where they</em></ins></span>
can <span class="removed"><del><strong>collect</strong></del></span> <span
class="inserted"><ins><em>be accessed by
advertising companies and government agencies. In other words,
- deleting the collected information doesn't cancel the wrong of
- collecting it.</p>
+ deleting</em></ins></span> the <span class="removed"><del><strong>emails
of members</strong></del></span> <span class="inserted"><ins><em>collected
information doesn't cancel the wrong</em></ins></span> of <span
class="removed"><del><strong>Parliament
+ this way, because</strong></del></span>
+ <span class="inserted"><ins><em>collecting it.</p>
<p>Data collected by devices such as the Nest thermostat, the Philips
Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
speakers are likewise stored longer than necessary on the servers
- the devices are tethered to. Moreover, they are made
available</em></ins></span> to
- <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very
precise picture of users' life
- at home, not only in the present, but in the past (and, who knows,
- in the future too?)</p></em></ins></span>
+ the devices are tethered to. Moreover,</em></ins></span> they <span
class="removed"><del><strong>pass it through Microsoft.</p></li>
+
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>are made available to
+ Alexa. As a result, Amazon has a very precise picture of users' life
+ at home, not only</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
</li>
+</ul>
- <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
+
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware</strong></del></span> <span
class="inserted"><ins><em>the present, but</em></ins></span> in <span
class="removed"><del><strong>Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>the past (and, who knows,</em></ins></span>
+ in <span class="removed"><del><strong>Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype
+ <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p></strong></del></span> <span
class="inserted"><ins><em>the future too?)</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+
+
+<!-- #SpywareOnTheRoad</strong></del></span>
<span class="inserted"><ins><em><li id="M201904240">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Some of users' commands to the Alexa service
are</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded</em></ins></span> for <span
class="removed"><del><strong>companies,</strong></del></span> <span
class="inserted"><ins><em>Amazon employees to listen to</a>. The
Google</em></ins></span> and <span class="inserted"><ins><em>Apple
- voice assistants do similar things.</p>
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>Some of users'
commands</em></ins></span> to <span class="removed"><del><strong>place new
items on top under each subsection -->
- <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even has access</em></ins></span>
to <span class="removed"><del><strong>spy through it too</a>.
- Here's information on
- <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>The Nest Cam “smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when the “owner” switches it
“off.”</p>
+ <p>A “smart” device means</strong></del></span> the
<span class="removed"><del><strong>manufacturer is using
it</strong></del></span> <span class="inserted"><ins><em>Alexa service are <a
+
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees</em></ins></span> to <span
class="removed"><del><strong>outsmart
+ you.</p>
</li>
</ul>
-
<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
<ul>
+ <li><p>E-books can contain Javascript
code,</strong></del></span> <span class="inserted"><ins><em>listen
to</a>. The Google</em></ins></span> and <span
class="removed"><del><strong><a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not
only</strong></del></span> <span class="inserted"><ins><em>Apple
+ voice assistants do similar things.</p>
- <li><p>A company that makes internet-controlled
vibrators</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
- being sued for collecting lots of</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
- location and other</em></ins></span> personal <span
class="removed"><del><strong>information about how
- people use it</a>.</p>
+ <p>A fraction of</em></ins></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report</strong></del></span> <span class="inserted"><ins><em>Alexa
service staff</em></ins></span> even <span class="removed"><del><strong>which
page</strong></del></span> <span class="inserted"><ins><em>has access to <a
+
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
+ location and other personal data</a>.</p>
- <p>The company's statement that it
anonymizes</strong></del></span> <span
class="inserted"><ins><em>data</a>.</p>
+ <p>Since</em></ins></span> the <span
class="removed"><del><strong>user reads at what time</a>.</p>
+ </li>
- <p>Since</em></ins></span> the <span
class="inserted"><ins><em>client program is nonfree, and</em></ins></span> data
<span class="removed"><del><strong>may be
- true, but it doesn't really matter. If it sells</strong></del></span>
<span class="inserted"><ins><em>processing is done
+ <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>client
program is nonfree, and data processing is done
“<a
href="/philosophy/words-to-avoid.html#CloudComputing">in</em></ins></span>
- the <span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>cloud</a>” (a soothing way of saying
“We won't
- tell you how and where it's done”), users have no way
- to know what happens</em></ins></span> to <span
class="removed"><del><strong>a
- data broker, the data broker can figure out who</strong></del></span>
the <span class="removed"><del><strong>user is.</p></strong></del></span>
<span class="inserted"><ins><em>recordings unless human eavesdroppers <a
-
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
+ the <span class="removed"><del><strong>e-reader used
+ by most US libraries,
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots</strong></del></span> <span
class="inserted"><ins><em>cloud</a>” (a soothing
way</em></ins></span> of <span class="removed"><del><strong>data to
Adobe</a>. Adobe's “excuse”:</strong></del></span> <span
class="inserted"><ins><em>saying “We won't
+ tell you how and where</em></ins></span> it's
+ <span class="removed"><del><strong>needed</strong></del></span> <span
class="inserted"><ins><em>done”), users have no way</em></ins></span>
+ to <span class="removed"><del><strong>check DRM!</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul>
+<li><p>Computerized cars with nonfree software
are</strong></del></span> <span class="inserted"><ins><em>know what happens to
the recordings unless human eavesdroppers</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
break their non-disclosure
agreements</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>A computerized
- vibrator</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Nissan Leaf has a
built-in cell phone modem which allows
+ effectively
+ anyone</strong></del></span>
<span class="inserted"><ins><em><li id="M201902080">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The HP</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops
- on its users through</strong></del></span>
+ <p>The HP</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make changes in various
+ settings</a>.</p>
+
+ <p>That's easy</strong></del></span>
<span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a> to make sure</em></ins></span> the
<span class="removed"><del><strong>proprietary control app</a>.</p>
-
- <p>The app reports</strong></del></span> <span
class="inserted"><ins><em>user is still
- paying for</em></ins></span> the <span
class="removed"><del><strong>temperature of</strong></del></span> <span
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
+ communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>do because the system has no authentication when
+ accessed through</strong></del></span> <span
class="inserted"><ins><em>make sure</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it
asked</strong></del></span> <span class="inserted"><ins><em>user is still
+ paying</em></ins></span> for
+ <span class="removed"><del><strong>authentication, you
couldn't</strong></del></span> <span class="inserted"><ins><em>the
subscription, and hasn't printed more pages than were
paid for.</p>
- <p>Even though</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>ink subscription program may be cheaper in some
- specific cases,</em></ins></span> it <span class="removed"><del><strong>is
surrounded by a person's
- body),</strong></del></span> <span class="inserted"><ins><em>spies on
users,</em></ins></span> and <span class="inserted"><ins><em>involves totally
unacceptable
- restrictions in</em></ins></span> the <span
class="removed"><del><strong>vibration frequency.</p>
-
- <p>Note</strong></del></span> <span class="inserted"><ins><em>use
of ink cartridges that would otherwise be in
- working order.</p>
+ <p>Even though the ink subscription program may</em></ins></span> be
<span class="removed"><del><strong>confident</strong></del></span> <span
class="inserted"><ins><em>cheaper in some
+ specific cases, it spies on users, and involves totally unacceptable
+ restrictions in the use of ink cartridges</em></ins></span> that <span
class="removed"><del><strong>Nissan has no
+ access. The software</strong></del></span> <span
class="inserted"><ins><em>would otherwise be</em></ins></span> in
+ <span class="inserted"><ins><em>working order.</p>
</li>
<li id="M201808120">
<!--#set var="DATE" value='<small
class="date-tag">2018-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Crackers found a way to break</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed
response:</strong></del></span> <span class="inserted"><ins><em>security of an
Amazon device,
- and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
- turn it into</em></ins></span> a <span
class="removed"><del><strong>labeling
- standard with which manufacturers</strong></del></span> <span
class="inserted"><ins><em>listening device</a> for them.</p>
-
- <p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And if some government such as China or the US
- told Amazon to do this, or cease to sell the product in that country,
- do you think Amazon</em></ins></span> would <span
class="removed"><del><strong>make statements about
- their products, rather than free software which users can check
- and change.</p>
- </li>
- <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>have the moral fiber to say no?</p>
-
- <p><small>(These crackers are probably hackers too, but
please</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
- <span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
- “hacking”</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>mean “breaking
security”</a>.)</small></p>
+ <p>Crackers found a way to break</em></ins></span> the <span
class="removed"><del><strong>car is
+ proprietary,</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,
+ and</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ means</strong></del></span> <span
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ turn</em></ins></span> it <span class="removed"><del><strong>demands blind
faith from its users</a>.</p>
+
+ <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>into a listening device</a> for them.</p>
+
+ <p>It was very difficult for them</em></ins></span> to <span
class="inserted"><ins><em>do this. The job would be much
+ easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>car remotely, the
cell phone
+ modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>US
+ told Amazon</em></ins></span> to <span class="removed"><del><strong>track
the car's movements all
+ the time; it is possible</strong></del></span> <span
class="inserted"><ins><em>do this, or cease</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>sell</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
+ though.</p>
+ </li>
+
+ <li><p>Proprietary software</strong></del></span> <span
class="inserted"><ins><em>product</em></ins></span> in <span
class="removed"><del><strong>cars
+ <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available</strong></del></span> <span
class="inserted"><ins><em>that country,
+ do you think Amazon would have the moral fiber</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
+ others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
is not
+ really a matter of proprietary surveillance. These
systems</strong></del></span> <span class="inserted"><ins><em>say no?</p>
+
+ <p><small>(These crackers</em></ins></span> are <span
class="removed"><del><strong>an
+ intolerable invasion of privacy, and should be replaced with anonymous
+ payment systems,</strong></del></span> <span
class="inserted"><ins><em>probably hackers too,</em></ins></span> but <span
class="removed"><del><strong>the invasion isn't done</strong></del></span>
<span class="inserted"><ins><em>please <a
+ href="https://stallman.org/articles/on-hacking.html"> don't use
+ “hacking” to mean “breaking
security”</a>.)</small></p>
</li>
<li id="M201804140">
@@ -3050,99 +3208,42 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A medical insurance company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops</em></ins></span> on
<span class="removed"><del><strong>children and
adults.</a>.</p></strong></del></span> <span
class="inserted"><ins><em>its user by
- sending usage data back over the
Internet</a>.</p></em></ins></span>
+ offers a gratis electronic toothbrush that snoops on its
user</em></ins></span> by <span class="removed"><del><strong>malware. The other
+ cases mentioned</strong></del></span>
+ <span class="inserted"><ins><em>sending usage data back over the
Internet</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareAtLowLevel</strong></del></span>
- <span class="inserted"><ins><em><li id="M201706204">
+ <li id="M201706204">
<!--#set var="DATE" value='<small
class="date-tag">2017-06</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>Lots of “smart”
products are designed <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Lots of “smart” products</em></ins></span> are <span
class="removed"><del><strong>done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen</em></ins></span> to <span class="removed"><del><strong>place new
items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>everyone</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
-
-<ul>
-<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note that</strong></del></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used
did</strong></del></span> <span class="inserted"><ins><em>house, all the
time</a>.</p>
-
- <p>Today's technological practice does</em></ins></span> not <span
class="removed"><del><strong>affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>include
any way of making</em></ins></span>
- a <span class="removed"><del><strong>“clean” Windows install
is not really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items</strong></del></span> <span
class="inserted"><ins><em>device that can obey your voice commands without
potentially spying</em></ins></span>
- on <span class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
+ listen to everyone</em></ins></span> in the <span
class="removed"><del><strong>car.</p></li>
- <p>Specifically,</strong></del></span> <span
class="inserted"><ins><em>you. Even if</em></ins></span> it <span
class="removed"><del><strong>can collect the emails of members of Parliament
- this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>is air-gapped,</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+ <li><p>Tesla cars allow the company to extract data remotely and
+ determine</strong></del></span> <span class="inserted"><ins><em>house,
all</em></ins></span> the <span class="removed"><del><strong>car's location
at</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>could be saving up records
- about you for later examination.</p></em></ins></span>
+ <p>Today's technological practice does not include</em></ins></span>
any <span class="removed"><del><strong>time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>). The company says it doesn't
+ store this information, but</strong></del></span> <span
class="inserted"><ins><em>way of making
+ a device that can obey your voice commands without potentially spying
+ on you. Even</em></ins></span> if <span class="removed"><del><strong>the
state orders</strong></del></span> it <span class="removed"><del><strong>to get
the data
+ and hand</strong></del></span> <span class="inserted"><ins><em>is
air-gapped,</em></ins></span> it <span
class="removed"><del><strong>over,</strong></del></span> <span
class="inserted"><ins><em>could be saving up records
+ about you for later examination.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware in Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
- <span class="inserted"><ins><em><li id="M201407170">
+ <li id="M201407170">
<!--#set var="DATE" value='<small
class="date-tag">2014-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot of
- data about the user</a>.</p></em></ins></span>
+ <p id="nest-thermometers">Nest thermometers send <a
+ href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
+ data about</em></ins></span> the <span class="removed"><del><strong>state
can store it.</p></strong></del></span> <span
class="inserted"><ins><em>user</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
-
-<!-- #SpywareOnTheRoad</strong></del></span>
+<!-- #SpywareAtHome</strong></del></span>
<span class="inserted"><ins><em><li id="M201310260">
<!--#set var="DATE" value='<small
class="date-tag">2013-10</small>'
@@ -3150,38 +3251,31 @@
<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
<span class="inserted"><ins><em><p><a
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div></strong></del></span> <span
class="inserted"><ins><em>spy on their renters</a>.</p>
+ Rent-to-own computers were programmed</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>their
renters</a>.</p>
</li>
</ul></em></ins></span>
-<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInCameras">Spyware
in Cameras</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareOnWearables">Wearables</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInCameras">#SpywareInCameras</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnWearables">#SpywareOnWearables</a>)</span></em></ins></span>
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareAtHome">Spyware at
Home</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareOnWearables">Wearables</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtHome">#SpywareAtHome</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnWearables">#SpywareOnWearables</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear: left;"></div>
-<span class="removed"><del><strong><ul>
- <li>
- <p>The Nest Cam “smart” camera is</strong></del></span>
+<ul>
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201807260">
<!--#set var="DATE" value='<small
class="date-tag">2018-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tommy Hilfiger clothing</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
+ <p>Tommy Hilfiger clothing <a
+
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
monitor how often people wear it</a>.</p>
- <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>sheeple to find</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>normal that companies
+ <p>This will teach the sheeple to find it normal that companies
monitor every aspect of what they do.</p>
</li>
</ul>
@@ -3197,7 +3291,7 @@
are malware, violating people (specially children's)
privacy. In addition, they have a lot of security flaws. They <a
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
- permit security breakers (and unauthorized people) to
access</a></em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>watch.</p>
+ permit security breakers (and unauthorized people) to access</a> the
watch.</p>
<p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
@@ -3213,8 +3307,8 @@
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
that connects to an unidentified site in China</a>.</p>
- <p>The article says this</em></ins></span> is <span
class="removed"><del><strong>using</strong></del></span> <span
class="inserted"><ins><em>a back door, but that could be a
- misunderstanding. However,</em></ins></span> it <span
class="inserted"><ins><em>is certainly surveillance, at least.</p>
+ <p>The article says this is a back door, but that could be a
+ misunderstanding. However, it is certainly surveillance, at
least.</p>
</li>
<li id="M201407090">
@@ -3222,20 +3316,18 @@
--><!--#echo encoding="none" var="DATE" -->
<p>An LG “smart” watch is designed <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
- to <span class="removed"><del><strong>outsmart
- you.</p></strong></del></span> <span
class="inserted"><ins><em>report its location to someone else and to transmit
conversations
+ to <span class="removed"><del><strong>spy on their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>report its location to someone else and to transmit
conversations
too</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInVehicles">Vehicles</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInVehicles">Vehicles</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></em></ins></span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>E-books</strong></del></span>
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202008181">
@@ -3243,25 +3335,53 @@
--><!--#echo encoding="none" var="DATE" -->
<p>New Toyotas will <a
href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/">
- upload data to AWS to help create custom insurance premiums</a>
+ upload data</em></ins></span> to <span
class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>AWS to help create custom insurance premiums</a>
based on driver behaviour.</p>
- <p>Before you buy a “connected” car, make sure
you</em></ins></span> can <span class="removed"><del><strong>contain Javascript
code,</strong></del></span>
- <span class="inserted"><ins><em>disconnect its cellular antenna and its
GPS antenna. If you want
- GPS navigation, get a separate navigator which runs free
software</em></ins></span>
- and <span class="inserted"><ins><em>works with Open Street Map.</p>
+ <p>Before you buy a “connected” car, make sure you can
+ disconnect its cellular antenna</em></ins></span> and
+<span class="removed"><del><strong>said, “Didn't I
see</strong></del></span> <span class="inserted"><ins><em>its GPS antenna.
If</em></ins></span> you <span class="removed"><del><strong>on
television?” I said, “I
+don't know. You can't see out the other way.” Evidently that was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>want
+ GPS navigation, get a separate navigator which runs free software
+ and works with Open Street Map.</p>
</li>
<li id="M201912171">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Most modern cars now</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p></strong></del></span>
+ <p>Most modern cars now</em></ins></span> <a <span
class="removed"><del><strong>href="
+
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report was as</strong></del></span>
<span
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
- record and send various kinds of data to the manufacturer</a>. For
- the user, access to the data is nearly impossible, as it involves
- cracking the car's computer, which is always hidden and running with
- proprietary software.</p>
+ record and send various kinds</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect this has got
better.</p>
+
+ <p>This shows that laws requiring products to get users' formal
+ consent before collecting personal</strong></del></span> data <span
class="removed"><del><strong>are totally inadequate.
+ And what happens if a user declines consent? Probably the TV
+ will say, “Without your consent</strong></del></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> the <span
class="removed"><del><strong>TV will
+ not work.”</p>
+
+ <p>Proper laws would say that TVs are not
allowed</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. For
+ the user, access</em></ins></span> to <span
class="removed"><del><strong>report what</strong></del></span> the <span
class="removed"><del><strong>user watches — no exceptions!</p>
+ </li>
+ <li><p>Vizio goes a step further than other TV manufacturers in
spying on
+ their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so that advertisers can track you
+ across devices.</p>
+
+ <p>It</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> is <span
class="removed"><del><strong>possible to turn this off, but
having</strong></del></span> <span class="inserted"><ins><em>nearly impossible,
as</em></ins></span> it <span class="removed"><del><strong>enabled by
default</strong></del></span> <span class="inserted"><ins><em>involves
+ cracking the car's computer, which</em></ins></span> is <span
class="removed"><del><strong>an injustice already.</p>
+ </li>
+
+ <li><p>Tivo's alliance</strong></del></span> <span
class="inserted"><ins><em>always hidden and running</em></ins></span> with
<span class="removed"><del><strong>Viacom adds 2.3 million
households</strong></del></span>
+ <span class="inserted"><ins><em>proprietary software.</p>
</li>
<li id="M201903290">
@@ -3269,197 +3389,171 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Tesla cars collect lots of personal data, and <a
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
- when they go to a junkyard the driver's personal data goes with
- them</a>.</p></em></ins></span>
+ when they go</em></ins></span> to <span class="inserted"><ins><em>a
junkyard</em></ins></span> the <span class="removed"><del><strong>600 millions
social media profiles the company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>driver's personal data goes</em></ins></span>
with <span class="removed"><del><strong>online
+ social media participation, Tivo can now</strong></del></span>
+ <span class="inserted"><ins><em>them</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902011">
+ <li id="M201902011">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The FordPass Connect feature of some Ford vehicles has <a
-
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access to the internal car network</a>. It is
constantly
- connected to the cellular phone network and sends Ford a lot of data,
+ <p>The FordPass Connect feature of some Ford vehicles
has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all
users</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ near-complete access</em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>the internal car
network</a>. It is constantly
+ connected</em></ins></span> to <span class="removed"><del><strong>be
+ picked up</strong></del></span> <span class="inserted"><ins><em>the
cellular phone network and sends Ford a lot of data,
including car location. This feature operates even when the ignition
key is removed, and users report that they can't disable it.</p>
- <p>If you own one of these cars, have you
succeeded</em></ins></span> in <span class="removed"><del><strong>many
e-readers—not only</strong></del></span> <span
class="inserted"><ins><em>breaking</em></ins></span> the
- <span class="removed"><del><strong>Kindle:</strong></del></span>
- <span class="inserted"><ins><em>connectivity by disconnecting the cellular
modem, or wrapping the
- antenna in aluminum foil?</p>
+ <p>If you own one of these cars, have you succeeded in breaking the
+ connectivity</em></ins></span> by <span
class="removed"><del><strong>proprietary malware running on other
devices</strong></del></span> <span class="inserted"><ins><em>disconnecting the
cellular modem, or wrapping the
+ antenna</em></ins></span> in
+ <span class="removed"><del><strong>range so as</strong></del></span>
<span class="inserted"><ins><em>aluminum foil?</p>
</li>
<li id="M201811300">
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>In China, it is mandatory for electric
- cars to be equipped with a terminal that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span>
+ cars</em></ins></span> to <span class="removed"><del><strong>determine
that they are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads</strong></del></span> <span class="inserted"><ins><em>be
equipped</em></ins></span> with <span class="removed"><del><strong>Web
activity, and
+ other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
+ </li>
+ <li><p>Vizio “smart” TVs recognize
and</strong></del></span> <span class="inserted"><ins><em>a terminal
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if it isn't</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
transfers technical data, including car location,
- to a government-run platform</a>. In practice, <a
- href="/proprietary/proprietary-surveillance.html#car-spying">
+ to</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p>
+ </li>
+ <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>government-run platform</a>. In
practice,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching and listening all</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying">
manufacturers collect this data</a> as part of their own spying, then
- forward it to</em></ins></span> the <span
class="removed"><del><strong>user reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>government-run platform.</p></em></ins></span>
+ forward it to</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>government-run
platform.</p></em></ins></span>
</li>
-
- <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,”</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
<span class="inserted"><ins><em><li id="M201810230">
<!--#set var="DATE" value='<small
class="date-tag">2018-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>GM <a
- href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked</em></ins></span> the <span class="removed"><del><strong>e-reader
used</strong></del></span> <span class="inserted"><ins><em>choices of radio
programs</a> in its
- “connected” cars, minute</em></ins></span> by <span
class="removed"><del><strong>most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send</strong></del></span> <span
class="inserted"><ins><em>minute.</p>
-
- <p>GM did not get users' consent, but it could have got that easily
by
- sneaking it into the contract that users sign for some digital service
+ <p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
+ tracked</em></ins></span> the <span class="removed"><del><strong>internet
to another
+ company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>choices of radio programs</a> in its
+ “connected” cars, minute by minute.</p>
+
+ <p>GM did not get users' consent, but</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>could</em></ins></span> have <span
class="removed"><del><strong>to
+ give</strong></del></span> <span class="inserted"><ins><em>got that
easily by
+ sneaking</em></ins></span> it <span class="inserted"><ins><em>into the
contract that users sign for some digital service
or other. A requirement for consent is effectively no protection.</p>
- <p>The cars can also collect</em></ins></span> lots of <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>other data: listening</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
- needed</strong></del></span> <span class="inserted"><ins><em>you,
+ <p>The cars can also collect lots of other data: listening to you,
watching you, following your movements, tracking passengers' cell
phones. <em>All</em> such data collection should be
forbidden.</p>
- <p>But if you really want</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p></strong></del></span> <span
class="inserted"><ins><em>be safe, we must make sure the car's
- hardware cannot collect any of that data, or that the software
- is free so we know it won't collect any of that
data.</p></em></ins></span>
+ <p>But if you really want</em></ins></span> to <span
class="inserted"><ins><em>be safe, we must make sure</em></ins></span> the
<span class="removed"><del><strong>US</strong></del></span> <span
class="inserted"><ins><em>car's
+ hardware cannot collect any of that data,</em></ins></span> or <span
class="removed"><del><strong>some other government.</p>
+ <p>Speech recognition is not to be trusted unless
it</strong></del></span> <span class="inserted"><ins><em>that the
software</em></ins></span>
+ is <span class="removed"><del><strong>done
+ by</strong></del></span> free <span class="removed"><del><strong>software
in</strong></del></span> <span class="inserted"><ins><em>so we know it won't
collect any of that data.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
-
-<ul>
-<li><p>Computerized</strong></del></span>
- <span class="inserted"><ins><em><li id="M201711230">
+ <li id="M201711230">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>AI-powered driving apps can <a
href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p>
+ track</em></ins></span> your <span class="removed"><del><strong>own
computer.</p></strong></del></span> <span class="inserted"><ins><em>every
move</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Spyware
in</strong></del></span>
- <li id="M201607160">
+ <span class="inserted"><ins><em><li id="M201607160">
<!--#set var="DATE" value='<small
class="date-tag">2016-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p id="car-spying">Computerized</em></ins></span> cars with nonfree
software are <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"></em></ins></span>
+ <p id="car-spying">Computerized cars with nonfree software
are</em></ins></span> <a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a> reports what the user
watches,</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
snooping devices</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>The</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201602240">
+ <li id="M201602240">
<!--#set var="DATE" value='<small
class="date-tag">2016-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p id="nissan-modem">The</em></ins></span> Nissan Leaf has a built-in
- cell phone modem which allows effectively anyone <span
class="inserted"><ins><em>to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"></em></ins></span>
- access its computers remotely and make changes in various
+ <p id="nissan-modem">The Nissan Leaf has a built-in
+ cell phone modem which allows effectively anyone to <a
+ href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
+ access its computers remotely</em></ins></span> and
+ <span class="removed"><del><strong>the switch</strong></del></span>
<span class="inserted"><ins><em>make changes in various
settings</a>.</p>
- <p>That's easy to do because the system has no authentication
- when accessed through the modem. However, even if it asked
- for authentication, you couldn't be confident that Nissan
- has no access. The software in the car is proprietary, <a
- href="/philosophy/free-software-even-more-important.html">which means
- it demands blind faith from its users</a>.</p>
-
- <p>Even if no one connects to the car remotely, the cell <span
class="removed"><del><strong>phone
- modem enables the phone company to track the car's movements all
- the time; it is possible to physically remove the cell phone modem
- though.</p>
- </li>
+ <p>That's easy</em></ins></span> to <span
class="removed"><del><strong>turn this off</strong></del></span> <span
class="inserted"><ins><em>do because the system</em></ins></span> has no <span
class="removed"><del><strong>effect. (The fact that the
+ transmission reports a 404 error really means
nothing;</strong></del></span> <span class="inserted"><ins><em>authentication
+ when accessed through</em></ins></span> the <span
class="removed"><del><strong>server
+ could save that data anyway.)</p>
- <li><p>Proprietary software in cars
- <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available to car manufacturers, insurance companies, and
- others.</p>
+ <p>Even worse,</strong></del></span> <span
class="inserted"><ins><em>modem. However, even if</em></ins></span> it
+ <span class="removed"><del><strong><a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on</strong></del></span> <span
class="inserted"><ins><em>asked
+ for authentication, you couldn't be confident that Nissan
+ has no access. The software in</em></ins></span> the <span
class="removed"><del><strong>user's local network.</a></p>
- <p>The case of toll-collection systems, mentioned in this article,
is not
- really a matter of proprietary surveillance. These systems are an
- intolerable invasion of privacy, and should be replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>phone modem
- enables</em></ins></span> the <span class="removed"><del><strong>invasion
isn't done by malware. The other
- cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>phone company to track the car's movements all
the time;
- it is possible to physically remove</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
+ <p>LG later said it had installed a patch to stop this, but any
product
+ could spy this way.</p>
- <li><p>Tesla</strong></del></span> <span
class="inserted"><ins><em>cell phone modem, though.</p>
+ <p>Meanwhile, LG TVs</strong></del></span> <span
class="inserted"><ins><em>car is proprietary,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
</li>
+ <li>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they
wanted</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
means
+ it demands blind faith from its users</a>.</p>
- <li id="M201306140">
- <!--#set var="DATE" value='<small
class="date-tag">2013-06</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Tesla</em></ins></span> cars allow the company to extract
- data remotely and determine the car's location
- at any time. (See
- <span class="removed"><del><strong><a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"></strong></del></span>
Section 2, paragraphs b and <span
class="removed"><del><strong>c.</a>).</strong></del></span> <span
class="inserted"><ins><em>c of the <a
-
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- privacy statement</a>.)</em></ins></span> The company says it
doesn't store this
- information, but if the state orders it to get the data and hand it
- over, the state <span class="removed"><del><strong>can store it.</p>
+ <p>Even if no one connects</em></ins></span> to <span
class="removed"><del><strong>record.</a></p>
</li>
</ul>
-
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
+<!-- #SpywareAtPlay -->
<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+ <h3 id="SpywareAtPlay">Spyware at Play</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
</div>
<div style="clear: left;"></div>
<ul>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy on their
renters</a>.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
-</div>
-
-<p>Emo Phillips made a joke: The other day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li><p>More or less all “smart” TVs <a href="
-
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
+ <li><p>Many
+ <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users and
report</strong></del></span> <span class="inserted"><ins><em>the car remotely,
the cell phone modem
+ enables the phone company</em></ins></span> to <span
class="inserted"><ins><em>track</em></ins></span> the
+ <span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
- <p>The report was as of 2014, but we don't expect this has got
better.</p>
+ <p>A game console</strong></del></span> <span
class="inserted"><ins><em>car's movements all the time;
+ it</em></ins></span> is <span class="removed"><del><strong>a computer, and
you can't trust a computer with
+ a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>possible to physically remove the cell phone modem,
though.</p></em></ins></span>
+ </li>
- <p>This shows that laws requiring products to get users' formal
- consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent? Probably the TV
- will say, “Without your consent to tracking, the TV will
- not work.”</p>
+ <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps
+ <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of</strong></del></span>
- <p>Proper laws would say that TVs are not allowed to report what
- the user watches — no exceptions!</p>
- </li>
- <li><p>Vizio goes a step further than other TV manufacturers in
spying on
- their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so that advertisers can track you
- across devices.</p>
+ <span class="inserted"><ins><em><li id="M201306140">
+ <!--#set var="DATE" value='<small
class="date-tag">2013-06</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Tesla cars allow the company to extract</em></ins></span>
+ data <span class="removed"><del><strong>about their
users</strong></del></span> <span
class="inserted"><ins><em>remotely</em></ins></span> and <span
class="removed"><del><strong>their users'
+ friends</strong></del></span> <span class="inserted"><ins><em>determine
the car's location
+ at any time. (See Section 2, paragraphs b</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
- <p>It</strong></del></span> <span class="inserted"><ins><em>can
store it.</p>
+ <p>Even nastier, they do</strong></del></span> <span
class="inserted"><ins><em>c of the <a
+
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ privacy statement</a>.) The company says</em></ins></span> it <span
class="removed"><del><strong>through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
+ information, but if the state orders it to get</em></ins></span> the data
+ <span class="removed"><del><strong>collected by various
cr…apps</strong></del></span> and <span
class="removed"><del><strong>sites</strong></del></span> <span
class="inserted"><ins><em>hand it
+ over, the state can store it.</p>
</li>
<li id="M201303250">
@@ -3467,21 +3561,19 @@
--><!--#echo encoding="none" var="DATE" -->
<p id="records-drivers">Proprietary software in cars <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
- records information about drivers' movements</a>,
which</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>made
- available</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>car manufacturers, insurance companies, and
others.</p>
-
- <p>The case of toll-collection systems, mentioned
in</em></ins></span> this <span class="removed"><del><strong>off, but having it
enabled by default</strong></del></span> <span
class="inserted"><ins><em>article,</em></ins></span>
- is <span class="inserted"><ins><em>not really a matter of proprietary
surveillance. These systems
- are</em></ins></span> an <span class="removed"><del><strong>injustice
already.</p>
- </li>
+ records information about drivers' movements</a>, which
is</em></ins></span> made <span class="removed"><del><strong>by different
+ companies.</p>
- <li><p>Tivo's alliance</strong></del></span> <span
class="inserted"><ins><em>intolerable invasion of privacy, and should be
replaced</em></ins></span> with <span class="removed"><del><strong>Viacom adds
2.3 million households to
- the 600 millions social media profiles</strong></del></span>
- <span class="inserted"><ins><em>anonymous payment systems,
but</em></ins></span> the <span class="removed"><del><strong>company already
- monitors. Tivo customers</strong></del></span> <span
class="inserted"><ins><em>invasion isn't done by malware. The
- other cases mentioned</em></ins></span> are <span
class="removed"><del><strong>unaware they're being
watched</strong></del></span> <span
class="inserted"><ins><em>done</em></ins></span> by
- <span class="removed"><del><strong>advertisers. By combining TV viewing
information with online
- social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>proprietary malware in the car.</p>
+ <p>They use this data to manipulate people</strong></del></span>
+ <span class="inserted"><ins><em>available</em></ins></span> to <span
class="removed"><del><strong>buy things,</strong></del></span> <span
class="inserted"><ins><em>car manufacturers, insurance
companies,</em></ins></span> and <span class="removed"><del><strong>hunt
+ for “whales” who can be led to spend a
lot</strong></del></span> <span class="inserted"><ins><em>others.</p>
+
+ <p>The case</em></ins></span> of <span
class="removed"><del><strong>money. They
+ also use</strong></del></span> <span
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
+ is not really</em></ins></span> a <span class="removed"><del><strong>back
door</strong></del></span> <span class="inserted"><ins><em>matter of
proprietary surveillance. These systems
+ are an intolerable invasion of privacy, and should be replaced with
+ anonymous payment systems, but the invasion isn't done by malware. The
+ other cases mentioned are done by proprietary malware in the car.</p>
</li>
</ul>
@@ -3495,238 +3587,177 @@
<li id="M202008182">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Oculus headsets</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing
all</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require</em></ins></span>
- users to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>identify
themselves</em></ins></span> to <span class="removed"><del><strong>be
- picked up by proprietary malware running on other devices in
- range so as</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. This will give Facebook
- free rein</em></ins></span> to <span
class="removed"><del><strong>determine that they are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads with Web activity, and
- other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>pervasively snoop on Oculus
users.</p></em></ins></span>
+ <p>Oculus headsets <a
+
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
+ users</em></ins></span> to <span
class="removed"><del><strong>manipulate</strong></del></span> <span
class="inserted"><ins><em>identify themselves to Facebook</a>. This will
give Facebook
+ free rein to pervasively snoop on Oculus users.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and
- <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people are watching</a>,
- even if</strong></del></span>
- <span class="inserted"><ins><em><li id="M201612230">
+ <li id="M201612230">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>VR equipment, measuring every slight motion,
- creates the potential for the most intimate
- surveillance ever. All</em></ins></span> it <span
class="removed"><del><strong>isn't a TV channel.</p>
- </li>
- <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>takes to make this potential
real</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching and listening all</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
+ creates</em></ins></span> the <span class="removed"><del><strong>game play
for specific players.</p>
+
+ <p>While</strong></del></span> <span
class="inserted"><ins><em>potential for</em></ins></span> the <span
class="removed"><del><strong>article describes gratis games, games that cost
money</strong></del></span> <span class="inserted"><ins><em>most intimate
+ surveillance ever. All it takes to make this potential real <a
+
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
software as malicious as many other programs listed in this
page</a>.</p>
- <p>You can bet Facebook will implement</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>maximum possible
+ <p>You</em></ins></span> can <span
class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>bet Facebook will implement</em></ins></span> the
<span class="removed"><del><strong>same
tactics.</p></strong></del></span> <span
class="inserted"><ins><em>maximum possible
surveillance on Oculus Rift devices. The moral is, never trust a VR
system with nonfree software in it.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV
- <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
+
+<span class="removed"><del><strong><!-- #SpywareOnTheWeb
--></strong></del></span>
<div class="big-section">
- <h3 id="SpywareOnTheWeb">Spyware</em></ins></span> on the <span
class="removed"><del><strong>internet to another
- company, Nuance</a>. Nuance can save it and would then have to
- give</strong></del></span> <span class="inserted"><ins><em>Web</h3>
+ <h3 id="SpywareOnTheWeb">Spyware on the Web</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnTheWeb">#SpywareOnTheWeb</a>)</span>
</div>
<div style="clear: left;"></div>
<p>In addition, many web sites spy on their visitors. Web sites are not
- programs, so</em></ins></span> it
- <span class="inserted"><ins><em><a
href="/philosophy/network-services-arent-free-or-nonfree.html">
- makes no sense</em></ins></span> to <span class="removed"><del><strong>the
US</strong></del></span> <span class="inserted"><ins><em>call them
“free”</em></ins></span> or <span class="removed"><del><strong>some
other government.</p>
- <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>“proprietary”</a>,
- but the surveillance</em></ins></span> is <span
class="removed"><del><strong>not to be trusted unless</strong></del></span>
<span class="inserted"><ins><em>an abuse all the same.</p>
+ programs, so it
+ <a href="/philosophy/network-services-arent-free-or-nonfree.html">
+ makes no sense to call them “free” or
“proprietary”</a>,
+ but the surveillance is an abuse all the same.</p>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+
+ <li><p>Online</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201904210">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>As of April 2019,</em></ins></span> it is <span
class="removed"><del><strong>done
- by free software in your own computer.</p>
- </li>
- <li><p>Spyware in</strong></del></span> <a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports what the user
watches,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/">no
+ <p>As of April 2019, it is <a
+
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/">no
longer possible to disable an
unscrupulous tracking anti-feature</a> that <a
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
users when they follow ping links</a> in Apple Safari, Google Chrome,
- Opera, Microsoft Edge</em></ins></span> and <span
class="inserted"><ins><em>also in</em></ins></span> the <span
class="removed"><del><strong>switch</strong></del></span> <span
class="inserted"><ins><em>upcoming Microsoft Edge that is
- going</em></ins></span> to <span class="removed"><del><strong>turn this
off has no effect. (The fact</strong></del></span> <span
class="inserted"><ins><em>be based on Chromium.</p>
+ Opera, Microsoft Edge and also in the upcoming Microsoft Edge that is
+ going to be based on Chromium.</p>
</li>
<li id="M201901101">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Until 2015, any tweet</em></ins></span> that <span
class="removed"><del><strong>the
- transmission reports</strong></del></span> <span
class="inserted"><ins><em>listed</em></ins></span> a <span
class="removed"><del><strong>404 error really means
nothing;</strong></del></span> <span class="inserted"><ins><em>geographical tag
<a
+ <p>Until 2015, any tweet that listed a geographical tag <a
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/">
- sent</em></ins></span> the <span class="removed"><del><strong>server
- could save that data anyway.)</p>
-
- <p>Even worse, it</strong></del></span> <span
class="inserted"><ins><em>precise GPS location to Twitter's server</a>.
It still
+ sent the precise GPS location to Twitter's server</a>. It still
contains these GPS locations.</p>
</li>
<li id="M201805170">
<!--#set var="DATE" value='<small
class="date-tag">2018-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Storyful program</em></ins></span> <a <span
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies</em></ins></span>
- on the <span class="removed"><del><strong>user's local
network.</a></p>
-
- <p>LG later said it had installed</strong></del></span> <span
class="inserted"><ins><em>reporters that use it</a>.</p>
+ <p>The Storyful program <a
+
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies
+ on the reporters that use it</a>.</p>
</li>
<li id="M201701060">
<!--#set var="DATE" value='<small
class="date-tag">2017-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>When</em></ins></span> a <span class="removed"><del><strong>patch
to stop this, but any product
- could spy this way.</p>
-
- <p>Meanwhile, LG TVs</strong></del></span> <span
class="inserted"><ins><em>page uses Disqus
- for comments, the proprietary Disqus software</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">loads
- a Facebook software package into the browser</em></ins></span> of <span
class="removed"><del><strong>spying anyway</a>.</p>
- </li>
- <li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch,</strong></del></span> <span
class="inserted"><ins><em>every anonymous visitor
- to the page,</em></ins></span> and <span class="removed"><del><strong>even
what they wanted</strong></del></span> <span class="inserted"><ins><em>makes
the page's URL available</em></ins></span> to <span
class="removed"><del><strong>record.</a></p></strong></del></span>
<span class="inserted"><ins><em>Facebook</a>.</p></em></ins></span>
+ <p>When a page uses Disqus
+ for comments, the proprietary Disqus software <a
+
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">loads
+ a Facebook software package into the browser of every anonymous visitor
+ to the page, and makes the page's URL available to
Facebook</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-<!-- #SpywareAtPlay</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201612064">
+ <li id="M201612064">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareAtPlay">Spyware at Play</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Many
- <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users</strong></del></span>
- <span class="inserted"><ins><em><p>Online sales, with
tracking</em></ins></span> and <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>surveillance of customers, <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Online</em></ins></span> sales, with tracking and surveillance of
customers, <a
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
- businesses</em></ins></span> to <span class="inserted"><ins><em>show
different people different prices</a>. Most of</em></ins></span>
- the
- <span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
-
- <p>A game console</strong></del></span> <span
class="inserted"><ins><em>tracking</em></ins></span> is <span
class="removed"><del><strong>a computer, and you can't trust a
computer</strong></del></span> <span class="inserted"><ins><em>done by
recording interactions</em></ins></span> with
- <span class="removed"><del><strong>a nonfree operating
system.</p></strong></del></span> <span
class="inserted"><ins><em>servers, but
- proprietary software contributes.</p></em></ins></span>
+ businesses to show different people different prices</a>. Most of
+ the <span class="removed"><del><strong>tracking is done by recording
interactions with
+ servers, but proprietary software contributes.</p>
</li>
- <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps
- <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data about their users and
their</strong></del></span>
+ <li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
+ Baidu's Japanese-input and Chinese-input apps spy on
users.</a></p></strong></del></span> <span
class="inserted"><ins><em>tracking is done by recording interactions with
servers, but
+ proprietary software contributes.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201405140">
+ <li id="M201405140">
<!--#set var="DATE" value='<small
class="date-tag">2014-05</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
- Microsoft SkyDrive allows the NSA to directly examine</em></ins></span>
users'
- <span class="removed"><del><strong>friends and
associates</a>.</p>
-
- <p>Even nastier, they do it through ad</strong></del></span>
- <span class="inserted"><ins><em>data</a>.</p>
+ Microsoft SkyDrive allows the NSA to directly examine users'
+ data</a>.</p>
</li>
<li id="M201210240">
<!--#set var="DATE" value='<small
class="date-tag">2012-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many web sites rat their visitors to advertising</em></ins></span>
- networks that <span
class="removed"><del><strong>merge</strong></del></span> <span
class="inserted"><ins><em>track users. Of</em></ins></span> the <span
class="removed"><del><strong>data
- collected by various cr…apps and</strong></del></span> <span
class="inserted"><ins><em>top 1000 web sites, <a
+ <p>Many web sites rat their visitors to advertising
+ networks that track users. Of the top 1000 web sites, <a
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
(as of 5/17/2012) fed their visitors third-party cookies, allowing
- other</em></ins></span> sites <span class="removed"><del><strong>made by
different
- companies.</p>
-
- <p>They use this data</strong></del></span> to <span
class="removed"><del><strong>manipulate people</strong></del></span> <span
class="inserted"><ins><em>track them</a>.</p>
+ other sites to track them</a>.</p>
</li>
<li id="M201208210">
<!--#set var="DATE" value='<small
class="date-tag">2012-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many web sites report all their visitors</em></ins></span>
- to <span class="removed"><del><strong>buy things,</strong></del></span>
<span class="inserted"><ins><em>Google by using the Google Analytics service,
which <a
+ <p>Many web sites report all their visitors
+ to Google by using the Google Analytics service, which <a
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
- tells Google the IP address</em></ins></span> and <span
class="removed"><del><strong>hunt
- for “whales” who can be led</strong></del></span> <span
class="inserted"><ins><em>the page that was visited</a>.</p>
+ tells Google the IP address and the page that was
visited</a>.</p>
</li>
<li id="M201200000">
<!--#set var="DATE" value='<small
class="date-tag">[2012]</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many web sites try</em></ins></span> to <span
class="removed"><del><strong>spend a lot</strong></del></span> <span
class="inserted"><ins><em>collect users' address books (the user's
list</em></ins></span>
- of <span class="removed"><del><strong>money. They
- also use a back door to manipulate the game play for specific
players.</p>
-
- <p>While</strong></del></span> <span
class="inserted"><ins><em>other people's phone numbers or email addresses).
This violates</em></ins></span>
- the <span class="removed"><del><strong>article describes gratis games,
games</strong></del></span> <span class="inserted"><ins><em>privacy of those
other people.</p>
+ <p>Many web sites try to collect users' address books (the user's
list
+ of other people's phone numbers or email addresses). This violates
+ the privacy of those other people.</p></em></ins></span>
</li>
- <li id="M201110040">
+ <span
class="removed"><del><strong><li><p>Pages</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201110040">
<!--#set var="DATE" value='<small
class="date-tag">2011-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Pages that contain “Like” buttons <a
-
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
- enable Facebook to track visitors to those pages</a>—even
users</em></ins></span>
- that <span class="removed"><del><strong>cost money
- can use the same tactics.</p></strong></del></span> <span
class="inserted"><ins><em>don't have Facebook
accounts.</p></em></ins></span>
+ <p>Pages</em></ins></span> that contain “Like” buttons
<a <span
class="removed"><del><strong>href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"></em></ins></span>
+ enable Facebook to track visitors to those pages</a>—even users
+ that don't have Facebook accounts.</p>
</li>
-</ul>
-<span class="removed"><del><strong><!-- #SpywareOnTheWeb
--></strong></del></span>
+ <span
class="removed"><del><strong><li><p>Many</strong></del></span>
+<span class="inserted"><ins><em></ul>
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareOnTheWeb">Spyware on the
Web</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInJavaScript">JavaScript</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareOnTheWeb">#SpywareOnTheWeb</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInJavaScript">#SpywareInJavaScript</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 id="SpywareInJavaScript">JavaScript</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInJavaScript">#SpywareInJavaScript</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
-<p>In addition, many</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201811270">
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many</em></ins></span> web sites <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>use JavaScript code <a
+ <p>Many</em></ins></span> web sites <span
class="removed"><del><strong>rat</strong></del></span> <span
class="inserted"><ins><em>use JavaScript code <a
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- to snoop</em></ins></span> on <span class="inserted"><ins><em>information
that users have typed into a
- form but not sent</a>, in order to learn</em></ins></span> their
<span class="removed"><del><strong>visitors. Web sites</strong></del></span>
<span class="inserted"><ins><em>identity. Some</em></ins></span> are <span
class="removed"><del><strong>not
- programs, so it</strong></del></span> <a <span
class="removed"><del><strong>href="/philosophy/network-services-arent-free-or-nonfree.html">
- makes no sense</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege">
+ to snoop on information that users have typed into a
+ form but not sent</a>, in order to learn</em></ins></span> their
<span class="removed"><del><strong>visitors</strong></del></span> <span
class="inserted"><ins><em>identity. Some are <a
+
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege">
getting sued</a> for this.</p>
<p>The chat facilities of some customer services use the same sort of
- malware</em></ins></span> to <span class="removed"><del><strong>call them
“free” or “proprietary”</a>,
- but</strong></del></span> <span class="inserted"><ins><em><a
+ malware</em></ins></span> to <span
class="removed"><del><strong>advertising networks</strong></del></span> <span
class="inserted"><ins><em><a
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
- read what</em></ins></span> the <span
class="removed"><del><strong>surveillance</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> is <span
class="removed"><del><strong>an abuse</strong></del></span> <span
class="inserted"><ins><em>typing before it is posted</a>.</p>
+ read what the user is typing before it is posted</a>.</p>
</li>
<li id="M201807190">
@@ -3750,24 +3781,14 @@
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Some websites send
- JavaScript code to collect</em></ins></span> all the <span
class="removed"><del><strong>same.</p>
-
-<ul>
-
- <li><p>Online sales, with tracking and surveillance of
customers,</strong></del></span> <span class="inserted"><ins><em>user's
input,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
- businesses</strong></del></span>
- <span
class="inserted"><ins><em>href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
- can then be used</em></ins></span> to <span
class="removed"><del><strong>show different people different prices</a>.
Most
- of</strong></del></span> <span
class="inserted"><ins><em>reproduce</em></ins></span> the <span
class="removed"><del><strong>tracking is done by recording interactions with
- servers, but proprietary software
contributes.</p></strong></del></span> <span
class="inserted"><ins><em>whole session</a>.</p>
+ JavaScript code to collect all the user's input, <a
+
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
+ can then be used to reproduce the whole session</a>.</p>
- <p>If you use LibreJS, it will block that malicious JavaScript
- code.</p></em></ins></span>
+ <p>If you use LibreJS, it will block</em></ins></span> that <span
class="inserted"><ins><em>malicious JavaScript
+ code.</p>
</li>
-
- <span class="removed"><del><strong><li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
- Baidu's Japanese-input</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -3779,13 +3800,9 @@
<li id="M201310110">
<!--#set var="DATE" value='<small
class="date-tag">2013-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Flash</em></ins></span> and <span
class="removed"><del><strong>Chinese-input apps spy on
users.</a></p>
- </li>
-
- <li><p>Pages that contain “Like”
buttons</strong></del></span> <span class="inserted"><ins><em>JavaScript are
used for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
- enable Facebook</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices</a></em></ins></span> to <span
class="inserted"><ins><em>identify users.</p>
+ <p>Flash and JavaScript are used for <a
+
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ “fingerprinting” devices</a> to identify users.</p>
</li>
<li id="M201003010">
@@ -3793,7 +3810,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Flash Player's <a
href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/">
- cookie feature helps web sites</em></ins></span> track <span
class="removed"><del><strong>visitors</strong></del></span> <span
class="inserted"><ins><em>visitors</a>.</p>
+ cookie feature helps web sites</em></ins></span> track
+ <span class="removed"><del><strong>users. Of</strong></del></span>
<span class="inserted"><ins><em>visitors</a>.</p>
</li>
</ul>
@@ -3810,61 +3828,57 @@
<p>Google Chrome is an <a
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/">
instrument of surveillance</a>. It lets thousands of trackers invade
- users' computers and report the sites they visit</em></ins></span> to
<span class="removed"><del><strong>those
pages</a>—even</strong></del></span> <span
class="inserted"><ins><em>advertising and
- data companies, first of all to Google. Moreover, if</em></ins></span>
users <span class="removed"><del><strong>that don't</strong></del></span> have
<span class="removed"><del><strong>Facebook accounts.</p>
- </li>
-
- <li><p>Many web sites rat</strong></del></span> <span
class="inserted"><ins><em>a
+ users' computers and report the sites they visit to advertising and
+ data companies, first of all to Google. Moreover, if users have a
Gmail account, Chrome automatically logs them in to the browser for
- more convenient profiling. On Android, Chrome also
reports</em></ins></span> their <span
class="removed"><del><strong>visitors</strong></del></span>
- <span class="inserted"><ins><em>location to Google.</p>
+ more convenient profiling. On Android, Chrome also reports their
+ location to Google.</p>
- <p>The best way to escape surveillance is to
switch</em></ins></span> to <span class="removed"><del><strong>advertising
networks that track
- users. Of the top 1000 web sites,</strong></del></span> <a
- <span
class="removed"><del><strong>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
- (as</strong></del></span>
- <span
class="inserted"><ins><em>href="/software/icecat/">IceCat</a>, a
modified version</em></ins></span> of <span
class="removed"><del><strong>5/17/2012) fed their visitors third-party cookies,
allowing other
- sites</strong></del></span> <span class="inserted"><ins><em>Firefox
- with several changes</em></ins></span> to <span
class="removed"><del><strong>track
them</a>.</p></strong></del></span> <span
class="inserted"><ins><em>protect users' privacy.</p></em></ins></span>
+ <p>The best way to escape surveillance is to switch to <a
+ href="/software/icecat/">IceCat</a>, a modified version of Firefox
+ with several changes to protect users' privacy.</p>
</li>
- <span class="removed"><del><strong><li><p>Many web sites report
all their visitors to Google by using
- the Google Analytics service, which</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704131">
+ <li id="M201704131">
<!--#set var="DATE" value='<small
class="date-tag">2017-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Low-priced Chromebooks for schools are</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
- tells Google</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
+ <p>Low-priced Chromebooks for schools are <a
+ href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
collecting far more data on students than is necessary, and store
- it indefinitely</a>. Parents and students complain
about</em></ins></span> the <span class="removed"><del><strong>IP
address</strong></del></span> <span class="inserted"><ins><em>lack
- of transparency on the part of both the educational
services</em></ins></span> and the <span class="removed"><del><strong>page that
was visited.</a></p>
+ it indefinitely</a>. Parents and students complain about the lack
+ of transparency on the part of both the educational services and the
+ schools,</em></ins></span> the <span class="removed"><del><strong>top 1000
web sites, <a
+
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
+ (as</strong></del></span> <span
class="inserted"><ins><em>difficulty</em></ins></span> of <span
class="removed"><del><strong>5/17/2012) fed their visitors third-party cookies,
allowing</strong></del></span> <span class="inserted"><ins><em>opting out of
these services, and the lack
+ of proper privacy policies, among</em></ins></span> other
+ <span class="removed"><del><strong>sites to track
them</a>.</p>
</li>
- <li><p>Many web sites try to collect users' address books (the
- user's list</strong></del></span>
- <span class="inserted"><ins><em>schools, the difficulty</em></ins></span>
of <span class="removed"><del><strong>other people's phone numbers or email
addresses).
- This violates</strong></del></span> <span
class="inserted"><ins><em>opting out of these services, and</em></ins></span>
the <span class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>lack</em></ins></span>
- of <span class="removed"><del><strong>those</strong></del></span> <span
class="inserted"><ins><em>proper privacy policies, among</em></ins></span>
other <span class="removed"><del><strong>people.</p>
+ <li><p>Many web sites report all their visitors to Google by
using</strong></del></span> <span class="inserted"><ins><em>things.</p>
+
+ <p>But complaining is not sufficient. Parents, students and teachers
+ should realize that</em></ins></span> the <span
class="inserted"><ins><em>software</em></ins></span> Google <span
class="removed"><del><strong>Analytics service, which</strong></del></span>
<span class="inserted"><ins><em>uses to spy on students is
+ nonfree, so they can't verify what it really does. The only remedy is
+ to persuade school officials to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
+ tells Google</strong></del></span> <span
class="inserted"><ins><em>href="/education/edu-schools.html">
+ exclusively use free software</a> for both education and school
+ administration. If</em></ins></span> the <span
class="removed"><del><strong>IP address</strong></del></span> <span
class="inserted"><ins><em>school is run locally, parents</em></ins></span> and
<span class="inserted"><ins><em>teachers
+ can mandate their representatives at</em></ins></span> the <span
class="removed"><del><strong>page that was visited.</a></p>
</li>
- <li><p><a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
- Microsoft SkyDrive allows</strong></del></span> <span
class="inserted"><ins><em>things.</p>
+ <li><p>Many web sites try</strong></del></span> <span
class="inserted"><ins><em>School Board</em></ins></span> to <span
class="removed"><del><strong>collect users' address books (the
+ user's list of other people's phone numbers or email addresses).
+ This violates</strong></del></span> <span
class="inserted"><ins><em>refuse</em></ins></span> the <span
class="removed"><del><strong>privacy of those other people.</p>
+ </li>
- <p>But complaining is not sufficient. Parents, students and teachers
- should realize that</em></ins></span> the <span
class="removed"><del><strong>NSA to directly examine users'
data</a>.</p>
+ <li><p><a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
+ Microsoft SkyDrive allows</strong></del></span>
+ <span class="inserted"><ins><em>budget unless</em></ins></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>school initiates a switch</em></ins></span> to <span
class="removed"><del><strong>directly examine users' data</a>.</p>
</li>
</ul>
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>software Google uses</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection</strong></del></span>
<span class="inserted"><ins><em>students is
- nonfree, so they can't verify what it really does. The only remedy is
- to persuade school officials to <a
href="/education/edu-schools.html">
- exclusively use free software</a> for both education and school
- administration. If the school is run locally, parents and teachers
- can mandate their representatives at the School Board to refuse the
- budget unless the school initiates a switch to free software. If
- education is run nation-wide, they need to persuade legislators
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>free software. If
+ education is run nation-wide, they need</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each
subsection</strong></del></span> <span class="inserted"><ins><em>persuade
legislators
(e.g., through free software organizations, political parties,
etc.) to migrate the public schools to free software.</p>
</li>
@@ -3940,20 +3954,38 @@
<div style="clear: left;"></div>
<span class="removed"><del><strong><ul>
- <li><p>The natural extension of monitoring people through
- “their” phones</strong></del></span>
+ <li><p>The natural extension</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M202012250">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The HonorLock online exam
+ proctoring program is a surveillance tool that <a
+
href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps">tracks
+ students and collects data</a> such as face, driving license, and
+ network information, among others, in blatant violation of students'
+ privacy.</p>
+
+ <p>Preventing students from cheating should not be an excuse for
+ running malware/spyware on their computers, and it's good that students
+ are protesting. But their petitions overlook a crucial issue, namely,
+ the injustice</em></ins></span> of <span
class="removed"><del><strong>monitoring people through
+ “their” phones is <a
+
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary</strong></del></span> <span class="inserted"><ins><em>being
forced to run nonfree</em></ins></span> software <span
class="inserted"><ins><em>in order</em></ins></span> to <span
class="removed"><del><strong>make sure they can't
“fool”</strong></del></span>
+ <span class="inserted"><ins><em>get an education.</p>
+ </li>
+
<li id="M202009070">
<!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>While the world</em></ins></span> is <span
class="inserted"><ins><em>still
- struggling with COVID-19 coronavirus, many</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/">people
+ <p>While</em></ins></span> the
+ <span
class="removed"><del><strong>monitoring</a>.</p></strong></del></span>
<span class="inserted"><ins><em>world is still
+ struggling with COVID-19 coronavirus, many <a
+
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/">people
are in danger of surveillance</a> and their computers are infected
- with malware as a result of installing</em></ins></span> proprietary <span
class="removed"><del><strong>software to make sure they can't
“fool” the
- monitoring</a>.</p></strong></del></span> <span
class="inserted"><ins><em>software.</p></em></ins></span>
+ with malware as a result of installing proprietary
software.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
@@ -4087,7 +4119,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/02/06 16:03:04 $
+$Date: 2021/02/22 10:31:57 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.372
retrieving revision 1.373
diff -u -b -r1.372 -r1.373
--- proprietary-surveillance.ja.po 6 Feb 2021 14:33:06 -0000 1.372
+++ proprietary-surveillance.ja.po 22 Feb 2021 10:31:57 -0000 1.373
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -4322,6 +4322,24 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"While the world is still struggling with COVID-19 coronavirus, many <a href="
"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
"are in danger of surveillance</a> and their computers are infected with "
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.311
retrieving revision 1.312
diff -u -b -r1.311 -r1.312
--- proprietary-surveillance.pot 6 Feb 2021 14:33:06 -0000 1.311
+++ proprietary-surveillance.pot 22 Feb 2021 10:31:57 -0000 1.312
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -3496,6 +3496,23 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps\">tracks
"
+"students and collects data</a> such as face, driving license, and network "
+"information, among others, in blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"While the world is still struggling with COVID-19 coronavirus, many <a "
"href=\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people
"
"are in danger of surveillance</a> and their computers are infected with "
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.689
retrieving revision 1.690
diff -u -b -r1.689 -r1.690
--- proprietary-surveillance.ru.po 9 Feb 2021 05:32:09 -0000 1.689
+++ proprietary-surveillance.ru.po 22 Feb 2021 10:31:57 -0000 1.690
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-22 10:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -5172,6 +5173,24 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"While the world is still struggling with COVID-19 coronavirus, many <a href="
"\"https://mashable.com/article/privacy-in-the-age-of-coronavirus/\">people "
"are in danger of surveillance</a> and their computers are infected with "
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.227
retrieving revision 1.228
diff -u -b -r1.227 -r1.228
--- proprietary.de-diff.html 6 Feb 2021 14:33:06 -0000 1.227
+++ proprietary.de-diff.html 22 Feb 2021 10:31:58 -0000 1.228
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -58,10 +58,10 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
@@ -224,6 +224,23 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202012250">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The HonorLock online exam
+ proctoring program is a surveillance tool that <a
+
href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps">tracks
+ students and collects data</a> such as face, driving license, and
+ network information, among others, in blatant violation of students'
+ privacy.</p>
+
+ <p>Preventing students from cheating should not be an excuse for
+ running malware/spyware on their computers, and it's good that students
+ are protesting. But their petitions overlook a crucial issue, namely,
+ the injustice of being forced to run nonfree software in order to
+ get an education.</p>
+ </li>
+
<li id="M202102010">
<!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -273,20 +290,6 @@
wrongly refers to crackers as "<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p>
</li>
-
- <li id="M202101080">
- <!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a
-
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/">forcing
- its users to hand over sensitive personal data</a> to its parent
- company. This increases Facebook's power over users, and further
- jeopardizes people's privacy and security.</p>
-
- <p>Instead of WhatsApp you can use <a
- href="https://directory.fsf.org/wiki/Jami">GNU Jami</a>, which is
- free software and will not collect your data.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -350,7 +353,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/02/06 14:33:06 $
+$Date: 2021/02/22 10:31:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.263
retrieving revision 1.264
diff -u -b -r1.263 -r1.264
--- proprietary.de.po 6 Feb 2021 14:33:06 -0000 1.263
+++ proprietary.de.po 22 Feb 2021 10:31:58 -0000 1.264
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -480,6 +480,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many cr…apps, developed by various companies for various "
"organizations, do <a href=\"https://www.expressvpn.com/digital-security-lab/"
"investigation-xoth\"> location tracking unknown to those companies and those "
@@ -539,22 +557,6 @@
"Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/words-"
"to-avoid#Monetize\">âmonetarisierenâ</a> verwendet."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
-"\">GNU Jami</a>, which is free software and will not collect your data."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.399
retrieving revision 1.400
diff -u -b -r1.399 -r1.400
--- proprietary.es.po 7 Feb 2021 10:33:37 -0000 1.399
+++ proprietary.es.po 22 Feb 2021 10:31:58 -0000 1.400
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-22 10:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -341,6 +342,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many cr…apps, developed by various companies for various "
"organizations, do <a href=\"https://www.expressvpn.com/digital-security-lab/"
"investigation-xoth\"> location tracking unknown to those companies and those "
@@ -419,30 +438,6 @@
"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
"html#Hacker\">«<cite>hackers</cite>»</a>)</small>"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
-msgstr ""
-"Desde 2021, WhatsApp (una de las filiales de Facebook) está <a href="
-"\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-"
-"share-your-data-with-facebook-or-well-deactivate-your-account/\">obligando a "
-"sus usuarios a ceder datos personales sensibles</a> a su empresa matriz. "
-"Esto aumenta el poder de Facebook sobre sus usuarios, comprometiendo aún
más "
-"la privacidad y seguridad la gente."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
-"\">GNU Jami</a>, which is free software and will not collect your data."
-msgstr ""
-"En vez de WhatsApp puede utilizar <a href=\"https://directory.fsf.org/wiki/"
-"Jami\">GNU Jami</a>, que es software libre y no recopila sus datos."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -522,3 +517,26 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima actualización:"
+
+#~ msgid ""
+#~ "As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href="
+#~ "\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-"
+#~ "share-your-data-with-facebook-or-well-deactivate-your-account/\">forcing "
+#~ "its users to hand over sensitive personal data</a> to its parent company. "
+#~ "This increases Facebook's power over users, and further jeopardizes "
+#~ "people's privacy and security."
+#~ msgstr ""
+#~ "Desde 2021, WhatsApp (una de las filiales de Facebook) está <a href="
+#~ "\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-"
+#~ "share-your-data-with-facebook-or-well-deactivate-your-account/"
+#~ "\">obligando a sus usuarios a ceder datos personales sensibles</a> a su "
+#~ "empresa matriz. Esto aumenta el poder de Facebook sobre sus usuarios, "
+#~ "comprometiendo aún más la privacidad y seguridad la gente."
+
+#~ msgid ""
+#~ "Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/"
+#~ "Jami\">GNU Jami</a>, which is free software and will not collect your "
+#~ "data."
+#~ msgstr ""
+#~ "En vez de WhatsApp puede utilizar <a href=\"https://directory.fsf.org/"
+#~ "wiki/Jami\">GNU Jami</a>, que es software libre y no recopila sus datos."
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.445
retrieving revision 1.446
diff -u -b -r1.445 -r1.446
--- proprietary.fr.po 6 Feb 2021 16:22:45 -0000 1.445
+++ proprietary.fr.po 22 Feb 2021 10:31:58 -0000 1.446
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
"PO-Revision-Date: 2021-02-06 17:22+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-22 10:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -338,6 +339,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many cr…apps, developed by various companies for various "
"organizations, do <a href=\"https://www.expressvpn.com/digital-security-lab/"
"investigation-xoth\"> location tracking unknown to those companies and those "
@@ -414,31 +433,6 @@
"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
-msgstr ""
-"Ã compter de 2021, WhatsApp (l'une des filiales de Facebook) <a href="
-"\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-"
-"share-your-data-with-facebook-or-well-deactivate-your-account/\">force ses "
-"utilisateurs à communiquer des données personnelles sensibles</a> à la "
-"maison-mère. Ceci accroît le pouvoir de Facebook sur les utilisateurs et "
-"compromet un peu plus leur vie privée et leur sécurité."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
-"\">GNU Jami</a>, which is free software and will not collect your data."
-msgstr ""
-"Ã la place de WhatsApp, vous pouvez utiliser <a
href=\"https://directory.fsf."
-"org/wiki/Jami\">GNU Jami</a>, qui est un logiciel libre et respecte les "
-"libertés numériques de l'utilisateur."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -511,3 +505,27 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href="
+#~ "\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-"
+#~ "share-your-data-with-facebook-or-well-deactivate-your-account/\">forcing "
+#~ "its users to hand over sensitive personal data</a> to its parent company. "
+#~ "This increases Facebook's power over users, and further jeopardizes "
+#~ "people's privacy and security."
+#~ msgstr ""
+#~ "Ã compter de 2021, WhatsApp (l'une des filiales de Facebook) <a href="
+#~ "\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-"
+#~ "share-your-data-with-facebook-or-well-deactivate-your-account/\">force "
+#~ "ses utilisateurs à communiquer des données personnelles sensibles</a> Ã
"
+#~ "la maison-mère. Ceci accroît le pouvoir de Facebook sur les utilisateurs
"
+#~ "et compromet un peu plus leur vie privée et leur sécurité."
+
+#~ msgid ""
+#~ "Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/"
+#~ "Jami\">GNU Jami</a>, which is free software and will not collect your "
+#~ "data."
+#~ msgstr ""
+#~ "Ã la place de WhatsApp, vous pouvez utiliser <a href=\"https://directory."
+#~ "fsf.org/wiki/Jami\">GNU Jami</a>, qui est un logiciel libre et respecte "
+#~ "les libertés numériques de l'utilisateur."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.239
retrieving revision 1.240
diff -u -b -r1.239 -r1.240
--- proprietary.it-diff.html 6 Feb 2021 14:33:06 -0000 1.239
+++ proprietary.it-diff.html 22 Feb 2021 10:31:58 -0000 1.240
@@ -58,10 +58,9 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
@@ -71,8 +70,9 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width { width: 55em; }
-</style></em></ins></span>
+ .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -139,18 +139,18 @@
<td>
<ul class="columns">
<li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
- <li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
+ <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
@@ -223,6 +223,23 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202012250">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The HonorLock online exam
+ proctoring program is a surveillance tool that <a
+
href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps">tracks
+ students and collects data</a> such as face, driving license, and
+ network information, among others, in blatant violation of students'
+ privacy.</p>
+
+ <p>Preventing students from cheating should not be an excuse for
+ running malware/spyware on their computers, and it's good that students
+ are protesting. But their petitions overlook a crucial issue, namely,
+ the injustice of being forced to run nonfree software in order to
+ get an education.</p>
+ </li>
+
<li id="M202102010">
<!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -272,20 +289,6 @@
wrongly refers to crackers as "<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p>
</li>
-
- <li id="M202101080">
- <!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a
-
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/">forcing
- its users to hand over sensitive personal data</a> to its parent
- company. This increases Facebook's power over users, and further
- jeopardizes people's privacy and security.</p>
-
- <p>Instead of WhatsApp you can use <a
- href="https://directory.fsf.org/wiki/Jami">GNU Jami</a>, which is
- free software and will not collect your data.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -349,7 +352,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/02/06 14:33:06 $
+$Date: 2021/02/22 10:31:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.272
retrieving revision 1.273
diff -u -b -r1.272 -r1.273
--- proprietary.it.po 6 Feb 2021 14:33:06 -0000 1.272
+++ proprietary.it.po 22 Feb 2021 10:31:58 -0000 1.273
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -485,6 +485,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many cr…apps, developed by various companies for various "
"organizations, do <a href=\"https://www.expressvpn.com/digital-security-lab/"
"investigation-xoth\"> location tracking unknown to those companies and those "
@@ -533,22 +551,6 @@
"\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
-"\">GNU Jami</a>, which is free software and will not collect your data."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.244
retrieving revision 1.245
diff -u -b -r1.244 -r1.245
--- proprietary.ja-diff.html 6 Feb 2021 14:33:06 -0000 1.244
+++ proprietary.ja-diff.html 22 Feb 2021 10:31:58 -0000 1.245
@@ -56,14 +56,14 @@
#TOC ul { padding-top: .5em; margin: 0; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none; }
#TOC a:hover { text-decoration: underline;</em></ins></span> }
-->
</style>
@@ -173,14 +173,14 @@
<td>
<ul>
<li><a
href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
- <li><a
href="/proprietary/malware-games.html">Games</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li>
<li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
<li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
<li><a
href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <ul>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
<li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
<li><a
href="/proprietary/malware-apple.html">Apple</a></li>
<li><a
href="/proprietary/malware-google.html">Google</a></li>
@@ -205,10 +205,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -228,6 +228,23 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202012250">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The HonorLock online exam
+ proctoring program is a surveillance tool that <a
+
href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps">tracks
+ students and collects data</a> such as face, driving license, and
+ network information, among others, in blatant violation of students'
+ privacy.</p>
+
+ <p>Preventing students from cheating should not be an excuse for
+ running malware/spyware on their computers, and it's good that students
+ are protesting. But their petitions overlook a crucial issue, namely,
+ the injustice of being forced to run nonfree software in order to
+ get an education.</p>
+ </li>
+
<li id="M202102010">
<!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -277,20 +294,6 @@
wrongly refers to crackers as "<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p>
</li>
-
- <li id="M202101080">
- <!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a
-
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/">forcing
- its users to hand over sensitive personal data</a> to its parent
- company. This increases Facebook's power over users, and further
- jeopardizes people's privacy and security.</p>
-
- <p>Instead of WhatsApp you can use <a
- href="https://directory.fsf.org/wiki/Jami">GNU Jami</a>, which is
- free software and will not collect your data.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -354,7 +357,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/02/06 14:33:06 $
+$Date: 2021/02/22 10:31:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.256
retrieving revision 1.257
diff -u -b -r1.256 -r1.257
--- proprietary.ja.po 6 Feb 2021 14:33:06 -0000 1.256
+++ proprietary.ja.po 22 Feb 2021 10:31:58 -0000 1.257
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -343,6 +343,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many cr…apps, developed by various companies for various "
"organizations, do <a href=\"https://www.expressvpn.com/digital-security-lab/"
"investigation-xoth\"> location tracking unknown to those companies and those "
@@ -391,22 +409,6 @@
"\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
-"\">GNU Jami</a>, which is free software and will not collect your data."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.240
retrieving revision 1.241
diff -u -b -r1.240 -r1.241
--- proprietary.nl-diff.html 6 Feb 2021 14:33:06 -0000 1.240
+++ proprietary.nl-diff.html 22 Feb 2021 10:31:58 -0000 1.241
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -58,10 +58,10 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
@@ -199,10 +199,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -223,6 +223,23 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202012250">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The HonorLock online exam
+ proctoring program is a surveillance tool that <a
+
href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps">tracks
+ students and collects data</a> such as face, driving license, and
+ network information, among others, in blatant violation of students'
+ privacy.</p>
+
+ <p>Preventing students from cheating should not be an excuse for
+ running malware/spyware on their computers, and it's good that students
+ are protesting. But their petitions overlook a crucial issue, namely,
+ the injustice of being forced to run nonfree software in order to
+ get an education.</p>
+ </li>
+
<li id="M202102010">
<!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -272,20 +289,6 @@
wrongly refers to crackers as "<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p>
</li>
-
- <li id="M202101080">
- <!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a
-
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/">forcing
- its users to hand over sensitive personal data</a> to its parent
- company. This increases Facebook's power over users, and further
- jeopardizes people's privacy and security.</p>
-
- <p>Instead of WhatsApp you can use <a
- href="https://directory.fsf.org/wiki/Jami">GNU Jami</a>, which is
- free software and will not collect your data.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -349,7 +352,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/02/06 14:33:06 $
+$Date: 2021/02/22 10:31:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.246
retrieving revision 1.247
diff -u -b -r1.246 -r1.247
--- proprietary.nl.po 6 Feb 2021 14:33:06 -0000 1.246
+++ proprietary.nl.po 22 Feb 2021 10:31:58 -0000 1.247
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -388,6 +388,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many cr…apps, developed by various companies for various "
"organizations, do <a href=\"https://www.expressvpn.com/digital-security-lab/"
"investigation-xoth\"> location tracking unknown to those companies and those "
@@ -436,22 +454,6 @@
"\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
-"\">GNU Jami</a>, which is free software and will not collect your data."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.257
retrieving revision 1.258
diff -u -b -r1.257 -r1.258
--- proprietary.pl-diff.html 6 Feb 2021 14:33:06 -0000 1.257
+++ proprietary.pl-diff.html 22 Feb 2021 10:31:58 -0000 1.258
@@ -167,11 +167,11 @@
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li>
<li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
- <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
- <li><a
href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
+ <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
<ul></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
@@ -222,6 +222,23 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202012250">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The HonorLock online exam
+ proctoring program is a surveillance tool that <a
+
href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps">tracks
+ students and collects data</a> such as face, driving license, and
+ network information, among others, in blatant violation of students'
+ privacy.</p>
+
+ <p>Preventing students from cheating should not be an excuse for
+ running malware/spyware on their computers, and it's good that students
+ are protesting. But their petitions overlook a crucial issue, namely,
+ the injustice of being forced to run nonfree software in order to
+ get an education.</p>
+ </li>
+
<li id="M202102010">
<!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -271,20 +288,6 @@
wrongly refers to crackers as "<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p>
</li>
-
- <li id="M202101080">
- <!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a
-
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/">forcing
- its users to hand over sensitive personal data</a> to its parent
- company. This increases Facebook's power over users, and further
- jeopardizes people's privacy and security.</p>
-
- <p>Instead of WhatsApp you can use <a
- href="https://directory.fsf.org/wiki/Jami">GNU Jami</a>, which is
- free software and will not collect your data.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -348,7 +351,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/02/06 14:33:06 $
+$Date: 2021/02/22 10:31:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.239
retrieving revision 1.240
diff -u -b -r1.239 -r1.240
--- proprietary.pl.po 6 Feb 2021 14:33:06 -0000 1.239
+++ proprietary.pl.po 22 Feb 2021 10:31:58 -0000 1.240
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -569,6 +569,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many cr…apps, developed by various companies for various "
"organizations, do <a href=\"https://www.expressvpn.com/digital-security-lab/"
"investigation-xoth\"> location tracking unknown to those companies and those "
@@ -617,22 +635,6 @@
"\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
-"\">GNU Jami</a>, which is free software and will not collect your data."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.236
retrieving revision 1.237
diff -u -b -r1.236 -r1.237
--- proprietary.pot 6 Feb 2021 14:33:07 -0000 1.236
+++ proprietary.pot 22 Feb 2021 10:31:58 -0000 1.237
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -280,6 +280,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps\">tracks
"
+"students and collects data</a> such as face, driving license, and network "
+"information, among others, in blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many cr…apps, developed by various companies for various "
"organizations, do <a "
"href=\"https://www.expressvpn.com/digital-security-lab/investigation-xoth\"> "
@@ -328,22 +345,6 @@
"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a "
-"href=\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/\">forcing
"
-"its users to hand over sensitive personal data</a> to its parent "
-"company. This increases Facebook's power over users, and further jeopardizes "
-"people's privacy and security."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a "
-"href=\"https://directory.fsf.org/wiki/Jami\">GNU Jami</a>, which is free "
-"software and will not collect your data."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.388
retrieving revision 1.389
diff -u -b -r1.388 -r1.389
--- proprietary.pt-br.po 7 Feb 2021 19:01:05 -0000 1.388
+++ proprietary.pt-br.po 22 Feb 2021 10:31:58 -0000 1.389
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
"PO-Revision-Date: 2021-02-07 15:33-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-22 10:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1)\n"
"X-Generator: Gtranslator 3.38.0\n"
@@ -335,6 +336,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many cr…apps, developed by various companies for various "
"organizations, do <a href=\"https://www.expressvpn.com/digital-security-lab/"
"investigation-xoth\"> location tracking unknown to those companies and those "
@@ -412,30 +431,6 @@
"como â<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>â.)</"
"small>"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
-msgstr ""
-"Em 2021, o WhatsApp (uma das subsidiárias do Facebook) está <a href="
-"\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-"
-"share-your-data-with-facebook-or-well-deactivate-your-account/\">forçando "
-"seus usuários a entregar dados pessoais confidenciais</a> para sua empresa-"
-"mãe. Isso aumenta o poder do Facebook sobre os usuários e prejudica ainda "
-"mais a privacidade e a segurança das pessoas."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
-"\">GNU Jami</a>, which is free software and will not collect your data."
-msgstr ""
-"Em vez do WhatsApp, você pode usar o <a href=\"https://directory.fsf.org/"
-"wiki/Jami\">GNU Jami</a>, que é um software livre e não coleta seus dados."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -511,6 +506,29 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href="
+#~ "\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-"
+#~ "share-your-data-with-facebook-or-well-deactivate-your-account/\">forcing "
+#~ "its users to hand over sensitive personal data</a> to its parent company. "
+#~ "This increases Facebook's power over users, and further jeopardizes "
+#~ "people's privacy and security."
+#~ msgstr ""
+#~ "Em 2021, o WhatsApp (uma das subsidiárias do Facebook) está <a href="
+#~ "\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-"
+#~ "share-your-data-with-facebook-or-well-deactivate-your-account/\">forçando
"
+#~ "seus usuários a entregar dados pessoais confidenciais</a> para sua "
+#~ "empresa-mãe. Isso aumenta o poder do Facebook sobre os usuários e "
+#~ "prejudica ainda mais a privacidade e a segurança das pessoas."
+
+#~ msgid ""
+#~ "Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/"
+#~ "Jami\">GNU Jami</a>, which is free software and will not collect your "
+#~ "data."
+#~ msgstr ""
+#~ "Em vez do WhatsApp, você pode usar o <a href=\"https://directory.fsf.org/"
+#~ "wiki/Jami\">GNU Jami</a>, que é um software livre e não coleta seus
dados."
+
+#~ msgid ""
#~ "The personal finance management software “Quicken” <a href="
#~ "\"https://www.quicken.com/support/quicken-discontinuation-policy\"> has a "
#~ "discontinuation policy, a.k.a. planned obsolescence</a>, which is an "
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.470
retrieving revision 1.471
diff -u -b -r1.470 -r1.471
--- proprietary.ru.po 9 Feb 2021 05:32:09 -0000 1.470
+++ proprietary.ru.po 22 Feb 2021 10:31:58 -0000 1.471
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-22 10:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -340,6 +341,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many cr…apps, developed by various companies for various "
"organizations, do <a href=\"https://www.expressvpn.com/digital-security-lab/"
"investigation-xoth\"> location tracking unknown to those companies and those "
@@ -415,31 +434,6 @@
"html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ "
"взломÑиков.)</small>"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
-msgstr ""
-"Ðа 2021 год WhatsApp (один из Ñилиалов Facebook) <a
href=\"https://www."
-"forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-"
-"with-facebook-or-well-deactivate-your-account/\">пÑинÑждаеÑ
ÑвоиÑ
"
-"полÑзоваÑелей вÑдаваÑÑ ÐºÐ¾Ð½ÑиденÑиалÑнÑе
пеÑÑоналÑнÑе даннÑе</a> ÑодиÑелÑÑкой "
-"компании. ÐÑо ÑÑÐ¸Ð»Ð¸Ð²Ð°ÐµÑ Ð²Ð»Ð°ÑÑÑ Facebook над
полÑзоваÑелÑми и еÑе более "
-"подÑÑÐ²Ð°ÐµÑ Ð½ÐµÐ¿ÑикоÑновенноÑÑÑ Ð»Ð¸Ñной
жизни и безопаÑноÑÑÑ Ð»Ñдей."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
-"\">GNU Jami</a>, which is free software and will not collect your data."
-msgstr ""
-"ÐмеÑÑо WhatsApp Ð²Ñ Ð¼Ð¾Ð¶ÐµÑе полÑзоваÑÑÑÑ <a
href=\"https://directory.fsf.org/"
-"wiki/Jami\">GNU Jami</a>, ÑÑо ÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¿ÑогÑамма,
она не бÑÐ´ÐµÑ ÑобиваÑÑ "
-"ваÑи даннÑе."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -516,6 +510,30 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href="
+#~ "\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-"
+#~ "share-your-data-with-facebook-or-well-deactivate-your-account/\">forcing "
+#~ "its users to hand over sensitive personal data</a> to its parent company. "
+#~ "This increases Facebook's power over users, and further jeopardizes "
+#~ "people's privacy and security."
+#~ msgstr ""
+#~ "Ðа 2021 год WhatsApp (один из Ñилиалов Facebook) <a
href=\"https://www."
+#~ "forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+#~ "data-with-facebook-or-well-deactivate-your-account/\">пÑинÑждаеÑ
ÑвоиÑ
"
+#~ "полÑзоваÑелей вÑдаваÑÑ
конÑиденÑиалÑнÑе пеÑÑоналÑнÑе даннÑе</a> "
+#~ "ÑодиÑелÑÑкой компании. ÐÑо ÑÑиливаеÑ
влаÑÑÑ Facebook над полÑзоваÑелÑми и "
+#~ "еÑе более подÑÑÐ²Ð°ÐµÑ Ð½ÐµÐ¿ÑикоÑновенноÑÑÑ
лиÑной жизни и безопаÑноÑÑÑ Ð»Ñдей."
+
+#~ msgid ""
+#~ "Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/"
+#~ "Jami\">GNU Jami</a>, which is free software and will not collect your "
+#~ "data."
+#~ msgstr ""
+#~ "ÐмеÑÑо WhatsApp Ð²Ñ Ð¼Ð¾Ð¶ÐµÑе полÑзоваÑÑÑÑ <a
href=\"https://directory.fsf."
+#~ "org/wiki/Jami\">GNU Jami</a>, ÑÑо ÑвободнаÑ
пÑогÑамма, она не бÑÐ´ÐµÑ "
+#~ "ÑобиваÑÑ Ð²Ð°Ñи даннÑе."
+
+#~ msgid ""
#~ "Many popular mobile games include a random-reward system called <a href="
#~ "\"#gacha\"><i>gacha</i></a> which is especially effective on children. "
#~ "One variant of gacha was declared illegal in Japan in 2012, but the other "
Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary.tr.po 7 Feb 2021 08:07:08 -0000 1.122
+++ proprietary.tr.po 22 Feb 2021 10:31:58 -0000 1.123
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
"PO-Revision-Date: 2021-02-07 09:05+0100\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-22 10:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Poedit 2.4.1\n"
@@ -336,6 +337,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many cr…apps, developed by various companies for various "
"organizations, do <a href=\"https://www.expressvpn.com/digital-security-lab/"
"investigation-xoth\"> location tracking unknown to those companies and those "
@@ -413,30 +432,6 @@
"philosophy/words-to-avoid.html#Hacker\">üstât (hacker)</a>\" olarak "
"adlandırdıÄını belirtmek isteriz)</small>"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
-msgstr ""
-"2021 itibariyle WhatsApp (Facebook'un iÅtiraklerinden biri),
kullanıcılarını "
-"ana kuruluÅa <a href=\"https://www.forbes.com/sites/carlypage/2021/01/08/"
-"whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-"
-"account/\">hassas kiÅisel verilerini teslim etmeye zorluyor</a>. Bu "
-"Facebook'un kullanıcılar üzerindeki iktidarını arttırdıÄı gibi "
-"kullanıcıların gizlilik ve güvenliÄini tehlikeye sokar."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
-"\">GNU Jami</a>, which is free software and will not collect your data."
-msgstr ""
-"WhatsApp yerine <a href=\"https://directory.fsf.org/wiki/Jami\">GNU Jami</a> "
-"kullanabilirsiniz, özgür bir yazılımdır ve verinizi toplamaz."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -518,6 +513,29 @@
msgstr "Son Güncelleme:"
#~ msgid ""
+#~ "As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href="
+#~ "\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-"
+#~ "share-your-data-with-facebook-or-well-deactivate-your-account/\">forcing "
+#~ "its users to hand over sensitive personal data</a> to its parent company. "
+#~ "This increases Facebook's power over users, and further jeopardizes "
+#~ "people's privacy and security."
+#~ msgstr ""
+#~ "2021 itibariyle WhatsApp (Facebook'un iÅtiraklerinden biri), "
+#~ "kullanıcılarını ana kuruluÅa <a href=\"https://www.forbes.com/sites/"
+#~ "carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-"
+#~ "or-well-deactivate-your-account/\">hassas kiÅisel verilerini teslim "
+#~ "etmeye zorluyor</a>. Bu Facebook'un kullanıcılar üzerindeki
iktidarını "
+#~ "arttırdıÄı gibi kullanıcıların gizlilik ve güvenliÄini tehlikeye
sokar."
+
+#~ msgid ""
+#~ "Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/"
+#~ "Jami\">GNU Jami</a>, which is free software and will not collect your "
+#~ "data."
+#~ msgstr ""
+#~ "WhatsApp yerine <a href=\"https://directory.fsf.org/wiki/Jami\">GNU Jami</"
+#~ "a> kullanabilirsiniz, özgür bir yazılımdır ve verinizi toplamaz."
+
+#~ msgid ""
#~ "Many popular mobile games include a random-reward system called <a href="
#~ "\"#gacha\"><i>gacha</i></a> which is especially effective on children. "
#~ "One variant of gacha was declared illegal in Japan in 2012, but the other "
Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- proprietary.zh-cn.po 9 Feb 2021 07:31:38 -0000 1.154
+++ proprietary.zh-cn.po 22 Feb 2021 10:31:58 -0000 1.155
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
"PO-Revision-Date: 2021-02-09 15:10+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-02-22 10:25+0000\n"
"X-Generator: Poedit 2.3\n"
#. type: Content of: <title>
@@ -315,6 +316,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many cr…apps, developed by various companies for various "
"organizations, do <a href=\"https://www.expressvpn.com/digital-security-lab/"
"investigation-xoth\"> location tracking unknown to those companies and those "
@@ -383,29 +402,6 @@
"<small>ï¼è¯·æ³¨æï¼æ¬æé误å°å° <a
href=\"/philosophy/words-to-avoid."
"html#Hacker\">é»å®¢</a> ä¸è¯å½æéªå®¢æ¥ç¨ãï¼</small>"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
-msgstr ""
-"å¨ 2021ï¼WhatsAppï¼Facebook çä¸ä¸ªä¸å±æºæï¼<a
href=\"https://www.forbes.com/"
-"sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-"
-"facebook-or-well-deactivate-your-account/\">强å¶å
¶ç¨æ·æ交ä»ä»¬çææ个人æ°æ®"
-"</a> ç»å
¶æ¯å
¬å¸ãè¿å°±å¢å¼ºäº Facebook
对ç¨æ·çæ§å¶åï¼å¹¶è¿ä¸æ¥ä¾µå®³äºäººä»¬çéç§"
-"åå®å
¨ã"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
-"\">GNU Jami</a>, which is free software and will not collect your data."
-msgstr ""
-"ä¸ç¨ WhatsAppï¼ä½ å¯ä»¥ç¨ <a
href=\"https://directory.fsf.org/wiki/Jami\">GNU "
-"Jami</a>ï¼è¿æ¯ä¸ä¸ªèªç±è½¯ä»¶ï¼å®ä¸ä¼æéä½ çæ°æ®ã"
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -491,6 +487,28 @@
msgstr "æåæ´æ°ï¼"
#~ msgid ""
+#~ "As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href="
+#~ "\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-"
+#~ "share-your-data-with-facebook-or-well-deactivate-your-account/\">forcing "
+#~ "its users to hand over sensitive personal data</a> to its parent company. "
+#~ "This increases Facebook's power over users, and further jeopardizes "
+#~ "people's privacy and security."
+#~ msgstr ""
+#~ "å¨ 2021ï¼WhatsAppï¼Facebook çä¸ä¸ªä¸å±æºæï¼<a
href=\"https://www.forbes."
+#~ "com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-"
+#~ "facebook-or-well-deactivate-your-account/\">强å¶å
¶ç¨æ·æ交ä»ä»¬çææ个人æ°"
+#~ "æ®</a> ç»å
¶æ¯å
¬å¸ãè¿å°±å¢å¼ºäº Facebook
对ç¨æ·çæ§å¶åï¼å¹¶è¿ä¸æ¥ä¾µå®³äºäººä»¬"
+#~ "çéç§åå®å
¨ã"
+
+#~ msgid ""
+#~ "Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/"
+#~ "Jami\">GNU Jami</a>, which is free software and will not collect your "
+#~ "data."
+#~ msgstr ""
+#~ "ä¸ç¨ WhatsAppï¼ä½ å¯ä»¥ç¨ <a
href=\"https://directory.fsf.org/wiki/Jami"
+#~ "\">GNU Jami</a>ï¼è¿æ¯ä¸ä¸ªèªç±è½¯ä»¶ï¼å®ä¸ä¼æéä½
çæ°æ®ã"
+
+#~ msgid ""
#~ "Many popular mobile games include a random-reward system called <a href="
#~ "\"#gacha\"><i>gacha</i></a> which is especially effective on children. "
#~ "One variant of gacha was declared illegal in Japan in 2012, but the other "
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.220
retrieving revision 1.221
diff -u -b -r1.220 -r1.221
--- proprietary.zh-tw-diff.html 6 Feb 2021 14:33:07 -0000 1.220
+++ proprietary.zh-tw-diff.html 22 Feb 2021 10:31:58 -0000 1.221
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -58,10 +58,10 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
@@ -224,6 +224,23 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202012250">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The HonorLock online exam
+ proctoring program is a surveillance tool that <a
+
href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps">tracks
+ students and collects data</a> such as face, driving license, and
+ network information, among others, in blatant violation of students'
+ privacy.</p>
+
+ <p>Preventing students from cheating should not be an excuse for
+ running malware/spyware on their computers, and it's good that students
+ are protesting. But their petitions overlook a crucial issue, namely,
+ the injustice of being forced to run nonfree software in order to
+ get an education.</p>
+ </li>
+
<li id="M202102010">
<!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -273,20 +290,6 @@
wrongly refers to crackers as "<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p>
</li>
-
- <li id="M202101080">
- <!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a
-
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/">forcing
- its users to hand over sensitive personal data</a> to its parent
- company. This increases Facebook's power over users, and further
- jeopardizes people's privacy and security.</p>
-
- <p>Instead of WhatsApp you can use <a
- href="https://directory.fsf.org/wiki/Jami">GNU Jami</a>, which is
- free software and will not collect your data.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -350,7 +353,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/02/06 14:33:07 $
+$Date: 2021/02/22 10:31:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.226
retrieving revision 1.227
diff -u -b -r1.226 -r1.227
--- proprietary.zh-tw.po 6 Feb 2021 14:33:07 -0000 1.226
+++ proprietary.zh-tw.po 22 Feb 2021 10:31:58 -0000 1.227
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-02-06 14:26+0000\n"
+"POT-Creation-Date: 2021-02-22 10:25+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -458,6 +458,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Many cr…apps, developed by various companies for various "
"organizations, do <a href=\"https://www.expressvpn.com/digital-security-lab/"
"investigation-xoth\"> location tracking unknown to those companies and those "
@@ -506,22 +524,6 @@
"\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
-"\">GNU Jami</a>, which is free software and will not collect your data."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.356
retrieving revision 1.357
diff -u -b -r1.356 -r1.357
--- pt-br.po 7 Feb 2021 19:01:05 -0000 1.356
+++ pt-br.po 22 Feb 2021 10:31:58 -0000 1.357
@@ -9397,33 +9397,21 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
msgstr ""
-"Em 2021, o WhatsApp (uma das subsidiárias do Facebook) está <a href="
-"\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-"
-"share-your-data-with-facebook-or-well-deactivate-your-account/\">forçando "
-"seus usuários a entregar dados pessoais confidenciais</a> para sua empresa-"
-"mãe. Isso aumenta o poder do Facebook sobre os usuários e prejudica ainda "
-"mais a privacidade e a segurança das pessoas."
#. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "People can play <a href=\"https://directory.fsf.org/wiki/Minetest"
-#| "\">Minetest</a> instead. Minetest is free software and respects the "
-#| "user's computer freedom."
msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
msgstr ""
-"As pessoas podem jogar <a href=\"https://directory.fsf.org/wiki/Minetest"
-"\">Minetest</a> em vez disso. Minetest é um software livre e respeita a "
-"liberdade de computação do usuário."
#
#. TRANSLATORS: Ignore the original text in this paragraph,
@@ -9966,6 +9954,36 @@
"\">#SpywareInTelephones</a>)</span>"
msgstr ""
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+"Em 2021, o WhatsApp (uma das subsidiárias do Facebook) está <a href="
+"\"https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-"
+"share-your-data-with-facebook-or-well-deactivate-your-account/\">forçando "
+"seus usuários a entregar dados pessoais confidenciais</a> para sua empresa-"
+"mãe. Isso aumenta o poder do Facebook sobre os usuários e prejudica ainda "
+"mais a privacidade e a segurança das pessoas."
+
+#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "People can play <a href=\"https://directory.fsf.org/wiki/Minetest"
+#| "\">Minetest</a> instead. Minetest is free software and respects the "
+#| "user's computer freedom."
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+"As pessoas podem jogar <a href=\"https://directory.fsf.org/wiki/Minetest"
+"\">Minetest</a> em vez disso. Minetest é um software livre e respeita a "
+"liberdade de computação do usuário."
+
#. type: Content of: <div><div><div><h4>
msgid "iThings"
msgstr ""
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.603
retrieving revision 1.604
diff -u -b -r1.603 -r1.604
--- ru.po 9 Feb 2021 06:01:29 -0000 1.603
+++ ru.po 22 Feb 2021 10:31:58 -0000 1.604
@@ -11250,28 +11250,21 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
msgstr ""
-"Ðа 2021 год WhatsApp (один из Ñилиалов Facebook) <a
href=\"https://www."
-"forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-"
-"with-facebook-or-well-deactivate-your-account/\">пÑинÑждаеÑ
ÑвоиÑ
"
-"полÑзоваÑелей вÑдаваÑÑ ÐºÐ¾Ð½ÑиденÑиалÑнÑе
пеÑÑоналÑнÑе даннÑе</a> ÑодиÑелÑÑкой "
-"компании. ÐÑо ÑÑÐ¸Ð»Ð¸Ð²Ð°ÐµÑ Ð²Ð»Ð°ÑÑÑ Facebook над
полÑзоваÑелÑми и еÑе более "
-"подÑÑÐ²Ð°ÐµÑ Ð½ÐµÐ¿ÑикоÑновенноÑÑÑ Ð»Ð¸Ñной
жизни и безопаÑноÑÑÑ Ð»Ñдей."
#. type: Content of: <div><ul><li><p>
msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
msgstr ""
-"ÐмеÑÑо WhatsApp Ð²Ñ Ð¼Ð¾Ð¶ÐµÑе полÑзоваÑÑÑÑ <a
href=\"https://directory.fsf.org/"
-"wiki/Jami\">GNU Jami</a>, ÑÑо ÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¿ÑогÑамма,
она не бÑÐ´ÐµÑ ÑобиваÑÑ "
-"ваÑи даннÑе."
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
@@ -11895,6 +11888,31 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInTelephones"
"\">#SpywareInTelephones</a>)</span>"
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+"Ðа 2021 год WhatsApp (один из Ñилиалов Facebook) <a
href=\"https://www."
+"forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-"
+"with-facebook-or-well-deactivate-your-account/\">пÑинÑждаеÑ
ÑвоиÑ
"
+"полÑзоваÑелей вÑдаваÑÑ ÐºÐ¾Ð½ÑиденÑиалÑнÑе
пеÑÑоналÑнÑе даннÑе</a> ÑодиÑелÑÑкой "
+"компании. ÐÑо ÑÑÐ¸Ð»Ð¸Ð²Ð°ÐµÑ Ð²Ð»Ð°ÑÑÑ Facebook над
полÑзоваÑелÑми и еÑе более "
+"подÑÑÐ²Ð°ÐµÑ Ð½ÐµÐ¿ÑикоÑновенноÑÑÑ Ð»Ð¸Ñной
жизни и безопаÑноÑÑÑ Ð»Ñдей."
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+"ÐмеÑÑо WhatsApp Ð²Ñ Ð¼Ð¾Ð¶ÐµÑе полÑзоваÑÑÑÑ <a
href=\"https://directory.fsf.org/"
+"wiki/Jami\">GNU Jami</a>, ÑÑо ÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¿ÑогÑамма,
она не бÑÐ´ÐµÑ ÑобиваÑÑ "
+"ваÑи даннÑе."
+
#. type: Content of: <div><div><div><h4>
msgid "iThings"
msgstr "Ðй-ÑÑÑÑки"
Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- tr.po 7 Feb 2021 08:29:31 -0000 1.142
+++ tr.po 22 Feb 2021 10:31:59 -0000 1.143
@@ -8389,35 +8389,21 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
msgstr ""
-"2021 itibariyle WhatsApp (Facebook'un iÅtiraklerinden biri),
kullanıcılarını "
-"ana kuruluÅa <a href=\"https://www.forbes.com/sites/carlypage/2021/01/08/"
-"whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-"
-"account/\">hassas kiÅisel verilerini teslim etmeye zorluyor</a>. Bu "
-"Facebook'un kullanıcılar üzerindeki iktidarını arttırdıÄı gibi "
-"kullanıcıların gizlilik ve güvenliÄini tehlikeye sokar."
#. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
-#| "play Minetest</a> instead. The essential advantage of Minetest is that it "
-#| "is free software, meaning it respects the user's computer freedom. As a "
-#| "bonus, it offers more options."
msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
msgstr ""
-"Minecraft oyuncuları bunun yerine <a href=\"https://directory.fsf.org/wiki/"
-"Minetest\">Minetest oynayabilirler</a>. Minetest'in temel yararı özgür "
-"yazılım olmasıdır, yani bilgisayar kullanıcılarının özgürlüÄüne
saygılıdır. "
-"Bonus olarak daha fazla seçenek sunuyor."
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
@@ -8957,6 +8943,38 @@
"\">#SpywareInTelephones</a>)</span>"
msgstr ""
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+"2021 itibariyle WhatsApp (Facebook'un iÅtiraklerinden biri),
kullanıcılarını "
+"ana kuruluÅa <a href=\"https://www.forbes.com/sites/carlypage/2021/01/08/"
+"whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-"
+"account/\">hassas kiÅisel verilerini teslim etmeye zorluyor</a>. Bu "
+"Facebook'un kullanıcılar üzerindeki iktidarını arttırdıÄı gibi "
+"kullanıcıların gizlilik ve güvenliÄini tehlikeye sokar."
+
+#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Minecraft players <a href=\"https://directory.fsf.org/wiki/Minetest\">can "
+#| "play Minetest</a> instead. The essential advantage of Minetest is that it "
+#| "is free software, meaning it respects the user's computer freedom. As a "
+#| "bonus, it offers more options."
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+"Minecraft oyuncuları bunun yerine <a href=\"https://directory.fsf.org/wiki/"
+"Minetest\">Minetest oynayabilirler</a>. Minetest'in temel yararı özgür "
+"yazılım olmasıdır, yani bilgisayar kullanıcılarının özgürlüÄüne
saygılıdır. "
+"Bonus olarak daha fazla seçenek sunuyor."
+
#. type: Content of: <div><div><div><h4>
msgid "iThings"
msgstr ""
Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- zh-cn.po 9 Feb 2021 07:31:38 -0000 1.145
+++ zh-cn.po 22 Feb 2021 10:31:59 -0000 1.146
@@ -8128,32 +8128,21 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
msgstr ""
-"å¨ 2021ï¼WhatsAppï¼Facebook çä¸ä¸ªä¸å±æºæï¼<a
href=\"https://www.forbes.com/"
-"sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-"
-"facebook-or-well-deactivate-your-account/\">强å¶å
¶ç¨æ·æ交ä»ä»¬çææ个人æ°æ®"
-"</a> ç»å
¶æ¯å
¬å¸ãè¿å°±å¢å¼ºäº Facebook
对ç¨æ·çæ§å¶åï¼å¹¶è¿ä¸æ¥ä¾µå®³äºäººä»¬çéç§"
-"åå®å
¨ã"
#. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "People can play <a href=\"https://directory.fsf.org/wiki/Minetest"
-#| "\">Minetest</a> instead. Minetest is free software and respects the "
-#| "user's computer freedom."
msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
msgstr ""
-"ç©å®¶ <a href=\"https://directory.fsf.org/wiki/Minetest\">å¯ä»¥å»ç©
Minetest</"
-"a>ï¼èä¸ç¨éè¦ç© MinecraftãMinetest
æ¯èªç±è½¯ä»¶ï¼è¿æå³çå®å°éç¨æ·ç计ç®èª"
-"ç±ã"
#
#
@@ -8687,6 +8676,35 @@
"\">#SpywareInTelephones</a>)</span>"
msgstr ""
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+"å¨ 2021ï¼WhatsAppï¼Facebook çä¸ä¸ªä¸å±æºæï¼<a
href=\"https://www.forbes.com/"
+"sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-"
+"facebook-or-well-deactivate-your-account/\">强å¶å
¶ç¨æ·æ交ä»ä»¬çææ个人æ°æ®"
+"</a> ç»å
¶æ¯å
¬å¸ãè¿å°±å¢å¼ºäº Facebook
对ç¨æ·çæ§å¶åï¼å¹¶è¿ä¸æ¥ä¾µå®³äºäººä»¬çéç§"
+"åå®å
¨ã"
+
+#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "People can play <a href=\"https://directory.fsf.org/wiki/Minetest"
+#| "\">Minetest</a> instead. Minetest is free software and respects the "
+#| "user's computer freedom."
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+"ç©å®¶ <a href=\"https://directory.fsf.org/wiki/Minetest\">å¯ä»¥å»ç©
Minetest</"
+"a>ï¼èä¸ç¨éè¦ç© MinecraftãMinetest
æ¯èªç±è½¯ä»¶ï¼è¿æå³çå®å°éç¨æ·ç计ç®èª"
+"ç±ã"
+
#. type: Content of: <div><div><div><h4>
msgid "iThings"
msgstr ""
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.285
retrieving revision 1.286
diff -u -b -r1.285 -r1.286
--- zh-tw.po 6 Feb 2021 14:33:07 -0000 1.285
+++ zh-tw.po 22 Feb 2021 10:31:59 -0000 1.286
@@ -8110,18 +8110,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
-"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
-"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
-"hand over sensitive personal data</a> to its parent company. This increases "
-"Facebook's power over users, and further jeopardizes people's privacy and "
-"security."
+"The HonorLock online exam proctoring program is a surveillance tool that <a "
+"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
+"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
+"such as face, driving license, and network information, among others, in "
+"blatant violation of students' privacy."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
-"\">GNU Jami</a>, which is free software and will not collect your data."
+"Preventing students from cheating should not be an excuse for running "
+"malware/spyware on their computers, and it's good that students are "
+"protesting. But their petitions overlook a crucial issue, namely, the "
+"injustice of being forced to run nonfree software in order to get an "
+"education."
msgstr ""
#
@@ -8686,6 +8688,22 @@
"\">#SpywareInTelephones</a>)</span>"
msgstr ""
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=\"https://"
+"www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-"
+"data-with-facebook-or-well-deactivate-your-account/\">forcing its users to "
+"hand over sensitive personal data</a> to its parent company. This increases "
+"Facebook's power over users, and further jeopardizes people's privacy and "
+"security."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Instead of WhatsApp you can use <a href=\"https://directory.fsf.org/wiki/Jami"
+"\">GNU Jami</a>, which is free software and will not collect your data."
+msgstr ""
+
#. type: Content of: <div><div><div><h4>
msgid "iThings"
msgstr ""