[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Sun, 11 Apr 2021 09:04:39 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 21/04/11 09:04:38
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-google.de-diff.html
malware-google.de.po malware-google.es.po
malware-google.fr.po malware-google.pot
malware-google.ru.po nl.po pl.po pot
proprietary-back-doors.de-diff.html
proprietary-back-doors.de.po
proprietary-back-doors.es.po
proprietary-back-doors.fr.po
proprietary-back-doors.it-diff.html
proprietary-back-doors.it.po
proprietary-back-doors.ja-diff.html
proprietary-back-doors.ja.po
proprietary-back-doors.pot
proprietary-back-doors.ru.po
proprietary-manipulation.es.po
proprietary-manipulation.fr.po
proprietary-manipulation.pot
proprietary-manipulation.ru.po
proprietary-subscriptions.de-diff.html
proprietary-subscriptions.de.po
proprietary-subscriptions.es.po
proprietary-subscriptions.fr.po
proprietary-subscriptions.ja-diff.html
proprietary-subscriptions.ja.po
proprietary-subscriptions.pot
proprietary-subscriptions.ru.po
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.tr.po
proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.300&r2=1.301
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.425&r2=1.426
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.525&r2=1.526
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.300&r2=1.301
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.308&r2=1.309
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-diff.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.es.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pot?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.301&r2=1.302
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.300&r2=1.301
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.299&r2=1.300
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es.po?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.129&r2=1.130
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.226&r2=1.227
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.es.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.fr.po?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.pot?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.ru.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.de-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.de.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.es.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.fr.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ja-diff.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ja.po?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.pot?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ru.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.176&r2=1.177
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.386&r2=1.387
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.176&r2=1.177
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.620&r2=1.621
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.242&r2=1.243
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.398&r2=1.399
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.260&r2=1.261
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.380&r2=1.381
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.319&r2=1.320
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.701&r2=1.702
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.243&r2=1.244
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.278&r2=1.279
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.424&r2=1.425
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.467&r2=1.468
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.255&r2=1.256
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.287&r2=1.288
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.260&r2=1.261
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.271&r2=1.272
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.256&r2=1.257
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.261&r2=1.262
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.273&r2=1.274
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.254&r2=1.255
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.251&r2=1.252
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.403&r2=1.404
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.489&r2=1.490
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.180&r2=1.181
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.236&r2=1.237
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.241&r2=1.242
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.371&r2=1.372
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.626&r2=1.627
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.163&r2=1.164
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.164&r2=1.165
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.300&r2=1.301
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.300
retrieving revision 1.301
diff -u -b -r1.300 -r1.301
--- de.po 11 Apr 2021 12:03:09 -0000 1.300
+++ de.po 11 Apr 2021 13:04:29 -0000 1.301
@@ -6324,6 +6324,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google Nest <a href=\"https://blog.google/products/google-nest/partnership-"
"adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
"software update to its speaker devices using their back door <a href="
@@ -11192,6 +11202,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
"door that can make it cease to function</a>."
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.425
retrieving revision 1.426
diff -u -b -r1.425 -r1.426
--- es.po 11 Apr 2021 12:03:09 -0000 1.425
+++ es.po 11 Apr 2021 13:04:29 -0000 1.426
@@ -6311,6 +6311,16 @@
"no es una opción activada por defecto."
#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
# | Google Nest <a
# |
href=\"https://blog.google/products/google-nest/partnership-adt-smarter-home-security/\">
# | is taking over ADT</a>. Google sent out a software update to its speaker
@@ -11821,6 +11831,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
"door that can make it cease to function</a>."
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.525
retrieving revision 1.526
diff -u -b -r1.525 -r1.526
--- fr.po 11 Apr 2021 12:03:09 -0000 1.525
+++ fr.po 11 Apr 2021 13:04:29 -0000 1.526
@@ -5412,6 +5412,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google Nest <a href=\"https://blog.google/products/google-nest/partnership-"
"adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
"software update to its speaker devices using their back door <a href="
@@ -10051,6 +10061,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
"door that can make it cease to function</a>."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.300
retrieving revision 1.301
diff -u -b -r1.300 -r1.301
--- it.po 11 Apr 2021 12:03:10 -0000 1.300
+++ it.po 11 Apr 2021 13:04:29 -0000 1.301
@@ -5919,6 +5919,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google Nest <a href=\"https://blog.google/products/google-nest/partnership-"
"adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
"software update to its speaker devices using their back door <a href="
@@ -10417,6 +10427,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
"door that can make it cease to function</a>."
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.308
retrieving revision 1.309
diff -u -b -r1.308 -r1.309
--- ja.po 11 Apr 2021 12:03:10 -0000 1.308
+++ ja.po 11 Apr 2021 13:04:29 -0000 1.309
@@ -4611,6 +4611,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google Nest <a href=\"https://blog.google/products/google-nest/partnership-"
"adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
"software update to its speaker devices using their back door <a href="
@@ -8225,6 +8235,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
"door that can make it cease to function</a>."
Index: malware-google.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de-diff.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- malware-google.de-diff.html 15 Mar 2021 13:39:23 -0000 1.55
+++ malware-google.de-diff.html 11 Apr 2021 13:04:29 -0000 1.56
@@ -444,24 +444,35 @@
<h3 <span class="removed"><del><strong>id="surveillance">Google
Surveillance</h3>
<ul>
- <li><p>Tracking</strong></del></span> <span
class="inserted"><ins><em>id="surveillance">Surveillance</h3>
+ <li><p>Tracking software in popular Android apps is pervasive and
+ sometimes very clever. Some trackers can</strong></del></span> <span
class="inserted"><ins><em>id="surveillance">Surveillance</h3>
<ul class="blurbs">
+ <li id="M202102160">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Google has</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16">handed
+ over personal data of Indian protesters and activists to Indian
+ police</a> which leaded to their arrest. The cops requested the IP
+ address and the location where</em></ins></span> a <span
class="removed"><del><strong>user's movements around</strong></del></span>
<span class="inserted"><ins><em>document was created and with those
+ information, they identified protesters and activists.</p>
+ </li>
+
<li id="M202008030">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Google Nest <a
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
- is taking over ADT</a>. Google sent out a</em></ins></span> software
<span class="removed"><del><strong>in popular Android apps</strong></del></span>
- <span class="inserted"><ins><em>update to its speaker devices using their
back door <a
+ is taking over ADT</a>. Google sent out</em></ins></span> a <span
class="removed"><del><strong>physical store</strong></del></span> <span
class="inserted"><ins><em>software
+ update to its speaker devices using their back door <a
href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that
listens for things like smoke alarms</a> and then notifies your phone
- that an alarm</em></ins></span> is <span
class="removed"><del><strong>pervasive</strong></del></span> <span
class="inserted"><ins><em>happening. This means the devices now listen for more
+ that an alarm is happening. This means the devices now listen for more
than just their wake words. Google says the software update was sent
- out prematurely</em></ins></span> and
- <span class="removed"><del><strong>sometimes very clever. Some trackers
can <a
-href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store</strong></del></span>
<span class="inserted"><ins><em>on accident and Google was planning on
disclosing
+ out prematurely and on accident and Google was planning on disclosing
this new feature and offering it to customers who pay for it.</p>
</li>
@@ -865,7 +876,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/03/15 13:39:23 $
+$Date: 2021/04/11 13:04:29 $
<!-- timestamp end -->
</p>
</div>
Index: malware-google.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- malware-google.de.po 12 Mar 2021 09:03:44 -0000 1.68
+++ malware-google.de.po 11 Apr 2021 13:04:29 -0000 1.69
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-google.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-03-12 08:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
"PO-Revision-Date: 2018-05-07 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -739,6 +739,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google Nest <a href=\"https://blog.google/products/google-nest/partnership-"
"adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
"software update to its speaker devices using their back door <a href="
Index: malware-google.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.es.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- malware-google.es.po 12 Mar 2021 12:02:57 -0000 1.65
+++ malware-google.es.po 11 Apr 2021 13:04:29 -0000 1.66
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2021-03-12 08:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
"PO-Revision-Date: 2021-03-12 12:36+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -578,6 +579,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google Nest <a href=\"https://blog.google/products/google-nest/partnership-"
"adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
"software update to its speaker devices using their back door <a href="
Index: malware-google.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- malware-google.fr.po 12 Mar 2021 10:02:38 -0000 1.120
+++ malware-google.fr.po 11 Apr 2021 13:04:29 -0000 1.121
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2021-03-12 08:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
"PO-Revision-Date: 2021-03-12 11:02+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:55+0000\n"
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -573,6 +574,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google Nest <a href=\"https://blog.google/products/google-nest/partnership-"
"adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
"software update to its speaker devices using their back door <a href="
Index: malware-google.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.pot,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- malware-google.pot 12 Mar 2021 09:03:44 -0000 1.63
+++ malware-google.pot 11 Apr 2021 13:04:30 -0000 1.64
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2021-03-12 08:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -415,6 +415,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Google has <a "
+"href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\">handed
"
+"over personal data of Indian protesters and activists to Indian police</a> "
+"which leaded to their arrest. The cops requested the IP address and the "
+"location where a document was created and with those information, they "
+"identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google Nest <a "
"href=\"https://blog.google/products/google-nest/partnership-adt-smarter-home-security/\">
"
"is taking over ADT</a>. Google sent out a software update to its speaker "
Index: malware-google.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- malware-google.ru.po 12 Mar 2021 10:01:16 -0000 1.131
+++ malware-google.ru.po 11 Apr 2021 13:04:30 -0000 1.132
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-03-12 08:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:55+0000\n"
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -573,6 +574,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google Nest <a href=\"https://blog.google/products/google-nest/partnership-"
"adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
"software update to its speaker devices using their back door <a href="
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.301
retrieving revision 1.302
diff -u -b -r1.301 -r1.302
--- nl.po 11 Apr 2021 12:03:12 -0000 1.301
+++ nl.po 11 Apr 2021 13:04:30 -0000 1.302
@@ -4298,6 +4298,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google Nest <a href=\"https://blog.google/products/google-nest/partnership-"
"adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
"software update to its speaker devices using their back door <a href="
@@ -7486,6 +7496,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
"door that can make it cease to function</a>."
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.300
retrieving revision 1.301
diff -u -b -r1.300 -r1.301
--- pl.po 11 Apr 2021 12:03:12 -0000 1.300
+++ pl.po 11 Apr 2021 13:04:30 -0000 1.301
@@ -3822,6 +3822,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google Nest <a href=\"https://blog.google/products/google-nest/partnership-"
"adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
"software update to its speaker devices using their back door <a href="
@@ -6943,6 +6953,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
"door that can make it cease to function</a>."
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.299
retrieving revision 1.300
diff -u -b -r1.299 -r1.300
--- pot 11 Apr 2021 12:03:12 -0000 1.299
+++ pot 11 Apr 2021 13:04:30 -0000 1.300
@@ -3581,6 +3581,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google Nest <a href=\"https://blog.google/products/google-nest/partnership-"
"adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
"software update to its speaker devices using their back door <a href="
@@ -6602,6 +6612,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
"door that can make it cease to function</a>."
Index: proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary-back-doors.de-diff.html 15 Mar 2021 13:39:23 -0000 1.59
+++ proprietary-back-doors.de-diff.html 11 Apr 2021 13:04:32 -0000 1.60
@@ -210,8 +210,8 @@
requirement to run a proprietary phone app</a> to be allowed into
the event.</p>
- <p>This app is a spyware that can snoop</em></ins></span> on <span
class="removed"><del><strong>many sorts</strong></del></span> <span
class="inserted"><ins><em>a lot</em></ins></span> of <span
class="removed"><del><strong>data in the phone, and in server
accounts,</strong></del></span>
- <span class="inserted"><ins><em>sensitive data, including user's location
and contact list, and has <a
+ <p>This app is a spyware that can snoop</em></ins></span> on <span
class="removed"><del><strong>many sorts</strong></del></span> <span
class="inserted"><ins><em>a lot</em></ins></span> of <span
class="removed"><del><strong>data in the phone,</strong></del></span>
+ <span class="inserted"><ins><em>sensitive data, including user's
location</em></ins></span> and <span class="removed"><del><strong>in server
accounts,</strong></del></span> <span class="inserted"><ins><em>contact list,
and has <a
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
near-complete control</a> over the phone.</p>
</li>
@@ -396,87 +396,75 @@
<p>We link to</strong></del></span> <span
class="inserted"><ins><em>universal back door</a> which lets Adobe
control</em></ins></span>
the <span class="removed"><del><strong>article</strong></del></span> <span
class="inserted"><ins><em>software and,</em></ins></span> for <span
class="removed"><del><strong>the facts</strong></del></span> <span
class="inserted"><ins><em>example, disable</em></ins></span> it <span
class="removed"><del><strong>presents. It is too bad
- that</strong></del></span> <span class="inserted"><ins><em>whenever it
+ that the</strong></del></span> <span class="inserted"><ins><em>whenever
it
wants. Adobe will block Flash content from running in Flash Player
beginning January 12, 2021, which indicates that they have access to
every Flash Player through a back door.</p>
- <p>The back door won't be dangerous in</em></ins></span> the <span
class="removed"><del><strong>article finishes by
advocating</strong></del></span> <span class="inserted"><ins><em>future, as
it'll disable
- a proprietary program and make users delete</em></ins></span> the <span
class="removed"><del><strong>moral weakness</strong></del></span> <span
class="inserted"><ins><em>software, but it
+ <p>The back door won't be dangerous in the future, as it'll disable
+ a proprietary program and make users delete the software, but it
was an injustice for many years. Users should have deleted Flash Player
- even before its end</em></ins></span> of
- <span class="removed"><del><strong>surrendering to Netflix. The
Netflix</strong></del></span> <span class="inserted"><ins><em>life.</p>
+ even before its end of life.</p>
+ </li>
+
+ <li id="M202007020">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>BMW is trying to <a
+
href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates">lock
+ certain features of its cars, and force people to pay to use part of
+ the car they already bought</a>. This is done through forced update
+ of the car software via a radio-operated back door.</p>
</li>
<li id="M201908270">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A very popular</em></ins></span> app <span
class="inserted"><ins><em>found in the
- Google Play store contained a module that was designed
to</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/">secretly
- install</em></ins></span> malware <span
class="removed"><del><strong>too</a>.</p></strong></del></span>
<span class="inserted"><ins><em>on the user's computer</a>. The app
developers
+ <p>A very popular app found in the
+ Google Play store contained a module that was designed to <a
+
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/">secretly
+ install malware on the user's computer</a>. The app developers
regularly used it to make the computer download and execute any code
they wanted.</p>
<p>This is a concrete example of what users are exposed to when they
run nonfree apps. They can never be completely sure that a nonfree
- app is safe.</p></em></ins></span>
+ app is safe.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Baidu's proprietary Android library, Moplus,
has</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201907100">
+ <li id="M201907100">
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Apple appears to say that <a
href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
- there is</em></ins></span> a back door <span class="inserted"><ins><em>in
MacOS</a> for automatically updating some
+ there is a back door in MacOS</a> for automatically updating some
(all?) apps.</p>
- <p>The specific change described in the article was not
- malicious—it protected users from surveillance by third
- parties—but</em></ins></span> that <span
class="removed"><del><strong><a
-
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
- can “upload files” as well as forcibly install
apps</a>.</p>
- <p>It</strong></del></span> is <span
class="removed"><del><strong>used by 14,000 Android
applications.</p></strong></del></span> <span class="inserted"><ins><em>a
separate question.</p></em></ins></span>
+ <p>The specific change described in the</em></ins></span> article
<span class="removed"><del><strong>finishes</strong></del></span> <span
class="inserted"><ins><em>was not
+ malicious—it protected users from surveillance</em></ins></span> by
<span class="removed"><del><strong>advocating</strong></del></span> <span
class="inserted"><ins><em>third
+ parties—but that is a separate question.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>In Android, <a
-
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
- Google</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201811100">
+ <li id="M201811100">
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Corel Paintshop Pro</em></ins></span> has a <span
class="inserted"><ins><em><a
-
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"></em></ins></span>
- back door <span class="inserted"><ins><em>that can make it
cease</em></ins></span> to <span class="removed"><del><strong>remotely delete
apps.</a> (It was in</strong></del></span> <span
class="inserted"><ins><em>function</a>.</p>
+ <p>Corel Paintshop Pro has a <a
+
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
+ back door that can make it cease to function</a>.</p>
<p>The article is full of confusions, errors and biases that we have
- an obligation to expose, given that we are making</em></ins></span> a
- <span class="removed"><del><strong>program called GTalkService, which
seems since then</strong></del></span> <span
class="inserted"><ins><em>link</em></ins></span> to <span
class="removed"><del><strong>have been
- merged into Google Play.)</p>
- <p>Google can also <a
-
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
- forcibly and remotely install apps</a> through GTalkService.
- This is</strong></del></span> <span
class="inserted"><ins><em>them.</p>
+ an obligation to expose, given that we are making a link to them.</p>
<ul>
- <li>Getting a patent does</em></ins></span> not <span
class="removed"><del><strong>equivalent</strong></del></span> <span
class="inserted"><ins><em>“enable” a company to do
+ <li>Getting a patent does not “enable” a company to do
any particular thing in its products. What it does enable the company
to do is sue other companies if they do some particular thing in
their products.</li>
- <li>A company's policies about when</em></ins></span> to <span
class="inserted"><ins><em>attack users through</em></ins></span> a <span
class="removed"><del><strong>universal</strong></del></span> back <span
class="removed"><del><strong>door, but permits various
- dirty tricks.</p>
- <p>Although Google's <em>exercise</em> of this power has
not been
- malicious so far,</strong></del></span>
- <span class="inserted"><ins><em>door are beside</em></ins></span> the
<span class="removed"><del><strong>point</strong></del></span> <span
class="inserted"><ins><em>point. Inserting the back door</em></ins></span> is
<span class="removed"><del><strong>that nobody</strong></del></span> <span
class="inserted"><ins><em>wrong in the
+ <li>A company's policies about when to attack users through a back
+ door are beside the point. Inserting the back door is wrong in the
first place, and using the back door is always wrong too. No software
- developer</em></ins></span> should have <span
class="removed"><del><strong>such power,
- which could also</strong></del></span> <span
class="inserted"><ins><em>that power over users.</li>
+ developer should have that power over users.</li>
<li>“<a
href="/philosophy/words-to-avoid.html#Piracy">Piracy</a>”
means
@@ -493,7 +481,7 @@
because neighbors' kids are playing on your front yard, and saying
that you're “protecting the boundary line”. The kids can't do
harm
to the boundary line, not even with a jackhammer, because it is an
- abstraction and can't</em></ins></span> be <span
class="inserted"><ins><em>affected by physical action.</p></li>
+ abstraction and can't be affected by physical action.</p></li>
</ul>
</li>
@@ -519,7 +507,7 @@
can “upload files” as well as forcibly install
apps</a>.</p>
- <p>It is</em></ins></span> used <span
class="removed"><del><strong>maliciously. You</strong></del></span> <span
class="inserted"><ins><em>by 14,000 Android applications.</p>
+ <p>It is used by 14,000 Android applications.</p>
</li>
<li id="M201112080">
@@ -530,7 +518,7 @@
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html">
remotely deleting apps</a>.</p>
- <p>You</em></ins></span> might well decide to <span
class="removed"><del><strong>let</strong></del></span> <span
class="inserted"><ins><em>let a security service that you trust
+ <p>You might well decide to let a security service that you trust
remotely <em>deactivate</em> programs that it considers
malicious.
But there is no excuse for <em>deleting</em> the programs, and
you
should have the right to decide whom (if anyone) to trust in this
@@ -598,41 +586,63 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Some Wavelink and JetStream wifi routers have
universal back doors that enable unauthenticated
- users to remotely control not only the routers, but
- also any devices connected to the network. There is evidence that <a
-
href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/">
- this vulnerability is actively exploited</a>.</p>
+ users to remotely control not only</em></ins></span> the <span
class="removed"><del><strong>moral weakness of
+ surrendering</strong></del></span> <span
class="inserted"><ins><em>routers, but
+ also any devices connected</em></ins></span> to <span
class="removed"><del><strong>Netflix. The Netflix
+ app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ malware too</a>.</p>
+ </li>
+
+ <li>
+ <p>Baidu's proprietary Android library, Moplus, has a back
door</strong></del></span> <span class="inserted"><ins><em>the network. There
is evidence</em></ins></span> that <a
+ <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
+ can “upload files” as well as forcibly install
apps</a>.</p>
+ <p>It</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/">
+ this vulnerability</em></ins></span> is <span
class="removed"><del><strong>used by 14,000 Android applications.</p>
+ </li>
- <p>If you consider buying a router, we encourage you to get one
+ <li>
+ <p>In Android, <a
+
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
+ Google has</strong></del></span> <span
class="inserted"><ins><em>actively exploited</a>.</p>
+
+ <p>If you consider buying</em></ins></span> a <span
class="removed"><del><strong>back door</strong></del></span> <span
class="inserted"><ins><em>router, we encourage you</em></ins></span> to <span
class="removed"><del><strong>remotely delete apps.</a> (It
was</strong></del></span> <span class="inserted"><ins><em>get one
that <a href="https://ryf.fsf.org/categories/routers">runs on free
- software</a>. Any attempts at introducing malicious functionalities
in
- it (e.g., through a firmware update) will be detected by the community,
+ software</a>. Any attempts at introducing malicious
functionalities</em></ins></span> in
+ <span class="inserted"><ins><em>it (e.g., through</em></ins></span> a
+ <span class="removed"><del><strong>program called GTalkService, which
seems since then</strong></del></span> <span class="inserted"><ins><em>firmware
update) will be detected by the community,
and soon corrected.</p>
<p>If unfortunately you own a router that runs on
- proprietary software, don't panic! You may be able to
- replace its firmware with a free operating system such as <a
+ proprietary software, don't panic! You may be able</em></ins></span> to
<span class="removed"><del><strong>have been
+ merged into Google Play.)</p>
+ <p>Google</strong></del></span>
+ <span class="inserted"><ins><em>replace its firmware with a free operating
system such as <a
href="https://librecmc.org">libreCMC</a>. If you don't know how,
- you can get help from a nearby GNU/Linux user group.</p>
+ you</em></ins></span> can <span
class="removed"><del><strong>also</strong></del></span> <span
class="inserted"><ins><em>get help from a nearby GNU/Linux user group.</p>
</li>
<li id="M202011060">
<!--#set var="DATE" value='<small
class="date-tag">2020-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A new app published by Google <a
-
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
+ <p>A new app published by Google</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
+ forcibly</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets
banks and creditors deactivate people's Android devices</a> if they
fail to make payments. If someone's device gets deactivated, it will
- be limited to basic functionality, such as emergency calling and
- access to settings.</p>
+ be limited to basic functionality, such as emergency
calling</em></ins></span> and
+ <span class="inserted"><ins><em>access to settings.</p>
</li>
<li id="M202007010">
<!--#set var="DATE" value='<small
class="date-tag">2020-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>BMW will remotely <a
+ <p>BMW will</em></ins></span> remotely <span
class="removed"><del><strong>install apps</a></strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/">
- enable and disable functionality in cars</a> through a universal
+ enable and disable functionality in cars</a></em></ins></span>
through <span class="removed"><del><strong>GTalkService.
+ This is</strong></del></span> <span class="inserted"><ins><em>a universal
back door.</p>
</li>
@@ -643,9 +653,13 @@
Google Play Terms of Service</a> insist that the user of Android
accept
the presence of universal back doors in apps released by Google.</p>
- <p>This does not tell us whether any of Google's apps currently
- contains a universal back door, but that is a secondary question.
- In moral terms, demanding that people accept in advance certain bad
+ <p>This does</em></ins></span> not <span
class="removed"><del><strong>equivalent to</strong></del></span> <span
class="inserted"><ins><em>tell us whether any of Google's apps currently
+ contains</em></ins></span> a universal back door, but <span
class="removed"><del><strong>permits various
+ dirty tricks.</p>
+ <p>Although Google's <em>exercise</em> of this power has
not been
+ malicious so far, the point</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> is <span
class="inserted"><ins><em>a secondary question.
+ In moral terms, demanding</em></ins></span> that <span
class="removed"><del><strong>nobody should have such power,
+ which could also be used maliciously. You might well
decide</strong></del></span> <span class="inserted"><ins><em>people accept in
advance certain bad
treatment is equivalent to actually doing it. Whatever condemnation
the latter deserves, the former deserves the same.</p>
</li>
@@ -660,7 +674,7 @@
<p>The adware is in a modified version of an
essential system configuration app. The back door is a
- surreptitious addition to</em></ins></span> a
+ surreptitious addition</em></ins></span> to <span
class="removed"><del><strong>let</strong></del></span> a
<span class="removed"><del><strong>security service remotely
<em>deactivate</em> programs that it
considers malicious. But there</strong></del></span> <span
class="inserted"><ins><em>program whose stated purpose</em></ins></span> is
<span class="removed"><del><strong>no excuse</strong></del></span> <span
class="inserted"><ins><em>to be a <a
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/">
@@ -1144,7 +1158,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/03/15 13:39:23 $
+$Date: 2021/04/11 13:04:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- proprietary-back-doors.de.po 25 Feb 2021 17:01:56 -0000 1.153
+++ proprietary-back-doors.de.po 11 Apr 2021 13:04:32 -0000 1.154
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-02-25 16:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
"PO-Revision-Date: 2018-08-29 03:06+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -631,6 +631,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very popular app found in the Google Play store contained a module that "
"was designed to <a href=\"https://arstechnica.com/information-"
"technology/2019/08/google-play-app-with-100-million-downloads-executed-"
Index: proprietary-back-doors.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- proprietary-back-doors.es.po 26 Feb 2021 10:21:50 -0000 1.60
+++ proprietary-back-doors.es.po 11 Apr 2021 13:04:32 -0000 1.61
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2021-02-25 16:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
"PO-Revision-Date: 2021-02-26 11:17+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -504,6 +505,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very popular app found in the Google Play store contained a module that "
"was designed to <a href=\"https://arstechnica.com/information-"
"technology/2019/08/google-play-app-with-100-million-downloads-executed-"
Index: proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- proprietary-back-doors.fr.po 25 Feb 2021 18:31:19 -0000 1.183
+++ proprietary-back-doors.fr.po 11 Apr 2021 13:04:32 -0000 1.184
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2021-02-25 16:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
"PO-Revision-Date: 2021-01-04 17:56+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:55+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -503,6 +504,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very popular app found in the Google Play store contained a module that "
"was designed to <a href=\"https://arstechnica.com/information-"
"technology/2019/08/google-play-app-with-100-million-downloads-executed-"
Index: proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary-back-doors.it-diff.html 15 Mar 2021 13:39:24 -0000 1.85
+++ proprietary-back-doors.it-diff.html 11 Apr 2021 13:04:32 -0000 1.86
@@ -286,8 +286,7 @@
<li><p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
Microsoft has already backdoored</strong></del></span> <span
class="inserted"><ins><em>remotely unlock an Android device</a>,
unless</em></ins></span> its disk <span
class="removed"><del><strong>encryption</a>.</p></li>
- <li><p>Modern gratis game cr…apps
- <a</strong></del></span>
+ <li><p>Modern gratis game cr…apps</strong></del></span>
<span class="inserted"><ins><em>is encrypted (possible since Android 5.0
Lollipop, but still not
quite the default).</p>
</li>
@@ -303,7 +302,7 @@
<li id="M201509160">
<!--#set var="DATE" value='<small
class="date-tag">2015-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Modern gratis game cr…apps <a</em></ins></span>
+ <p>Modern gratis game cr…apps</em></ins></span> <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
collect a wide range of data about their users and their users'
friends and associates</a>.</p>
@@ -490,30 +489,39 @@
<p>The back door won't be dangerous in</em></ins></span> the <span
class="removed"><del><strong>programs,</strong></del></span> <span
class="inserted"><ins><em>future, as it'll disable
a proprietary program</em></ins></span> and <span
class="removed"><del><strong>you
-should have the right to decide who (if anyone) to trust</strong></del></span>
<span class="inserted"><ins><em>make users delete the software, but it
+should have</strong></del></span> <span class="inserted"><ins><em>make users
delete</em></ins></span> the <span
class="removed"><del><strong>right</strong></del></span> <span
class="inserted"><ins><em>software, but it
was an injustice for many years. Users should have deleted Flash Player
even before its end of life.</p>
</li>
- <li id="M201908270">
- <!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
+ <li id="M202007020">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A very popular app found</em></ins></span> in <span
class="removed"><del><strong>this way.
+ <p>BMW is trying</em></ins></span> to <span
class="removed"><del><strong>decide who (if anyone)</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates">lock
+ certain features of its cars, and force people</em></ins></span> to <span
class="removed"><del><strong>trust in this way.
</p>
<p>
-As these pages show, if you do want</strong></del></span> <span
class="inserted"><ins><em>the
- Google Play store contained a module that was designed</em></ins></span>
to <span class="removed"><del><strong>clean your</strong></del></span> <span
class="inserted"><ins><em><a
+As these pages show, if you do want</strong></del></span> <span
class="inserted"><ins><em>pay</em></ins></span> to <span
class="removed"><del><strong>clean your computer</strong></del></span> <span
class="inserted"><ins><em>use part</em></ins></span> of <span
class="removed"><del><strong>malware,</strong></del></span>
+ the <span class="removed"><del><strong>first</strong></del></span> <span
class="inserted"><ins><em>car they already bought</a>. This is done
through forced update
+ of the car</em></ins></span> software <span class="inserted"><ins><em>via
a radio-operated back door.</p>
+ </li>
+
+ <li id="M201908270">
+ <!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A very popular app found in the
+ Google Play store contained a module that was designed</em></ins></span>
to <span class="removed"><del><strong>delete</strong></del></span> <span
class="inserted"><ins><em><a
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/">secretly
install malware on the user's computer</a>. The app developers
- regularly used it to make the</em></ins></span> computer <span
class="inserted"><ins><em>download and execute any code
+ regularly used it to make the computer download and execute any code
they wanted.</p>
- <p>This is a concrete example</em></ins></span> of <span
class="removed"><del><strong>malware,
-the first software</strong></del></span> <span class="inserted"><ins><em>what
users are exposed</em></ins></span> to <span
class="removed"><del><strong>delete</strong></del></span> <span
class="inserted"><ins><em>when they
+ <p>This</em></ins></span> is <span
class="removed"><del><strong>Windows or iOS.
+</p></strong></del></span> <span class="inserted"><ins><em>a concrete
example of what users are exposed to when they
run nonfree apps. They can never be completely sure that a nonfree
- app</em></ins></span> is <span class="removed"><del><strong>Windows or iOS.
-</p></strong></del></span> <span
class="inserted"><ins><em>safe.</p></em></ins></span>
+ app is safe.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
@@ -567,12 +575,11 @@
<span class="inserted"><ins><em>door are beside</em></ins></span> the
<span class="removed"><del><strong>point</strong></del></span> <span
class="inserted"><ins><em>point. Inserting the back door</em></ins></span> is
<span class="removed"><del><strong>that nobody</strong></del></span> <span
class="inserted"><ins><em>wrong in the
first place, and using the back door is always wrong too. No software
developer</em></ins></span> should have <span
class="removed"><del><strong>such power,
-which could also be used maliciously. You might well
decide</strong></del></span> <span class="inserted"><ins><em>that power over
users.</li>
+which could also</strong></del></span> <span class="inserted"><ins><em>that
power over users.</li>
<li>“<a
href="/philosophy/words-to-avoid.html#Piracy">Piracy</a>”
means
- attacking ships. Using that word</em></ins></span> to <span
class="removed"><del><strong>let</strong></del></span> <span
class="inserted"><ins><em>refer to sharing copies is</em></ins></span> a
-<span class="removed"><del><strong>security service remotely
<em>deactivate</em></strong></del></span> <span
class="inserted"><ins><em>smear;
+ attacking ships. Using that word to refer to sharing copies is a smear;
please don't smear sharing.</li>
<li><p>The idea of “protecting our IP” is
@@ -623,8 +630,8 @@
remotely deleting apps</a>.</p>
<p>You might well decide to let a security service that you trust
- remotely <em>deactivate</em></em></ins></span> programs that
it considers malicious.
- But there is no excuse for <span
class="removed"><del><strong>allowing</strong></del></span> <span
class="inserted"><ins><em><em>deleting</em> the programs, and you
+ remotely <em>deactivate</em> programs that it considers
malicious.
+ But there is no excuse for <em>deleting</em> the programs, and
you
should have the right to decide whom (if anyone) to trust in this
way.</p>
</li>
@@ -646,10 +653,10 @@
<p>Although Google's <em>exercise</em> of this power has
not been
malicious so far, the point is that nobody should have such power,
- which could also be used maliciously. You might well decide to
- let a security service remotely <em>deactivate</em> programs
that</em></ins></span>
- it <span class="inserted"><ins><em>considers malicious. But there is no
excuse for allowing it to
- <em>delete</em> the programs, and you should have the right to
decide
+ which could also</em></ins></span> be used maliciously. You might well
decide to
+ let a security service remotely <em>deactivate</em> programs
that
+ it considers malicious. But there is no excuse for allowing it to <span
class="removed"><del><strong><em>delete</em></strong></del></span>
+ <span class="inserted"><ins><em><em>delete</em> the programs,
and you should have the right to decide
who (if anyone) to trust in this way.</p>
</li>
@@ -906,7 +913,7 @@
it installs “updates” automatically</a>.</p>
<p>We have found nothing explicitly documenting the lack of any way
- to disable remote changes</em></ins></span> to <span
class="removed"><del><strong><em>delete</em></strong></del></span>
the <span class="removed"><del><strong>programs, and you
should</strong></del></span> <span class="inserted"><ins><em>software, so we
are not completely
+ to disable remote changes to</em></ins></span> the <span
class="removed"><del><strong>programs, and you should</strong></del></span>
<span class="inserted"><ins><em>software, so we are not completely
sure there isn't one, but this seems pretty clear.</p>
</li>
@@ -1185,7 +1192,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/03/15 13:39:24 $
+$Date: 2021/04/11 13:04:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- proprietary-back-doors.it.po 25 Feb 2021 17:01:56 -0000 1.145
+++ proprietary-back-doors.it.po 11 Apr 2021 13:04:32 -0000 1.146
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2021-02-25 16:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -623,6 +623,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very popular app found in the Google Play store contained a module that "
"was designed to <a href=\"https://arstechnica.com/information-"
"technology/2019/08/google-play-app-with-100-million-downloads-executed-"
Index: proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary-back-doors.ja-diff.html 15 Mar 2021 13:39:24 -0000 1.86
+++ proprietary-back-doors.ja-diff.html 11 Apr 2021 13:04:32 -0000 1.87
@@ -291,14 +291,14 @@
can use the same tactics.</p>
</li>
<span class="removed"><del><strong><li>
- <p>Dell computers, shipped with Windows, had</strong></del></span>
+ <p>Dell computers, shipped</strong></del></span>
<span class="inserted"><ins><em><li id="M201403120.1">
<!--#set var="DATE" value='<small
class="date-tag">2014-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p id="samsung"><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
- Samsung Galaxy devices running proprietary Android versions come
with</em></ins></span>
+ Samsung Galaxy devices running proprietary Android versions
come</em></ins></span> with <span class="removed"><del><strong>Windows,
had</strong></del></span>
a <span class="removed"><del><strong>bogus root
certificate</strong></del></span> <span class="inserted"><ins><em>back
door</a></em></ins></span> that
<span class="removed"><del><strong><a
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/">allowed
@@ -400,22 +400,33 @@
every Flash Player through</em></ins></span> a <span
class="removed"><del><strong>universal</strong></del></span> <span
class="inserted"><ins><em>back door.</p>
<p>The</em></ins></span> back door <span
class="inserted"><ins><em>won't be dangerous</em></ins></span> in the <span
class="removed"><del><strong>modem chip. So
-why did Coolpad bother to introduce another? Because this one is controlled
-by Coolpad.
-</p></strong></del></span> <span class="inserted"><ins><em>future, as
it'll disable
+why did Coolpad bother</strong></del></span> <span
class="inserted"><ins><em>future, as it'll disable
a proprietary program and make users delete the software, but it
was an injustice for many years. Users should have deleted Flash Player
- even before its end of life.</p></em></ins></span>
+ even before its end of life.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Microsoft Windows has</strong></del></span>
+ <li id="M202007020">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>BMW is trying</em></ins></span> to <span
class="removed"><del><strong>introduce another? Because this
one</strong></del></span> <span class="inserted"><ins><em><a
+
href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates">lock
+ certain features of its cars, and force people to pay to use part of
+ the car they already bought</a>. This</em></ins></span> is <span
class="removed"><del><strong>controlled
+by Coolpad.
+</p>
+</li>
+
+<li>
+<p>Microsoft Windows has</strong></del></span> <span
class="inserted"><ins><em>done through forced update
+ of the car software via</em></ins></span> a <span
class="removed"><del><strong>universal</strong></del></span> <span
class="inserted"><ins><em>radio-operated</em></ins></span> back <span
class="removed"><del><strong>door through which</strong></del></span> <span
class="inserted"><ins><em>door.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201908270">
+ <li id="M201908270">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>A very popular app found in the
- Google Play store contained</em></ins></span> a <span
class="removed"><del><strong>universal back door through
which</strong></del></span> <span class="inserted"><ins><em>module that was
designed to</em></ins></span> <a <span
class="removed"><del><strong>href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
+ Google Play store contained a module that was designed
to</em></ins></span> <a <span
class="removed"><del><strong>href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
any change whatsoever can be imposed</strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/">secretly
install malware</em></ins></span> on the <span
class="removed"><del><strong>users</a>.
@@ -477,24 +488,24 @@
remote wipe</a>. It's</strong></del></span> <span
class="inserted"><ins><em>link to them.</p>
<ul>
- <li>Getting a patent does</em></ins></span> not <span
class="removed"><del><strong>always enabled, but users are led into enabling
+ <li>Getting a patent does</em></ins></span> not <span
class="removed"><del><strong>always enabled, but</strong></del></span> <span
class="inserted"><ins><em>“enable” a company to do
+ any particular thing in its products. What it does enable the company
+ to do is sue other companies if they do some particular thing in
+ their products.</li>
+
+ <li>A company's policies about when to attack</em></ins></span>
users <span class="inserted"><ins><em>through a back
+ door</em></ins></span> are <span class="removed"><del><strong>led into
enabling
it without understanding.
</p>
</li>
<li>
- <p>Apple can, and regularly does,
+ <p>Apple can,</strong></del></span> <span
class="inserted"><ins><em>beside the point. Inserting the back door is wrong in
the
+ first place,</em></ins></span> and <span
class="removed"><del><strong>regularly does,
<a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract</strong></del></span> <span
class="inserted"><ins><em>“enable” a company to do
- any particular thing in its products. What it does enable the company
- to do is sue other companies if they do</em></ins></span> some <span
class="removed"><del><strong>data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>particular thing in
- their products.</li>
-
- <li>A company's policies about when to attack users through a back
- door are beside</em></ins></span> the <span
class="removed"><del><strong>state</a>.
+ remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>using</em></ins></span> the <span
class="removed"><del><strong>state</a>.
</p>
- <p>This may</strong></del></span> <span
class="inserted"><ins><em>point. Inserting the back door is wrong in the
- first place, and using the back door is always wrong too. No software
+ <p>This may</strong></del></span> <span class="inserted"><ins><em>back
door is always wrong too. No software
developer should</em></ins></span> have <span
class="removed"><del><strong>improved</strong></del></span> <span
class="inserted"><ins><em>that power over users.</li>
<li>“<a
@@ -1138,7 +1149,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/03/15 13:39:24 $
+$Date: 2021/04/11 13:04:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.129
retrieving revision 1.130
diff -u -b -r1.129 -r1.130
--- proprietary-back-doors.ja.po 25 Feb 2021 17:01:57 -0000 1.129
+++ proprietary-back-doors.ja.po 11 Apr 2021 13:04:32 -0000 1.130
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2021-02-25 16:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
"PO-Revision-Date: 2017-01-24 12:17+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -482,6 +482,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very popular app found in the Google Play store contained a module that "
"was designed to <a href=\"https://arstechnica.com/information-"
"technology/2019/08/google-play-app-with-100-million-downloads-executed-"
Index: proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- proprietary-back-doors.pot 25 Feb 2021 17:01:57 -0000 1.94
+++ proprietary-back-doors.pot 11 Apr 2021 13:04:32 -0000 1.95
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2021-02-25 16:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -358,6 +358,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a "
+"href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates\">lock
"
+"certain features of its cars, and force people to pay to use part of the car "
+"they already bought</a>. This is done through forced update of the car "
+"software via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very popular app found in the Google Play store contained a module that "
"was designed to <a "
"href=\"https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/\">secretly
"
Index: proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.226
retrieving revision 1.227
diff -u -b -r1.226 -r1.227
--- proprietary-back-doors.ru.po 25 Feb 2021 17:01:57 -0000 1.226
+++ proprietary-back-doors.ru.po 11 Apr 2021 13:04:32 -0000 1.227
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-02-25 16:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -491,6 +492,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"A very popular app found in the Google Play store contained a module that "
"was designed to <a href=\"https://arstechnica.com/information-"
"technology/2019/08/google-play-app-with-100-million-downloads-executed-"
Index: proprietary-manipulation.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.es.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary-manipulation.es.po 12 Mar 2021 12:02:57 -0000 1.20
+++ proprietary-manipulation.es.po 11 Apr 2021 13:04:32 -0000 1.21
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2021-03-12 08:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
"PO-Revision-Date: 2021-03-12 12:39+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -145,6 +146,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Femm “fertility” app is secretly a <a href=\"https://www."
"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
Index: proprietary-manipulation.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.fr.po,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary-manipulation.fr.po 12 Mar 2021 10:02:38 -0000 1.19
+++ proprietary-manipulation.fr.po 11 Apr 2021 13:04:32 -0000 1.20
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2021-03-12 08:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
"PO-Revision-Date: 2021-03-12 11:02+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Manipulation - GNU Project - Free Software Foundation"
@@ -139,6 +140,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Femm “fertility” app is secretly a <a href=\"https://www."
"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
Index: proprietary-manipulation.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.pot,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary-manipulation.pot 12 Mar 2021 09:03:44 -0000 1.12
+++ proprietary-manipulation.pot 11 Apr 2021 13:04:32 -0000 1.13
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2021-03-12 08:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -111,6 +111,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a "
+"href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates\">lock
"
+"certain features of its cars, and force people to pay to use part of the car "
+"they already bought</a>. This is done through forced update of the car "
+"software via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Femm “fertility” app is secretly a <a "
"href=\"https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners\">
"
"tool for propaganda</a> by natalist Christians. It spreads distrust for "
Index: proprietary-manipulation.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.ru.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-manipulation.ru.po 12 Mar 2021 10:01:17 -0000 1.16
+++ proprietary-manipulation.ru.po 11 Apr 2021 13:04:32 -0000 1.17
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-03-12 08:55+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Manipulation - GNU Project - Free Software Foundation"
@@ -140,6 +141,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Femm “fertility” app is secretly a <a href=\"https://www."
"theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-"
"anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
Index: proprietary-subscriptions.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.de-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary-subscriptions.de-diff.html 15 Mar 2021 13:39:26 -0000
1.34
+++ proprietary-subscriptions.de-diff.html 11 Apr 2021 13:04:32 -0000
1.35
@@ -104,6 +104,16 @@
to have this sort of power.</p>
</li>
+ <li id="M202007020">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>BMW is trying to <a
+
href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates">lock
+ certain features of its cars, and force people to pay to use part of
+ the car they already bought</a>. This is done through forced update
+ of the car software via a radio-operated back door.</p>
+ </li>
+
<li id="M201910071">
<!--#set var="DATE" value='<small
class="date-tag">2019-10</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -249,7 +259,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/03/15 13:39:26 $
+$Date: 2021/04/11 13:04:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-subscriptions.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.de.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary-subscriptions.de.po 18 Jan 2021 13:10:33 -0000 1.37
+++ proprietary-subscriptions.de.po 11 Apr 2021 13:04:32 -0000 1.38
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
"PO-Revision-Date: 2018-08-29 02:39+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -199,6 +199,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-"
"ban-users-from-venezuela-due-to-us-executive-order/\"> cancelled the "
"software subscriptions of all users in Venezuela</a>. This demonstrates how "
Index: proprietary-subscriptions.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.es.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary-subscriptions.es.po 19 Jan 2021 10:00:40 -0000 1.27
+++ proprietary-subscriptions.es.po 11 Apr 2021 13:04:32 -0000 1.28
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
"PO-Revision-Date: 2021-01-19 10:35+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:56+0000\n"
"Plural-Forms: nplurals=2;plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -142,6 +143,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-"
"ban-users-from-venezuela-due-to-us-executive-order/\"> cancelled the "
"software subscriptions of all users in Venezuela</a>. This demonstrates how "
Index: proprietary-subscriptions.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.fr.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary-subscriptions.fr.po 18 Jan 2021 13:10:33 -0000 1.57
+++ proprietary-subscriptions.fr.po 11 Apr 2021 13:04:32 -0000 1.58
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
"PO-Revision-Date: 2020-10-17 10:26+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
@@ -137,6 +138,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-"
"ban-users-from-venezuela-due-to-us-executive-order/\"> cancelled the "
"software subscriptions of all users in Venezuela</a>. This demonstrates how "
Index: proprietary-subscriptions.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ja-diff.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary-subscriptions.ja-diff.html 15 Mar 2021 13:39:26 -0000
1.44
+++ proprietary-subscriptions.ja-diff.html 11 Apr 2021 13:04:32 -0000
1.45
@@ -106,6 +106,16 @@
to have this sort of power.</p>
</li>
+ <li id="M202007020">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>BMW is trying to <a
+
href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates">lock
+ certain features of its cars, and force people to pay to use part of
+ the car they already bought</a>. This is done through forced update
+ of the car software via a radio-operated back door.</p>
+ </li>
+
<li id="M201910071">
<!--#set var="DATE" value='<small
class="date-tag">2019-10</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -249,7 +259,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/03/15 13:39:26 $
+$Date: 2021/04/11 13:04:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-subscriptions.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ja.po,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary-subscriptions.ja.po 18 Jan 2021 13:10:34 -0000 1.33
+++ proprietary-subscriptions.ja.po 11 Apr 2021 13:04:32 -0000 1.34
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
"PO-Revision-Date: 2016-09-16 09:36+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -158,6 +158,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-"
"ban-users-from-venezuela-due-to-us-executive-order/\"> cancelled the "
"software subscriptions of all users in Venezuela</a>. This demonstrates how "
Index: proprietary-subscriptions.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.pot,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary-subscriptions.pot 18 Jan 2021 13:10:34 -0000 1.30
+++ proprietary-subscriptions.pot 11 Apr 2021 13:04:32 -0000 1.31
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -112,6 +112,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a "
+"href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates\">lock
"
+"certain features of its cars, and force people to pay to use part of the car "
+"they already bought</a>. This is done through forced update of the car "
+"software via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Adobe has <a "
"href=\"https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order/\">
"
"cancelled the software subscriptions of all users in Venezuela</a>. This "
Index: proprietary-subscriptions.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ru.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary-subscriptions.ru.po 18 Jan 2021 13:10:34 -0000 1.62
+++ proprietary-subscriptions.ru.po 11 Apr 2021 13:04:32 -0000 1.63
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-01-18 12:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
@@ -139,6 +140,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Adobe has <a href=\"https://www.bleepingcomputer.com/news/software/adobe-to-"
"ban-users-from-venezuela-due-to-us-executive-order/\"> cancelled the "
"software subscriptions of all users in Venezuela</a>. This demonstrates how "
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.176
retrieving revision 1.177
diff -u -b -r1.176 -r1.177
--- proprietary-surveillance.de-diff.html 16 Mar 2021 17:33:27 -0000
1.176
+++ proprietary-surveillance.de-diff.html 11 Apr 2021 13:04:32 -0000
1.177
@@ -646,18 +646,11 @@
snoopers</a>.</p>
<p>Google did not intend to make these apps spy;</strong></del></span>
<span class="inserted"><ins><em>spyware via
- BIOS</a></em></ins></span> on <span
class="inserted"><ins><em>Windows installs. Note that</em></ins></span> the
<span class="removed"><del><strong>contrary, it
- worked in various ways to prevent that, and deleted these apps
- after discovering what they did. So we cannot blame Google
- specifically for the snooping of these apps.</p>
-
- <p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares</strong></del></span> <span
class="inserted"><ins><em>specific
+ BIOS</a></em></ins></span> on <span
class="removed"><del><strong>the</strong></del></span> <span
class="inserted"><ins><em>Windows installs. Note that the specific
sabotage method Lenovo used did not affect GNU/Linux; also, a
“clean” Windows install is not really clean since <a
- href="/proprietary/malware-microsoft.html">Microsoft
puts</em></ins></span> in <span class="removed"><del><strong>the responsibility
for the injustice of their
- being nonfree. It also distributes</strong></del></span> its
- own <span class="removed"><del><strong>nonfree apps,</strong></del></span>
<span class="inserted"><ins><em>malware</a>.</p>
+ href="/proprietary/malware-microsoft.html">Microsoft puts in its
+ own malware</a>.</p>
</li>
</ul>
@@ -681,66 +674,31 @@
<p>The proprietary program Clubhouse
is malware and a privacy disaster. Clubhouse <a
href="https://www.theguardian.com/commentisfree/2021/feb/20/why-hot-new-social-app-clubhouse-spells-nothing-but-trouble">collects
- people's personal data</em></ins></span> such as
- <span class="removed"><del><strong>Google
- Play, <a
href="/philosophy/free-software-even-more-important.html">which
- are malicious</a>.</p>
-
- <p>Could Google have done a better job</strong></del></span> <span
class="inserted"><ins><em>recordings</em></ins></span> of <span
class="removed"><del><strong>preventing apps from
- cheating? There is no systematic way for Google, or Android
- users, to inspect executable proprietary apps to see what they
- do.</p>
-
- <p>Google could demand the source code for these apps, and study the
- source code somehow to determine whether they mistreat users in
- various ways. If it did</strong></del></span> <span
class="inserted"><ins><em>people's
- conversations</a>, and, as</em></ins></span> a <span
class="removed"><del><strong>good job</strong></del></span> <span
class="inserted"><ins><em>secondary problem, does not encrypt them,
- which shows a bad security part</em></ins></span> of <span
class="removed"><del><strong>this, it could more or less
- prevent such snooping, except when</strong></del></span> the <span
class="removed"><del><strong>app developers</strong></del></span> <span
class="inserted"><ins><em>issue.</p>
-
- <p>A user's unique Clubhouse ID number and chatroom
ID</em></ins></span> are <span class="removed"><del><strong>clever
- enough to outsmart</strong></del></span> <span
class="inserted"><ins><em>transmitted
- in plaintext, and Agora (the company behind</em></ins></span> the <span
class="removed"><del><strong>checking.</p>
+ people's personal data such as recordings of people's
+ conversations</a>, and, as a secondary problem, does not encrypt
them,
+ which shows a bad security part of the issue.</p>
+
+ <p>A user's unique Clubhouse ID number and chatroom ID are
transmitted
+ in plaintext, and Agora (the company behind the app) would likely
+ have access to users' raw audio, potentially providing access to
+ the Chinese government.</p>
- <p>But since Google itself develops malicious apps, we cannot trust
- Google</strong></del></span> <span class="inserted"><ins><em>app) would
likely
- have access</em></ins></span> to <span
class="removed"><del><strong>protect us. We must demand release of source
code</strong></del></span> <span class="inserted"><ins><em>users' raw audio,
potentially providing access</em></ins></span> to
- the
- <span class="removed"><del><strong>public, so we can depend on each
other.</p>
-</li>
-<li>
- <p>A
- <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated the privacy
and</strong></del></span> <span class="inserted"><ins><em>Chinese
government.</p>
-
- <p>Even with good</em></ins></span> security of <span
class="removed"><del><strong>283 Android VPN apps concluded that “in
spite</strong></del></span> <span class="inserted"><ins><em>data transmission,
collecting personal
- data</em></ins></span> of <span class="removed"><del><strong>the
- promises for privacy, security,</strong></del></span> <span
class="inserted"><ins><em>people is wrong</em></ins></span> and <span
class="removed"><del><strong>anonymity given by the
- majority</strong></del></span> <span class="inserted"><ins><em>a
violation</em></ins></span> of <span class="removed"><del><strong>VPN
apps—millions</strong></del></span> <span
class="inserted"><ins><em>people's privacy rights.</p>
+ <p>Even with good security of data transmission, collecting personal
+ data of people is wrong and a violation of people's privacy
rights.</p>
</li>
<li id="M202101080">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>As of 2021, WhatsApp (one</em></ins></span> of <span
class="inserted"><ins><em>Facebook's subsidiaries) is <a
+ <p>As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/">forcing
- its</em></ins></span> users <span class="removed"><del><strong>may be
unawarely subject</strong></del></span> to <span
class="removed"><del><strong>poor security guarantees and abusive practices
inflicted by
- VPN apps.”</p>
+ its users to hand over sensitive personal data</a> to its parent
+ company. This increases Facebook's power over users, and further
+ jeopardizes people's privacy and security.</p>
- <p>Following is a non-exhaustive list of proprietary VPN apps from
- the research paper that tracks</strong></del></span> <span
class="inserted"><ins><em>hand over sensitive personal data</a> to its
parent
- company. This increases Facebook's power over users,</em></ins></span> and
<span class="removed"><del><strong>infringes the</strong></del></span> <span
class="inserted"><ins><em>further
- jeopardizes people's</em></ins></span> privacy <span
class="inserted"><ins><em>and security.</p>
-
- <p>Instead</em></ins></span> of
- <span class="removed"><del><strong>users:</p>
-
- <dl>
- <dt>SurfEasy</dt>
- <dd>Includes tracking libraries such as
NativeX</strong></del></span> <span class="inserted"><ins><em>WhatsApp you can
use <a
+ <p>Instead of WhatsApp you can use <a
href="https://directory.fsf.org/wiki/Jami">GNU Jami</a>, which is
- free software</em></ins></span> and <span
class="removed"><del><strong>Appflood,
- meant to track</strong></del></span> <span
class="inserted"><ins><em>will not collect your data.</p>
+ free software and will not collect your data.</p>
</li>
<li id="M202006260">
@@ -749,57 +707,33 @@
<p>Most apps are malware, but
Trump's campaign app, like Modi's campaign app, is <a
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
- especially nasty malware, helping companies snoop on</em></ins></span>
users <span class="removed"><del><strong>and show</strong></del></span> <span
class="inserted"><ins><em>as well
- as snooping on</em></ins></span> them <span
class="removed"><del><strong>targeted ads.</dd>
-
- <dt>sFly Network Booster</dt>
- <dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning</strong></del></span> <span
class="inserted"><ins><em>itself</a>.</p>
+ especially nasty malware, helping companies snoop on users as well
+ as snooping on them itself</a>.</p>
<p>The article says that Biden's app has a less manipulative overall
- approach, but that does not tell us whether</em></ins></span> it has <span
class="removed"><del><strong>full access to
- users' text messages.</dd>
-
- <dt>DroidVPN and TigerVPN</dt>
- <dd>Requests</strong></del></span> <span
class="inserted"><ins><em>functionalities we
- consider malicious, such as sending data</em></ins></span> the <span
class="removed"><del><strong><code>READ_LOGS</code>
permission</strong></del></span> <span class="inserted"><ins><em>user has not
explicitly
- asked</em></ins></span> to <span class="removed"><del><strong>read logs
- for other apps</strong></del></span> <span
class="inserted"><ins><em>send.</p>
+ approach, but that does not tell us whether it has functionalities we
+ consider malicious, such as sending data the user has not explicitly
+ asked to send.</p>
</li>
<li id="M201809121">
<!--#set var="DATE" value='<small
class="date-tag">2018-09</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Tiny Lab Productions, along with online ad businesses run
- by Google, Twitter</em></ins></span> and <span
class="removed"><del><strong>also core system logs. TigerVPN developers
- have confirmed this.</dd>
-
- <dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it stores detailed
logs</strong></del></span> <span class="inserted"><ins><em>three other
companies are facing a lawsuit <a
+ by Google, Twitter and three other companies are facing a lawsuit <a
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html">for
- violating people's privacy by collecting their data from mobile
games</em></ins></span>
- and <span class="removed"><del><strong>may turn them</strong></del></span>
<span class="inserted"><ins><em>handing</em></ins></span> over <span
class="inserted"><ins><em>these data</em></ins></span> to <span
class="removed"><del><strong>the UK government if
- requested.</dd>
-
- <dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages returned to the
- users. The stated purpose</strong></del></span> <span
class="inserted"><ins><em>other companies/advertisers</a>.</p>
+ violating people's privacy by collecting their data from mobile games
+ and handing over these data to other
companies/advertisers</a>.</p>
</li>
<li id="M201601110">
<!--#set var="DATE" value='<small
class="date-tag">2016-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>the JS injection</strong></del></span> <span
class="inserted"><ins><em>monitoring
- people through “their” phones</em></ins></span> is <span
class="inserted"><ins><em><a
+ <p>The natural extension of monitoring
+ people through “their” phones is <a
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software</em></ins></span> to <span
class="removed"><del><strong>display
- ads. Uses roughly 5 tracking libraries. Also, it
redirects</strong></del></span> <span class="inserted"><ins><em>make sure they
can't “fool”</em></ins></span>
- the
- <span class="removed"><del><strong>user's traffic through valueclick.com
(an advertising
- website).</dd>
-
- <dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages,</strong></del></span>
<span class="inserted"><ins><em>monitoring</a>.</p>
+ proprietary software to make sure they can't “fool”
+ the monitoring</a>.</p>
</li>
<li id="M201510050">
@@ -808,59 +742,37 @@
<p>According to Edward Snowden, <a
href="http://www.bbc.com/news/uk-34444233">agencies can take over
smartphones</a> by sending hidden text messages which enable
- them to turn the phones on</em></ins></span> and <span
class="removed"><del><strong>also uses
- roughly 5 tracking libraries. Developers of this app have
- confirmed that</strong></del></span> <span
class="inserted"><ins><em>off, listen to</em></ins></span> the <span
class="removed"><del><strong>non-premium version of</strong></del></span> <span
class="inserted"><ins><em>microphone,
- retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>app does
- JavaScript injection for tracking</strong></del></span> <span
class="inserted"><ins><em>GPS, take photographs, read
- text messages, read call, location</em></ins></span> and <span
class="removed"><del><strong>display ads.</dd>
- </dl></strong></del></span> <span class="inserted"><ins><em>web
browsing history, and
+ them to turn the phones on and off, listen to the microphone,
+ retrieve geo-location data from the GPS, take photographs, read
+ text messages, read call, location and web browsing history, and
read the contact list. This malware is designed to disguise itself
- from investigation.</p></em></ins></span>
+ from investigation.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201311120">
+ <li id="M201311120">
<!--#set var="DATE" value='<small
class="date-tag">2013-11</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p><a <span
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
- The NSA can tap data</em></ins></span> in <span
class="removed"><del><strong>2015</a> found that 90% of the top-ranked
gratis
- proprietary Android apps contained recognizable tracking libraries. For
- the paid proprietary apps,</strong></del></span> <span
class="inserted"><ins><em>smart phones, including iPhones,
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
+ The NSA can tap data in smart phones, including iPhones,
Android, and BlackBerry</a>. While there is not much
- detail here,</em></ins></span> it <span class="removed"><del><strong>was
only 60%.</p>
-
- <p>The article confusingly describes gratis apps as “free”,
- but most of them are</strong></del></span> <span
class="inserted"><ins><em>seems that this does</em></ins></span> not <span
class="removed"><del><strong>in fact
- <a href="/philosophy/free-sw.html">free software</a>.
- It also uses</strong></del></span> <span class="inserted"><ins><em>operate
via</em></ins></span>
- the <span class="removed"><del><strong>ugly word “monetize”. A
good replacement
- for</strong></del></span> <span class="inserted"><ins><em>universal back
door</em></ins></span> that <span class="removed"><del><strong>word is
“exploit”;</strong></del></span> <span class="inserted"><ins><em>we
know</em></ins></span> nearly <span class="removed"><del><strong>always that
will fit
- perfectly.</p></strong></del></span> <span
class="inserted"><ins><em>all portable
+ detail here, it seems that this does not operate via
+ the universal back door that we know nearly all portable
phones have. It may involve exploiting various bugs. There are <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots of bugs in the phones' radio
software</a>.</p></em></ins></span>
+ lots of bugs in the phones' radio software</a>.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Apps for BART</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201307000">
+ <li id="M201307000">
<!--#set var="DATE" value='<small
class="date-tag">2013-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Portable phones with GPS</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps,</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send their GPS location on remote command, and</em></ins></span>
users <span class="removed"><del><strong>could <em>make sure</em>
that they don't snoop.</p>
- <p>With proprietary apps, one can only hope that they
don't.</p></strong></del></span> <span class="inserted"><ins><em>cannot
stop
+ <p>Portable phones with GPS <a
+
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+ will send their GPS location on remote command, and users cannot stop
them</a>. (The US says it will eventually require all new portable
phones
- to have GPS.)</p></em></ins></span>
+ to have GPS.)</p>
</li>
-
-<span class="removed"><del><strong><li>
- <p>A study found 234 Android apps that track users
by</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -872,47 +784,29 @@
<li id="M202009183">
<!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Facebook</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or
played</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops
- on Instagram</a> users</em></ins></span> by <span
class="removed"><del><strong>TV programs</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>surreptitously turning on the device's
- camera.</p></em></ins></span>
+ <p>Facebook <a
+
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops
+ on Instagram</a> users by surreptitously turning on the device's
+ camera.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Pairs</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M202004200">
+ <li id="M202004200">
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Apple whistleblower Thomas Le Bonniec reports that Apple
- made a practice</em></ins></span> of <span
class="removed"><del><strong>Android apps can collude</strong></del></span>
<span class="inserted"><ins><em>surreptitiously activating the Siri
software</em></ins></span> to <span
class="removed"><del><strong>transmit</strong></del></span> <span
class="inserted"><ins><em><a
+ made a practice of surreptitiously activating the Siri software to <a
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf">
- record</em></ins></span> users' <span class="removed"><del><strong>personal
- data</strong></del></span> <span
class="inserted"><ins><em>conversations when they had not activated
Siri</a>.
+ record users' conversations when they had not activated Siri</a>.
This was not just occasional, it was systematic practice.</p>
- <p>His job was</em></ins></span> to <span
class="removed"><del><strong>servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that collude</a>.</p>
-</li>
-
-<li>
-<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details of users</strong></del></span> <span
class="inserted"><ins><em>listen to these recordings, in a
group</em></ins></span> that <span class="removed"><del><strong>install the
app</a>.</p>
-
-<p>Merely asking the “consent”</strong></del></span> <span
class="inserted"><ins><em>made
- transcripts</em></ins></span> of <span class="removed"><del><strong>users
is</strong></del></span> <span class="inserted"><ins><em>them. He
does</em></ins></span> not <span
class="removed"><del><strong>enough</strong></del></span> <span
class="inserted"><ins><em>believes that Apple has ceased this
+ <p>His job was to listen to these recordings, in a group that made
+ transcripts of them. He does not believes that Apple has ceased this
practice.</p>
- <p>The only reliable way</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this.
At</strong></del></span> <span
class="inserted"><ins><em>prevent</em></ins></span> this <span
class="removed"><del><strong>point, most users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>is,
for</em></ins></span> the <span class="removed"><del><strong>“Terms and
Conditions”</strong></del></span> <span
class="inserted"><ins><em>program</em></ins></span> that <span
class="removed"><del><strong>spell out
-what they are “consenting” to. Google should
clearly</strong></del></span>
- <span class="inserted"><ins><em>controls access to the microphone to
decide when the user has
- “activated” any service, to be free
software,</em></ins></span> and <span class="removed"><del><strong>honestly
identify</strong></del></span> the <span
class="removed"><del><strong>information it collects on users, instead
-of hiding</strong></del></span>
- <span class="inserted"><ins><em>operating system under</em></ins></span>
it <span class="inserted"><ins><em>free as well. This way, users could make
+ <p>The only reliable way to prevent this is, for the program that
+ controls access to the microphone to decide when the user has
+ “activated” any service, to be free software, and the
+ operating system under it free as well. This way, users could make
sure Apple can't listen to them.</p>
</li>
@@ -921,120 +815,47 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Safari occasionally <a
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
- sends browsing data from Apple devices</em></ins></span> in <span
class="removed"><del><strong>an obscurely worded EULA.</p>
-
-<p>However,</strong></del></span> <span
class="inserted"><ins><em>China</em></ins></span> to <span
class="removed"><del><strong>truly protect people's privacy, we must prevent
Google
-and other companies from getting this personal information in the first
-place!</p>
-</li>
-
- <li>
- <p>Google Play (a component of Android) <a
-
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</strong></del></span> the <span class="removed"><del><strong>users'
movements without their permission</a>.</p>
-
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>Tencent Safe
- Browsing service</a>,</em></ins></span> to <span
class="removed"><del><strong>completely stop the tracking. This is
- yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>check URLs that possibly
correspond</em></ins></span> to <span class="removed"><del><strong>obey the
user,
- when it's actually doing something else. Such a thing would be almost
- unthinkable</strong></del></span>
- <span class="inserted"><ins><em>“fraudulent” websites. Since
Tencent collaborates</em></ins></span>
- with <span class="removed"><del><strong>free software.</p>
-
- </li>
-
- <li><p>More than 73% of</strong></del></span> the <span
class="inserted"><ins><em>Chinese government, its Safe Browsing black
list</em></ins></span> most <span class="removed"><del><strong>popular Android
apps
- <a href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a></strong></del></span> <span
class="inserted"><ins><em>certainly
- contains the websites</em></ins></span> of <span
class="inserted"><ins><em>political opponents. By linking the requests
+ sends browsing data from Apple devices in China to the Tencent Safe
+ Browsing service</a>, to check URLs that possibly correspond to
+ “fraudulent” websites. Since Tencent collaborates
+ with the Chinese government, its Safe Browsing black list most certainly
+ contains the websites of political opponents. By linking the requests
originating from single IP addresses, the government can identify
- dissenters in China and Hong Kong, thus endangering</em></ins></span>
their <span class="removed"><del><strong>users with third
parties.</p></strong></del></span> <span
class="inserted"><ins><em>lives.</p></em></ins></span>
+ dissenters in China and Hong Kong, thus endangering their lives.</p>
</li>
- <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905280">
+ <li id="M201905280">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>In spite of Apple's supposed commitment</em></ins></span> to
<span class="removed"><del><strong>the app's functionality,
- was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis Android apps</a>.</p>
-
- <p>The article should not have described these</strong></del></span>
- <span class="inserted"><ins><em>privacy, iPhone</em></ins></span> apps
<span class="removed"><del><strong>as
- “free”—they</strong></del></span> <span
class="inserted"><ins><em>contain trackers that</em></ins></span> are <span
class="removed"><del><strong>not free software. The clear
way</strong></del></span> <span class="inserted"><ins><em>busy at night <a
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers that are busy at night <a
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
- sending users' personal information</em></ins></span> to <span
class="removed"><del><strong>say
- “zero price” is
“gratis.”</p></strong></del></span> <span
class="inserted"><ins><em>third parties</a>.</p></em></ins></span>
+ sending users' personal information to third parties</a>.</p>
- <p>The article <span class="removed"><del><strong>takes for granted
that the usual analytics tools are
- legitimate, but</strong></del></span> <span
class="inserted"><ins><em>mentions specific examples: Microsoft OneDrive,
+ <p>The article mentions specific examples: Microsoft OneDrive,
Intuit's Mint, Nike, Spotify, The Washington Post, The Weather
Channel (owned by IBM), the crime-alert service Citizen, Yelp
- and DoorDash. But it</em></ins></span> is <span
class="inserted"><ins><em>likely</em></ins></span> that <span
class="removed"><del><strong>valid? Software developers have no right to
- analyze what users are doing or how. “Analytics” tools that
snoop are
- just as wrong as any other snooping.</p>
- </li>
- <li><p>Gratis Android</strong></del></span> <span
class="inserted"><ins><em>most nonfree</em></ins></span> apps <span
class="removed"><del><strong>(but not <a
href="/philosophy/free-sw.html">free software</a>)
- connect to 100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
- on the average.</p>
- </li>
- <li><p>Spyware is present in some Android devices when they are
sold.</strong></del></span> <span class="inserted"><ins><em>contain
- trackers.</em></ins></span> Some <span
class="removed"><del><strong>Motorola phones modify Android to
- <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"></strong></del></span>
<span class="inserted"><ins><em>of these</em></ins></span> send <span
class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>personally identifying</em></ins></span> data <span
class="removed"><del><strong>to Motorola</a>.</p>
- </li>
-
- <li><p>Some manufacturers add a
- <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package</strong></del></span> such as <span
class="removed"><del><strong>Carrier IQ.</a></p>
- </li>
-
- <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file
on</strong></del></span> <span class="inserted"><ins><em>phone
+ and DoorDash. But it is likely that most nonfree apps contain
+ trackers. Some of these send personally identifying data such as phone
fingerprint, exact location, email address, phone number or even
- delivery address (in</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>case of DoorDash). Once this information
+ delivery address (in the case of DoorDash). Once this information
is collected by the company, there is no telling what it will be
- used for.</p></em></ins></span>
+ used for.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure to place new items on top under each
subsection</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711250">
+ <li id="M201711250">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareIniThings">Spyware in iThings</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
-</div>
-
-<ul>
- <li><p>The</strong></del></span>
- <span class="inserted"><ins><em><p>The</em></ins></span> DMCA and
the EU Copyright Directive make it <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The DMCA and the EU Copyright Directive make it <a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS <span
class="removed"><del><strong>cr...apps</strong></del></span> <span
class="inserted"><ins><em>cr…apps</em></ins></span> spy on
users</a>, because
+ illegal to study how iOS cr…apps spy on users</a>, because
this would require circumventing the iOS DRM.</p>
</li>
- <span
class="removed"><del><strong><li><p>In</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201709210">
+ <li id="M201709210">
<!--#set var="DATE" value='<small
class="date-tag">2017-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>In</em></ins></span> the latest iThings system,
+ <p>In the latest iThings system,
“turning off” WiFi and Bluetooth the obvious way <a
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
@@ -1042,64 +863,43 @@
know you want to be spied on”.</p>
</li>
- <span
class="removed"><del><strong><li><p>Apple</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702150">
+ <li id="M201702150">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apple</em></ins></span> proposes <a
+ <p>Apple proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
- fingerprint-scanning touch <span
class="removed"><del><strong>screen</a>
- — which</strong></del></span> <span
class="inserted"><ins><em>screen</a>—which</em></ins></span> would
mean no way
+ fingerprint-scanning touch screen</a>—which would mean no way
to use it without having your fingerprints taken. Users would have
- no way to tell whether the phone is snooping on
- <span class="removed"><del><strong>them.</p></li>
-
- <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>them.</p>
+ no way to tell whether the phone is snooping on them.</p>
</li>
<li id="M201611170">
<!--#set var="DATE" value='<small
class="date-tag">2016-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send</em></ins></span>
+ <p>iPhones <a
+
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
lots of personal data to Apple's servers</a>. Big Brother can get
them from there.</p>
</li>
- <span
class="removed"><del><strong><li><p>The</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201609280">
+ <li id="M201609280">
<!--#set var="DATE" value='<small
class="date-tag">2016-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The</em></ins></span> iMessage app on iThings <a
+ <p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
a server every phone number that the user types into it</a>; the
server records these numbers for at least 30 days.</p>
</li>
- <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
- without giving a valid email address and receiving the code Apple
- sends to it.</p>
- </li>
-
- <li><p>Around 47% of the most popular iOS apps
- <a class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a> of their users with third
parties.</p>
- </li>
-
- <li><p>iThings</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201509240">
+ <li id="M201509240">
<!--#set var="DATE" value='<small
class="date-tag">2015-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>iThings</em></ins></span> automatically upload to Apple's servers
all the photos
+ <p>iThings automatically upload to Apple's servers all the photos
and videos they make.</p>
<blockquote><p> iCloud Photo Library stores every photo and
video you
take, and keeps them up to date on all your devices. Any edits you
- make are automatically updated everywhere. <span
class="removed"><del><strong>[...]</strong></del></span> <span
class="inserted"><ins><em>[…]</em></ins></span>
</p></blockquote>
+ make are automatically updated everywhere. […]
</p></blockquote>
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
information</a> as accessed on 24 Sep 2015.) The iCloud feature is
@@ -1115,11 +915,8 @@
<p>Unknown people apparently took advantage of this to <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA can access any of them through <a
<span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware in iThings:</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+ security to get at them, but NSA can access any of them through <a
+
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
</li>
<li id="M201409220">
@@ -1142,23 +939,21 @@
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
Several “features” of iOS seem to exist
- for no possible purpose other than surveillance</a>. Here
is</em></ins></span> the <a
- <span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ for no possible purpose other than surveillance</a>. Here is the
<a
+
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
<li id="M201401100">
<!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The <a</em></ins></span> class="not-a-duplicate"
+ <p>The <a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
iBeacon</a> lets stores determine exactly where the iThing is, and
get other info too.</p>
</li>
- <span
class="removed"><del><strong><li><p>There</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201312300">
+ <li id="M201312300">
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
@@ -1179,65 +974,39 @@
<li id="M201210170">
<!--#set var="DATE" value='<small
class="date-tag">2012-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>There</em></ins></span> is also a feature for web sites to track
users, which is <a
+ <p>There is also a feature for web sites to track users, which is
<a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it is
still true in iOS 7.)</p>
</li>
- <span class="removed"><del><strong><li><p>The iThing also
- <a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though that can be
- turned off.</p>
- </li>
-
- <li><p>Apple can,</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201204280">
+ <li id="M201204280">
<!--#set var="DATE" value='<small
class="date-tag">2012-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Users cannot make an Apple ID (<a
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary
to install even gratis apps</a>) without giving a valid
- email address</em></ins></span> and <span
class="removed"><del><strong>regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>receiving</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p>
- </li>
-
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either</strong></del></span> <span
class="inserted"><ins><em>verification code</em></ins></span> Apple <span
class="removed"><del><strong>helps the NSA snoop on all the data in an iThing,
- or it is totally incompetent.</a></p>
- </li>
-
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em>sends</em></ins></span>
- to <span class="removed"><del><strong>exist for no
- possible purpose other than surveillance</a>. Here is the
- <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>it.</p></em></ins></span>
+ email address and receiving the verification code Apple sends
+ to it.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware
in</strong></del></span> <span
class="inserted"><ins><em>id="SpywareInAndroid">Android</em></ins></span>
Telephones</h4>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInAndroid">#SpywareInAndroid</a>)</span></em></ins></span>
+ <h4 id="SpywareInAndroid">Android Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInAndroid">#SpywareInAndroid</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Tracking software in popular Android</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202012070">
<!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Baidu</em></ins></span> apps <span class="inserted"><ins><em>were
<a
+ <p>Baidu apps were <a
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/">
caught collecting sensitive personal data</a> that can be used for
lifetime tracking of users, and putting them in danger. More than 1.4
billion people worldwide are affected by these proprietary apps, and
- users' privacy</em></ins></span> is <span
class="removed"><del><strong>pervasive</strong></del></span> <span
class="inserted"><ins><em>jeopardized by this surveillance tool. Data collected
+ users' privacy is jeopardized by this surveillance tool. Data collected
by Baidu may be handed over to the Chinese government, possibly
putting Chinese people in danger.</p>
</li>
@@ -1248,46 +1017,32 @@
<p>Samsung is forcing its smartphone users in Hong Kong (and Macau)
<a
href="https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-dns-service-upon-hong-kong-wifi-users/">to
use a public DNS in Mainland China</a>, using software update
released
- in September 2020, which causes many unease</em></ins></span> and
- <span class="removed"><del><strong>sometimes very clever. Some trackers
can</strong></del></span> <span class="inserted"><ins><em>privacy
concerns.</p>
+ in September 2020, which causes many unease and privacy concerns.</p>
</li>
<li id="M202004300">
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Xiaomi phones</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
- many actions the user takes</a>: starting an app, looking
at</em></ins></span> a <span class="removed"><del><strong>user's movements
around</strong></del></span> <span class="inserted"><ins><em>folder,
- visiting</em></ins></span> a <span class="removed"><del><strong>physical
store by noticing WiFi
- networks</a>.</p>
-</li>
-
- <li><p>Android tracks location for Google</strong></del></span>
<span class="inserted"><ins><em>website, listening to a song. They send device
identifying
+ <p>Xiaomi phones <a
+
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
+ many actions the user takes</a>: starting an app, looking at a
folder,
+ visiting a website, listening to a song. They send device identifying
information too.</p>
<p>Other nonfree programs snoop too. For instance, Spotify and
- other streaming dis-services make a dossier about each user,
and</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off,
even</strong></del></span>
- <span
class="inserted"><ins><em>href="/malware/proprietary-surveillance.html#M201508210">
they make
+ other streaming dis-services make a dossier about each user, and <a
+ href="/malware/proprietary-surveillance.html#M201508210"> they make
users identify themselves to pay</a>. Out, out, damned
Spotify!</p>
- <p>Forbes exonerates the same wrongs</em></ins></span> when the
<span class="removed"><del><strong>phone has</strong></del></span> <span
class="inserted"><ins><em>culprits are not Chinese,
- but we condemn this</em></ins></span> no <span
class="removed"><del><strong>SIM card</a>.</p></li>
-
- <li><p>Some portable phones</strong></del></span> <span
class="inserted"><ins><em>matter who does it.</p>
+ <p>Forbes exonerates the same wrongs when the culprits are not
Chinese,
+ but we condemn this no matter who does it.</p>
</li>
<li id="M201812060">
<!--#set var="DATE" value='<small
class="date-tag">2018-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Facebook's app got “consent” to</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to
China</a>.</p></li>
-
- <li><p>According</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
+ <p>Facebook's app got “consent” to <a
+
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
upload call logs automatically from Android phones</a> while
disguising
what the “consent” was for.</p>
</li>
@@ -1295,13 +1050,11 @@
<li id="M201811230">
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>An Android phone was observed</em></ins></span> to <span
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>track location even while
+ <p>An Android phone was observed to track location even while
in airplane mode. It didn't send the location data while in
- airplane mode. Instead,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages which enable them to
turn</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up</em></ins></span> the <span class="removed"><del><strong>phones
- on</strong></del></span> <span
class="inserted"><ins><em>data,</em></ins></span> and <span
class="inserted"><ins><em>sent them all later</a>.</p>
+ airplane mode. Instead, <a
+
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
+ it saved up the data, and sent them all later</a>.</p>
</li>
<li id="M201711210">
@@ -1309,8 +1062,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Android tracks location for Google <a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned</em></ins></span>
off, <span class="removed"><del><strong>listen to</strong></del></span> <span
class="inserted"><ins><em>even when</em></ins></span>
- the <span class="removed"><del><strong>microphone, retrieve
geo-location</strong></del></span> <span class="inserted"><ins><em>phone has no
SIM card</a>.</p>
+ even when “location services” are turned off, even when
+ the phone has no SIM card</a>.</p>
</li>
<li id="M201611150">
@@ -1318,7 +1071,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of</em></ins></span> data <span
class="removed"><del><strong>from</strong></del></span> <span
class="inserted"><ins><em>to China</a>.</p>
+ sold with spyware sending lots of data to China</a>.</p>
</li>
<li id="M201609140">
@@ -1326,159 +1079,86 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Google Play (a component of Android) <a
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
- browsing history,</strong></del></span> <span
class="inserted"><ins><em>users' movements without their
permission</a>.</p>
+ tracks the users' movements without their permission</a>.</p>
- <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>location tracking, you must
- disable Google Play itself to completely stop</em></ins></span> the <span
class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>tracking.</em></ins></span> This <span
class="removed"><del><strong>malware</strong></del></span> is <span
class="removed"><del><strong>designed</strong></del></span>
- <span class="inserted"><ins><em>yet another example of nonfree software
pretending</em></ins></span> to
- <span class="removed"><del><strong>disguise itself from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>obey the user,
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself to completely stop the tracking. This is
+ yet another example of nonfree software pretending to obey the user,
when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p></em></ins></span>
+ unthinkable with free software.</p>
</li>
- <span
class="removed"><del><strong><li><p>Samsung</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201507030">
+ <li id="M201507030">
<!--#set var="DATE" value='<small
class="date-tag">2015-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Samsung</em></ins></span> phones come with <a
+ <p>Samsung phones come with <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>, and they send so much data that their
transmission is a substantial expense for users. Said transmission,
not wanted or requested by the user, clearly must constitute spying
- of some
- <span class="removed"><del><strong>kind.</p></li>
-
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</strong></del></span> <span
class="inserted"><ins><em>kind.</p>
+ of some kind.</p>
</li>
<li id="M201403120">
<!--#set var="DATE" value='<small
class="date-tag">2014-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file
on</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>system.</p></em></ins></span>
+ Samsung's back door</a> provides access to any file on the
system.</p>
</li>
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201308010">
+ <li id="M201308010">
<!--#set var="DATE" value='<small
class="date-tag">2013-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Spyware</em></ins></span> in Android phones (and Windows?
laptops): The Wall Street
+ <p>Spyware in Android phones (and Windows? laptops): The Wall Street
Journal (in an article blocked from us by a paywall) reports that <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
the FBI can remotely activate the GPS and microphone in Android phones
- and <span class="removed"><del><strong>laptops</a>.
- (I suspect this means</strong></del></span> <span
class="inserted"><ins><em>laptops</a> (presumably</em></ins></span>
Windows <span class="removed"><del><strong>laptops.)</strong></del></span>
<span class="inserted"><ins><em>laptops).</em></ins></span> Here is <a
+ and laptops</a> (presumably Windows laptops). Here is <a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
- remote command and users cannot stop them:
- <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable phones
- to have GPS.)</p>
- </li>
-
- <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201307280">
+ <li id="M201307280">
<!--#set var="DATE" value='<small
class="date-tag">2013-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Spyware</em></ins></span> is <span
class="removed"><del><strong>to restrict
- the use of data on the user's computer, but it does surveillance
- too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the user's list of other people's phone
- numbers.</a></p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware</strong></del></span> <span
class="inserted"><ins><em>present</em></ins></span> in <span
class="removed"><del><strong>Mobile Applications</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>The moviepass app and dis-service spy on users even more than
users
- expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where</strong></del></span> <span class="inserted"><ins><em>some
Android devices when</em></ins></span> they <span
class="removed"><del><strong>travel before and after going
to</strong></del></span> <span class="inserted"><ins><em>are
+ <p>Spyware is present in some Android devices when they are
sold. Some Motorola phones, made when this company was owned
- by Google, use</em></ins></span> a <span
class="removed"><del><strong>movie</a>.
- </p>
-
- <p>Don't be tracked — pay
cash!</p></strong></del></span> <span class="inserted"><ins><em>modified
version of Android that <a
+ by Google, use a modified version of Android that <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal data to Motorola</a>.</p></em></ins></span>
+ sends personal data to Motorola</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>AI-powered driving
apps can</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201307250">
+ <li id="M201307250">
<!--#set var="DATE" value='<small
class="date-tag">2013-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p></em></ins></span>
+ <p>A Motorola phone <a
+
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all the time</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The
Sarahah</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201302150">
+ <li id="M201302150">
<!--#set var="DATE" value='<small
class="date-tag">2013-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google Play intentionally sends</em></ins></span> app <span
class="inserted"><ins><em>developers</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers and email addresses</a> in user's address
- book to developer's server. Note</strong></del></span>
- <span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
- the personal details of users</em></ins></span> that <span
class="removed"><del><strong>this article misuses</strong></del></span> <span
class="inserted"><ins><em>install</em></ins></span> the <span
class="removed"><del><strong>words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
-
- <p>Merely asking the “consent” of users is not
enough</em></ins></span> to <span class="removed"><del><strong>zero
price.</p>
- </li>
-
- <li>
- <p>Facebook's app listens all</strong></del></span>
- <span class="inserted"><ins><em>legitimize actions like this. At this
point, most users have stopped
- reading</em></ins></span> the <span class="removed"><del><strong>time,
<a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
- on</strong></del></span> <span class="inserted"><ins><em>“Terms and
Conditions” that spell out</em></ins></span> what <span
class="removed"><del><strong>people</strong></del></span>
- <span class="inserted"><ins><em>they</em></ins></span> are <span
class="removed"><del><strong>listening to or watching</a>. In
addition,</strong></del></span> <span
class="inserted"><ins><em>“consenting” to. Google should clearly
and
- honestly identify the information</em></ins></span> it <span
class="removed"><del><strong>may
- be analyzing people's conversations to serve them with targeted
- advertisements.</p>
- </li>
-
- <li>
- <p>Faceapp appears to do lots</strong></del></span> <span
class="inserted"><ins><em>collects on users, instead</em></ins></span> of <span
class="removed"><del><strong>surveillance, judging by
- <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access</strong></del></span>
- <span class="inserted"><ins><em>hiding</em></ins></span> it <span
class="removed"><del><strong>demands</strong></del></span> <span
class="inserted"><ins><em>in an obscurely worded EULA.</p>
-
- <p>However,</em></ins></span> to <span
class="inserted"><ins><em>truly protect people's privacy, we must prevent Google
- and other companies from getting this</em></ins></span> personal <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>information</em></ins></span> in the <span
class="removed"><del><strong>device</a>.
- </p>
- </li>
-
- <li>
- <p>Verizon</strong></del></span>
- <span class="inserted"><ins><em>first place!</p>
+ <p>Google Play intentionally sends app developers <a
+
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+ the personal details of users that install the app</a>.</p>
+
+ <p>Merely asking the “consent” of users is not enough to
+ legitimize actions like this. At this point, most users have stopped
+ reading the “Terms and Conditions” that spell out what
+ they are “consenting” to. Google should clearly and
+ honestly identify the information it collects on users, instead of
+ hiding it in an obscurely worded EULA.</p>
+
+ <p>However, to truly protect people's privacy, we must prevent Google
+ and other companies from getting this personal information in the
+ first place!</p>
</li>
<li id="M201111170">
<!--#set var="DATE" value='<small
class="date-tag">2011-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some manufacturers add a</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
- pre-install</strong></del></span>
- <span
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ <p>Some manufacturers add a <a
+
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
hidden general surveillance package such as Carrier IQ</a>.</p>
</li>
</ul>
@@ -1495,20 +1175,15 @@
--><!--#echo encoding="none" var="DATE" -->
<p>E-books can contain JavaScript code, and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops</em></ins></span> on <span
class="removed"><del><strong>some of its phones. The app will give Verizon the
same
- information about the users' searches that Google normally gets when
- they use its search engine.</p>
-
- <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>readers</a>.</p>
+ sometimes this code snoops on readers</a>.</p>
</li>
<li id="M201410080">
<!--#set var="DATE" value='<small
class="date-tag">2014-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Adobe made “Digital Editions,”</em></ins></span>
- the <span class="removed"><del><strong>app is</strong></del></span> <span
class="inserted"><ins><em>e-reader used by most US libraries,</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ <p>Adobe made “Digital Editions,”
+ the e-reader used by most US libraries, <a
+
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
send lots of data to Adobe</a>. Adobe's “excuse”: it's
needed to check DRM!</p>
</li>
@@ -1516,17 +1191,11 @@
<li id="M201212030">
<!--#set var="DATE" value='<small
class="date-tag">2012-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Spyware in many e-readers—not</em></ins></span> only <span
class="removed"><del><strong>one phone</a>, and the
- user must explicitly opt-in before</strong></del></span> the <span
class="removed"><del><strong>app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>Kindle: <a
+ <p>Spyware in many e-readers—not only the Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
- report even which page</em></ins></span> the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware is
- still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>user reads at what
time</a>.</p></em></ins></span>
+ report even which page the user reads at what time</a>.</p>
</li>
-
- <span class="removed"><del><strong><li><p>The Meitu photo-editing
- app</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
@@ -1545,56 +1214,25 @@
<li id="M202011260">
<!--#set var="DATE" value='<small
class="date-tag">2020-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft's Office 365 suite enables employers</em></ins></span>
<a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance">to
- snoop on each employee</a>. After</em></ins></span>
- a <span class="removed"><del><strong>Chinese
company</a>.</p></li>
-
- <li><p>A pregnancy test controller application not only
- can</strong></del></span> <span class="inserted"><ins><em>public outburst,
Microsoft stated that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts of data in the phone,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance">it
+ <p>Microsoft's Office 365 suite enables employers <a
+
href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance">to
+ snoop on each employee</a>. After
+ a public outburst, Microsoft stated that <a
+
href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance">it
would remove this capability</a>. Let's hope so.</p>
</li>
<li id="M201912190">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some Avast</em></ins></span> and <span
class="removed"><del><strong>in server accounts, it can
- alter them too</a>.
- </p></li>
-
- <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>AVG extensions
- for Firefox and Chrome were found to</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
- snoop on users' detailed browsing habits</a>.
Mozilla</em></ins></span> and <span
class="removed"><del><strong>after</strong></del></span> <span
class="inserted"><ins><em>Google
- removed</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
-
- <p>This example illustrates</strong></del></span> <span
class="inserted"><ins><em>problematic extensions from their stores, but this
shows
- once more</em></ins></span> how <span
class="removed"><del><strong>“getting the user's consent”
- for surveillance is inadequate as a protection against massive
- surveillance.</p>
- </li>
-
- <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
- </li>
-
- <li><p>Apps that include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance</strong></del></span> <span
class="inserted"><ins><em>unsafe nonfree</em></ins></span> software <span
class="removed"><del><strong>snoop on what radio and TV
programs</strong></del></span> <span class="inserted"><ins><em>can be. Tools
that</em></ins></span> are <span class="removed"><del><strong>playing
nearby</a>. Also on what users post on various sites
- such as Facebook, Google+ and Twitter.</p>
- </li>
-
- <li><p>Facebook's new Magic Photo app
- <a
-href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known faces</a>,
- and suggests you</strong></del></span> <span
class="inserted"><ins><em>supposed</em></ins></span>
- to <span class="removed"><del><strong>share</strong></del></span> <span
class="inserted"><ins><em>protect a proprietary system are, instead, infecting
it with
- additional malware (the system itself being</em></ins></span> the <span
class="removed"><del><strong>picture you take according</strong></del></span>
<span class="inserted"><ins><em>original malware).</p>
+ <p>Some Avast and AVG extensions
+ for Firefox and Chrome were found to <a
+
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
+ snoop on users' detailed browsing habits</a>. Mozilla and Google
+ removed the problematic extensions from their stores, but this shows
+ once more how unsafe nonfree software can be. Tools that are supposed
+ to protect a proprietary system are, instead, infecting it with
+ additional malware (the system itself being the original
malware).</p>
</li>
<li id="M201811020">
@@ -1602,13 +1240,13 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Foundry's graphics software <a
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information</em></ins></span> to <span
class="inserted"><ins><em>identify</em></ins></span> who is <span
class="removed"><del><strong>in the frame.</p></strong></del></span>
<span class="inserted"><ins><em>running it</a>. The result is
+ reports information to identify who is running it</a>. The result is
often a legal threat demanding a lot of money.</p>
<p>The fact that this is used for repression of forbidden sharing
- makes it even more vicious.</p></em></ins></span>
+ makes it even more vicious.</p>
- <p>This <span class="removed"><del><strong>spyware feature seems to
require online access</strong></del></span> <span
class="inserted"><ins><em>illustrates that making unauthorized copies of
nonfree software
+ <p>This illustrates that making unauthorized copies of nonfree
software
is not a cure for the injustice of nonfree software. It may avoid
paying for the nasty thing, but cannot make it less nasty.</p>
</li>
@@ -1626,35 +1264,22 @@
<p>Many cr…apps, developed by various
companies for various organizations, do <a
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth">
- location tracking unknown</em></ins></span> to <span
class="inserted"><ins><em>those companies and those
- organizations</a>. It's actually</em></ins></span> some
- <span class="removed"><del><strong>known-faces database, which
means</strong></del></span> <span class="inserted"><ins><em>widely used
libraries that do</em></ins></span>
- the <span class="removed"><del><strong>pictures are
likely</strong></del></span> <span class="inserted"><ins><em>tracking.</p>
+ location tracking unknown to those companies and those
+ organizations</a>. It's actually some widely used libraries that do
+ the tracking.</p>
<p>What's unusual here is that proprietary software developer A
tricks
proprietary software developers B1 … B50 into making platforms for
- A</em></ins></span> to <span class="removed"><del><strong>be
- sent across</strong></del></span> <span
class="inserted"><ins><em>mistreat</em></ins></span> the <span
class="removed"><del><strong>wire to Facebook's servers and face-recognition
- algorithms.</p>
-
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>end user.</p>
+ A to mistreat the end user.</p>
</li>
<li id="M202003260">
<!--#set var="DATE" value='<small
class="date-tag">2020-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Apple iOS version</em></ins></span> of <span
class="removed"><del><strong>Facebook</strong></del></span> <span
class="inserted"><ins><em>Zoom <a
+ <p>The Apple iOS version of Zoom <a
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account">is
- sending</em></ins></span> users' <span
class="removed"><del><strong>pictures are private
- anymore,</strong></del></span> <span class="inserted"><ins><em>data to
Facebook</a></em></ins></span> even if the user <span
class="removed"><del><strong>didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>doesn't have
- a Facebook account. According</em></ins></span> to the <span
class="removed"><del><strong>service.</p>
- </li>
-
- <li><p>Like most “music screaming” disservices,
Spotify
- is based on proprietary malware (DRM</strong></del></span> <span
class="inserted"><ins><em>article, Zoom</em></ins></span> and <span
class="removed"><del><strong>snooping). In August
- 2015 it <a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased
snooping</a>,</strong></del></span> <span
class="inserted"><ins><em>Facebook
+ sending users' data to Facebook</a> even if the user doesn't have
+ a Facebook account. According to the article, Zoom and Facebook
don't even mention this surveillance on their privacy policy page,
making this an obvious violation of people's privacy even in their
own terms.</p>
@@ -1664,99 +1289,62 @@
<!--#set var="DATE" value='<small
class="date-tag">2020-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The Alipay Health Code app
- estimates whether the user has Covid-19</em></ins></span> and <span
class="removed"><del><strong>some
- are starting to realize that it is nasty.</p>
-
- <p>This article shows</strong></del></span> <span
class="inserted"><ins><em><a
+ estimates whether the user has Covid-19 and <a
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
- tells</em></ins></span> the <span class="inserted"><ins><em>cops
directly</a>.</p>
+ tells the cops directly</a>.</p>
</li>
<li id="M202001290">
<!--#set var="DATE" value='<small
class="date-tag">2020-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Amazon Ring app does</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
- surveillance for other companies</em></ins></span> as <span
class="removed"><del><strong>a way</strong></del></span> <span
class="inserted"><ins><em>well as for Amazon</a>.</p>
+ <p>The Amazon Ring app does <a
+
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
+ surveillance for other companies as well as for Amazon</a>.</p>
</li>
<li id="M201912220">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The ToToc messaging app seems</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
- whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>be</em></ins></span> a <span
class="removed"><del><strong>typical example of</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>The ToToc messaging app seems to be a <a
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
- spying tool for</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>government</em></ins></span> of the <span
class="removed"><del><strong>proprietary software industry towards
- those they have subjugated.</p>
-
- <p>Out, out, damned Spotify!</p>
- </li>
- <li><p>Many proprietary apps for mobile devices report which
other
- apps the user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is</strong></del></span> <span class="inserted"><ins><em>United Arab
Emirates</a>.
- Any nonfree program could be</em></ins></span> doing <span
class="removed"><del><strong>this in a way</strong></del></span> <span
class="inserted"><ins><em>this, and</em></ins></span> that <span
class="removed"><del><strong>at least</strong></del></span> is <span
class="removed"><del><strong>visible and
- optional</a>. Not as bad as what</strong></del></span> <span
class="inserted"><ins><em>a good
+ spying tool for the government of the United Arab Emirates</a>.
+ Any nonfree program could be doing this, and that is a good
reason to use free software instead.</p>
- <p><small>Note: this article uses</em></ins></span> the <span
class="removed"><del><strong>others do.</p>
+ <p><small>Note: this article uses the word “free”
in
+ the sense of “gratis.”</small></p>
</li>
- <li><p>FTC says most mobile apps for children don't respect
privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>word “free” in
- the sense of
“gratis.”</small></p></em></ins></span>
- </li>
-
- <span
class="removed"><del><strong><li><p>Widely</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201912090">
+ <li id="M201912090">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>iMonsters and Android phones,
- when</em></ins></span> used <span class="inserted"><ins><em>for work, give
employers powerful</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
+ when used for work, give employers powerful <a
+
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
snooping and sabotage capabilities</a> if they install their own
- software</em></ins></span> on the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>device. Many
employers demand</em></ins></span> to <span class="inserted"><ins><em>do this.
For</em></ins></span> the <span class="removed"><del><strong>snooping done by
the phone company,</strong></del></span>
- <span class="inserted"><ins><em>employee, this is simply nonfree software,
as fundamentally unjust</em></ins></span>
- and <span class="removed"><del><strong>perhaps by the OS in the
- phone.</p>
-
- <p>Don't be distracted by the question of
whether</strong></del></span> <span class="inserted"><ins><em>as dangerous as
any other nonfree software.</p>
+ software on the device. Many employers demand to do this. For the
+ employee, this is simply nonfree software, as fundamentally unjust
+ and as dangerous as any other nonfree software.</p>
</li>
<li id="M201910130">
<!--#set var="DATE" value='<small
class="date-tag">2019-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Chinese Communist Party's “Study</em></ins></span>
- the <span class="inserted"><ins><em>Great Nation”</em></ins></span>
app <span class="removed"><del><strong>developers get</strong></del></span>
<span class="inserted"><ins><em>requires</em></ins></span> users to <span
class="removed"><del><strong>say “I agree”. That is no excuse for
malware.</p>
- </li>
-
- <li><p>The Brightest Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p>
-
- <p>The FTC criticized this app because</strong></del></span> <span
class="inserted"><ins><em>grant</em></ins></span> it <span
class="removed"><del><strong>asked</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>The Chinese Communist Party's “Study
+ the Great Nation” app requires users to grant it <a
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access to</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts,
and
- internet history</a>, and the Android version was
found</em></ins></span> to
- <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>contain a
- back-door allowing developers</em></ins></span> to <span
class="inserted"><ins><em>run any code they wish in</em></ins></span> the <span
class="inserted"><ins><em>users'
- phone, as “superusers.” Downloading and using
this</em></ins></span>
- app <span class="removed"><del><strong>developer</strong></del></span>
<span class="inserted"><ins><em>is mandatory at some workplaces.</p>
+ access to the phone's microphone, photos, text messages, contacts, and
+ internet history</a>, and the Android version was found to contain a
+ back-door allowing developers to run any code they wish in the users'
+ phone, as “superusers.” Downloading and using this
+ app is mandatory at some workplaces.</p>
<p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly
obfuscated,</em></ins></span> but <span class="removed"><del><strong>did not
- ask about sending it to other companies. This
shows</strong></del></span>
- <span class="inserted"><ins><em>readable after copy-pasting in a text
editor) includes a clarification
- saying that</em></ins></span> the
- <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>tests were only performed on the Android
version</em></ins></span>
- of the <span class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution”</strong></del></span> <span
class="inserted"><ins><em>app, and that, according</em></ins></span> to <span
class="removed"><del><strong>surveillance: why should a
flashlight</strong></del></span> <span class="inserted"><ins><em>Apple,
“this kind of
+ Washington Post version of the article</a> (partly obfuscated, but
+ readable after copy-pasting in a text editor) includes a clarification
+ saying that the tests were only performed on the Android version
+ of the app, and that, according to Apple, “this kind of
‘superuser’ surveillance could not be conducted on
Apple's operating system.”</p>
</li>
@@ -1764,113 +1352,65 @@
<li id="M201909091">
<!--#set var="DATE" value='<small
class="date-tag">2019-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Facebook</em></ins></span> app <span
class="removed"><del><strong>send any information to anyone? A free software
flashlight</strong></del></span> <span class="inserted"><ins><em><a
+ <p>The Facebook app <a
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
tracks users even when it is turned off</a>, after tricking them
- into giving the</em></ins></span> app <span
class="removed"><del><strong>would not.</p>
+ into giving the app broad permissions in order to use one of its
+ functionalities.</p>
</li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware</strong></del></span> <span
class="inserted"><ins><em>broad permissions</em></ins></span> in <span
class="removed"><del><strong>Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-<ul>
-
- <li>
- <p>A remote-control sex toy was found</strong></del></span> <span
class="inserted"><ins><em>order</em></ins></span> to <span
class="removed"><del><strong>make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings</strong></del></span> <span class="inserted"><ins><em>use
one</em></ins></span> of <span class="removed"><del><strong>the conversation
between two users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>its
- functionalities.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li>
- <p>The “smart” toys My Friend Cayla</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201909090">
+ <li id="M201909090">
<!--#set var="DATE" value='<small
class="date-tag">2019-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some nonfree period-tracking apps including MIA
Fem</em></ins></span> and <span class="removed"><del><strong>i-Que
transmit</strong></del></span> <span
class="inserted"><ins><em>Maya</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
- send intimate details of users' lives</em></ins></span> to <span
class="removed"><del><strong>Nuance
Communications</a>,</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
+ <p>Some nonfree period-tracking apps including MIA Fem and Maya <a
+
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
+ send intimate details of users' lives to Facebook</a>.</p>
</li>
<li id="M201909060">
<!--#set var="DATE" value='<small
class="date-tag">2019-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Keeping track of who downloads</em></ins></span> a <span
class="removed"><del><strong>speech recognition company based
in</strong></del></span> <span class="inserted"><ins><em>proprietary
+ <p>Keeping track of who downloads a proprietary
program is a form of surveillance. There is a
proprietary program for adjusting a certain telescopic rifle sight. <a
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
- A US prosecutor has demanded</em></ins></span> the <span
class="removed"><del><strong>U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</strong></del></span> <span
class="inserted"><ins><em>list of all</em></ins></span> the <span
class="removed"><del><strong>toys with</strong></del></span> <span
class="inserted"><ins><em>10,000 or more people
+ A US prosecutor has demanded the list of all the 10,000 or more people
who have installed it</a>.</p>
- <p>With</em></ins></span> a <span
class="removed"><del><strong>mobile phone. This</strong></del></span> <span
class="inserted"><ins><em>free program there</em></ins></span> would
- <span class="removed"><del><strong>enable crackers to listen in
on</strong></del></span> <span class="inserted"><ins><em>not
be</em></ins></span> a <span class="removed"><del><strong>child's speech, and
even speak
- into the toys themselves.</p></strong></del></span> <span
class="inserted"><ins><em>list of who has installed
- it.</p></em></ins></span>
+ <p>With a free program there would not be a list of who has installed
+ it.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A computerized vibrator</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201907081">
+ <li id="M201907081">
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many unscrupulous mobile-app developers keep finding ways
to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
-
- <p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether it was surrounded by a person's
- body), as well as the vibration frequency.</p>
-
- <p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about
- their products, rather than free software which users could have
- checked</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
- bypass user's settings</a>, regulations,</em></ins></span> and <span
class="removed"><del><strong>changed.</p>
-
- <p>The company that made the vibrator
- <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots</strong></del></span> <span
class="inserted"><ins><em>privacy-enhancing features</em></ins></span>
- of <span class="removed"><del><strong>personal information about how
- people used it</a>.</p>
-
- <p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold</strong></del></span>
the <span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>operating system, in order</em></ins></span> to <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>gather as much private</em></ins></span> data <span
class="removed"><del><strong>broker,</strong></del></span> <span
class="inserted"><ins><em>as
+ <p>Many unscrupulous mobile-app developers keep finding ways to <a
+
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations, and privacy-enhancing
features
+ of the operating system, in order to gather as much private data as
they possibly can.</p>
<p>Thus, we can't trust rules against spying. What we can trust is
- having control over</em></ins></span> the <span
class="removed"><del><strong>data broker would have been able to figure out
- who</strong></del></span> <span class="inserted"><ins><em>software we
run.</p>
+ having control over the software we run.</p>
</li>
<li id="M201907080">
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many Android apps can track
- users' movements even when</em></ins></span> the user <span
class="removed"><del><strong>was.</p>
-
- <p>Following this lawsuit,</strong></del></span> <span
class="inserted"><ins><em>says</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not</em></ins></span> to <span class="removed"><del><strong>pay a total of
C$4m</a></strong></del></span> <span class="inserted"><ins><em>allow them
access</em></ins></span> to <span class="removed"><del><strong>its
customers.</p></strong></del></span> <span
class="inserted"><ins><em>locations</a>.</p>
+ users' movements even when the user says <a
+
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not to allow them access to locations</a>.</p>
<p>This involves an apparently unintentional weakness in Android,
- exploited intentionally by malicious apps.</p></em></ins></span>
+ exploited intentionally by malicious apps.</p>
</li>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905300">
+ <li id="M201905300">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Femm “fertility” app is secretly
a</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
- manufacturer</a>. Guess what?</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
+ <p>The Femm “fertility” app is secretly a <a
+
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
@@ -1881,10 +1421,10 @@
<li id="M201905060">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement to run</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>proprietary phone app</a></em></ins></span> to
<span class="removed"><del><strong>access</strong></del></span> <span
class="inserted"><ins><em>be allowed into</em></ins></span>
- the <span
class="removed"><del><strong>data</a></strong></del></span> <span
class="inserted"><ins><em>event.</p>
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a proprietary phone app</a> to be allowed into
+ the event.</p>
<p>This app is a spyware that can snoop on a lot of
sensitive data, including user's location and contact list, and has <a
@@ -1895,102 +1435,53 @@
<li id="M201904131">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Data</em></ins></span> collected by <span
class="inserted"><ins><em>menstrual and pregnancy monitoring apps is often <a
+ <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>. Even
though</em></ins></span> the <span class="removed"><del><strong>manufacturer's
snooping.</p>
-
- <p>That the manufacturer</strong></del></span>
- <span class="inserted"><ins><em>data is
“anonymized</em></ins></span> and <span
class="inserted"><ins><em>aggregated,” it can easily be
- traced back to</em></ins></span> the <span
class="removed"><del><strong>FBI could listen</strong></del></span> <span
class="inserted"><ins><em>woman who uses the app.</p>
+ available to employers and insurance companies</a>. Even though the
+ data is “anonymized and aggregated,” it can easily be
+ traced back to the woman who uses the app.</p>
<p>This has harmful implications for women's rights to equal
employment
- and freedom</em></ins></span> to <span class="inserted"><ins><em>make
their own pregnancy choices. Don't use</em></ins></span>
- these <span class="removed"><del><strong>conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span class="inserted"><ins><em>apps, even if
someone offers you a reward</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>do so. A
+ and freedom to make their own pregnancy choices. Don't use
+ these apps, even if someone offers you a reward to do so. A
free-software app that does more or less the same thing without
- spying</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>you is available from <a
-
href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>adults</a>.</p>
- </li>
-</ul>
-
-
-<!-- #SpywareOnSmartWatches -->
-<!-- WEBMASTERS: make sure to place</strong></del></span> <span
class="inserted"><ins><em><a
+ spying on you is available from <a
+ href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
- a</em></ins></span> new <span class="removed"><del><strong>items on top
under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnSmartWatches">Spyware on “Smart”
Watches</h3>
- <span class="anchor-reference-id">
- (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li>
- <p>An LG “smart” watch</strong></del></span> <span
class="inserted"><ins><em>one</em></ins></span> is <span
class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>being developed</a>.</p>
+ a new one is being developed</a>.</p>
</li>
<li id="M201904130">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Google tracks the movements of Android phones and iPhones
- running Google apps, and sometimes</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ running Google apps, and sometimes <a
+
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
saves the data for years</a>.</p>
- <p>Nonfree software in the phone has</em></ins></span> to <span
class="removed"><del><strong>report its</strong></del></span> <span
class="inserted"><ins><em>be responsible for sending
- the</em></ins></span> location <span
class="inserted"><ins><em>data</em></ins></span> to <span
class="removed"><del><strong>someone else and to transmit
- conversations too</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Google.</p></em></ins></span>
+ <p>Nonfree software in the phone has to be responsible for sending
+ the location data to Google.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A very cheap “smart watch” comes with
an</strong></del></span>
- <span class="inserted"><ins><em><li id="M201903251">
+ <li id="M201903251">
<!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many</em></ins></span> Android <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>phones come with a huge number of</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps</em></ins></span> that <span
class="removed"><del><strong>connects</strong></del></span> <span
class="inserted"><ins><em>have access</em></ins></span> to <span
class="removed"><del><strong>an unidentified site in China</a>.</p>
- <p>The article says this is a back door, but that could be a
- misunderstanding. However,</strong></del></span> <span
class="inserted"><ins><em>sensitive data without
+ <p>Many Android phones come with a huge number of <a
+
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that have access to sensitive data without
users' knowledge</a>. These hidden apps may either call home with
- the data, or pass</em></ins></span> it <span
class="removed"><del><strong>is certainly surveillance, at
- least.</p>
- </li>
-</ul>
-
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items</strong></del></span> on
<span class="removed"><del><strong>top under each
subsection</strong></del></span> <span class="inserted"><ins><em>to
user-installed apps that have access to
+ the data, or pass it on to user-installed apps that have access to
the network but no direct access to the data. This results in massive
surveillance on which the user has absolutely no control.</p>
</li>
<li id="M201903201">
<!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span>
- <span class="inserted"><ins><em><p>A study of 24
“health” apps found that 19 of them <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A study of 24 “health” apps found that 19 of them
<a
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
send sensitive personal data to third parties</a>, which can use it
- for invasive advertising or discriminating against
people</em></ins></span> in <span class="removed"><del><strong>BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
-
-<ul>
-<li><p></strong></del></span> <span class="inserted"><ins><em>poor
+ for invasive advertising or discriminating against people in poor
medical condition.</p>
<p>Whenever user “consent” is sought, it is buried in
@@ -2002,56 +1493,30 @@
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Facebook offered a convenient proprietary
- library for building mobile apps, which also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ library for building mobile apps, which also <a
+ href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
sent personal data to Facebook</a>. Lots of companies built apps that
- way</em></ins></span> and <span class="removed"><del><strong>spyware via
BIOS</a> on Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>released them,
apparently not realizing</em></ins></span> that <span
class="inserted"><ins><em>all</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>personal
+ way and released them, apparently not realizing that all the personal
data they collected would go to Facebook as well.</p>
- <p>It shows that no one can trust</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install
is</strong></del></span> <span class="inserted"><ins><em>nonfree
program,</em></ins></span> not <span class="removed"><del><strong>really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork</strong></del></span> <span
class="inserted"><ins><em>even the
+ <p>It shows that no one can trust a nonfree program, not even the
developers of other nonfree programs.</p>
</li>
<li id="M201902140">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make sure to place new
items</strong></del></span>
- <span class="inserted"><ins><em><p>The AppCensus database gives
information</em></ins></span> on <span class="removed"><del><strong>top under
each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it can collect the emails</strong></del></span>
- <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android apps use and
- misuse users' personal data</a>. As</em></ins></span> of <span
class="removed"><del><strong>members</strong></del></span> <span
class="inserted"><ins><em>March 2019, nearly
- 78,000 have been analyzed,</em></ins></span> of <span
class="removed"><del><strong>Parliament</strong></del></span> <span
class="inserted"><ins><em>which 24,000 (31%) transmit the <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The AppCensus database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps use and
+ misuse users' personal data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
href="/proprietary/proprietary-surveillance.html#M201812290">
Advertising ID</a> to other companies, and <a
href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link</em></ins></span> this <span
class="removed"><del><strong>way, because they pass it through
Microsoft.</p></li>
-
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>ID to hardware identifiers</a>,
+ 18,000 (23% of the total) link this ID to hardware identifiers</a>,
so that users cannot escape tracking by resetting it.</p>
- <p>Collecting hardware identifiers is</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span
class="inserted"><ins><em>apparent violation of
+ <p>Collecting hardware identifiers is in apparent violation of
Google's policies. But it seems that Google wasn't aware of it,
and, once informed, was in no hurry to take action. This proves
that the policies of a development platform are ineffective at
@@ -2062,18 +1527,12 @@
<li id="M201902060">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many nonfree apps have a surveillance feature
for</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p></em></ins></span>
+ <p>Many nonfree apps have a surveillance feature for <a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in interacting with the
app.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902041.1">
+ <li id="M201902041.1">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Twenty nine “beauty camera” apps that used to
@@ -2086,13 +1545,8 @@
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should also stay away from nonfree
apps</em></ins></span> in <span class="removed"><del><strong>Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware</strong></del></span>
- <span class="inserted"><ins><em>general. <em>All</em> nonfree
apps carry a potential risk because
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry a potential risk
because
there is no easy way of knowing what they really do.</p>
</li>
@@ -2100,15 +1554,11 @@
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>An investigation of the 150 most popular
- gratis VPN apps</em></ins></span> in <span
class="removed"><del><strong>Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ gratis VPN apps in Google Play found that <a
+ href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
25% fail to protect their users' privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
- source code—often used</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>invasive advertising—that could
+ source code—often used for invasive advertising—that could
potentially also be used to spy on users. Other technical flaws were
found as well.</p>
@@ -2118,15 +1568,10 @@
<p><small>(It is unfortunate that these articles talk about
“free
apps.” These apps are gratis, but they are <em>not</em>
<a
- href="/philosophy/free-sw.html">free
software</a>.)</small></p></em></ins></span>
+ href="/philosophy/free-sw.html">free
software</a>.)</small></p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareOnTheRoad</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201901050">
+ <li id="M201901050">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The Weather Channel app <a
@@ -2274,10 +1719,10 @@
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
calls and sent them and text messages and emails to
snoopers</a>.</p>
- <p>Google did not intend to make these apps spy; on the contrary, it
+ <p>Google did not intend to make these apps spy; on
the</em></ins></span> contrary, it
worked in various ways to prevent that, and deleted these apps after
discovering what they did. So we cannot blame Google specifically
- for the snooping of these apps.</p>
+ for the <span class="removed"><del><strong>snooping</strong></del></span>
<span class="inserted"><ins><em>snooping of these apps.</p>
<p>On the other hand, Google redistributes nonfree Android apps, and
therefore shares in the responsibility for the injustice of their being
@@ -2336,23 +1781,39 @@
<p>Users are suing Bose for <a
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
distributing a spyware app for its headphones</a>. Specifically,
- the app would record the names of the audio files users listen to
- along with the headphone's unique serial number.</p>
+ the app would record the names</em></ins></span> of <span
class="removed"><del><strong>these apps.</p>
- <p>The suit accuses that this was done without the users' consent.
- If the fine print of the app said that users gave consent for this,
- would that make it acceptable? No way! It should be flat out <a
- href="/philosophy/surveillance-vs-democracy.html"> illegal to design
+ <p>On</strong></del></span> the <span
class="removed"><del><strong>other hand, Google redistributes nonfree Android
apps, and
+ therefore shares in</strong></del></span> <span
class="inserted"><ins><em>audio files users listen to
+ along with</em></ins></span> the <span
class="removed"><del><strong>responsibility for</strong></del></span> <span
class="inserted"><ins><em>headphone's unique serial number.</p>
+
+ <p>The suit accuses that this was done without</em></ins></span> the
<span class="removed"><del><strong>injustice</strong></del></span> <span
class="inserted"><ins><em>users' consent.
+ If the fine print</em></ins></span> of <span
class="removed"><del><strong>their
+ being nonfree.</strong></del></span> <span class="inserted"><ins><em>the
app said that users gave consent for this,
+ would that make it acceptable? No way!</em></ins></span> It <span
class="removed"><del><strong>also distributes its own nonfree apps, such as
+ Google
+ Play,</strong></del></span> <span class="inserted"><ins><em>should be flat
out</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ are malicious</a>.</p>
+
+ <p>Could Google have done a better job</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">
illegal to design
the app to snoop at all</a>.</p>
</li>
<li id="M201704074">
<!--#set var="DATE" value='<small
class="date-tag">2017-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Pairs of Android apps can collude
- to transmit users' personal data to servers. <a
+ <p>Pairs</em></ins></span> of <span
class="removed"><del><strong>preventing apps from
+ cheating? There is no systematic way for Google, or</strong></del></span>
Android
+ <span class="removed"><del><strong>users, to inspect executable
proprietary</strong></del></span> apps <span class="inserted"><ins><em>can
collude</em></ins></span>
+ to <span class="removed"><del><strong>see what they
+ do.</p>
+
+ <p>Google could demand the source code for these apps, and study the
+ source code somehow</strong></del></span> <span
class="inserted"><ins><em>transmit users' personal data</em></ins></span> to
<span class="removed"><del><strong>determine whether they mistreat users in
+ various ways. If it did a good job</strong></del></span> <span
class="inserted"><ins><em>servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
- study found tens of thousands of pairs that collude</a>.</p>
+ study found tens</em></ins></span> of <span
class="removed"><del><strong>this,</strong></del></span> <span
class="inserted"><ins><em>thousands of pairs that collude</a>.</p>
</li>
<li id="M201703300">
@@ -2360,16 +1821,21 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
pre-install
+ announced an opt-in proprietary search app that</em></ins></span> it <span
class="removed"><del><strong>could more or less
+ prevent such snooping, except</strong></del></span> <span
class="inserted"><ins><em>will</a> pre-install
on some of its phones. The app will give Verizon the same information
- about the users' searches that Google normally gets when they use
+ about the users' searches that Google normally gets</em></ins></span> when
<span class="inserted"><ins><em>they use
its search engine.</p>
- <p>Currently, the app is <a
+ <p>Currently,</em></ins></span> the app <span
class="removed"><del><strong>developers are clever
+ enough to outsmart</strong></del></span> <span
class="inserted"><ins><em>is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and the user must
- explicitly opt-in before the app takes effect. However, the app
- remains spyware—an “optional” piece of spyware is
+ being pre-installed on only one phone</a>, and</em></ins></span> the
<span class="removed"><del><strong>checking.</p>
+
+ <p>But since Google itself develops malicious apps, we cannot trust
+ Google to protect us. We</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> must <span
class="removed"><del><strong>demand release</strong></del></span>
+ <span class="inserted"><ins><em>explicitly opt-in before the app takes
effect. However, the app
+ remains spyware—an “optional” piece</em></ins></span> of
<span class="removed"><del><strong>source code</strong></del></span> <span
class="inserted"><ins><em>spyware is
still spyware.</p>
</li>
@@ -2378,7 +1844,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Meitu photo-editing app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to a Chinese company</a>.</p>
+ user data</em></ins></span> to <span class="inserted"><ins><em>a Chinese
company</a>.</p>
</li>
<li id="M201611280">
@@ -2386,16 +1852,18 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
+ movements before and after</em></ins></span> the
+ <span class="removed"><del><strong>public, so we can depend on each
other.</p></strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
<p>This example illustrates how “getting the user's
consent” for surveillance is inadequate as a protection against
- massive surveillance.</p>
+ massive surveillance.</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li></strong></del></span>
- <li id="M201611160">
+ <span class="inserted"><ins><em><li id="M201611160">
<!--#set var="DATE" value='<small
class="date-tag">2016-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
+ --><!--#echo encoding="none" var="DATE" --></em></ins></span>
<p>A <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated the privacy and security of
@@ -2404,11 +1872,15 @@
apps—millions of users may be unawarely subject to poor security
guarantees and abusive practices inflicted by VPN apps.”</p>
- <p>Following is a non-exhaustive list, taken from the research paper,
- of some proprietary VPN apps that track users and infringe their
+ <p>Following is a non-exhaustive <span
class="removed"><del><strong>list</strong></del></span> <span
class="inserted"><ins><em>list, taken from the research paper,</em></ins></span>
+ of <span class="inserted"><ins><em>some</em></ins></span> proprietary VPN
apps <span class="removed"><del><strong>from
+ the research paper</strong></del></span> that <span
class="removed"><del><strong>tracks</strong></del></span> <span
class="inserted"><ins><em>track users</em></ins></span> and <span
class="removed"><del><strong>infringes the privacy of
+ users:</p>
+
+ <dl></strong></del></span> <span class="inserted"><ins><em>infringe
their
privacy:</p>
- <dl class="compact">
+ <dl class="compact"></em></ins></span>
<dt>SurfEasy</dt>
<dd>Includes tracking libraries such as NativeX and Appflood,
meant to track users and show them targeted ads.</dd>
@@ -2430,22 +1902,62 @@
<dt>VPN Services HotspotShield</dt>
<dd>Injects JavaScript code into the HTML pages returned to the
users. The stated purpose of the JS injection is to display ads. Uses
- roughly five tracking libraries. Also, it redirects the user's
+ roughly <span class="removed"><del><strong>5</strong></del></span> <span
class="inserted"><ins><em>five</em></ins></span> tracking libraries. Also, it
redirects the user's
traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses roughly
- five tracking libraries. Developers of this app have confirmed that
- the non-premium version of the app does JavaScript injection for
- tracking the user and displaying ads.</dd>
+ <dd>Injects JavaScript code into HTML pages, and also uses roughly
<span class="removed"><del><strong>5 tracking libraries. Developers of this app
have
+ confirmed that the non-premium version of the app does
+ JavaScript injection for tracking and display ads.</dd>
</dl>
+</li>
+<li>
+ <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of the top-ranked gratis
+ proprietary Android apps contained recognizable</strong></del></span>
+ <span class="inserted"><ins><em>five</em></ins></span> tracking <span
class="removed"><del><strong>libraries. For
+ the paid proprietary apps, it was only 60%.</p>
+
+ <p>The article confusingly describes gratis apps as “free”,
+ but most of them are not in fact
+ <a href="/philosophy/free-sw.html">free software</a>.
+ It also uses the ugly word “monetize”. A good replacement
+ for that word is “exploit”; nearly always that will fit
+ perfectly.</p>
+</li>
+
+<li>
+ <p>Apps for BART
+ <a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With proprietary apps, one can only hope that they don't.</p>
+</li>
+
+<li>
+ <p>A study found 234 Android apps that track users by
+ <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed in stores or played by TV
programs</a>.
+ </p>
+
+</li>
+
+<li>
+ <p>Pairs of Android apps can collude to transmit users' personal
+ data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands</strong></del></span> <span
class="inserted"><ins><em>libraries. Developers</em></ins></span> of <span
class="removed"><del><strong>pairs</strong></del></span> <span
class="inserted"><ins><em>this app have confirmed</em></ins></span> that <span
class="removed"><del><strong>collude</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>the non-premium version of the app does
JavaScript injection for
+ tracking the user and displaying ads.</dd>
+ </dl></em></ins></span>
</li>
- <li id="M201609210">
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609210">
<!--#set var="DATE" value='<small
class="date-tag">2016-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google's new voice messaging app <a
-
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ <p>Google's new voice messaging</em></ins></span> app <span
class="removed"><del><strong>developers</strong></del></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
all conversations</a>.</p>
</li>
@@ -2455,16 +1967,21 @@
<p>Facebook's new Magic Photo app <a
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections for known faces</a>,
- and suggests you circulate the picture you take according to who is
- in the frame.</p>
+ and suggests you circulate</em></ins></span> the <span
class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>picture you take
according to who is
+ in</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
+
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>frame.</p>
<p>This spyware feature seems to require online access to some
- known-faces database, which means the pictures are likely to be
- sent across the wire to Facebook's servers and face-recognition
+ known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>“consent” of users is not
enough</strong></del></span> <span class="inserted"><ins><em>pictures are
likely</em></ins></span> to <span class="removed"><del><strong>legitimize
actions like this. At this point, most users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>be
+ sent across</em></ins></span> the <span
class="removed"><del><strong>“Terms</strong></del></span> <span
class="inserted"><ins><em>wire to Facebook's servers</em></ins></span> and
<span class="removed"><del><strong>Conditions” that spell out
+what they</strong></del></span> <span
class="inserted"><ins><em>face-recognition
algorithms.</p>
- <p>If so, none of Facebook users' pictures are private anymore,
- even if the user didn't “upload” them to the service.</p>
+ <p>If so, none of Facebook users' pictures</em></ins></span> are
<span class="removed"><del><strong>“consenting” to. Google should
clearly
+and honestly identify</strong></del></span> <span
class="inserted"><ins><em>private anymore,
+ even if</em></ins></span> the <span
class="removed"><del><strong>information</strong></del></span> <span
class="inserted"><ins><em>user didn't “upload” them to the
service.</p>
</li>
<li id="M201605310">
@@ -2472,8 +1989,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Facebook's app listens all the time, <a
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html">to
- snoop on what people are listening to or watching</a>. In addition,
- it may be analyzing people's conversations to serve them with targeted
+ snoop on what people are listening to or watching</a>. In
addition,</em></ins></span>
+ it <span class="removed"><del><strong>collects</strong></del></span> <span
class="inserted"><ins><em>may be analyzing people's conversations to serve them
with targeted
advertisements.</p>
</li>
@@ -2482,7 +1999,9 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A pregnancy test controller application not only can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts of data in the phone, and in server accounts,
+ spy</em></ins></span> on <span class="removed"><del><strong>users,
instead</strong></del></span> <span class="inserted"><ins><em>many
sorts</em></ins></span> of <span class="removed"><del><strong>hiding
it</strong></del></span> <span class="inserted"><ins><em>data</em></ins></span>
in <span class="removed"><del><strong>an obscurely worded EULA.</p>
+
+<p>However, to truly protect people's privacy, we must prevent
Google</strong></del></span> <span class="inserted"><ins><em>the phone, and in
server accounts,
it can alter them too</a>.</p>
</li>
@@ -2493,47 +2012,65 @@
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
Symphony surveillance software snoop on what radio and TV programs
are playing nearby</a>. Also on what users post on various sites
- such as Facebook, Google+ and Twitter.</p>
+ such as Facebook, Google+</em></ins></span> and <span
class="removed"><del><strong>other companies from getting this personal
information in the first
+place!</p></strong></del></span> <span
class="inserted"><ins><em>Twitter.</p></em></ins></span>
</li>
- <li id="M201511190">
+ <span class="removed"><del><strong><li>
+ <p>Google Play (a component of Android)</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511190">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>“Cryptic communication,”
- unrelated to the app's functionality, was <a
-
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis Android apps</a>.</p>
+ unrelated to the app's functionality, was</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in</em></ins></span> the <span class="removed"><del><strong>users'
movements without their permission</a>.</p>
+
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>500 most popular gratis Android
apps</a>.</p>
<p>The article should not have described these apps as
- “free”—they are not free software. The clear way
- to say “zero price” is “gratis.”</p>
+ “free”—they are not free software. The clear
way</em></ins></span>
+ to <span class="removed"><del><strong>completely
stop</strong></del></span> <span class="inserted"><ins><em>say “zero
price” is “gratis.”</p>
- <p>The article takes for granted that the usual analytics tools are
- legitimate, but is that valid? Software developers have no right to
- analyze what users are doing or how. “Analytics” tools
- that snoop are just as wrong as any other snooping.</p>
+ <p>The article takes for granted that</em></ins></span> the <span
class="removed"><del><strong>tracking. This</strong></del></span> <span
class="inserted"><ins><em>usual analytics tools are
+ legitimate, but</em></ins></span> is
+ <span class="removed"><del><strong>yet another example of nonfree software
pretending</strong></del></span> <span class="inserted"><ins><em>that valid?
Software developers have no right</em></ins></span> to <span
class="removed"><del><strong>obey the user,
+ when it's actually</strong></del></span>
+ <span class="inserted"><ins><em>analyze what users are</em></ins></span>
doing <span class="removed"><del><strong>something else. Such a thing would be
almost
+ unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>or how. “Analytics” tools
+ that snoop are just as wrong as any other
snooping.</p></em></ins></span>
</li>
- <li id="M201510300">
+ <span
class="removed"><del><strong><li><p>More</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201510300">
<!--#set var="DATE" value='<small
class="date-tag">2015-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>More than 73% and 47% of mobile applications, for Android and iOS
- respectively <a href="https://techscience.org/a/2015103001/">hand
over
- personal, behavioral and location information</a> of their users to
+ <p>More</em></ins></span> than 73% <span
class="inserted"><ins><em>and 47%</em></ins></span> of <span
class="removed"><del><strong>the most popular</strong></del></span> <span
class="inserted"><ins><em>mobile applications, for</em></ins></span> Android
<span class="removed"><del><strong>apps</strong></del></span> <span
class="inserted"><ins><em>and iOS
+ respectively</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share</strong></del></span>
<span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">hand
over</em></ins></span>
+ personal, behavioral and location information</a> of their users
<span class="removed"><del><strong>with</strong></del></span> <span
class="inserted"><ins><em>to</em></ins></span>
third parties.</p>
</li>
- <li id="M201508210">
+ <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201508210">
<!--#set var="DATE" value='<small
class="date-tag">2015-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Like most “music screaming” disservices, Spotify is
based on proprietary malware (DRM and snooping). In August 2015 it <a
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some are
starting
- to realize that it is nasty.</p>
+ demanded users submit to increased snooping</a>, and some are
starting</em></ins></span>
+ to <span class="inserted"><ins><em>realize that it is nasty.</p>
- <p>This article shows the <a
-
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ <p>This article shows</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
+ was</strong></del></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
twisted ways that they present snooping as a way to “serve”
users better</a>—never mind whether they want that. This is a
typical example of the attitude of the proprietary software industry
@@ -2547,51 +2084,75 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf">
- A study in 2015</a> found that 90% of the top-ranked gratis
proprietary
- Android apps contained recognizable tracking libraries. For the paid
- proprietary apps, it was only 60%.</p>
+ A study</em></ins></span> in <span
class="inserted"><ins><em>2015</a> found that 90% of</em></ins></span>
the <span class="removed"><del><strong>500 most popular</strong></del></span>
<span class="inserted"><ins><em>top-ranked</em></ins></span> gratis <span
class="inserted"><ins><em>proprietary</em></ins></span>
+ Android <span
class="removed"><del><strong>apps</a>.</p></strong></del></span>
<span class="inserted"><ins><em>apps contained recognizable tracking libraries.
For the paid
+ proprietary apps, it was only 60%.</p></em></ins></span>
+
+ <p>The article <span class="removed"><del><strong>should not have
described these</strong></del></span> <span
class="inserted"><ins><em>confusingly describes gratis</em></ins></span> apps as
+ <span
class="removed"><del><strong>“free”—they</strong></del></span>
+ <span class="inserted"><ins><em>“free”, but most of
them</em></ins></span> are not <span class="removed"><del><strong>free
software. The clear way to say
+ “zero price” is “gratis.”</p>
- <p>The article confusingly describes gratis apps as
- “free”, but most of them are not in fact <a
+ <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>in fact <a
href="/philosophy/free-sw.html">free software</a>. It also uses
the
- ugly word “monetize”. A good replacement for that word
- is “exploit”; nearly always that will fit perfectly.</p>
+ ugly word “monetize”. A good replacement</em></ins></span> for
<span class="removed"><del><strong>granted</strong></del></span> that <span
class="removed"><del><strong>the usual analytics tools are
+ legitimate, but</strong></del></span> <span
class="inserted"><ins><em>word</em></ins></span>
+ is <span class="inserted"><ins><em>“exploit”; nearly
always</em></ins></span> that <span class="removed"><del><strong>valid?
Software developers have no right to
+ analyze what users are doing or how. “Analytics” tools that
snoop are
+ just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>will fit perfectly.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Gratis</strong></del></span>
- <li id="M201505060">
+ <span class="inserted"><ins><em><li id="M201505060">
<!--#set var="DATE" value='<small
class="date-tag">2015-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Gratis Android apps (but not <a
+ <p>Gratis</em></ins></span> Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs, on the average.</p>
</li>
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
- <li id="M201504060">
+ <span class="inserted"><ins><em><li id="M201504060">
<!--#set var="DATE" value='<small
class="date-tag">2015-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This is in addition to
- the snooping done by the phone company, and perhaps by the OS in
+ QR-code scanner apps snoop on the user</a>. This</em></ins></span>
is <span class="removed"><del><strong>present</strong></del></span> in <span
class="removed"><del><strong>some Android devices when they are sold.
+ Some Motorola phones modify Android</strong></del></span> <span
class="inserted"><ins><em>addition</em></ins></span> to
+ <span class="removed"><del><strong><a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data</strong></del></span>
+ <span class="inserted"><ins><em>the snooping done by the phone company,
and perhaps by the OS in
the phone.</p>
<p>Don't be distracted by the question of whether the app developers
- get users to say “I agree”. That is no excuse for
- malware.</p>
+ get users</em></ins></span> to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
<span class="inserted"><ins><em>say “I agree”. That is no excuse
for
+ malware.</p></em></ins></span>
</li>
- <li id="M201411260">
+ <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201411260">
<!--#set var="DATE" value='<small
class="date-tag">2014-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many proprietary apps for mobile devices
- report which other apps the user has installed. <a
- href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible and optional</a>. Not
- as bad as what the others do.</p>
+ report which other apps the user has installed.</em></ins></span> <a
<span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way that at least is visible and optional</a>.
Not</em></ins></span>
+ as <span class="removed"><del><strong>Carrier IQ.</a></p>
+ </li>
+
+ <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access to any file
on</strong></del></span> <span class="inserted"><ins><em>bad as
what</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>others do.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
- <li id="M201401150.1">
+<!-- #SpywareOnMobiles</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201401150.1">
<!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The Simeji keyboard is a smartphone version of Baidu's <a
@@ -2601,37 +2162,95 @@
<li id="M201312270">
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The nonfree Snapchat app's principal purpose is to restrict the
- use of data on the user's computer, but it does surveillance too: <a
-
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the user's list of other people's phone
- numbers</a>.</p>
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>The nonfree Snapchat app's
principal purpose is</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware</strong></del></span> <span
class="inserted"><ins><em>restrict the
+ use of data</em></ins></span> on <span
class="removed"><del><strong>Mobiles</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareIniThings">Spyware in iThings</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+</div>
+
+<ul>
+ <li><p>The DMCA and</strong></del></span> the <span
class="removed"><del><strong>EU Copyright Directive make</strong></del></span>
<span class="inserted"><ins><em>user's computer, but</em></ins></span> it <span
class="inserted"><ins><em>does surveillance too:</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries</em></ins></span> to <span class="removed"><del><strong>study how
iOS cr...apps spy on users</a>, because this
+ would require circumventing</strong></del></span> <span
class="inserted"><ins><em>get</em></ins></span> the <span
class="removed"><del><strong>iOS DRM.</p></strong></del></span> <span
class="inserted"><ins><em>user's list of other people's phone
+ numbers</a>.</p></em></ins></span>
</li>
- <li id="M201312060">
+ <span class="removed"><del><strong><li><p>In the latest iThings
system, “turning off” WiFi and Bluetooth the
+ obvious way</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312060">
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Brightest Flashlight app <a
-
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies</a>.</p>
-
- <p>The FTC criticized this app because it asked the user to
- approve sending personal data to the app developer but did not ask
- about sending it to other companies. This shows the weakness of
- the reject-it-if-you-dislike-snooping “solution” to
- surveillance: why should a flashlight app send any information to
- anyone? A free software flashlight app would not.</p>
+ <p>The Brightest Flashlight app</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>.
+ A more advanced way really does turn them off—only until 5am.
+ That's Apple</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation,</em></ins></span> for <span
class="removed"><del><strong>you—“We know you want to be spied
on”.</p>
+ </li>
+
+ <li><p>Apple proposes
+ <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way to</strong></del></span> use <span
class="inserted"><ins><em>by companies</a>.</p>
+
+ <p>The FTC criticized this app because</em></ins></span> it <span
class="removed"><del><strong>without having your fingerprints
+ taken. Users would have no way to tell whether</strong></del></span>
<span class="inserted"><ins><em>asked</em></ins></span> the <span
class="removed"><del><strong>phone is snooping on
+ them.</p></li>
+
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots of</strong></del></span> <span class="inserted"><ins><em>user to
+ approve sending</em></ins></span> personal data to <span
class="removed"><del><strong>Apple's servers</a>. Big Brother can
+ get them from there.</p>
+ </li>
+
+ <li><p>The iMessage</strong></del></span> <span
class="inserted"><ins><em>the</em></ins></span> app <span
class="removed"><del><strong>on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that</strong></del></span> <span
class="inserted"><ins><em>developer but did not ask
+ about sending it to other companies. This shows</em></ins></span> the
<span class="removed"><del><strong>user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>weakness
of</em></ins></span>
+ the <span class="removed"><del><strong>server records these numbers for at
least 30
+ days.</p>
+ </li>
+
+ <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
<span class="inserted"><ins><em>reject-it-if-you-dislike-snooping
“solution”</em></ins></span> to <span
class="removed"><del><strong>install even gratis apps)</a>
+ without giving</strong></del></span>
+ <span class="inserted"><ins><em>surveillance: why should</em></ins></span>
a <span class="removed"><del><strong>valid email address and receiving the code
Apple
+ sends</strong></del></span> <span class="inserted"><ins><em>flashlight
app send any information</em></ins></span> to <span
class="removed"><del><strong>it.</p></strong></del></span>
+ <span class="inserted"><ins><em>anyone? A free software flashlight app
would not.</p></em></ins></span>
</li>
- <li id="M201212100">
+ <span class="removed"><del><strong><li><p>Around 47% of
the</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201212100">
<!--#set var="DATE" value='<small
class="date-tag">2012-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>FTC says most mobile apps for children don't respect privacy:
<a
-
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ <p>FTC says</em></ins></span> most <span
class="removed"><del><strong>popular iOS</strong></del></span> <span
class="inserted"><ins><em>mobile</em></ins></span> apps <span
class="inserted"><ins><em>for children don't respect privacy:</em></ins></span>
<a <span class="removed"><del><strong>class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a> of their users with third
parties.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>iThings automatically
upload to Apple's servers all the photos and
+ videos they make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you take,
+ and keeps them up</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -2643,11 +2262,22 @@
<li id="M201908151">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Skype refuses to say whether it can <a
-
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
- on calls</a>.</p>
+ <p>Skype refuses</em></ins></span> to <span
class="removed"><del><strong>date on all your devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
+
+ <p>(From</strong></del></span> <span class="inserted"><ins><em>say
whether it can</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
+ information</a> as accessed</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop</em></ins></span>
+ on <span class="removed"><del><strong>24 Sep 2015.) The iCloud feature is
+ <a href="https://support.apple.com/en-us/HT202033">activated by the
+ startup of iOS</a>. The term
“cloud”</strong></del></span> <span
class="inserted"><ins><em>calls</a>.</p>
- <p>That almost certainly means it can do so.</p>
+ <p>That almost certainly</em></ins></span> means
+ <span class="removed"><del><strong>“please don't ask
where.”</p>
+
+ <p>There is a way to <a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default
so</strong></del></span> it <span class="removed"><del><strong>still counts as
a</strong></del></span> <span class="inserted"><ins><em>can do so.</p>
</li>
<li id="M201307110">
@@ -2671,17 +2301,26 @@
<li id="M202010221">
<!--#set var="DATE" value='<small
class="date-tag">2020-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft is imposing its
- surveillance on the game of Minecraft by <a
-
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
- every player to open an account on Microsoft's network</a>. Microsoft
+ <p>Microsoft is imposing its</em></ins></span>
+ surveillance <span class="removed"><del><strong>functionality.</p>
+
+ <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>on the game</em></ins></span> of <span
class="removed"><del><strong>this to</strong></del></span> <span
class="inserted"><ins><em>Minecraft by</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
+ every player</em></ins></span> to <span class="removed"><del><strong>get
at them, but NSA can access any of</strong></del></span> <span
class="inserted"><ins><em>open an account on Microsoft's network</a>.
Microsoft
has bought the game and will merge all accounts into its network,
- which will give them access to people's data.</p>
+ which will give</em></ins></span> them <span
class="removed"><del><strong>through</strong></del></span> <span
class="inserted"><ins><em>access to people's data.</p>
- <p>Minecraft players <a
- href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
+ <p>Minecraft players</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p>Spyware in iThings:</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://directory.fsf.org/wiki/Minetest">can
play Minetest</a>
instead. The essential advantage of Minetest is that it is free
- software, meaning it respects the user's computer freedom. As a bonus,
+ software, meaning it respects</em></ins></span> the <span
class="removed"><del><strong><a class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly
where</strong></del></span> <span class="inserted"><ins><em>user's computer
freedom. As a bonus,
it offers more options.</p>
</li>
@@ -2690,40 +2329,74 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Microsoft recorded users of Xboxes and had <a
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
- human workers listen to the recordings</a>.</p>
+ human workers listen to</em></ins></span> the <span
class="removed"><del><strong>iThing is,</strong></del></span> <span
class="inserted"><ins><em>recordings</a>.</p>
- <p>Morally, we see no difference between having human workers listen
and
- having speech-recognition systems listen. Both intrude on
privacy.</p>
+ <p>Morally, we see no difference between having human workers
listen</em></ins></span> and <span class="removed"><del><strong>get other info
too.</p></strong></del></span>
+ <span class="inserted"><ins><em>having speech-recognition systems listen.
Both intrude on privacy.</p></em></ins></span>
</li>
- <li id="M201806240">
+ <span
class="removed"><del><strong><li><p>There</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201806240">
<!--#set var="DATE" value='<small
class="date-tag">2018-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Red Shell is a spyware that
- is found in many proprietary games. It <a
-
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data on users' computers and sends it to third
parties</a>.</p>
+ <p>Red Shell</em></ins></span> is <span
class="removed"><del><strong>also</strong></del></span> a <span
class="removed"><del><strong>feature for web sites to track users, which is
+ <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks about iOS 6, but
it</strong></del></span> <span class="inserted"><ins><em>spyware
that</em></ins></span>
+ is <span class="removed"><del><strong>still true</strong></del></span>
<span class="inserted"><ins><em>found</em></ins></span> in <span
class="removed"><del><strong>iOS 7.)</p>
+ </li>
+
+ <li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default, though that can be
+ turned off.</p>
+ </li>
+
+ <li><p>Apple can, and regularly does,</strong></del></span>
<span class="inserted"><ins><em>many proprietary games. It</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
+ tracks</em></ins></span> data <span class="removed"><del><strong>from
iPhones for the state</a>.</p></strong></del></span> <span
class="inserted"><ins><em>on users' computers and sends it to third
parties</a>.</p></em></ins></span>
</li>
- <li id="M201804144">
+ <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804144">
<!--#set var="DATE" value='<small
class="date-tag">2018-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>ArenaNet surreptitiously installed a spyware
- program along with an update to the massive
+ program along with an update to</em></ins></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>massive
multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
- to snoop on all open processes running on its user's
computer</a>.</p>
+ to</em></ins></span> snoop on all <span class="removed"><del><strong>the
data in an iThing,
+ or it is totally incompetent.</a></p></strong></del></span>
<span class="inserted"><ins><em>open processes running on its user's
computer</a>.</p></em></ins></span>
</li>
- <li id="M201711070">
+ <span class="removed"><del><strong><li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem to exist</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711070">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The driver for a certain gaming keyboard <a
-
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
- information to China</a>.</p>
+ <p>The driver</em></ins></span> for <span
class="removed"><del><strong>no
+ possible purpose other than surveillance</a>. Here is
the</strong></del></span> <span class="inserted"><ins><em>a certain gaming
keyboard</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
+ information to China</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201512290">
+
+<div class="big-subsection">
+ <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+</div>
+
+<ul>
+ <li><p>Tracking software in popular Android
apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201512290">
<!--#set var="DATE" value='<small
class="date-tag">2015-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many <a
@@ -2731,27 +2404,46 @@
video game consoles snoop on their users and report to the
internet</a>—even what their users weigh.</p>
- <p>A game console is a computer, and you can't trust a computer with
- a nonfree operating system.</p>
- </li>
+ <p>A game console</em></ins></span> is <span
class="removed"><del><strong>pervasive</strong></del></span> <span
class="inserted"><ins><em>a computer,</em></ins></span> and
+ <span class="removed"><del><strong>sometimes very clever. Some trackers
can <a
+href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow</strong></del></span> <span class="inserted"><ins><em>you can't
trust</em></ins></span> a <span class="removed"><del><strong>user's movements
around</strong></del></span> <span class="inserted"><ins><em>computer
with</em></ins></span>
+ a <span class="removed"><del><strong>physical store by noticing WiFi
+ networks</a>.</p></strong></del></span> <span
class="inserted"><ins><em>nonfree operating system.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Android tracks
location for Google <a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off, even
+ when the phone has no SIM card</a>.</p></li>
+
+ <li><p>Some portable phones</strong></del></span>
- <li id="M201509160">
+ <span class="inserted"><ins><em><li id="M201509160">
<!--#set var="DATE" value='<small
class="date-tag">2015-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Modern gratis game cr…apps <a
-
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data about their users and their users'
+ <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range</em></ins></span> of data <span
class="inserted"><ins><em>about their users and their users'
friends and associates</a>.</p>
<p>Even nastier, they do it through ad networks that merge the data
collected by various cr…apps and sites made by different
companies.</p>
- <p>They use this data to manipulate people to buy things, and hunt
for
- “whales” who can be led to spend a lot of money. They also
- use a back door to manipulate the game play for specific players.</p>
+ <p>They use this data</em></ins></span> to <span
class="removed"><del><strong>China</a>.</p></li>
+
+ <li><p>According</strong></del></span> <span
class="inserted"><ins><em>manipulate people</em></ins></span> to <span
class="removed"><del><strong>Edward Snowden,
+ <a
href="http://www.bbc.com/news/uk-34444233">agencies</strong></del></span>
<span class="inserted"><ins><em>buy things, and hunt for
+ “whales” who</em></ins></span> can <span
class="removed"><del><strong>take over smartphones</a>
+ by sending hidden text messages which enable them</strong></del></span>
<span class="inserted"><ins><em>be led</em></ins></span> to <span
class="removed"><del><strong>turn the phones
+ on and off, listen</strong></del></span> <span
class="inserted"><ins><em>spend a lot of money. They also
+ use a back door</em></ins></span> to <span
class="inserted"><ins><em>manipulate</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location data
from</strong></del></span> <span class="inserted"><ins><em>game play for
specific players.</p>
- <p>While the article describes gratis games, games that cost money
+ <p>While</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
+ browsing history,</strong></del></span> <span
class="inserted"><ins><em>article describes gratis games, games that cost money
can use the same tactics.</p>
</li>
@@ -2760,9 +2452,13 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Angry Birds <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and the NSA takes advantage
- to spy through it too</a>. Here's information on <a
-
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ spies for companies,</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> the <span
class="removed"><del><strong>contact list. This malware is
designed</strong></del></span> <span class="inserted"><ins><em>NSA takes
advantage</em></ins></span>
+ to
+ <span class="removed"><del><strong>disguise itself from
investigation.</p>
+ </li>
+
+ <li><p>Samsung phones come with</strong></del></span> <span
class="inserted"><ins><em>spy through it too</a>. Here's information
on</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
@@ -2774,13 +2470,22 @@
<!--#set var="DATE" value='<small
class="date-tag">2005-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Blizzard Warden is a hidden
- “cheating-prevention” program that <a
+ “cheating-prevention” program</em></ins></span> that <span
class="removed"><del><strong>users can't
delete</a>,</strong></del></span> <span class="inserted"><ins><em><a
href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies on every process running on a gamer's computer and sniffs a
- good deal of personal data</a>, including lots of activities which
- have nothing to do with cheating.</p>
+ spies on every process running on a gamer's computer</em></ins></span> and
<span class="removed"><del><strong>they send so much data that their
transmission is</strong></del></span> <span
class="inserted"><ins><em>sniffs</em></ins></span> a
+ <span class="removed"><del><strong>substantial expense for users. Said
transmission, not wanted or
+ requested by the user, clearly must constitute
spying</strong></del></span>
+ <span class="inserted"><ins><em>good deal</em></ins></span> of <span
class="removed"><del><strong>some
+ kind.</p></li>
+
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>personal data</a>, including lots of activities
which
+ have nothing to do with cheating.</p></em></ins></span>
</li>
-</ul>
+
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+<span class="inserted"><ins><em></ul>
@@ -2794,42 +2499,66 @@
<li id="M202101050">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Most Internet connected devices in Mozilla's <a
-
href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
+ <p>Most Internet connected devices</em></ins></span> in <span
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us by a paywall)
+ reports that</strong></del></span> <span
class="inserted"><ins><em>Mozilla's</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
Not Included”</a> list <a
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
designed to snoop on users</a> even if they meet
Mozilla's “Minimum Security Standards.” Insecure
- design of the program running on some of these devices <a
-
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes
- the user susceptible to be snooped and exploited by crackers as
+ design of</em></ins></span> the <span class="removed"><del><strong>FBI can
remotely activate</strong></del></span> <span class="inserted"><ins><em>program
running on some of these devices <a
+
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes</em></ins></span>
+ the <span class="removed"><del><strong>GPS</strong></del></span> <span
class="inserted"><ins><em>user susceptible to be snooped</em></ins></span> and
<span class="removed"><del><strong>microphone</strong></del></span> <span
class="inserted"><ins><em>exploited by crackers as
well</a>.</p>
</li>
<li id="M201708280">
<!--#set var="DATE" value='<small
class="date-tag">2017-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The bad security in many Internet of Stings devices allows <a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on the people that use them</a>.</p>
+ <p>The bad security</em></ins></span> in <span
class="removed"><del><strong>Android
+ phones and laptops</a>.
+ (I suspect this means Windows laptops.) Here is</strong></del></span>
<span class="inserted"><ins><em>many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ </li>
- <p>Don't be a sucker—reject all the stings.</p>
+ <li><p>Portable phones with GPS will send their GPS
location</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop</em></ins></span> on
+ <span class="removed"><del><strong>remote command and users cannot stop
them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require</strong></del></span> <span
class="inserted"><ins><em>the people that use them</a>.</p>
+
+ <p>Don't be a sucker—reject</em></ins></span> all <span
class="removed"><del><strong>new portable phones
+ to have GPS.)</p>
+ </li>
+
+ <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span> <span class="inserted"><ins><em>the
stings.</p>
- <p><small>(It is unfortunate that the article uses the term
<a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p>
+ <p><small>(It</em></ins></span> is <span
class="removed"><del><strong>to restrict</strong></del></span> <span
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span
class="removed"><del><strong>use of data on</strong></del></span> <span
class="inserted"><ins><em>article uses</em></ins></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
+ too:</strong></del></span> <span
class="inserted"><ins><em>term</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get the user's list of other people's phone
+ numbers.</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInTVSets">TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInTVSets">TV
Sets</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></em></ins></span>
</div>
-<p>Emo Phillips made a joke: The other day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
-before Amazon “smart” TVs.</p>
+<span class="removed"><del><strong><ul>
+ <li>
+ <p>The moviepass app</strong></del></span>
+
+<span class="inserted"><ins><em><p>Emo Phillips made a joke: The other
day a woman came up to me</em></ins></span> and <span
class="removed"><del><strong>dis-service spy</strong></del></span>
+<span class="inserted"><ins><em>said, “Didn't I see
you</em></ins></span> on <span class="removed"><del><strong>users even more
than users
+ expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel</strong></del></span> <span
class="inserted"><ins><em>television?” I said, “I
+don't know. You can't see out the other way.” Evidently that
was</em></ins></span>
+before <span class="inserted"><ins><em>Amazon “smart”
TVs.</p>
<ul class="blurbs">
<li id="M202010282">
@@ -2841,57 +2570,92 @@
hard to find a TV that doesn't spy on you</a>.</p>
<p>It appears that those manufacturers business model is not to
produce
- TV and sell them for money, but to collect your personal data and
- (possibly) hand over them to others for benefit.</p>
+ TV</em></ins></span> and <span class="removed"><del><strong>after
going</strong></del></span> <span class="inserted"><ins><em>sell them for
money, but to collect your personal data and
+ (possibly) hand over them</em></ins></span> to <span
class="removed"><del><strong>a movie</a>.
+ </p>
+
+ <p>Don't be tracked — pay
cash!</p></strong></del></span> <span class="inserted"><ins><em>others
for benefit.</p></em></ins></span>
</li>
- <li id="M202006250">
+ <span class="removed"><del><strong><li><p>AI-powered driving
apps can</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202006250">
<!--#set var="DATE" value='<small
class="date-tag">2020-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>TV manufacturers are able to <a
-
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
- every second of what the user is watching</a>. This is illegal due to
+ <p>TV manufacturers are able to</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop</em></ins></span>
+ every <span
class="removed"><del><strong>move</a>.</p></strong></del></span>
<span class="inserted"><ins><em>second of what the user is watching</a>.
This is illegal due to
the Video Privacy Protection Act of 1988, but they're circumventing
- it through EULAs.</p>
+ it through EULAs.</p></em></ins></span>
</li>
- <li id="M201901070">
+ <span class="removed"><del><strong><li><p>The Sarahah
app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201901070">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio TVs <a
-
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
collect “whatever the TV sees,”</a> in the own words of
the company's
- CTO, and this data is sold to third parties. This is in return for
+ CTO,</em></ins></span> and <span class="removed"><del><strong>email
addresses</a></strong></del></span> <span class="inserted"><ins><em>this
data is sold to third parties. This is</em></ins></span> in <span
class="removed"><del><strong>user's address
+ book</strong></del></span> <span class="inserted"><ins><em>return for
“better service” (meaning more intrusive ads?) and slightly
lower retail prices.</p>
- <p>What is supposed to make this spying acceptable, according to him,
+ <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>developer's server. Note
that</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> this <span
class="removed"><del><strong>article misuses the words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring</strong></del></span> <span class="inserted"><ins><em>spying
acceptable, according</em></ins></span> to <span
class="removed"><del><strong>zero price.</p>
+ </li>
+
+ <li>
+ <p>Facebook's app listens</strong></del></span> <span
class="inserted"><ins><em>him,
is that it is opt-in in newer models. But since the Vizio software is
nonfree, we don't know what is actually happening behind the scenes,
- and there is no guarantee that all future updates will leave the
- settings unchanged.</p>
+ and there is no guarantee that</em></ins></span> all <span
class="inserted"><ins><em>future updates will leave</em></ins></span> the <span
class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span>
+ <span class="inserted"><ins><em>settings unchanged.</p>
<p>If you already own a Vizio “smart” TV (or any
“smart” TV, for that
- matter), the easiest way to make sure it isn't spying on you is
- to disconnect it from the Internet, and use a terrestrial antenna
+ matter), the easiest way to make sure it isn't spying</em></ins></span> on
<span class="removed"><del><strong>what people are
listening</strong></del></span> <span class="inserted"><ins><em>you
is</em></ins></span>
+ to <span class="removed"><del><strong>or watching</a>. In
addition,</strong></del></span> <span
class="inserted"><ins><em>disconnect</em></ins></span> it <span
class="removed"><del><strong>may
+ be analyzing people's conversations</strong></del></span> <span
class="inserted"><ins><em>from the Internet, and use a terrestrial antenna
instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is to get your own router (which can
+ if you are technically oriented, is</em></ins></span> to <span
class="removed"><del><strong>serve them with targeted
+ advertisements.</p>
+ </li>
+
+ <li>
+ <p>Faceapp appears</strong></del></span> <span
class="inserted"><ins><em>get your own router (which can
be an old computer running completely free software), and set up a
- firewall to block connections to Vizio's servers. Or, as a last resort,
- you can replace your TV with another model.</p>
+ firewall</em></ins></span> to <span class="removed"><del><strong>do lots
of surveillance, judging by
+ <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands</strong></del></span> <span
class="inserted"><ins><em>block connections</em></ins></span> to <span
class="removed"><del><strong>personal data in the device</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>Vizio's servers. Or, as a last resort,
+ you can replace your TV with another model.</p></em></ins></span>
</li>
- <li id="M201804010">
+ <span class="removed"><del><strong><li>
+ <p>Verizon</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804010">
<!--#set var="DATE" value='<small
class="date-tag">2018-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some “Smart” TVs automatically <a
-
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades that install a surveillance app</a>.</p>
-
- <p>We link to the article for the facts it presents. It
- is too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix app <a
- href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ load downgrades</em></ins></span> that <span
class="removed"><del><strong>it will</a>
+ pre-install on some of its phones. The app will give
Verizon</strong></del></span> <span class="inserted"><ins><em>install a
surveillance app</a>.</p>
+
+ <p>We link to</em></ins></span> the <span
class="removed"><del><strong>same
+ information about</strong></del></span> <span
class="inserted"><ins><em>article for</em></ins></span> the <span
class="removed"><del><strong>users' searches</strong></del></span> <span
class="inserted"><ins><em>facts it presents. It
+ is too bad</em></ins></span> that <span
class="removed"><del><strong>Google normally gets when
+ they use its search engine.</p>
+
+ <p>Currently,</strong></del></span> the <span
class="inserted"><ins><em>article finishes by advocating the
+ moral weakness of surrendering to Netflix. The Netflix</em></ins></span>
app <span class="removed"><del><strong>is</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
@@ -2900,22 +2664,39 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts and
- cable</a>. Even if the image is coming from the user's own computer,
- the TV reports what it is. The existence of a way to disable the
- surveillance, even if it were not hidden as it was in these TVs,
- does not legitimize the surveillance.</p>
+ report everything that is viewed</em></ins></span> on <span
class="removed"><del><strong>only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>them, and not just broadcasts</em></ins></span>
and
+ <span class="inserted"><ins><em>cable</a>. Even if</em></ins></span>
the
+ <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>image is coming
from</em></ins></span> the <span class="removed"><del><strong>app takes effect.
However,</strong></del></span> <span class="inserted"><ins><em>user's own
computer,</em></ins></span>
+ the
+ <span class="removed"><del><strong>app remains spyware—an
“optional” piece</strong></del></span> <span
class="inserted"><ins><em>TV reports what it is. The
existence</em></ins></span> of <span class="removed"><del><strong>spyware is
+ still spyware.</p>
+ </li>
+
+ <li><p>The Meitu photo-editing
+ app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to</strong></del></span> a <span
class="removed"><del><strong>Chinese company</a>.</p></li>
+
+ <li><p>A pregnancy test controller
application</strong></del></span> <span class="inserted"><ins><em>way to
disable the
+ surveillance, even if it were</em></ins></span> not <span
class="removed"><del><strong>only
+ can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts of data</strong></del></span> <span
class="inserted"><ins><em>hidden as it was</em></ins></span> in <span
class="inserted"><ins><em>these TVs,
+ does not legitimize</em></ins></span> the <span
class="removed"><del><strong>phone,</strong></del></span> <span
class="inserted"><ins><em>surveillance.</p>
</li>
<li id="M201511130">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some web and TV advertisements play inaudible
+ <p>Some web</em></ins></span> and <span class="inserted"><ins><em>TV
advertisements play inaudible
sounds to be picked up by proprietary malware running
- on other devices in range so as to determine that they
+ on other devices</em></ins></span> in <span
class="removed"><del><strong>server accounts, it</strong></del></span> <span
class="inserted"><ins><em>range so as to determine that they
are nearby. Once your Internet devices are paired with
- your TV, advertisers can correlate ads with Web activity, and other <a
-
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
+ your TV, advertisers</em></ins></span> can
+ <span class="removed"><del><strong>alter them too</a>.
+ </p></li>
+
+ <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>correlate ads with Web activity, and
other</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
cross-device tracking</a>.</p>
</li>
@@ -2925,8 +2706,8 @@
<p>Vizio goes a step further than other TV
manufacturers in spying on their users: their <a
href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so that advertisers can track you
+ “smart” TVs analyze your viewing habits in
detail</em></ins></span> and <span
class="removed"><del><strong>after</strong></del></span>
+ <span class="inserted"><ins><em>link them your IP address</a> so
that advertisers can track you
across devices.</p>
<p>It is possible to turn this off, but having it enabled by default
@@ -2937,29 +2718,40 @@
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Tivo's alliance with Viacom adds 2.3 million households
- to the 600 millions social media profiles the company
+ to</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
+
+ <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>600
millions social media profiles</em></ins></span> the <span
class="removed"><del><strong>user's consent”
+ for</strong></del></span> <span class="inserted"><ins><em>company
already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
information with online social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing all
- users to new combined surveillance by default.</p>
+ users to new combined</em></ins></span> surveillance <span
class="removed"><del><strong>is inadequate as a protection against massive
+ surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>by default.</p></em></ins></span>
</li>
- <li id="M201507240">
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201507240">
<!--#set var="DATE" value='<small
class="date-tag">2015-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio “smart” TVs recognize and <a
- href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are watching</a>, even if it isn't a TV
channel.</p>
+ <p>Vizio “smart” TVs recognize and</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
+ what people are watching</a>, even if it isn't a TV
channel.</p></em></ins></span>
</li>
- <li id="M201505290">
+ <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505290">
<!--#set var="DATE" value='<small
class="date-tag">2015-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Verizon cable TV <a
-
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch, and even what they wanted to
+ <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops</em></ins></span> on what <span class="removed"><del><strong>radio
and TV</strong></del></span> programs
+ <span class="removed"><del><strong>are playing nearby</a>.
Also</strong></del></span> <span class="inserted"><ins><em>people watch, and
even what they wanted to
record</a>.</p>
</li>
@@ -2968,20 +2760,31 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio <a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade” to make its TVs snoop on what
- users watch</a>. The TVs did not do that when first sold.</p>
+ used a firmware “upgrade” to make its TVs
snoop</em></ins></span> on what
+ users <span class="removed"><del><strong>post on various sites
+ such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>watch</a>. The TVs did not do that when
first sold.</p></em></ins></span>
</li>
- <li id="M201502090">
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201502090">
<!--#set var="DATE" value='<small
class="date-tag">2015-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Samsung “Smart” TV <a
-
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on the internet to another company,
Nuance</a>.
- Nuance can save it and would then have to give it to the US or some
+ <p>The Samsung “Smart” TV</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known faces</a>,
+ and suggests you to share</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>picture you take according</strong></del></span>
<span class="inserted"><ins><em>internet</em></ins></span> to <span
class="removed"><del><strong>who
+ is in the frame.</p>
+
+ <p>This spyware feature seems</strong></del></span> <span
class="inserted"><ins><em>another company, Nuance</a>.
+ Nuance can save it and would then have</em></ins></span> to <span
class="removed"><del><strong>require online access</strong></del></span> <span
class="inserted"><ins><em>give it</em></ins></span> to <span
class="removed"><del><strong>some
+ known-faces database, which means</strong></del></span> the <span
class="removed"><del><strong>pictures are likely</strong></del></span> <span
class="inserted"><ins><em>US or some
other government.</p>
- <p>Speech recognition is not to be trusted unless it is done by free
+ <p>Speech recognition is not</em></ins></span> to be
+ <span class="removed"><del><strong>sent across</strong></del></span>
<span class="inserted"><ins><em>trusted unless it is done by free
software in your own computer.</p>
<p>In its privacy policy, Samsung explicitly confirms that <a
@@ -2995,7 +2798,10 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Amazon “Smart” TV is <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all the time</a>.</p>
+ snooping all</em></ins></span> the <span class="removed"><del><strong>wire
to Facebook's servers and face-recognition
+ algorithms.</p>
+
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
</li>
<li id="M201409290">
@@ -3005,34 +2811,57 @@
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
- <p>The report was as of 2014, but we don't expect this has got
+ <p>The report was as</em></ins></span> of <span
class="removed"><del><strong>Facebook</strong></del></span> <span
class="inserted"><ins><em>2014, but we don't expect this has got
better.</p>
- <p>This shows that laws requiring products to get users' formal
- consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent? Probably the TV will
- say, “Without your consent to tracking, the TV will not
+ <p>This shows that laws requiring products to get</em></ins></span>
users' <span class="removed"><del><strong>pictures</strong></del></span> <span
class="inserted"><ins><em>formal
+ consent before collecting personal data</em></ins></span> are <span
class="removed"><del><strong>private
+ anymore, even</strong></del></span> <span
class="inserted"><ins><em>totally inadequate.
+ And what happens</em></ins></span> if <span
class="removed"><del><strong>the</strong></del></span> <span
class="inserted"><ins><em>a</em></ins></span> user <span
class="removed"><del><strong>didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>declines consent?
Probably the TV will
+ say, “Without your consent</em></ins></span> to <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>service.</p></strong></del></span> <span
class="inserted"><ins><em>TV will not
work.”</p>
<p>Proper laws would say that TVs are not allowed to report what the
- user watches—no exceptions!</p>
+ user watches—no exceptions!</p></em></ins></span>
</li>
- <li id="M201405200">
+ <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
+ is based on proprietary malware (DRM and snooping). In August
+ 2015 it</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201405200">
<!--#set var="DATE" value='<small
class="date-tag">2014-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Spyware in LG “smart” TVs <a
-
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches, and the switch to turn this off has
- no effect</a>. (The fact that the transmission reports a 404 error
- really means nothing; the server could save that data anyway.)</p>
+ <p>Spyware in LG “smart” TVs</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased
snooping</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what the user watches,</em></ins></span> and <span
class="removed"><del><strong>some
+ are starting</strong></del></span> <span class="inserted"><ins><em>the
switch</em></ins></span> to <span
class="removed"><del><strong>realize</strong></del></span> <span
class="inserted"><ins><em>turn this off has
+ no effect</a>. (The fact</em></ins></span> that <span
class="removed"><del><strong>it is nasty.</p>
+
+ <p>This article shows</strong></del></span> the <span
class="removed"><del><strong><a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as a way
+ to “serve” users better</a>—never mind
+ whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>transmission reports</em></ins></span> a <span
class="removed"><del><strong>typical example of
+ the attitude of</strong></del></span> <span
class="inserted"><ins><em>404 error
+ really means nothing;</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
+ those they have subjugated.</p>
+
+ <p>Out, out, damned Spotify!</p>
+ </li>
+ <li><p>Many proprietary apps for mobile devices report
which</strong></del></span> <span class="inserted"><ins><em>server could save
that data anyway.)</p>
<p>Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network</a>.</p>
+ snoops on</em></ins></span> other
+ <span class="removed"><del><strong>apps</strong></del></span> <span
class="inserted"><ins><em>devices on</em></ins></span> the <span
class="removed"><del><strong>user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing</strong></del></span> <span class="inserted"><ins><em>user's
local network</a>.</p>
<p>LG later said it had installed a patch to stop this, but any
- product could spy this way.</p>
+ product could spy</em></ins></span> this <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>way.</p>
<p>Meanwhile, LG TVs <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
@@ -3044,10 +2873,18 @@
--><!--#echo encoding="none" var="DATE" -->
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a “smart”
TV</a>
- and use its camera to watch the people who are watching TV.</p>
+ Crackers found</em></ins></span> a way <span
class="removed"><del><strong>that at least is visible</strong></del></span>
<span class="inserted"><ins><em>to break security on a “smart”
TV</a></em></ins></span>
+ and
+ <span class="removed"><del><strong>optional</a>. Not as bad as
what</strong></del></span> <span class="inserted"><ins><em>use its camera to
watch</em></ins></span> the <span class="removed"><del><strong>others
do.</p>
</li>
-</ul>
+
+ <li><p>FTC says most mobile apps for children don't respect
privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>people who are watching
TV.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -3059,39 +2896,52 @@
<li id="M201901100">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Amazon Ring “security” devices <a
-
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture to Amazon servers</a>, which save it
+ <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>video they
capture</em></ins></span> to <span class="inserted"><ins><em>Amazon
servers</a>, which save it
long-term.</p>
- <p>In many cases, the video shows everyone that comes near, or merely
- passes by, the user's front door.</p>
+ <p>In many cases,</em></ins></span> the <span
class="removed"><del><strong>snooping done by the phone company, and perhaps
by</strong></del></span> <span class="inserted"><ins><em>video shows everyone
that comes near, or merely
+ passes by,</em></ins></span> the <span class="removed"><del><strong>OS
in</strong></del></span> <span class="inserted"><ins><em>user's front
door.</p>
<p>The article focuses on how Ring used to let individual employees
look
- at the videos freely. It appears Amazon has tried to prevent that
- secondary abuse, but the primary abuse—that Amazon gets the
- video—Amazon expects society to surrender to.</p>
+ at</em></ins></span> the
+ <span class="removed"><del><strong>phone.</p>
+
+ <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>videos freely. It appears Amazon has tried to
prevent that
+ secondary abuse, but</em></ins></span> the <span
class="removed"><del><strong>question of whether</strong></del></span> <span
class="inserted"><ins><em>primary abuse—that Amazon
gets</em></ins></span> the <span class="removed"><del><strong>app developers get
+ users</strong></del></span>
+ <span class="inserted"><ins><em>video—Amazon expects
society</em></ins></span> to <span class="removed"><del><strong>say “I
agree”. That is no excuse for malware.</p></strong></del></span>
<span class="inserted"><ins><em>surrender to.</p></em></ins></span>
</li>
- <li id="M201810300">
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810300">
<!--#set var="DATE" value='<small
class="date-tag">2018-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Nearly all “home security cameras” <a
-
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy of everything they
+ <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p>
+
+ <p>The FTC criticized this app because it
asked</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give</em></ins></span> the <span class="removed"><del><strong>user to
+ approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>manufacturer an unencrypted copy of everything they
see</a>. “Home insecurity camera” would be a better
name!</p>
<p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not to look at what's in the videos. That's not
- security for your home. Security means making sure they don't get to
- see through your camera.</p>
+ manufacturers promise not</em></ins></span> to <span
class="inserted"><ins><em>look at what's in</em></ins></span> the <span
class="removed"><del><strong>app developer but did</strong></del></span> <span
class="inserted"><ins><em>videos. That's</em></ins></span> not
+ <span class="removed"><del><strong>ask about sending
it</strong></del></span>
+ <span class="inserted"><ins><em>security for your home. Security means
making sure they don't get</em></ins></span> to <span
class="removed"><del><strong>other companies. This shows the
+ weakness</strong></del></span>
+ <span class="inserted"><ins><em>see through your camera.</p>
</li>
<li id="M201603220">
<!--#set var="DATE" value='<small
class="date-tag">2016-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Over 70 brands of network-connected surveillance cameras have
<a
+ <p>Over 70 brands</em></ins></span> of <span
class="inserted"><ins><em>network-connected surveillance cameras have <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
security bugs that allow anyone to watch through them</a>.</p>
</li>
@@ -3103,18 +2953,25 @@
href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
even when the “owner” switches it “off.”</p>
- <p>A “smart” device means the manufacturer is using it
- to outsmart you.</p>
+ <p>A “smart” device means</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should a flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>manufacturer is using it</em></ins></span>
+ to <span class="removed"><del><strong>anyone? A free software flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInToys">Toys</h4>
+ <h4 <span class="removed"><del><strong>id="SpywareInToys">Spyware in
Toys</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
<span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+
+ <li></strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711244">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -3127,15 +2984,28 @@
<li id="M201711100">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
+ --><!--#echo encoding="none" var="DATE" --></em></ins></span>
<p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings of the conversation between two users</a>.</p>
</li>
- <li id="M201703140">
+ <span class="removed"><del><strong><li>
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
+ a speech recognition company based in the U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control the toys with a mobile phone. This would
+ enable crackers to listen in on a child's speech, and even speak
+ into the toys themselves.</p>
+ </li>
+
+ <li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201703140">
<!--#set var="DATE" value='<small
class="date-tag">2017-03</small>'
- --><!--#echo encoding="none" var="DATE" -->
+ --><!--#echo encoding="none" var="DATE" --></em></ins></span>
<p>A computerized vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
was snooping on its users through the proprietary control
app</a>.</p>
@@ -3165,35 +3035,145 @@
customers.</p>
</li>
- <li id="M201702280">
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
+ <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
+ manufacturer</a>. Guess what?
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way to access the data</a>
+ collected by the manufacturer's snooping.</p>
+
+ <p>That the manufacturer and the FBI could listen to these
conversations
+ was unacceptable by itself.</p></li>
+
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
+ </li>
+</ul>
+
+
+<!-- #SpywareOnSmartWatches -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareOnSmartWatches">Spyware on “Smart”
Watches</h3>
+ <span class="anchor-reference-id">
+ (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li>
+ <p>An LG “smart” watch is designed
+ <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+ to report its location to someone else and to transmit
+ conversations too</a>.</p>
+ </li>
+ <li>
+ <p>A very cheap “smart watch” comes with an Android app
+ <a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects to an unidentified site in China</a>.</p>
+ <p>The article says this is a back door, but that could be a
+ misunderstanding. However, it is certainly surveillance, at
+ least.</p>
+ </li>
+</ul>
+
+<!-- #SpywareAtLowLevel</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702280">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>“CloudPets” toys with microphones <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>“CloudPets” toys with
microphones <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess what?
<a
-
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p></strong></del></span> <span class="inserted"><ins><em>the
manufacturer</a>. Guess what?</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
Crackers found a way to access the data</a> collected by the
manufacturer's snooping.</p>
- <p>That the manufacturer and the FBI could listen to these
+ <p>That the manufacturer</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows installs.
+Note that</strong></del></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a “clean” Windows install is not really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each
subsection</strong></del></span> <span class="inserted"><ins><em>these
conversations was unacceptable by itself.</p>
</li>
<li id="M201612060">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
-
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows</strong></del></span>
+ <span class="inserted"><ins><em><p>The “smart” toys My
Friend Cayla and i-Que transmit</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>, a speech recognition
company based in the U.S.</p>
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would enable
- crackers to listen in on a child's speech, and even speak into the
- toys themselves.</p>
+ <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
+ can <span class="removed"><del><strong>collect</strong></del></span> <span
class="inserted"><ins><em>remotely control</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ this way, because they pass it through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
+ crackers to listen</em></ins></span> in <span
class="removed"><del><strong>Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype
+ <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p></strong></del></span> <span
class="inserted"><ins><em>on a child's speech, and even speak into the
+ toys themselves.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
- <li id="M201502180">
+<!-- #SpywareOnTheRoad</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201502180">
<!--#set var="DATE" value='<small
class="date-tag">2015-02</small>'
--><!--#echo encoding="none" var="DATE"</em></ins></span> -->
<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
@@ -3272,27 +3252,26 @@
<p>This shows why requiring the user's
“consent”</em></ins></span> is <span
class="removed"><del><strong>tethered</strong></del></span> <span
class="inserted"><ins><em>not
an adequate basis for protecting digital privacy. The boss can coerce
- most workers into consenting to almost anything, even probable
exposure</em></ins></span>
- to <span class="inserted"><ins><em>contagious disease that can be fatal.
Software like this should
- be illegal and bosses that demand it should be prosecuted for it.</p>
+ most workers into consenting</em></ins></span> to <span
class="removed"><del><strong>a server.</p>
+ <p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
+ <p>But</strong></del></span> <span class="inserted"><ins><em>almost
anything, even probable exposure
+ to contagious disease that can be fatal. Software like this should
+ be illegal and bosses that demand</em></ins></span> it <span
class="removed"><del><strong>also demonstrates</strong></del></span> <span
class="inserted"><ins><em>should be prosecuted for it.</p>
</li>
<li id="M201911190">
<!--#set var="DATE" value='<small
class="date-tag">2019-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Internet-tethered Amazon Ring had</em></ins></span>
- a <span class="removed"><del><strong>server.</p>
- <p><a href="/proprietary/proprietary-tethers.html">More
about</strong></del></span> <span class="inserted"><ins><em>security
vulnerability that enabled attackers to <a
+ <p>Internet-tethered Amazon Ring had
+ a security vulnerability</em></ins></span> that <span
class="inserted"><ins><em>enabled attackers to <a
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
- access the user's wifi password</a>, and snoop on the household
+ access</em></ins></span> the <span class="removed"><del><strong>device
gives</strong></del></span> <span class="inserted"><ins><em>user's wifi
password</a>, and snoop on</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>household
through connected surveillance devices.</p>
<p>Knowledge of the wifi password would not be sufficient to carry
- out any significant surveillance if the devices implemented proper
- security, including encryption. But many devices with</em></ins></span>
proprietary <span class="removed"><del><strong>tethering</a>.</p>
- <p>But it</strong></del></span>
- <span class="inserted"><ins><em>software lack this. Of course, they
are</em></ins></span> also <span class="removed"><del><strong>demonstrates that
the device gives the company
- surveillance capability.</p></strong></del></span> <span
class="inserted"><ins><em>used by their
+ out any significant</em></ins></span> surveillance <span
class="removed"><del><strong>capability.</p></strong></del></span> <span
class="inserted"><ins><em>if the devices implemented proper
+ security, including encryption. But many devices with proprietary
+ software lack this. Of course, they are also used by their
manufacturers for snooping.</p></em></ins></span>
</li>
@@ -3359,86 +3338,85 @@
<li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>id="M201905061">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Amazon Alexa collects</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem</strong></del></span>
<span class="inserted"><ins><em>lot more information from users
- than is necessary for correct functioning (time, location,
- recordings made without a legitimate prompt), and sends
- it to Amazon's servers,</em></ins></span> which <span
class="removed"><del><strong>allows
+ <p>Amazon Alexa collects</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
effectively
- anyone</strong></del></span> <span class="inserted"><ins><em>store it
indefinitely. Even
- worse, Amazon forwards it to third-party companies. Thus,
- even if users request deletion of their data from Amazon's
servers,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
- the data remain on other servers</a>, where they can be accessed by
- advertising companies</em></ins></span> and <span
class="removed"><del><strong>make changes in various
+ anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely</strong></del></span> <span
class="inserted"><ins><em>lot more information from users
+ than is necessary for correct functioning (time, location,
+ recordings made without a legitimate prompt),</em></ins></span> and <span
class="removed"><del><strong>make changes in various
settings</a>.</p>
- <p>That's easy to do because</strong></del></span> <span
class="inserted"><ins><em>government agencies. In other words,
- deleting the collected information doesn't cancel</em></ins></span> the
<span class="removed"><del><strong>system has no authentication when
- accessed through</strong></del></span> <span
class="inserted"><ins><em>wrong of
+ <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>sends
+ it</em></ins></span> to <span class="removed"><del><strong>do
because</strong></del></span> <span class="inserted"><ins><em>Amazon's servers,
which store it indefinitely. Even
+ worse, Amazon forwards it to third-party companies. Thus,
+ even if users request deletion of their data from Amazon's servers, <a
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
+ the <span class="removed"><del><strong>system has no authentication
when</strong></del></span> <span class="inserted"><ins><em>data remain on other
servers</a>, where they can be</em></ins></span> accessed <span
class="removed"><del><strong>through</strong></del></span> <span
class="inserted"><ins><em>by
+ advertising companies and government agencies. In other words,
+ deleting the collected information doesn't cancel the wrong of
collecting it.</p>
- <p>Data collected by devices such as</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
- authentication, you couldn't be confident that Nissan has no
- access. The software in</strong></del></span> <span
class="inserted"><ins><em>Nest thermostat,</em></ins></span> the <span
class="removed"><del><strong>car is
+ <p>Data collected by devices such as the Nest thermostat, the Philips
+ Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+ speakers are likewise stored longer than necessary on the
servers</em></ins></span>
+ the <span class="removed"><del><strong>modem. However, even if it asked
for
+ authentication, you couldn't be confident that
Nissan</strong></del></span> <span class="inserted"><ins><em>devices are
tethered to. Moreover, they are made available to
+ Alexa. As a result, Amazon</em></ins></span> has <span
class="removed"><del><strong>no
+ access. The software</strong></del></span> <span
class="inserted"><ins><em>a very precise picture of users' life
+ at home, not only</em></ins></span> in the <span
class="removed"><del><strong>car is
proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
means it demands blind faith from its users</a>.</p>
- <p>Even if no one connects to</strong></del></span> <span
class="inserted"><ins><em>Philips
- Hue-connected lights,</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>Chamberlain MyQ garage opener and</em></ins></span>
the <span class="removed"><del><strong>cell phone
- modem enables</strong></del></span> <span class="inserted"><ins><em>Sonos
- speakers are likewise stored longer than necessary on</em></ins></span>
the <span class="removed"><del><strong>phone company</strong></del></span>
<span class="inserted"><ins><em>servers
- the devices are tethered to. Moreover, they are made
available</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span>
- <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very
precise picture of users' life
- at home, not only in</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>time; it is possible to physically
remove</strong></del></span> <span class="inserted"><ins><em>past (and, who
knows,
- in</em></ins></span> the <span class="removed"><del><strong>cell phone
modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>future too?)</p></em></ins></span>
+ <p>Even if no one connects to</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>past (and, who knows,
+ in</em></ins></span> the <span class="removed"><del><strong>cell phone
+ modem enables</strong></del></span> <span class="inserted"><ins><em>future
too?)</p>
</li>
- <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201904240">
+ <li id="M201904240">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some of users' commands to the Alexa service
are</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance
companies,</strong></del></span> <span class="inserted"><ins><em>listen
to</a>. The Google</em></ins></span> and
- <span class="removed"><del><strong>others.</p>
-
- <p>The case</strong></del></span> <span
class="inserted"><ins><em>Apple
+ <p>Some of users' commands to</em></ins></span> the <span
class="removed"><del><strong>phone company</strong></del></span> <span
class="inserted"><ins><em>Alexa service are <a
+
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>listen to</a>. The Google and Apple
voice assistants do similar things.</p>
- <p>A fraction</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems, mentioned in this
article,</strong></del></span> <span class="inserted"><ins><em>the Alexa
service staff even has access to <a
+ <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even has access to <a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
location and other personal data</a>.</p>
- <p>Since the client program</em></ins></span> is <span
class="removed"><del><strong>not
- really a matter of proprietary surveillance. These systems are an
- intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>nonfree, and data processing is done
+ <p>Since</em></ins></span> the <span
class="removed"><del><strong>time; it</strong></del></span> <span
class="inserted"><ins><em>client program</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>nonfree, and data processing is done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
- the cloud</a>” (a soothing way</em></ins></span> of <span
class="removed"><del><strong>privacy,</strong></del></span> <span
class="inserted"><ins><em>saying “We won't
- tell you how</em></ins></span> and <span
class="removed"><del><strong>should be replaced</strong></del></span> <span
class="inserted"><ins><em>where it's done”), users have no way
- to know what happens to the recordings unless human eavesdroppers <a
+ the cloud</a>” (a soothing way of saying “We won't
+ tell you how and where it's done”), users have no way
+ to know what happens</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> the <span
class="removed"><del><strong>cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>recordings unless human eavesdroppers <a
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure agreements</a>.</p>
+ break their non-disclosure
agreements</a>.</p></em></ins></span>
</li>
- <li id="M201902080">
+ <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201902080">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The HP <a
- href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ <p>The HP</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates</em></ins></span> with <span
class="removed"><del><strong>anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>HP servers</a> to make sure</em></ins></span>
the <span class="removed"><del><strong>invasion isn't done by malware. The other
- cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>user is still
- paying for the subscription, and hasn't printed more pages than were
- paid for.</p>
+ communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
+ others.</p>
- <p>Even though</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
+ <p>The case of toll-collection systems, mentioned in this
article,</strong></del></span> <span class="inserted"><ins><em>make sure the
user</em></ins></span> is <span class="removed"><del><strong>not
+ really a matter of proprietary surveillance. These systems are an
+ intolerable invasion of privacy,</strong></del></span> <span
class="inserted"><ins><em>still
+ paying for the subscription,</em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>hasn't printed more pages than were
+ paid for.</p>
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>ink subscription program may be cheaper in some
+ <p>Even though</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
+ cases mentioned are done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>ink subscription program may be cheaper in some
specific cases, it spies on users, and involves totally unacceptable
- restrictions in</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>use of ink cartridges that would otherwise be in
+ restrictions</em></ins></span> in the <span
class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow the company</strong></del></span> <span
class="inserted"><ins><em>use of ink cartridges that would otherwise be in
working order.</p>
</li>
@@ -3527,26 +3505,17 @@
<span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnWearables">#SpywareOnWearables</a>)</span></em></ins></span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li>
- <p>Vizio
- “smart”</strong></del></span>
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201807260">
<!--#set var="DATE" value='<small
class="date-tag">2018-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tommy Hilfiger clothing</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
+ <p>Tommy Hilfiger clothing <a
+
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
monitor how often people wear it</a>.</p>
- <p>This will teach the sheeple to find it normal</em></ins></span>
that <span class="removed"><del><strong>is viewed on
them,</strong></del></span> <span class="inserted"><ins><em>companies
+ <p>This will teach the sheeple to find it normal that companies
monitor every aspect of what they do.</p>
</li>
</ul>
@@ -3560,57 +3529,61 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Internet-enabled watches with proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they have a lot of security flaws. They <a
+ privacy. In addition, they have</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>lot of security flaws. They <a
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
- permit security breakers (and unauthorized people) to access</a> the
watch.</p>
+ permit security breakers (and unauthorized people)</em></ins></span> to
<span class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>access</a> the watch.</p>
- <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent</em></ins></span> and <span
class="removed"><del><strong>not just broadcasts</strong></del></span> <span
class="inserted"><ins><em>child and spoof messages to</em></ins></span> and
<span class="removed"><del><strong>cable</a>. Even if the image is
coming</strong></del></span> from the <span class="removed"><del><strong>user's
own
- computer, the TV reports what it is. The existence of a way to
- disable</strong></del></span> <span class="inserted"><ins><em>watch,
possibly endangering</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden as it was
in
- these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>child.</p>
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent</em></ins></span> and
+<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I
+don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>child and spoof messages to and
from</em></ins></span> the <span class="removed"><del><strong>other way.”
Evidently</strong></del></span> <span class="inserted"><ins><em>watch, possibly
endangering the child.</p>
- <p><small>(Note that this article misuses</em></ins></span>
the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>word “<a
+ <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li>
+ <p>Vizio
+ “smart”</strong></del></span> <span
class="inserted"><ins><em>this article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
- to mean “crackers.”)</small></p></em></ins></span>
+ to mean “crackers.”)</small></p>
</li>
- <span class="removed"><del><strong><li><p>More or less all
“smart” TVs</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201603020">
+ <li id="M201603020">
<!--#set var="DATE" value='<small
class="date-tag">2016-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
-
- <p>The report was as of 2014, but we don't expect this has got
better.</p>
-
- <p>This shows</strong></del></span>
+ <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></em></ins></span>
- that <span class="removed"><del><strong>laws requiring
products</strong></del></span> <span
class="inserted"><ins><em>connects</em></ins></span> to <span
class="removed"><del><strong>get users' formal
- consent before collecting personal data are totally inadequate.
- And what happens if</strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
+ that <span class="inserted"><ins><em>connects to an unidentified site in
China</a>.</p>
- <p>The article says this is</em></ins></span> a <span
class="removed"><del><strong>user declines consent? Probably the TV
- will say, “Without your consent to tracking, the TV will
- not work.”</p>
-
- <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>back door, but</em></ins></span> that <span
class="removed"><del><strong>TVs are not allowed</strong></del></span> <span
class="inserted"><ins><em>could be a
- misunderstanding. However, it is certainly surveillance, at
least.</p>
+ <p>The article says this</em></ins></span> is <span
class="removed"><del><strong>viewed on them, and not just broadcasts
+ and cable</a>. Even if the image is coming from the user's own
+ computer, the TV reports what it is. The existence
of</strong></del></span> a <span class="removed"><del><strong>way to
+ disable the surveillance, even if it were not hidden
as</strong></del></span> <span class="inserted"><ins><em>back door, but that
could be a
+ misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>was in
+ these TVs, does not legitimize the
surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>is certainly surveillance, at
least.</p></em></ins></span>
</li>
- <li id="M201407090">
+ <span class="removed"><del><strong><li><p>More or less
all</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407090">
<!--#set var="DATE" value='<small
class="date-tag">2014-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>An LG “smart” watch is designed <a
-
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
- to report <span class="removed"><del><strong>what
- the user watches — no exceptions!</p></strong></del></span>
<span class="inserted"><ins><em>its location to someone else and to transmit
conversations
- too</a>.</p></em></ins></span>
+ <p>An LG</em></ins></span> “smart” <span
class="removed"><del><strong>TVs</strong></del></span> <span
class="inserted"><ins><em>watch is designed</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+ to</em></ins></span> report <span class="removed"><del><strong>was as of
2014, but we don't expect this has got better.</p>
+
+ <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>its location</em></ins></span> to <span
class="removed"><del><strong>get users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if a user declines consent? Probably the TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>someone else and</em></ins></span> to <span
class="removed"><del><strong>tracking, the TV</strong></del></span> <span
class="inserted"><ins><em>transmit conversations
+ too</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying on
- their users: their</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -3622,24 +3595,27 @@
<li id="M202008181">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>New Toyotas will</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ <p>New Toyotas</em></ins></span> will
+ <span class="removed"><del><strong>not work.”</p>
+
+ <p>Proper laws would say that TVs are not
allowed</strong></del></span> <span class="inserted"><ins><em><a
+ href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/">
+ upload data</em></ins></span> to <span class="removed"><del><strong>report
what
+ the user watches — no exceptions!</p>
+ </li>
+ <li><p>Vizio goes a step further than other TV manufacturers in
spying</strong></del></span> <span class="inserted"><ins><em>AWS to help create
custom insurance premiums</a>
+ based</em></ins></span> on
+ <span class="removed"><del><strong>their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
“smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so that
advertisers</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/">
- upload data to AWS to help create custom insurance premiums</a>
- based on driver behaviour.</p>
+ link them your IP address</a> so that
advertisers</strong></del></span> <span class="inserted"><ins><em>driver
behaviour.</p>
<p>Before you buy a “connected” car, make sure
you</em></ins></span> can <span
class="removed"><del><strong>track</strong></del></span>
<span class="inserted"><ins><em>disconnect its cellular antenna and its
GPS antenna. If</em></ins></span> you
<span class="removed"><del><strong>across devices.</p>
- <p>It is possible to turn this off, but having it enabled by
default
- is an injustice already.</p>
- </li>
-
- <li><p>Tivo's alliance</strong></del></span> <span
class="inserted"><ins><em>want
+ <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>want
GPS navigation, get a separate navigator which runs free software
- and works</em></ins></span> with <span class="removed"><del><strong>Viacom
adds 2.3 million households</strong></del></span> <span
class="inserted"><ins><em>Open Street Map.</p>
+ and works with Open Street Map.</p>
</li>
<li id="M201912171">
@@ -3647,54 +3623,59 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Most modern cars now <a
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
- record and send various kinds of data</em></ins></span> to the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. For</em></ins></span>
- the <span class="removed"><del><strong>company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span> <span class="inserted"><ins><em>user,
access</em></ins></span> to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>the data is nearly impossible, as it involves
- cracking the car's computer, which is always hidden</em></ins></span> and
<span class="removed"><del><strong>TV advertisements play inaudible sounds to be
- picked up by proprietary malware</strong></del></span> running <span
class="removed"><del><strong>on other devices in
- range so as to determine that they are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads</strong></del></span> with <span
class="removed"><del><strong>Web activity,</strong></del></span>
+ record and send various kinds of data</em></ins></span> to <span
class="removed"><del><strong>turn this off, but having</strong></del></span>
<span class="inserted"><ins><em>the manufacturer</a>. For
+ the user, access to the data is nearly impossible, as</em></ins></span> it
<span class="removed"><del><strong>enabled by default</strong></del></span>
<span class="inserted"><ins><em>involves
+ cracking the car's computer, which</em></ins></span> is <span
class="removed"><del><strong>an injustice already.</p>
+ </li>
+
+ <li><p>Tivo's alliance</strong></del></span> <span
class="inserted"><ins><em>always hidden and running</em></ins></span> with
<span class="removed"><del><strong>Viacom adds 2.3 million
households</strong></del></span>
<span class="inserted"><ins><em>proprietary software.</p>
</li>
<li id="M201903290">
<!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tesla cars collect lots of personal data,</em></ins></span> and
- <span class="removed"><del><strong>other</strong></del></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
- when they go to a junkyard the driver's personal data goes with
- them</a>.</p></em></ins></span>
+ <p>Tesla cars collect lots of personal data, and <a
+
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
+ when they go</em></ins></span> to <span class="inserted"><ins><em>a
junkyard</em></ins></span> the <span class="removed"><del><strong>600 millions
social media profiles the company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>driver's personal data goes</em></ins></span>
with <span class="removed"><del><strong>online
+ social media participation, Tivo can now</strong></del></span>
+ <span class="inserted"><ins><em>them</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and</strong></del></span>
- <span class="inserted"><ins><em><li id="M201902011">
+ <li id="M201902011">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The FordPass Connect feature of some Ford vehicles
has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,</strong></del></span>
+ <p>The FordPass Connect feature of some Ford vehicles
has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all
users</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access to the internal car network</a>. It is
constantly
- connected to the cellular phone network and sends Ford a lot of data,
- including car location. This feature operates</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>when the ignition
+ near-complete access</em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>the internal car
network</a>. It is constantly
+ connected</em></ins></span> to <span class="removed"><del><strong>be
+ picked up</strong></del></span> <span class="inserted"><ins><em>the
cellular phone network and sends Ford a lot of data,
+ including car location. This feature operates even when the ignition
key is removed, and users report that they can't disable it.</p>
<p>If you own one of these cars, have you succeeded in breaking the
- connectivity by disconnecting the cellular modem, or wrapping the
- antenna in aluminum foil?</p>
+ connectivity</em></ins></span> by <span
class="removed"><del><strong>proprietary malware running on other
devices</strong></del></span> <span class="inserted"><ins><em>disconnecting the
cellular modem, or wrapping the
+ antenna</em></ins></span> in
+ <span class="removed"><del><strong>range so as</strong></del></span>
<span class="inserted"><ins><em>aluminum foil?</p>
</li>
<li id="M201811300">
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>In China,</em></ins></span> it <span
class="removed"><del><strong>isn't</strong></del></span> <span
class="inserted"><ins><em>is mandatory for electric
- cars to be equipped with a terminal that <a
- href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ <p>In China, it is mandatory for electric
+ cars</em></ins></span> to <span class="removed"><del><strong>determine
that they are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads</strong></del></span> <span class="inserted"><ins><em>be
equipped</em></ins></span> with <span class="removed"><del><strong>Web
activity, and
+ other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
+ </li>
+ <li><p>Vizio “smart” TVs recognize
and</strong></del></span> <span class="inserted"><ins><em>a terminal
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if it isn't</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
transfers technical data, including car location,
to</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p>
</li>
@@ -3702,11 +3683,12 @@
snooping all</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying">
manufacturers collect this data</a> as part of their own spying, then
- forward it to</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>government-run
platform.</p></em></ins></span>
+ forward it to</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+ </li>
+ <li><p>The Samsung “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>government-run platform.</p>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
- <span class="inserted"><ins><em><li id="M201810230">
+ <li id="M201810230">
<!--#set var="DATE" value='<small
class="date-tag">2018-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
@@ -3758,22 +3740,14 @@
--><!--#echo encoding="none" var="DATE" -->
<p>AI-powered driving apps can <a
href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p>
- </li>
-
- <li id="M201607160">
- <!--#set var="DATE" value='<small
class="date-tag">2016-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p id="car-spying">Computerized cars with nonfree software are <a
-
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
- snooping devices</a>.</p></em></ins></span>
+ track your every move</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
<!-- #SpywareInGames</strong></del></span>
- <span class="inserted"><ins><em><li id="M201602240">
- <!--#set var="DATE" value='<small
class="date-tag">2016-02</small>'
+ <span class="inserted"><ins><em><li id="M201607160">
+ <!--#set var="DATE" value='<small
class="date-tag">2016-07</small>'
--><!--#echo encoding="none" var="DATE"</em></ins></span> -->
<span class="removed"><del><strong><div class="big-section">
<h3 id="SpywareInGames">Spyware in Games</h3>
@@ -3785,7 +3759,15 @@
<li>
<p>The driver for</strong></del></span>
- <span class="inserted"><ins><em><p id="nissan-modem">The Nissan Leaf
has</em></ins></span> a <span class="removed"><del><strong>certain gaming
keyboard <a
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information</strong></del></span> <span class="inserted"><ins><em>built-in
+ <span class="inserted"><ins><em><p id="car-spying">Computerized cars
with nonfree software are <a
+
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ snooping devices</a>.</p>
+ </li>
+
+ <li id="M201602240">
+ <!--#set var="DATE" value='<small
class="date-tag">2016-02</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p id="nissan-modem">The Nissan Leaf has</em></ins></span> a <span
class="removed"><del><strong>certain gaming keyboard <a
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information</strong></del></span> <span class="inserted"><ins><em>built-in
cell phone modem which allows effectively anyone</em></ins></span> to
<span class="removed"><del><strong>China</a>.</p>
</li>
@@ -3840,8 +3822,8 @@
<p>Even nastier, they do</strong></del></span> <span
class="inserted"><ins><em>c of the <a
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- privacy statement</a>.) The company says it doesn't store this
- information, but if the state orders</em></ins></span> it <span
class="removed"><del><strong>through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>to
get</em></ins></span> the data
+ privacy statement</a>.) The company says</em></ins></span> it <span
class="removed"><del><strong>through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
+ information, but if the state orders it to get</em></ins></span> the data
<span class="removed"><del><strong>collected by various
cr…apps</strong></del></span> and <span
class="removed"><del><strong>sites</strong></del></span> <span
class="inserted"><ins><em>hand it
over, the state can store it.</p>
</li>
@@ -3904,15 +3886,16 @@
--><!--#echo encoding="none" var="DATE" -->
<p>VR equipment, measuring every slight motion,
creates</em></ins></span> the <span class="removed"><del><strong>app said
that users gave consent</strong></del></span> <span
class="inserted"><ins><em>potential</em></ins></span> for <span
class="removed"><del><strong>this,
- would that make</strong></del></span> <span
class="inserted"><ins><em>the most intimate
- surveillance ever. All</em></ins></span> it <span
class="removed"><del><strong>acceptable? No way! It should be flat
out</strong></del></span> <span class="inserted"><ins><em>takes to make this
potential real</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">
- illegal to design</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
+ would that make it acceptable? No way! It should be flat out
+ <a href="/philosophy/surveillance-vs-democracy.html">
+ illegal to design</strong></del></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>most intimate
+ surveillance ever. All it takes</em></ins></span> to <span
class="removed"><del><strong>snoop at all</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>make this
potential real <a
+
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
software as malicious as many other programs listed in this
page</a>.</p>
- <p>You can bet Facebook will implement</em></ins></span> the <span
class="removed"><del><strong>app to snoop at all</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>maximum
possible
+ <p>You can bet Facebook will implement the maximum possible
surveillance on Oculus Rift devices. The moral is, never trust a VR
system with nonfree software in it.</p></em></ins></span>
</li>
@@ -4043,20 +4026,22 @@
</li>
<span class="removed"><del><strong><li><p><a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
- Microsoft SkyDrive allows</strong></del></span>
+ Microsoft SkyDrive allows the NSA</strong></del></span>
<span class="inserted"><ins><em><li id="M201110040">
<!--#set var="DATE" value='<small
class="date-tag">2011-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Pages that contain “Like” buttons <a
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
- enable Facebook to track visitors to those pages</a>—even users
- that don't have Facebook accounts.</p>
+ enable Facebook</em></ins></span> to <span
class="removed"><del><strong>directly examine users'
data</a>.</p></strong></del></span> <span
class="inserted"><ins><em>track visitors to those pages</a>—even
users
+ that don't have Facebook accounts.</p></em></ins></span>
</li>
</ul>
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
-<div class="big-subsection">
+
+<span class="inserted"><ins><em><div class="big-subsection">
<h4 id="SpywareInJavaScript">JavaScript</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInJavaScript">#SpywareInJavaScript</a>)</span>
</div>
@@ -4066,28 +4051,25 @@
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many web sites use JavaScript code <a
-
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- to snoop on information that users have typed into a
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"></em></ins></span>
+ to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>top under each subsection</strong></del></span>
<span class="inserted"><ins><em>information that users have typed into a
form but not sent</a>, in order to learn their identity. Some are
<a
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege">
getting sued</a> for this.</p>
- <p>The chat facilities of some customer services
use</em></ins></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>same sort of
- malware</em></ins></span> to <span class="removed"><del><strong>directly
examine users' data</a>.</p></strong></del></span> <span
class="inserted"><ins><em><a
+ <p>The chat facilities of some customer services use the same sort of
+ malware to <a
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
- read what the user is typing before it is
posted</a>.</p></em></ins></span>
+ read what the user is typing before it is posted</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-<!-- WEBMASTERS: make sure</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201807190">
+ <li id="M201807190">
<!--#set var="DATE" value='<small
class="date-tag">2018-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
- JavaScript on its web site</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>give other companies personal data</em></ins></span>
on <span class="removed"><del><strong>top under each
subsection</strong></del></span>
- <span class="inserted"><ins><em>its customers</a>.</p>
+ JavaScript on its web site to give other companies personal data on
+ its customers</a>.</p>
</li>
<li id="M201712300">
@@ -4163,11 +4145,9 @@
users' computers and report the sites they visit</em></ins></span> to
<span class="removed"><del><strong>snoop on information
that</strong></del></span> <span class="inserted"><ins><em>advertising and
data companies, first of all to Google. Moreover, if</em></ins></span>
users have <span class="removed"><del><strong>typed into</strong></del></span>
a <span class="removed"><del><strong>form but not
sent</a>,</strong></del></span>
- <span class="inserted"><ins><em>Gmail account, Chrome automatically logs
them</em></ins></span> in <span
class="removed"><del><strong>order</strong></del></span> to <span
class="removed"><del><strong>learn their identity. Some are <a
-
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
- getting sued</a> for this.</p></strong></del></span> <span
class="inserted"><ins><em>the browser for
- more convenient profiling. On Android, Chrome also reports their
- location to Google.</p>
+ <span class="inserted"><ins><em>Gmail account, Chrome automatically logs
them</em></ins></span> in <span
class="removed"><del><strong>order</strong></del></span> to <span
class="removed"><del><strong>learn</strong></del></span> <span
class="inserted"><ins><em>the browser for
+ more convenient profiling. On Android, Chrome also
reports</em></ins></span> their <span class="removed"><del><strong>identity.
Some</strong></del></span>
+ <span class="inserted"><ins><em>location to Google.</p>
<p>The best way to escape surveillance is to switch to <a
href="/software/icecat/">IceCat</a>, a modified version of Firefox
@@ -4177,8 +4157,10 @@
<li id="M201704131">
<!--#set var="DATE" value='<small
class="date-tag">2017-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Low-priced Chromebooks for schools are <a
- href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
+ <p>Low-priced Chromebooks for schools</em></ins></span> are <a
+ <span
class="removed"><del><strong>href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+ getting sued</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
collecting far more data on students than is necessary, and store
it indefinitely</a>. Parents and students complain about the lack
of transparency on the part of both the educational services and the
@@ -4189,36 +4171,37 @@
should realize that the software Google uses to spy on students is
nonfree, so they can't verify what it really does. The only remedy is
to persuade school officials to <a
href="/education/edu-schools.html">
- exclusively use free software</a> for both education and school
+ exclusively use free software</a></em></ins></span> for <span
class="removed"><del><strong>this.</p></strong></del></span> <span
class="inserted"><ins><em>both education and school
administration. If the school is run locally, parents and teachers
can mandate their representatives at the School Board to refuse the
budget unless the school initiates a switch to free software. If
education is run nation-wide, they need to persuade legislators
(e.g., through free software organizations, political parties,
- etc.) to migrate the public schools to free
software.</p></em></ins></span>
+ etc.) to migrate the public schools to free software.</p>
</li>
- <span class="removed"><del><strong><li><p>Flash
Player's</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201507280">
+ <li id="M201507280">
<!--#set var="DATE" value='<small
class="date-tag">2015-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google Chrome makes it easy for an extension to
do</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
- cookie feature helps web sites track visitors</a>.</p>
+ <p>Google Chrome makes it easy for an extension to do <a
+
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
+ snooping on the user's browsing</a>, and many of them do
so.</p></em></ins></span>
</li>
- <li><p>Flash</strong></del></span>
- <span
class="inserted"><ins><em>href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
- snooping on the user's browsing</a>,</em></ins></span> and <span
class="removed"><del><strong>JavaScript are also used for</strong></del></span>
<span class="inserted"><ins><em>many of them do so.</p>
- </li>
+ <span class="removed"><del><strong><li><p>Flash
Player's</strong></del></span>
- <li id="M201506180">
+ <span class="inserted"><ins><em><li id="M201506180">
<!--#set var="DATE" value='<small
class="date-tag">2015-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google Chrome includes a module that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices</a></strong></del></span>
+ <p>Google Chrome includes a module that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
+ cookie feature helps web sites track visitors</a>.</p>
+ </li>
+
+ <li><p>Flash</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
- activates microphones and transmits audio</em></ins></span> to <span
class="removed"><del><strong>identify users.</p></strong></del></span>
<span class="inserted"><ins><em>its
servers</a>.</p></em></ins></span>
+ activates microphones</em></ins></span> and <span
class="removed"><del><strong>JavaScript are also used for
+ <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ “fingerprinting” devices</a></strong></del></span>
<span class="inserted"><ins><em>transmits audio</em></ins></span> to <span
class="removed"><del><strong>identify users.</p></strong></del></span>
<span class="inserted"><ins><em>its
servers</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -4274,21 +4257,32 @@
<span class="removed"><del><strong><ul>
<li>
- <p>While you're using</strong></del></span>
+ <p>While you're using a DJI drone</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M202102160">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Google has <a
+
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16">handed
+ over personal data of Indian protesters and activists</em></ins></span> to
<span class="removed"><del><strong>snoop on other people,
DJI</strong></del></span> <span class="inserted"><ins><em>Indian
+ police</a> which leaded to their arrest. The cops requested the IP
+ address and the location where a document was created and with those
+ information, they identified protesters and activists.</p>
+ </li>
+
<li id="M202012250">
<!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The HonorLock online exam
- proctoring program is</em></ins></span> a <span
class="removed"><del><strong>DJI drone to snoop</strong></del></span> <span
class="inserted"><ins><em>surveillance tool that <a
+ proctoring program</em></ins></span> is <span class="inserted"><ins><em>a
surveillance tool that <a
href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps">tracks
students and collects data</a> such as face, driving license, and
network information, among others, in blatant violation of students'
privacy.</p>
<p>Preventing students from cheating should not be an excuse for
- running malware/spyware</em></ins></span> on <span
class="removed"><del><strong>other people, DJI is</strong></del></span> <span
class="inserted"><ins><em>their computers, and it's good that students
+ running malware/spyware on their computers, and it's good that students
are protesting. But their petitions overlook a crucial issue, namely,
the injustice of being forced to run nonfree software</em></ins></span> in
<span class="inserted"><ins><em>order to
get an education.</p>
@@ -4464,7 +4458,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/03/16 17:33:27 $
+$Date: 2021/04/11 13:04:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.386
retrieving revision 1.387
diff -u -b -r1.386 -r1.387
--- proprietary-surveillance.de.po 16 Mar 2021 17:33:27 -0000 1.386
+++ proprietary-surveillance.de.po 11 Apr 2021 13:04:33 -0000 1.387
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-03-16 17:25+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -5812,6 +5812,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The HonorLock online exam proctoring program is a surveillance tool that <a "
"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.176
retrieving revision 1.177
diff -u -b -r1.176 -r1.177
--- proprietary-surveillance.es.po 17 Mar 2021 10:32:16 -0000 1.176
+++ proprietary-surveillance.es.po 11 Apr 2021 13:04:33 -0000 1.177
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-03-16 17:25+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
"PO-Revision-Date: 2021-03-17 11:07+0100\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -5287,6 +5288,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The HonorLock online exam proctoring program is a surveillance tool that <a "
"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.620
retrieving revision 1.621
diff -u -b -r1.620 -r1.621
--- proprietary-surveillance.fr.po 16 Mar 2021 21:58:41 -0000 1.620
+++ proprietary-surveillance.fr.po 11 Apr 2021 13:04:34 -0000 1.621
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-03-16 17:25+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
"PO-Revision-Date: 2021-03-16 22:58+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -5304,6 +5305,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The HonorLock online exam proctoring program is a surveillance tool that <a "
"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.242
retrieving revision 1.243
diff -u -b -r1.242 -r1.243
--- proprietary-surveillance.it-diff.html 16 Mar 2021 17:33:27 -0000
1.242
+++ proprietary-surveillance.it-diff.html 11 Apr 2021 13:04:34 -0000
1.243
@@ -630,11 +630,10 @@
<li id="M201509220">
<!--#set var="DATE" value='<small
class="date-tag">2015-09</small>'
--><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p><a <span
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found</strong></del></span>
+ <p><a <span
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware and spyware via
- BIOS</a> on Windows installs. Note</em></ins></span> that <span
class="removed"><del><strong>90% of the top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span> the <span class="removed"><del><strong>paid
proprietary apps, it was only 60%.</p></strong></del></span> <span
class="inserted"><ins><em>specific
+ BIOS</a> on Windows installs. Note that the specific
sabotage method Lenovo used did not affect GNU/Linux; also, a
“clean” Windows install is not really clean since <a
href="/proprietary/malware-microsoft.html">Microsoft puts in its
@@ -658,44 +657,35 @@
<ul class="blurbs">
<li id="M202102200">
<!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p>The <span class="removed"><del><strong>article confusingly
describes gratis apps</strong></del></span> <span
class="inserted"><ins><em>proprietary program Clubhouse
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The proprietary program Clubhouse
is malware and a privacy disaster. Clubhouse <a
href="https://www.theguardian.com/commentisfree/2021/feb/20/why-hot-new-social-app-clubhouse-spells-nothing-but-trouble">collects
- people's personal data such</em></ins></span> as <span
class="removed"><del><strong>“free”,
- but most</strong></del></span> <span
class="inserted"><ins><em>recordings</em></ins></span> of <span
class="removed"><del><strong>them are</strong></del></span> <span
class="inserted"><ins><em>people's
- conversations</a>, and, as a secondary problem,
does</em></ins></span> not <span class="inserted"><ins><em>encrypt them,
+ people's personal data such as recordings of people's
+ conversations</a>, and, as a secondary problem, does not encrypt
them,
which shows a bad security part of the issue.</p>
- <p>A user's unique Clubhouse ID number and chatroom ID are
transmitted</em></ins></span>
- in <span class="removed"><del><strong>fact
- <a href="/philosophy/free-sw.html">free software</a>.
- It also uses</strong></del></span> <span
class="inserted"><ins><em>plaintext, and Agora (the company
behind</em></ins></span> the <span class="removed"><del><strong>ugly word
“monetize”. A</strong></del></span> <span
class="inserted"><ins><em>app) would likely
+ <p>A user's unique Clubhouse ID number and chatroom ID are
transmitted
+ in plaintext, and Agora (the company behind the app) would likely
have access to users' raw audio, potentially providing access to
the Chinese government.</p>
- <p>Even with</em></ins></span> good <span
class="removed"><del><strong>replacement
- for that word</strong></del></span> <span class="inserted"><ins><em>security
of data transmission, collecting personal
- data of people</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always that will fit
- perfectly.</p></strong></del></span> <span
class="inserted"><ins><em>wrong and a violation of people's privacy
rights.</p></em></ins></span>
+ <p>Even with good security of data transmission, collecting personal
+ data of people is wrong and a violation of people's privacy
rights.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Apps for BART</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M202101080">
+ <li id="M202101080">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>As of 2021, WhatsApp (one of Facebook's subsidiaries)
is</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/">forcing
+ <p>As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a
+
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/">forcing
its users to hand over sensitive personal data</a> to its parent
company. This increases Facebook's power over users, and further
jeopardizes people's privacy and security.</p>
<p>Instead of WhatsApp you can use <a
- href="https://directory.fsf.org/wiki/Jami">GNU Jami</a>, which
is</em></ins></span>
- free software <span
class="removed"><del><strong>apps,</strong></del></span> <span
class="inserted"><ins><em>and will not collect your data.</p>
+ href="https://directory.fsf.org/wiki/Jami">GNU Jami</a>, which is
+ free software and will not collect your data.</p>
</li>
<li id="M202006260">
@@ -704,11 +694,10 @@
<p>Most apps are malware, but
Trump's campaign app, like Modi's campaign app, is <a
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
- especially nasty malware, helping companies snoop on</em></ins></span>
users <span class="removed"><del><strong>could <em>make
sure</em></strong></del></span> <span class="inserted"><ins><em>as well
+ especially nasty malware, helping companies snoop on users as well
as snooping on them itself</a>.</p>
- <p>The article says</em></ins></span> that <span
class="removed"><del><strong>they don't snoop.</p>
- <p>With</strong></del></span> <span class="inserted"><ins><em>Biden's
app has a less manipulative overall
+ <p>The article says that Biden's app has a less manipulative overall
approach, but that does not tell us whether it has functionalities we
consider malicious, such as sending data the user has not explicitly
asked to send.</p>
@@ -1690,7 +1679,7 @@
<li id="M201711240">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tracking software in popular Android apps
+ <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>2015</a></strong></del></span> <span
class="inserted"><ins><em>popular Android apps
is pervasive and sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow a user's movements around a physical store by noticing WiFi
@@ -1759,7 +1748,7 @@
<li id="M201705040">
<!--#set var="DATE" value='<small
class="date-tag">2017-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A study found 234 Android apps that track users by <a
+ <p>A study</em></ins></span> found <span
class="inserted"><ins><em>234 Android apps</em></ins></span> that <span
class="removed"><del><strong>90%</strong></del></span> <span
class="inserted"><ins><em>track users by <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
to ultrasound from beacons placed in stores or played by TV
programs</a>.</p>
@@ -1768,9 +1757,10 @@
<li id="M201704260">
<!--#set var="DATE" value='<small
class="date-tag">2017-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Faceapp appears to do lots of surveillance, judging by <a
+ <p>Faceapp appears to do lots</em></ins></span> of <span
class="inserted"><ins><em>surveillance, judging by <a
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data in the
device</a>.</p>
+ how much access it demands to personal data in</em></ins></span> the <span
class="removed"><del><strong>top-ranked gratis
+ proprietary</strong></del></span> <span
class="inserted"><ins><em>device</a>.</p>
</li>
<li id="M201704190">
@@ -1792,7 +1782,8 @@
<li id="M201704074">
<!--#set var="DATE" value='<small
class="date-tag">2017-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Pairs of Android apps can collude
+ <p>Pairs of</em></ins></span> Android apps <span
class="removed"><del><strong>contained recognizable tracking libraries. For
+ the paid</strong></del></span> <span class="inserted"><ins><em>can collude
to transmit users' personal data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found tens of thousands of pairs that collude</a>.</p>
@@ -1803,14 +1794,14 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
pre-install
+ announced an opt-in</em></ins></span> proprietary <span
class="removed"><del><strong>apps,</strong></del></span> <span
class="inserted"><ins><em>search app that</em></ins></span> it <span
class="removed"><del><strong>was</strong></del></span> <span
class="inserted"><ins><em>will</a> pre-install
on some of its phones. The app will give Verizon the same information
about the users' searches that Google normally gets when they use
its search engine.</p>
<p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and the user must
+ being pre-installed on</em></ins></span> only <span
class="removed"><del><strong>60%.</p></strong></del></span> <span
class="inserted"><ins><em>one phone</a>, and the user must
explicitly opt-in before the app takes effect. However, the app
remains spyware—an “optional” piece of spyware is
still spyware.</p>
@@ -1826,29 +1817,48 @@
<li id="M201611280">
<!--#set var="DATE" value='<small
class="date-tag">2016-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The Uber app tracks <a
-
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
+ --><!--#echo encoding="none" var="DATE" --></em></ins></span>
+ <p>The <span class="removed"><del><strong>article confusingly
describes gratis apps as “free”,
+ but most of them are not in fact</strong></del></span> <span
class="inserted"><ins><em>Uber app tracks</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>.
+ It also uses</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after</em></ins></span> the <span
class="removed"><del><strong>ugly word “monetize”. A good
replacement</strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
<p>This example illustrates how “getting the user's
- consent” for surveillance is inadequate as a protection against
- massive surveillance.</p>
+ consent”</em></ins></span> for <span
class="removed"><del><strong>that word</strong></del></span> <span
class="inserted"><ins><em>surveillance</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always that will fit
+ perfectly.</p></strong></del></span> <span
class="inserted"><ins><em>inadequate as a protection against
+ massive surveillance.</p></em></ins></span>
</li>
- <li id="M201611160">
+<span class="removed"><del><strong><li>
+ <p>Apps for BART</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201611160">
<!--#set var="DATE" value='<small
class="date-tag">2016-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A <a
-
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated the privacy and security of
- 283 Android VPN apps concluded that “in spite of the promises
- for privacy, security, and anonymity given by the majority of VPN
- apps—millions of users may be unawarely subject to poor security
- guarantees and abusive practices inflicted by VPN apps.”</p>
+ <p>A</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With proprietary apps, one can only hope</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a></em></ins></span> that <span
class="removed"><del><strong>they don't.</p>
+</li>
+
+<li>
+ <p>A study found 234</strong></del></span> <span
class="inserted"><ins><em>investigated the privacy and security of
+ 283</em></ins></span> Android <span
class="inserted"><ins><em>VPN</em></ins></span> apps <span
class="inserted"><ins><em>concluded</em></ins></span> that <span
class="removed"><del><strong>track users</strong></del></span> <span
class="inserted"><ins><em>“in spite of the promises
+ for privacy, security, and anonymity given</em></ins></span> by
+ <span class="removed"><del><strong><a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
<span class="inserted"><ins><em>the majority of VPN
+ apps—millions of users may be unawarely subject</em></ins></span> to
<span class="removed"><del><strong>ultrasound from beacons placed in stores or
played</strong></del></span> <span class="inserted"><ins><em>poor security
+ guarantees and abusive practices inflicted</em></ins></span> by <span
class="removed"><del><strong>TV programs</a>.
+ </p>
+
+</li>
+
+<li>
+ <p>Pairs</strong></del></span> <span class="inserted"><ins><em>VPN
apps.”</p>
- <p>Following is a non-exhaustive list, taken from the research paper,
- of some proprietary VPN apps that track users and infringe their
+ <p>Following is a non-exhaustive list, taken from the research
paper,</em></ins></span>
+ of <span class="removed"><del><strong>Android</strong></del></span> <span
class="inserted"><ins><em>some proprietary VPN</em></ins></span> apps <span
class="removed"><del><strong>can collude</strong></del></span> <span
class="inserted"><ins><em>that track users and infringe their
privacy:</p>
<dl class="compact">
@@ -1858,11 +1868,13 @@
<dt>sFly Network Booster</dt>
<dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning it has full access to users'
- text messages.</dd>
+ permissions upon installation, meaning it has full
access</em></ins></span> to <span
class="removed"><del><strong>transmit</strong></del></span> users' <span
class="removed"><del><strong>personal
+ data</strong></del></span>
+ <span class="inserted"><ins><em>text messages.</dd>
<dt>DroidVPN and TigerVPN</dt>
- <dd>Requests the <code>READ_LOGS</code> permission to
read logs
+ <dd>Requests the <code>READ_LOGS</code>
permission</em></ins></span> to <span class="removed"><del><strong>servers.
<a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens</strong></del></span> <span class="inserted"><ins><em>read logs
for other apps and also core system logs. TigerVPN developers have
confirmed this.</dd>
@@ -1872,19 +1884,22 @@
<dt>VPN Services HotspotShield</dt>
<dd>Injects JavaScript code into the HTML pages returned to the
- users. The stated purpose of the JS injection is to display ads. Uses
+ users. The stated purpose</em></ins></span> of <span
class="removed"><del><strong>thousands</strong></del></span> <span
class="inserted"><ins><em>the JS injection is to display ads. Uses
roughly five tracking libraries. Also, it redirects the user's
traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
<dd>Injects JavaScript code into HTML pages, and also uses roughly
- five tracking libraries. Developers of this app have confirmed that
- the non-premium version of the app does JavaScript injection for
+ five tracking libraries. Developers</em></ins></span> of <span
class="removed"><del><strong>pairs</strong></del></span> <span
class="inserted"><ins><em>this app have confirmed</em></ins></span> that <span
class="removed"><del><strong>collude</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>the non-premium version of the app does
JavaScript injection for
tracking the user and displaying ads.</dd>
- </dl>
+ </dl></em></ins></span>
</li>
- <li id="M201609210">
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609210">
<!--#set var="DATE" value='<small
class="date-tag">2016-09</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Google's new voice messaging app <a
@@ -1895,19 +1910,41 @@
<li id="M201606050">
<!--#set var="DATE" value='<small
class="date-tag">2016-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Facebook's new Magic Photo app <a
-
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+ <p>Facebook's new Magic Photo</em></ins></span> app <span
class="removed"><del><strong>developers</strong></del></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+the personal details of users that install the app</a>.</p>
+
+<p>Merely asking</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections for known faces</a>,
- and suggests you circulate the picture you take according to who is
- in the frame.</p>
+ and suggests you circulate</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>picture you take
according to who</em></ins></span> is <span class="removed"><del><strong>not
enough</strong></del></span>
+ <span class="inserted"><ins><em>in the frame.</p>
- <p>This spyware feature seems to require online access to some
- known-faces database, which means the pictures are likely to be
- sent across the wire to Facebook's servers and face-recognition
+ <p>This spyware feature seems</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>require
online access to some
+ known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>“Terms and Conditions” that spell out
+what they</strong></del></span> <span
class="inserted"><ins><em>pictures</em></ins></span> are <span
class="removed"><del><strong>“consenting” to. Google should clearly
+and honestly identify</strong></del></span> <span
class="inserted"><ins><em>likely to be
+ sent across</em></ins></span> the <span
class="removed"><del><strong>information it collects on users, instead
+of hiding it in an obscurely worded EULA.</p>
+
+<p>However,</strong></del></span> <span
class="inserted"><ins><em>wire</em></ins></span> to <span
class="removed"><del><strong>truly protect people's privacy, we must prevent
Google</strong></del></span> <span class="inserted"><ins><em>Facebook's
servers</em></ins></span> and <span class="removed"><del><strong>other
companies from getting this personal information in the first
+place!</p>
+</li>
+
+ <li>
+ <p>Google Play (a component</strong></del></span> <span
class="inserted"><ins><em>face-recognition
algorithms.</p>
- <p>If so, none of Facebook users' pictures are private anymore,
- even if the user didn't “upload” them to the service.</p>
+ <p>If so, none</em></ins></span> of <span
class="removed"><del><strong>Android) <a
+
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks the</strong></del></span> <span
class="inserted"><ins><em>Facebook</em></ins></span> users' <span
class="removed"><del><strong>movements without their
permission</a>.</p>
+
+ <p>Even</strong></del></span> <span
class="inserted"><ins><em>pictures are private anymore,
+ even</em></ins></span> if <span class="removed"><del><strong>you disable
Google Maps and location tracking, you must
+ disable Google Play itself to completely stop</strong></del></span> the
<span class="removed"><del><strong>tracking. This is
+ yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>user didn't “upload”
them</em></ins></span> to <span
class="removed"><del><strong>obey</strong></del></span> the <span
class="removed"><del><strong>user,
+ when it's actually doing something else. Such a thing
would</strong></del></span> <span class="inserted"><ins><em>service.</p>
</li>
<li id="M201605310">
@@ -1916,33 +1953,39 @@
<p>Facebook's app listens all the time, <a
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html">to
snoop on what people are listening to or watching</a>. In addition,
- it may be analyzing people's conversations to serve them with targeted
- advertisements.</p>
+ it may</em></ins></span> be <span class="removed"><del><strong>almost
+ unthinkable</strong></del></span> <span
class="inserted"><ins><em>analyzing people's conversations to serve
them</em></ins></span> with <span class="removed"><del><strong>free
software.</p></strong></del></span> <span
class="inserted"><ins><em>targeted
+ advertisements.</p></em></ins></span>
</li>
- <li id="M201604250">
+ <span class="removed"><del><strong><li><p>More than
73%</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201604250">
<!--#set var="DATE" value='<small
class="date-tag">2016-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>A pregnancy test controller application not only can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts of data in the phone, and in server accounts,
+ spy on many sorts</em></ins></span> of <span
class="inserted"><ins><em>data in</em></ins></span> the <span
class="removed"><del><strong>most popular Android apps</strong></del></span>
<span class="inserted"><ins><em>phone, and in server accounts,
it can alter them too</a>.</p>
</li>
<li id="M201601130">
<!--#set var="DATE" value='<small
class="date-tag">2016-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apps that include <a
-
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also on what users post on various sites
- such as Facebook, Google+ and Twitter.</p>
+ <p>Apps that include</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio</em></ins></span> and
<span class="removed"><del><strong>location information</a> of
their</strong></del></span> <span class="inserted"><ins><em>TV programs
+ are playing nearby</a>. Also on what</em></ins></span> users <span
class="removed"><del><strong>with third
parties.</p></strong></del></span> <span class="inserted"><ins><em>post
on various sites
+ such as Facebook, Google+ and Twitter.</p></em></ins></span>
</li>
- <li id="M201511190">
+ <span
class="removed"><del><strong><li><p>“Cryptic</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511190">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>“Cryptic communication,”
+ <p>“Cryptic</em></ins></span> communication,”
unrelated to the app's functionality, was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
found in the 500 most popular gratis Android apps</a>.</p>
@@ -1956,41 +1999,55 @@
analyze what users are doing or how. “Analytics” tools
that snoop are just as wrong as any other snooping.</p>
</li>
+ <span
class="removed"><del><strong><li><p>Gratis</strong></del></span>
- <li id="M201510300">
+ <span class="inserted"><ins><em><li id="M201510300">
<!--#set var="DATE" value='<small
class="date-tag">2015-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>More than 73% and 47% of mobile applications, for Android and iOS
- respectively <a href="https://techscience.org/a/2015103001/">hand
over
- personal, behavioral and location information</a> of their users to
- third parties.</p>
+ <p>More than 73% and 47% of mobile applications,
for</em></ins></span> Android <span class="removed"><del><strong>apps (but not
<a href="/philosophy/free-sw.html">free software</a>)
+ connect to 100</strong></del></span> <span class="inserted"><ins><em>and
iOS
+ respectively</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">hand
over
+ personal, behavioral</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
+ on the average.</p></strong></del></span> <span
class="inserted"><ins><em>location information</a> of their users to
+ third parties.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
- <li id="M201508210">
+ <span class="inserted"><ins><em><li id="M201508210">
<!--#set var="DATE" value='<small
class="date-tag">2015-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Like most “music screaming” disservices, Spotify is
- based on proprietary malware (DRM and snooping). In August 2015 it <a
+ <p>Like most “music screaming” disservices,
Spotify</em></ins></span> is <span class="removed"><del><strong>present
in</strong></del></span>
+ <span class="inserted"><ins><em>based on proprietary malware (DRM and
snooping). In August 2015 it <a
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some are
starting
- to realize that it is nasty.</p>
+ demanded users submit to increased snooping</a>,
and</em></ins></span> some <span class="removed"><del><strong>Android devices
when they</strong></del></span> are <span class="removed"><del><strong>sold.
+ Some Motorola phones modify Android</strong></del></span> <span
class="inserted"><ins><em>starting</em></ins></span>
+ to <span class="inserted"><ins><em>realize that it is nasty.</p>
+
+ <p>This article shows the</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as a way</em></ins></span> to
<span class="removed"><del><strong>Motorola</a>.</p>
+ </li>
- <p>This article shows the <a
-
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way to “serve”
- users better</a>—never mind whether they want that. This is a
- typical example of the attitude of the proprietary software industry
+ <li><p>Some manufacturers add</strong></del></span> <span
class="inserted"><ins><em>“serve”
+ users better</a>—never mind whether they want that. This
is</em></ins></span> a
+ <span class="removed"><del><strong><a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p></strong></del></span>
+ <span class="inserted"><ins><em>typical example of the attitude of the
proprietary software industry
towards those they have subjugated.</p>
- <p>Out, out, damned Spotify!</p>
+ <p>Out, out, damned Spotify!</p></em></ins></span>
</li>
- <li id="M201506264">
+ <span class="removed"><del><strong><li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access to any file
on</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201506264">
<!--#set var="DATE" value='<small
class="date-tag">2015-06</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf">
- A study in 2015</a> found that 90% of the top-ranked gratis
proprietary
+ A study in 2015</a> found that 90% of</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>top-ranked gratis proprietary
Android apps contained recognizable tracking libraries. For the paid
proprietary apps, it was only 60%.</p>
@@ -1998,71 +2055,173 @@
“free”, but most of them are not in fact <a
href="/philosophy/free-sw.html">free software</a>. It also uses
the
ugly word “monetize”. A good replacement for that word
- is “exploit”; nearly always that will fit perfectly.</p>
+ is “exploit”; nearly always that will fit
perfectly.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
- <li id="M201505060">
+<!-- #SpywareOnMobiles</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505060">
<!--#set var="DATE" value='<small
class="date-tag">2015-05</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Gratis Android apps (but not <a
- href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>Gratis Android apps (but not <a
+ href="/philosophy/free-sw.html">free software</a>)
connect</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>100 <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
- and advertising</a> URLs, on the average.</p>
+ and advertising</a> URLs,</em></ins></span> on <span
class="removed"><del><strong>top under each subsection</strong></del></span>
<span class="inserted"><ins><em>the average.</p>
</li>
<li id="M201504060">
<!--#set var="DATE" value='<small
class="date-tag">2015-04</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Widely used <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware</strong></del></span>
+ <span class="inserted"><ins><em><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This is in addition to
- the snooping done by the phone company, and perhaps by the OS in
- the phone.</p>
+ QR-code scanner apps snoop</em></ins></span> on <span
class="removed"><del><strong>Mobiles</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareIniThings">Spyware</strong></del></span> <span
class="inserted"><ins><em>the user</a>. This is</em></ins></span> in
<span class="removed"><del><strong>iThings</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+</div>
+
+<ul>
+ <li><p>Apple proposes
+ <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way to use it without having your
fingerprints
+ taken. Users would have no way</strong></del></span> <span
class="inserted"><ins><em>addition</em></ins></span> to <span
class="removed"><del><strong>tell whether</strong></del></span>
+ the <span class="removed"><del><strong>phone is</strong></del></span>
snooping <span class="removed"><del><strong>on
+ them.</p></li>
+
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots of personal data to Apple's servers</a>. Big Brother can
+ get them from there.</p>
+ </li>
+
+ <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every</strong></del></span> <span
class="inserted"><ins><em>done by the</em></ins></span> phone <span
class="removed"><del><strong>number that</strong></del></span> <span
class="inserted"><ins><em>company, and perhaps by</em></ins></span> the <span
class="removed"><del><strong>user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>OS
in</em></ins></span>
+ the <span class="removed"><del><strong>server records these numbers for at
least 30
+ days.</p>
+ </li>
+
+ <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
+ without giving a valid email address and receiving</strong></del></span>
<span class="inserted"><ins><em>phone.</p>
+
+ <p>Don't be distracted by</em></ins></span> the <span
class="removed"><del><strong>code Apple
+ sends to it.</p>
+ </li>
+
+ <li><p>Around 47%</strong></del></span> <span
class="inserted"><ins><em>question</em></ins></span> of <span
class="inserted"><ins><em>whether</em></ins></span> the <span
class="removed"><del><strong>most popular iOS apps
+ <a class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a> of
their</strong></del></span> <span class="inserted"><ins><em>app developers
+ get</em></ins></span> users <span class="removed"><del><strong>with third
parties.</p>
+ </li>
+
+ <li><p>iThings automatically upload to Apple's servers all the
photos and
+ videos they make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you take,
+ and keeps them up</strong></del></span> to <span
class="removed"><del><strong>date on all your devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
- <p>Don't be distracted by the question of whether the app developers
- get users to say “I agree”. That is no excuse for
+ <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ information</a> as accessed on 24 Sep 2015.) The iCloud
feature</strong></del></span> <span class="inserted"><ins><em>say “I
agree”. That</em></ins></span> is
+ <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span> <span class="inserted"><ins><em>no excuse for
malware.</p>
</li>
<li id="M201411260">
<!--#set var="DATE" value='<small
class="date-tag">2014-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many</em></ins></span> proprietary <span
class="removed"><del><strong>apps, one</strong></del></span> <span
class="inserted"><ins><em>apps for mobile devices
- report which other apps the user has installed. <a
- href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible and optional</a>. Not
- as bad as what the others do.</p>
+ <p>Many proprietary apps for mobile devices
+ report which other apps</em></ins></span> the
+ <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
+ “please don't ask where.”</p>
+
+ <p>There</strong></del></span> <span class="inserted"><ins><em>user
has installed. <a
+
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</em></ins></span>
+ is <span class="inserted"><ins><em>doing this in</em></ins></span> a way
<span class="removed"><del><strong>to <a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default so it still
counts</strong></del></span> <span class="inserted"><ins><em>that at least is
visible and optional</a>. Not
+ as bad</em></ins></span> as <span class="inserted"><ins><em>what the
others do.</p>
</li>
<li id="M201401150.1">
<!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Simeji keyboard is a smartphone version of Baidu's <a
- href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
+ <p>The Simeji keyboard is</em></ins></span> a
+ <span class="removed"><del><strong>surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>smartphone version</em></ins></span> of <span
class="removed"><del><strong>this to</strong></del></span> <span
class="inserted"><ins><em>Baidu's</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
title="Input Method Editor">IME</abbr></a>.</p>
</li>
<li id="M201312270">
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The nonfree Snapchat app's principal purpose is to restrict the
- use of data on the user's computer, but it does surveillance too: <a
-
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the user's list of other people's phone
- numbers</a>.</p>
+ <p>The nonfree Snapchat app's principal purpose is</em></ins></span>
to <span class="removed"><del><strong>get at them, but NSA can access
any</strong></del></span> <span class="inserted"><ins><em>restrict the
+ use</em></ins></span> of <span class="removed"><del><strong>them through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p>Spyware in iThings:</strong></del></span> <span
class="inserted"><ins><em>data on</em></ins></span> the <span
class="inserted"><ins><em>user's computer, but it does surveillance
too:</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly where the iThing is,
+ and</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to</em></ins></span> get <span class="inserted"><ins><em>the
user's list of</em></ins></span> other <span class="removed"><del><strong>info
too.</p></strong></del></span> <span class="inserted"><ins><em>people's
phone
+ numbers</a>.</p></em></ins></span>
</li>
- <li id="M201312060">
+ <span class="removed"><del><strong><li><p>There is also a
feature for web sites to track users, which is</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312060">
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Brightest Flashlight app <a
-
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies</a>.</p>
-
- <p>The FTC criticized this app because it asked the user to
- approve sending personal data to the app developer but did not ask
- about sending it to other companies. This shows the weakness of
- the reject-it-if-you-dislike-snooping “solution” to
+ <p>The Brightest Flashlight app</em></ins></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use</em></ins></span> by <span
class="removed"><del><strong>default</a>. (That article talks about iOS
6, but</strong></del></span> <span
class="inserted"><ins><em>companies</a>.</p>
+
+ <p>The FTC criticized this app because</em></ins></span> it
+ <span class="removed"><del><strong>is still true in iOS 7.)</p>
+ </li>
+
+ <li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default, though that can be
+ turned off.</p>
+ </li>
+
+ <li><p>Apple can, and regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for the
state</a>.</p>
+ </li>
+
+ <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps the NSA snoop on all</strong></del></span> <span
class="inserted"><ins><em>asked</em></ins></span> the <span
class="inserted"><ins><em>user to
+ approve sending personal</em></ins></span> data <span
class="removed"><del><strong>in an iThing,
+ or</strong></del></span> <span class="inserted"><ins><em>to the app
developer but did not ask
+ about sending</em></ins></span> it <span class="removed"><del><strong>is
totally incompetent.</a></p>
+ </li>
+
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem</strong></del></span> to
<span class="removed"><del><strong>exist for no
+ possible purpose</strong></del></span> other <span
class="removed"><del><strong>than surveillance</a>. Here
is</strong></del></span> <span class="inserted"><ins><em>companies. This shows
the weakness of</em></ins></span>
+ the <span class="inserted"><ins><em>reject-it-if-you-dislike-snooping
“solution” to
surveillance: why should a flashlight app send any information to
anyone? A free software flashlight app would not.</p>
</li>
@@ -2070,47 +2229,43 @@
<li id="M201212100">
<!--#set var="DATE" value='<small
class="date-tag">2012-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>FTC says most mobile apps for children don't respect privacy:
<a
-
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ <p>FTC says most mobile apps for children don't respect
privacy:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInSkype">Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware in
Telephones</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInSkype">Skype</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInSkype">#SpywareInSkype</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>According</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201908151">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Skype refuses to say whether it</em></ins></span> can <span
class="removed"><del><strong>only hope that they
don't.</p></strong></del></span> <span class="inserted"><ins><em><a
-
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
+ <p>Skype refuses</em></ins></span> to <span
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>say whether it can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
on calls</a>.</p>
- <p>That almost certainly means it can do
so.</p></em></ins></span>
+ <p>That almost certainly means it</em></ins></span> can <span
class="removed"><del><strong>take over
smartphones</a></strong></del></span> <span class="inserted"><ins><em>do
so.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>A study found 234 Android apps that track users
by</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201307110">
+ <li id="M201307110">
<!--#set var="DATE" value='<small
class="date-tag">2013-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Skype contains</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
programs</a>.
- </p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
+ <p>Skype contains <a
+
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
Microsoft changed Skype <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></em></ins></span>
+ specifically for spying</a>.</p>
</li>
-
-<span class="removed"><del><strong><li>
- <p>Pairs</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -2123,76 +2278,57 @@
<!--#set var="DATE" value='<small
class="date-tag">2020-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Microsoft is imposing its
- surveillance on the game</em></ins></span> of <span
class="removed"><del><strong>Android apps can collude</strong></del></span>
<span class="inserted"><ins><em>Minecraft by <a
+ surveillance on the game of Minecraft</em></ins></span> by <span
class="removed"><del><strong>sending hidden text messages</strong></del></span>
<span class="inserted"><ins><em><a
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
- every player</em></ins></span> to <span
class="removed"><del><strong>transmit users' personal
- data</strong></del></span> <span class="inserted"><ins><em>open an
account on Microsoft's network</a>. Microsoft
- has bought the game and will merge all accounts into its network,
- which will give them access</em></ins></span> to <span
class="removed"><del><strong>servers.</strong></del></span> <span
class="inserted"><ins><em>people's data.</p>
-
- <p>Minecraft players</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands</strong></del></span>
- <span
class="inserted"><ins><em>href="https://directory.fsf.org/wiki/Minetest">can
play Minetest</a>
- instead. The essential advantage</em></ins></span> of <span
class="removed"><del><strong>pairs</strong></del></span> <span
class="inserted"><ins><em>Minetest is</em></ins></span> that <span
class="removed"><del><strong>collude</a>.</p>
-</li>
-
-<li>
-<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span class="inserted"><ins><em>it is free
- software, meaning it respects</em></ins></span> the <span
class="removed"><del><strong>personal details of</strong></del></span> <span
class="inserted"><ins><em>user's computer freedom. As a bonus,
+ every player to open an account on Microsoft's network</a>. Microsoft
+ has bought the game and will merge all accounts into its
network,</em></ins></span>
+ which <span class="removed"><del><strong>enable</strong></del></span>
<span class="inserted"><ins><em>will give</em></ins></span> them <span
class="inserted"><ins><em>access</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>people's data.</p>
+
+ <p>Minecraft players <a
+ href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
+ instead. The essential advantage of Minetest is that it is free
+ software, meaning it respects</em></ins></span> the <span
class="removed"><del><strong>phones
+ on</strong></del></span> <span class="inserted"><ins><em>user's computer
freedom. As a bonus,
it offers more options.</p>
</li>
<li id="M201908210">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft recorded</em></ins></span> users <span
class="removed"><del><strong>that install the app</a>.</p>
-
-<p>Merely asking the “consent”</strong></del></span> of
<span class="removed"><del><strong>users is not enough</strong></del></span>
<span class="inserted"><ins><em>Xboxes and had <a
+ <p>Microsoft recorded users of Xboxes</em></ins></span> and <span
class="removed"><del><strong>off,</strong></del></span> <span
class="inserted"><ins><em>had <a
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
- human workers listen</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users have
-stopped reading</strong></del></span> the <span
class="removed"><del><strong>“Terms</strong></del></span> <span
class="inserted"><ins><em>recordings</a>.</p>
+ human workers</em></ins></span> listen to the <span
class="removed"><del><strong>microphone, retrieve
geo-location</strong></del></span> <span
class="inserted"><ins><em>recordings</a>.</p>
- <p>Morally, we see no difference between having human workers
listen</em></ins></span> and <span
class="removed"><del><strong>Conditions”</strong></del></span>
- <span class="inserted"><ins><em>having speech-recognition systems listen.
Both intrude on privacy.</p>
+ <p>Morally, we see no difference between having human workers listen
and
+ having speech-recognition systems listen. Both intrude on
privacy.</p>
</li>
<li id="M201806240">
<!--#set var="DATE" value='<small
class="date-tag">2018-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Red Shell is a spyware</em></ins></span> that <span
class="removed"><del><strong>spell out
-what they are “consenting” to. Google should clearly
-and honestly identify the information it collects</strong></del></span>
- <span class="inserted"><ins><em>is found in many proprietary games. It
<a
+ <p>Red Shell is a spyware that
+ is found in many proprietary games. It <a
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data</em></ins></span> on <span class="removed"><del><strong>users,
instead
-of hiding</strong></del></span> <span class="inserted"><ins><em>users'
computers and sends</em></ins></span> it <span class="removed"><del><strong>in
an obscurely worded EULA.</p>
-
-<p>However,</strong></del></span> to <span
class="removed"><del><strong>truly protect people's privacy, we must prevent
Google
-and other companies from getting this personal information
in</strong></del></span> <span class="inserted"><ins><em>third
parties</a>.</p>
+ tracks</em></ins></span> data <span class="removed"><del><strong>from the
+ GPS, take photographs, read text messages, read call,
location</strong></del></span> <span class="inserted"><ins><em>on users'
computers</em></ins></span> and <span class="removed"><del><strong>web
+ browsing history,</strong></del></span> <span
class="inserted"><ins><em>sends it to third parties</a>.</p>
</li>
<li id="M201804144">
<!--#set var="DATE" value='<small
class="date-tag">2018-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>ArenaNet surreptitiously installed a spyware
- program along with an update to</em></ins></span> the <span
class="removed"><del><strong>first
-place!</p></strong></del></span> <span class="inserted"><ins><em>massive
+ program along with an update to the massive
multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
- to snoop on all open processes running on its user's
computer</a>.</p></em></ins></span>
+ to snoop on all open processes running on its user's
computer</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Google Play (a component of Android)</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711070">
+ <li id="M201711070">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The driver for a certain gaming keyboard</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without</strong></del></span>
- <span
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
+ <p>The driver for a certain gaming keyboard <a
+
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information to China</a>.</p>
</li>
@@ -2201,71 +2337,51 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Many <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on</em></ins></span> their <span
class="removed"><del><strong>permission</a>.</p>
-
- <p>Even if you disable Google Maps</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> and <span
class="removed"><del><strong>location tracking, you must
- disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>report</em></ins></span> to <span
class="removed"><del><strong>completely stop</strong></del></span> the <span
class="removed"><del><strong>tracking. This</strong></del></span>
+ video game consoles snoop on their users</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>report to</em></ins></span> the <span
class="removed"><del><strong>contact list. This malware</strong></del></span>
<span class="inserted"><ins><em>internet</a>—even what their
users weigh.</p>
- <p>A game console</em></ins></span> is
- <span class="removed"><del><strong>yet another example of nonfree software
pretending to obey the user,
- when it's actually doing something else. Such</strong></del></span> a
<span class="removed"><del><strong>thing would be almost
- unthinkable</strong></del></span> <span
class="inserted"><ins><em>computer, and you can't trust a
computer</em></ins></span> with <span class="removed"><del><strong>free
software.</p></strong></del></span>
- <span class="inserted"><ins><em>a nonfree operating
system.</p></em></ins></span>
+ <p>A game console</em></ins></span> is <span
class="removed"><del><strong>designed to
+ disguise itself from investigation.</p>
</li>
- <span class="removed"><del><strong><li><p>More than 73% of the
most popular Android apps</strong></del></span>
+ <li><p>Samsung phones come</strong></del></span> <span
class="inserted"><ins><em>a computer, and you can't trust a
computer</em></ins></span> with
+ <span class="inserted"><ins><em>a nonfree operating system.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201509160">
+ <li id="M201509160">
<!--#set var="DATE" value='<small
class="date-tag">2015-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral and location information</a></strong></del></span>
+ <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that</strong></del></span>
<span
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range</em></ins></span> of <span
class="inserted"><ins><em>data about</em></ins></span> their users <span
class="removed"><del><strong>with third parties.</p>
- </li>
-
- <li><p>“Cryptic communication,” unrelated to the
app's functionality,
- was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in</strong></del></span> <span class="inserted"><ins><em>and their
users'
+ collect a wide range of data about their</em></ins></span> users <span
class="removed"><del><strong>can't delete</a>,</strong></del></span> and
<span class="inserted"><ins><em>their users'
friends and associates</a>.</p>
- <p>Even nastier, they do it through ad networks that
merge</em></ins></span> the <span class="removed"><del><strong>500 most popular
gratis Android apps</a>.</p>
-
- <p>The article should not have described these apps as
- “free”—they are not free software. The clear
way</strong></del></span> <span class="inserted"><ins><em>data
+ <p>Even nastier,</em></ins></span> they <span
class="removed"><del><strong>send so much data</strong></del></span> <span
class="inserted"><ins><em>do it through ad networks</em></ins></span> that
<span class="removed"><del><strong>their transmission is</strong></del></span>
<span class="inserted"><ins><em>merge the data
collected by various cr…apps and sites made by different
companies.</p>
- <p>They use this data</em></ins></span> to <span
class="removed"><del><strong>say
- “zero price” is “gratis.”</p>
+ <p>They use this data to manipulate people to buy things, and hunt
for
+ “whales” who can be led to spend</em></ins></span> a
+ <span class="removed"><del><strong>substantial
expense</strong></del></span> <span class="inserted"><ins><em>lot of money.
They also
+ use a back door to manipulate the game play</em></ins></span> for <span
class="removed"><del><strong>users. Said transmission, not wanted or
+ requested by</strong></del></span> <span
class="inserted"><ins><em>specific players.</p>
+
+ <p>While</em></ins></span> the <span
class="removed"><del><strong>user, clearly must constitute spying of some
+ kind.</p></li>
- <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>manipulate people to buy things, and
hunt</em></ins></span> for <span class="removed"><del><strong>granted that the
usual analytics tools are
- legitimate, but is that valid? Software developers have no
right</strong></del></span>
- <span class="inserted"><ins><em>“whales” who can be
led</em></ins></span> to
- <span class="removed"><del><strong>analyze what users are doing or how.
“Analytics” tools</strong></del></span> <span
class="inserted"><ins><em>spend a lot of money. They also
- use a back door to manipulate the game play for specific players.</p>
-
- <p>While the article describes gratis games, games</em></ins></span>
that <span class="removed"><del><strong>snoop are
- just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>cost money
- can use the same tactics.</p></em></ins></span>
+ <li><p>A Motorola phone</strong></del></span> <span
class="inserted"><ins><em>article describes gratis games, games that cost money
+ can use the same tactics.</p>
</li>
- <span class="removed"><del><strong><li><p>Gratis Android apps
(but not <a href="/philosophy/free-sw.html">free software</a>)
- connect to 100</strong></del></span>
- <span class="inserted"><ins><em><li id="M201401280">
+ <li id="M201401280">
<!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Angry Birds</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
+ <p>Angry Birds</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
- on</strong></del></span> the <span
class="removed"><del><strong>average.</p>
- </li>
- <li><p>Spyware is present in some Android devices when they are
sold.
- Some Motorola phones modify Android</strong></del></span> <span
class="inserted"><ins><em>NSA takes advantage</em></ins></span>
- to <span class="inserted"><ins><em>spy through it too</a>. Here's
information on</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data to Motorola</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ spies</em></ins></span> for <span class="removed"><del><strong>voice
all</strong></del></span> <span class="inserted"><ins><em>companies,
and</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>NSA takes advantage
+ to spy through it too</a>. Here's information on <a
+
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
@@ -2273,116 +2389,88 @@
More about NSA app spying</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Some manufacturers
add</strong></del></span>
+ <span class="removed"><del><strong><li><p>Spyware in Android
phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us by</strong></del></span>
<span class="inserted"><ins><em><li id="M200510200">
<!--#set var="DATE" value='<small
class="date-tag">2005-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Blizzard Warden is</em></ins></span> a
- <span class="removed"><del><strong><a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"></strong></del></span>
hidden <span class="removed"><del><strong>general surveillance package such as
Carrier IQ.</a></p>
- </li>
-
- <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any
file</strong></del></span>
- <span class="inserted"><ins><em>“cheating-prevention” program
that <a
- href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies</em></ins></span> on <span class="removed"><del><strong>the
system.</p></strong></del></span> <span class="inserted"><ins><em>every
process running on a gamer's computer and sniffs a
+ <p>Blizzard Warden is</em></ins></span> a <span
class="removed"><del><strong>paywall)
+ reports</strong></del></span> <span class="inserted"><ins><em>hidden
+ “cheating-prevention” program</em></ins></span> that <a
<span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
+ spies on every process running on a gamer's computer and sniffs a
good deal of personal data</a>, including lots of activities which
- have nothing to do with cheating.</p></em></ins></span>
+ have nothing to do with cheating.</p>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
-
-
-
<div class="big-section">
- <h3 <span class="removed"><del><strong>id="SpywareOnMobiles">Spyware
on Mobiles</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInEquipment">Spyware in Connected
Equipment</h3></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
+ <h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
</div>
<div style="clear: left;"></div>
-
-<span class="removed"><del><strong><div class="big-subsection">
- <h4 id="SpywareIniThings">Spyware</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202101050">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Most Internet connected devices</em></ins></span> in <span
class="removed"><del><strong>iThings</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
-</div>
-
-<ul>
- <li><p>Apple proposes
- <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without having your
fingerprints
- taken. Users would have no way to tell whether the phone is snooping on
- them.</p></li>
-
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots of personal data to Apple's servers</a>. Big Brother can
- get them from there.</p>
- </li>
-
- <li><p>The iMessage app on iThings</strong></del></span> <span
class="inserted"><ins><em>Mozilla's</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that the user types into it</a>; the
server records these numbers for at least 30
- days.</p>
- </li>
-
- <li><p>Users cannot make an Apple ID</strong></del></span>
- <span
class="inserted"><ins><em>href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
- Not Included”</a> list</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
- <span
class="inserted"><ins><em>href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
- designed</em></ins></span> to <span
class="removed"><del><strong>install</strong></del></span> <span
class="inserted"><ins><em>snoop on users</a></em></ins></span> even <span
class="removed"><del><strong>gratis apps)</a>
- without giving a valid email address and receiving the code Apple
- sends to it.</p>
- </li>
-
- <li><p>Around 47%</strong></del></span> <span
class="inserted"><ins><em>if they meet
+ <p>Most Internet connected devices in Mozilla's <a
+
href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
+ Not Included”</a> list <a
+
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
+ designed to snoop on users</a> even if they meet
Mozilla's “Minimum Security Standards.” Insecure
- design</em></ins></span> of the <span class="removed"><del><strong>most
popular iOS apps</strong></del></span> <span class="inserted"><ins><em>program
running on some of these devices</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral</strong></del></span>
- <span
class="inserted"><ins><em>href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes
- the user susceptible to be snooped</em></ins></span> and <span
class="removed"><del><strong>location information</a> of their users with
third parties.</p></strong></del></span> <span
class="inserted"><ins><em>exploited by crackers as
- well</a>.</p></em></ins></span>
+ design of</em></ins></span> the <span class="removed"><del><strong>FBI can
remotely activate</strong></del></span> <span class="inserted"><ins><em>program
running on some of these devices <a
+
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes</em></ins></span>
+ the <span class="removed"><del><strong>GPS</strong></del></span> <span
class="inserted"><ins><em>user susceptible to be snooped</em></ins></span> and
<span class="removed"><del><strong>microphone</strong></del></span> <span
class="inserted"><ins><em>exploited by crackers as
+ well</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>iThings automatically
upload</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201708280">
+ <li id="M201708280">
<!--#set var="DATE" value='<small
class="date-tag">2017-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The bad security in many Internet of Stings devices allows <a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
- to <span class="removed"><del><strong>Apple's
servers</strong></del></span> <span class="inserted"><ins><em>snoop on the
people that use them</a>.</p>
+ <p>The bad security</em></ins></span> in <span
class="removed"><del><strong>Android
+ phones and laptops</a>.
+ (I suspect this means Windows laptops.) Here is</strong></del></span>
<span class="inserted"><ins><em>many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ </li>
- <p>Don't be a sucker—reject</em></ins></span> all the <span
class="removed"><del><strong>photos and
- videos they make.</p>
+ <li><p>Portable phones with GPS will send their GPS
location</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop</em></ins></span> on
+ <span class="removed"><del><strong>remote command and users cannot stop
them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require</strong></del></span> <span
class="inserted"><ins><em>the people that use them</a>.</p>
- <blockquote><p>
- iCloud Photo Library stores every photo and video you take,
- and keeps them</strong></del></span> <span
class="inserted"><ins><em>stings.</p>
+ <p>Don't be a sucker—reject</em></ins></span> all <span
class="removed"><del><strong>new portable phones
+ to have GPS.)</p>
+ </li>
+
+ <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span> <span class="inserted"><ins><em>the
stings.</p>
- <p><small>(It is unfortunate that the article uses the term
<a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p>
+ <p><small>(It</em></ins></span> is <span
class="removed"><del><strong>to restrict</strong></del></span> <span
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span
class="removed"><del><strong>use of data on</strong></del></span> <span
class="inserted"><ins><em>article uses</em></ins></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
+ too:</strong></del></span> <span
class="inserted"><ins><em>term</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get the user's list of other people's phone
+ numbers.</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInTVSets">TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInTVSets">TV
Sets</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></em></ins></span>
</div>
-<p>Emo Phillips made a joke: The other day a woman
came</em></ins></span> up to <span class="removed"><del><strong>date on all
your devices.
- Any edits</strong></del></span> <span class="inserted"><ins><em>me and
-said, “Didn't I see</em></ins></span> you <span
class="removed"><del><strong>make</strong></del></span> <span
class="inserted"><ins><em>on television?” I said, “I
+<span class="removed"><del><strong><ul>
+ <li>
+ <p>Faceapp</strong></del></span>
+
+<span class="inserted"><ins><em><p>Emo Phillips made a joke: The other
day a woman came up to me and
+said, “Didn't I see you on television?” I said, “I
don't know. You can't see out the other way.” Evidently that was
before Amazon “smart” TVs.</p>
@@ -2390,578 +2478,474 @@
<li id="M202010282">
<!--#set var="DATE" value='<small
class="date-tag">2020-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>TV manufacturers</em></ins></span> are <span
class="removed"><del><strong>automatically updated everywhere. [...]
- </p></blockquote>
+ <p>TV manufacturers are turning to produce only
+ “Smart” TV sets (which include spyware) that <a
+ href="https://frame.work/blog/in-defense-of-dumb-tvs">it's now very
+ hard to find a TV that doesn't spy on you</a>.</p>
- <p>(From</strong></del></span> <span
class="inserted"><ins><em>turning to produce only
- “Smart” TV sets (which include spyware) that</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
- information</a> as accessed</strong></del></span>
- <span
class="inserted"><ins><em>href="https://frame.work/blog/in-defense-of-dumb-tvs">it's
now very
- hard to find a TV that doesn't spy</em></ins></span> on <span
class="removed"><del><strong>24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated by the
- startup of iOS</a>. The term “cloud” means
- “please don't ask where.”</p>
-
- <p>There</strong></del></span> <span
class="inserted"><ins><em>you</a>.</p>
-
- <p>It appears that those manufacturers business
model</em></ins></span> is <span class="removed"><del><strong>a
way</strong></del></span> <span class="inserted"><ins><em>not</em></ins></span>
to <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>,</strong></del></span> <span
class="inserted"><ins><em>produce
- TV and sell them for money,</em></ins></span> but <span
class="removed"><del><strong>it's active by default so it still counts as a
- surveillance functionality.</p>
-
- <p>Unknown people apparently took advantage of
this</strong></del></span> <span class="inserted"><ins><em>to collect your
personal data and
+ <p>It</em></ins></span> appears <span class="inserted"><ins><em>that
those manufacturers business model is not to produce
+ TV and sell them for money, but to collect your personal data and
(possibly) hand over them to others for benefit.</p>
</li>
<li id="M202006250">
<!--#set var="DATE" value='<small
class="date-tag">2020-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>TV manufacturers are able</em></ins></span> to <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos</strong></del></span>
+ <p>TV manufacturers are able</em></ins></span> to <span
class="removed"><del><strong>do lots of surveillance, judging
by</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
- every second</em></ins></span> of <span class="removed"><del><strong>many
celebrities</a>. They needed to break Apple's
- security</strong></del></span> <span class="inserted"><ins><em>what the
user is watching</a>. This is illegal due</em></ins></span> to <span
class="removed"><del><strong>get at them, but NSA can access
any</strong></del></span>
- <span class="inserted"><ins><em>the Video Privacy Protection
Act</em></ins></span> of <span
class="removed"><del><strong>them</strong></del></span> <span
class="inserted"><ins><em>1988, but they're circumventing
- it</em></ins></span> through <span
class="inserted"><ins><em>EULAs.</p>
+ every second of what the user is watching</a>. This is illegal
due</em></ins></span> to <span class="removed"><del><strong>personal data
in</strong></del></span>
+ the <span class="removed"><del><strong>device</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>Video Privacy Protection Act of 1988, but they're
circumventing
+ it through EULAs.</p></em></ins></span>
</li>
- <li id="M201901070">
+ <span class="removed"><del><strong><li>
+ <p>Verizon</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201901070">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware</strong></del></span>
+ <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that it will</a>
+ pre-install on some of its phones. The app will give
Verizon</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever the TV sees,”</a></em></ins></span> in
<span class="removed"><del><strong>iThings:</strong></del></span> the <span
class="removed"><del><strong><a class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly
where</strong></del></span> <span class="inserted"><ins><em>own words
of</em></ins></span> the <span class="removed"><del><strong>iThing
is,</strong></del></span> <span class="inserted"><ins><em>company's
- CTO,</em></ins></span> and <span class="removed"><del><strong>get other
info too.</p>
- </li>
+ collect “whatever</em></ins></span> the <span
class="removed"><del><strong>same
+ information about</strong></del></span> <span class="inserted"><ins><em>TV
sees,”</a> in</em></ins></span> the <span
class="removed"><del><strong>users' searches that Google normally gets when
+ they use its search engine.</p>
- <li><p>There</strong></del></span> <span
class="inserted"><ins><em>this data</em></ins></span> is <span
class="removed"><del><strong>also a feature</strong></del></span> <span
class="inserted"><ins><em>sold to third parties. This is in
return</em></ins></span> for <span class="removed"><del><strong>web
sites</strong></del></span>
- <span class="inserted"><ins><em>“better service” (meaning more
intrusive ads?) and slightly
+ <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>own words of</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>company's
+ CTO, and this data</em></ins></span> is <span
class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>sold to third parties. This is in return for
+ “better service” (meaning more intrusive
ads?)</em></ins></span> and <span class="removed"><del><strong>the
+ user must explicitly</strong></del></span> <span
class="inserted"><ins><em>slightly
lower retail prices.</p>
- <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>track users, which</strong></del></span> <span
class="inserted"><ins><em>make this spying acceptable, according to
him,</em></ins></span>
- is
- <span class="removed"><del><strong><a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6,
but</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> it is <span
class="removed"><del><strong>still true</strong></del></span> <span
class="inserted"><ins><em>opt-in</em></ins></span> in <span
class="removed"><del><strong>iOS 7.)</p>
- </li>
-
- <li><p>The iThing also
- <a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though that can be
- turned off.</p>
- </li>
-
- <li><p>Apple can, and regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>newer models. But since</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p>
- </li>
-
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</strong></del></span> <span
class="inserted"><ins><em>Vizio software is
- nonfree, we don't know what is actually happening behind</em></ins></span>
the <span class="removed"><del><strong>NSA snoop on</strong></del></span> <span
class="inserted"><ins><em>scenes,
- and there is no guarantee that</em></ins></span> all <span
class="inserted"><ins><em>future updates will leave</em></ins></span> the <span
class="removed"><del><strong>data in an iThing,
- or it is totally incompetent.</a></p>
- </li>
-
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist</strong></del></span>
- <span class="inserted"><ins><em>settings unchanged.</p>
-
- <p>If you already own a Vizio “smart” TV (or any
“smart” TV,</em></ins></span> for <span
class="removed"><del><strong>no
- possible purpose other than surveillance</a>. Here
is</strong></del></span> <span class="inserted"><ins><em>that
- matter),</em></ins></span> the
- <span class="removed"><del><strong><a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
-</div>
-
-<ul>
- <li><p>According to Edward Snowden,
- <a href="http://www.bbc.com/news/uk-34444233">agencies can take
over smartphones</a>
- by sending hidden text messages which enable them</strong></del></span>
<span class="inserted"><ins><em>easiest way</em></ins></span> to <span
class="removed"><del><strong>turn the phones</strong></del></span> <span
class="inserted"><ins><em>make sure it isn't spying</em></ins></span> on <span
class="removed"><del><strong>and off, listen</strong></del></span> <span
class="inserted"><ins><em>you is</em></ins></span>
- to <span class="removed"><del><strong>the microphone, retrieve
geo-location data</strong></del></span> <span
class="inserted"><ins><em>disconnect it</em></ins></span> from the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
- browsing history,</strong></del></span> <span
class="inserted"><ins><em>Internet,</em></ins></span> and <span
class="removed"><del><strong>read the contact list. This
malware</strong></del></span> <span class="inserted"><ins><em>use a terrestrial
antenna
- instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented,</em></ins></span> is <span
class="removed"><del><strong>designed</strong></del></span> to
- <span class="removed"><del><strong>disguise itself from
investigation.</p>
- </li>
-
- <li><p>Samsung phones come</strong></del></span> <span
class="inserted"><ins><em>get your own router (which can
+ <p>What is supposed to make this spying acceptable, according to him,
+ is that it is</em></ins></span> opt-in <span
class="removed"><del><strong>before</strong></del></span> <span
class="inserted"><ins><em>in newer models. But since</em></ins></span> the
<span class="removed"><del><strong>app takes effect.
However,</strong></del></span> <span class="inserted"><ins><em>Vizio software is
+ nonfree, we don't know what is actually happening behind</em></ins></span>
the
+ <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware</strong></del></span> <span
class="inserted"><ins><em>scenes,
+ and there is no guarantee that all future updates will leave the
+ settings unchanged.</p>
+
+ <p>If you already own a Vizio “smart” TV (or any
“smart” TV, for that
+ matter), the easiest way to make sure it isn't spying on
you</em></ins></span> is
+ <span class="removed"><del><strong>still spyware.</p>
+ </li>
+
+ <li><p>The Meitu photo-editing
+ app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data</strong></del></span>
+ to <span class="inserted"><ins><em>disconnect it from the Internet, and
use</em></ins></span> a <span class="removed"><del><strong>Chinese
company</a>.</p></li>
+
+ <li><p>A pregnancy test controller
application</strong></del></span> <span class="inserted"><ins><em>terrestrial
antenna
+ instead. Unfortunately, this is</em></ins></span> not <span
class="removed"><del><strong>only</strong></del></span> <span
class="inserted"><ins><em>always possible. Another option,
+ if you are technically oriented, is to get your own router (which can
be an old computer running completely free software), and set up a
firewall to block connections to Vizio's servers. Or, as a last resort,
- you can replace your TV</em></ins></span> with <span
class="inserted"><ins><em>another model.</p>
+ you</em></ins></span> can <span class="inserted"><ins><em>replace your TV
with another model.</p>
</li>
<li id="M201804010">
<!--#set var="DATE" value='<small
class="date-tag">2018-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
- and they send so much data</strong></del></span>
+ <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts of data in</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades</em></ins></span> that <span
class="removed"><del><strong>their transmission is</strong></del></span> <span
class="inserted"><ins><em>install</em></ins></span> a
- <span class="removed"><del><strong>substantial
expense</strong></del></span> <span class="inserted"><ins><em>surveillance
app</a>.</p>
+ load downgrades that install a surveillance app</a>.</p>
- <p>We link to the article</em></ins></span> for <span
class="removed"><del><strong>users. Said transmission, not wanted or
- requested</strong></del></span> <span class="inserted"><ins><em>the
facts it presents. It
- is too bad that the article finishes</em></ins></span> by <span
class="inserted"><ins><em>advocating</em></ins></span> the <span
class="removed"><del><strong>user, clearly must constitute
spying</strong></del></span>
- <span class="inserted"><ins><em>moral weakness</em></ins></span> of <span
class="removed"><del><strong>some
- kind.</p></li>
+ <p>We link to</em></ins></span> the <span
class="removed"><del><strong>phone, and in server
accounts,</strong></del></span> <span class="inserted"><ins><em>article for the
facts</em></ins></span> it <span class="removed"><del><strong>can
+ alter them too</a>.
+ </p></li>
- <li><p>A Motorola phone</strong></del></span> <span
class="inserted"><ins><em>surrendering to Netflix. The Netflix
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p></strong></del></span>
+ <li><p>The Uber</strong></del></span> <span
class="inserted"><ins><em>presents. It
+ is too bad that the article finishes by advocating the
+ moral weakness of surrendering to Netflix. The Netflix</em></ins></span>
app <span class="removed"><del><strong>tracks</strong></del></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
- malware too</a>.</p></em></ins></span>
+ malware too</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware in Android
phones (and Windows? laptops): The Wall
- Street Journal (in an article blocked</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702060">
+ <li id="M201702060">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts and
- cable</a>. Even if the image is coming</em></ins></span> from <span
class="removed"><del><strong>us by a paywall)</strong></del></span> <span
class="inserted"><ins><em>the user's own computer,
- the TV</em></ins></span> reports <span class="removed"><del><strong>that
- <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
<span class="inserted"><ins><em>what it is. The existence of a way to
disable</em></ins></span> the <span class="removed"><del><strong>FBI can
remotely activate</strong></del></span>
- <span class="inserted"><ins><em>surveillance, even if it were not hidden
as it was in these TVs,
- does not legitimize</em></ins></span> the <span
class="removed"><del><strong>GPS</strong></del></span> <span
class="inserted"><ins><em>surveillance.</p>
+ report everything that is viewed on them,</em></ins></span> and <span
class="removed"><del><strong>after</strong></del></span> <span
class="inserted"><ins><em>not just broadcasts and
+ cable</a>. Even if</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
+
+ <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>image is
coming from</em></ins></span> the user's <span
class="removed"><del><strong>consent”
+ for surveillance is inadequate as</strong></del></span> <span
class="inserted"><ins><em>own computer,
+ the TV reports what it is. The existence of</em></ins></span> a <span
class="removed"><del><strong>protection against massive</strong></del></span>
<span class="inserted"><ins><em>way to disable the
+ surveillance, even if it were not hidden as it was in these TVs,
+ does not legitimize the</em></ins></span> surveillance.</p>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
</li>
- <li id="M201511130">
+ <li><p>Apps that include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511130">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some web</em></ins></span> and <span
class="removed"><del><strong>microphone</strong></del></span> <span
class="inserted"><ins><em>TV advertisements play inaudible
- sounds to be picked up by proprietary malware running
- on other devices</em></ins></span> in <span
class="removed"><del><strong>Android
- phones</strong></del></span> <span class="inserted"><ins><em>range so as
to determine that they
+ <p>Some web</em></ins></span> and TV <span
class="removed"><del><strong>programs
+ are playing nearby</a>. Also on what users
post</strong></del></span> <span class="inserted"><ins><em>advertisements play
inaudible
+ sounds to be picked up by proprietary malware running</em></ins></span>
+ on <span class="removed"><del><strong>various sites
+ such</strong></del></span> <span class="inserted"><ins><em>other devices
in range so</em></ins></span> as <span class="removed"><del><strong>Facebook,
Google+</strong></del></span> <span class="inserted"><ins><em>to determine that
they
are nearby. Once your Internet devices are paired with
- your TV, advertisers can correlate ads with Web
activity,</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
- (I suspect this means Windows laptops.) Here is</strong></del></span>
<span class="inserted"><ins><em>other</em></ins></span> <a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
+ your TV, advertisers can correlate ads with Web
activity,</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>other <a
+
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
cross-device tracking</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location</strong></del></span>
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
<span class="inserted"><ins><em><li id="M201511060">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio goes a step further than other TV
- manufacturers in spying</em></ins></span> on
- <span class="removed"><del><strong>remote command and users cannot stop
them:</strong></del></span> <span class="inserted"><ins><em>their users:
their</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable phones
- to have GPS.)</p>
- </li>
-
- <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span>
+ manufacturers in spying on their users: their</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so that advertisers can track you
- across devices.</p>
+ “smart” TVs analyze</em></ins></span> your <span
class="removed"><del><strong>mobile phone's photo collections for known
faces</a>,</strong></del></span> <span class="inserted"><ins><em>viewing
habits in detail</em></ins></span> and <span
class="removed"><del><strong>suggests you to share the
picture</strong></del></span>
+ <span class="inserted"><ins><em>link them your IP address</a> so
that advertisers can track</em></ins></span> you <span
class="removed"><del><strong>take according to who</strong></del></span>
+ <span class="inserted"><ins><em>across devices.</p>
- <p>It</em></ins></span> is <span
class="inserted"><ins><em>possible</em></ins></span> to <span
class="removed"><del><strong>restrict
- the use of data on the user's computer,</strong></del></span> <span
class="inserted"><ins><em>turn this off,</em></ins></span> but <span
class="inserted"><ins><em>having</em></ins></span> it <span
class="removed"><del><strong>does surveillance
- too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the user's list of other people's phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>enabled by default
- is an injustice already.</p></em></ins></span>
+ <p>It</em></ins></span> is <span class="removed"><del><strong>in the
frame.</p>
+
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means the pictures are
likely</strong></del></span> <span
class="inserted"><ins><em>possible</em></ins></span> to <span
class="removed"><del><strong>be
+ sent across the wire</strong></del></span> <span
class="inserted"><ins><em>turn this off, but having it enabled by default
+ is an injustice already.</p>
</li>
-<span class="removed"><del><strong></ul>
+ <li id="M201511020">
+ <!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Tivo's alliance with Viacom adds 2.3 million
households</em></ins></span>
+ to <span class="removed"><del><strong>Facebook's servers and
face-recognition
+ algorithms.</p>
-<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>Faceapp appears</strong></del></span>
+ <p>If so, none of Facebook users' pictures are private
+ anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload” them
to</strong></del></span> <span class="inserted"><ins><em>600 millions social
media profiles</em></ins></span> the <span
class="removed"><del><strong>service.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201511020">
- <!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Tivo's alliance with Viacom adds 2.3 million
households</em></ins></span>
- to <span class="removed"><del><strong>do lots of surveillance,
judging</strong></del></span> <span class="inserted"><ins><em>the 600 millions
social media profiles the company
+ <li><p>Like most “music screaming” disservices,
Spotify
+ is based on proprietary malware (DRM and snooping). In August
+ 2015 it</strong></del></span> <span class="inserted"><ins><em>company
already monitors. Tivo customers are unaware they're
- being watched</em></ins></span> by <span
class="inserted"><ins><em>advertisers. By combining TV viewing
- information with online social media participation, Tivo can
now</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands</strong></del></span>
+ being watched by advertisers. By combining TV viewing
+ information with online social media participation, Tivo can
now</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
- correlate TV advertisement with online purchases</a>, exposing all
- users</em></ins></span> to <span class="removed"><del><strong>personal
data in the device</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>new combined surveillance by
default.</p></em></ins></span>
+ correlate TV advertisement with online purchases</a>, exposing
all</em></ins></span>
+ users <span class="removed"><del><strong>submit</strong></del></span> to
<span class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em>new
combined surveillance by default.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Verizon</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201507240">
+ <li id="M201507240">
<!--#set var="DATE" value='<small
class="date-tag">2015-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio “smart” TVs recognize and</em></ins></span>
<a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are watching</a>, even if</em></ins></span> it <span
class="removed"><del><strong>will</a>
- pre-install on some of its phones. The app will give Verizon the same
- information about the users' searches that Google normally gets when
- they use its search engine.</p>
+ <p>Vizio “smart” TVs recognize</em></ins></span> and
<span class="removed"><del><strong>some</strong></del></span> <span
class="inserted"><ins><em><a
+ href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
+ what people</em></ins></span> are <span
class="removed"><del><strong>starting to realize that</strong></del></span>
<span class="inserted"><ins><em>watching</a>, even if</em></ins></span>
it <span class="removed"><del><strong>is nasty.</p>
- <p>Currently, the app is</strong></del></span> <span
class="inserted"><ins><em>isn't a TV channel.</p>
+ <p>This article shows the <a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as a way
+ to “serve” users better</a>—never mind
+ whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>isn't</em></ins></span> a <span
class="removed"><del><strong>typical example of
+ the attitude of the proprietary software industry towards
+ those they have subjugated.</p>
+
+ <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>TV channel.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other
+ apps the user has
+ installed.</strong></del></span>
- <li id="M201505290">
+ <span class="inserted"><ins><em><li id="M201505290">
<!--#set var="DATE" value='<small
class="date-tag">2015-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</strong></del></span>
+ <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way that at least is visible</strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops</em></ins></span> on <span class="removed"><del><strong>only one
phone</a>,</strong></del></span> <span class="inserted"><ins><em>what
programs people watch,</em></ins></span> and <span
class="removed"><del><strong>the
- user must explicitly opt-in before the app takes effect. However, the
- app remains spyware—an “optional” piece of spyware is
- still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>even what they wanted to
+ snoops on what programs people watch,</em></ins></span> and
+ <span class="removed"><del><strong>optional</a>. Not as bad
as</strong></del></span> <span class="inserted"><ins><em>even</em></ins></span>
what <span class="removed"><del><strong>the others
do.</p></strong></del></span> <span class="inserted"><ins><em>they wanted
to
record</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Meitu photo-editing
- app</strong></del></span>
+ <span class="removed"><del><strong><li><p>FTC says most mobile
apps for children don't respect privacy:</strong></del></span>
<span class="inserted"><ins><em><li id="M201504300">
<!--#set var="DATE" value='<small
class="date-tag">2015-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used</em></ins></span> a <span class="removed"><del><strong>Chinese
company</a>.</p></li>
-
- <li><p>A pregnancy test controller
application</strong></del></span> <span class="inserted"><ins><em>firmware
“upgrade” to make its TVs snoop on what
- users watch</a>. The TVs did</em></ins></span> not <span
class="removed"><del><strong>only
- can</strong></del></span> <span class="inserted"><ins><em>do that when first
sold.</p>
+ <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ </li>
+
+ <li><p>Widely</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"></em></ins></span>
+ used <span class="removed"><del><strong><a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps</strong></del></span> <span
class="inserted"><ins><em>a firmware “upgrade” to make its
TVs</em></ins></span> snoop on <span class="inserted"><ins><em>what
+ users watch</a>. The TVs did not do that when first sold.</p>
</li>
<li id="M201502090">
<!--#set var="DATE" value='<small
class="date-tag">2015-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Samsung “Smart” TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice</em></ins></span> on <span
class="removed"><del><strong>many sorts of data in</strong></del></span> the
<span class="removed"><del><strong>phone, and in server accounts,
it</strong></del></span> <span class="inserted"><ins><em>internet to another
company, Nuance</a>.
- Nuance</em></ins></span> can
- <span class="removed"><del><strong>alter them too</a>.
- </p></li>
-
- <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before</strong></del></span> <span
class="inserted"><ins><em>save it</em></ins></span> and <span
class="removed"><del><strong>after the ride</a>.</p>
-
- <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>would then
have to give it to</em></ins></span> the <span
class="removed"><del><strong>user's consent”
- for surveillance</strong></del></span> <span
class="inserted"><ins><em>US or some
+ <p>The Samsung “Smart” TV <a
+
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice on the internet to another company,
Nuance</a>.
+ Nuance can save it and would then have to give it to</em></ins></span> the
<span class="removed"><del><strong>user</a>. This</strong></del></span>
<span class="inserted"><ins><em>US or some
other government.</p>
- <p>Speech recognition</em></ins></span> is <span
class="removed"><del><strong>inadequate as a protection against massive
- surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>not to be trusted unless it is done by free
- software in your own computer.</p>
+ <p>Speech recognition</em></ins></span> is <span
class="removed"><del><strong>in addition</strong></del></span> <span
class="inserted"><ins><em>not</em></ins></span> to
+ <span class="removed"><del><strong>the snooping</strong></del></span>
<span class="inserted"><ins><em>be trusted unless it is</em></ins></span> done
by <span class="removed"><del><strong>the phone company, and perhaps by the
OS</strong></del></span> <span class="inserted"><ins><em>free
+ software</em></ins></span> in <span class="removed"><del><strong>the
+ phone.</p>
+
+ <p>Don't</strong></del></span> <span
class="inserted"><ins><em>your own computer.</p>
<p>In its privacy policy, Samsung explicitly confirms that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be transmitted to third
- parties</a>.</p></em></ins></span>
+ data containing sensitive information will</em></ins></span> be <span
class="removed"><del><strong>distracted by the question of whether the app
developers get
+ users</strong></del></span> <span
class="inserted"><ins><em>transmitted</em></ins></span> to <span
class="removed"><del><strong>say “I agree”.
That</strong></del></span> <span class="inserted"><ins><em>third
+ parties</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Google's new voice
messaging app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201411090">
+ <li id="M201411090">
<!--#set var="DATE" value='<small
class="date-tag">2014-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Amazon “Smart” TV is</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping</em></ins></span> all <span
class="removed"><del><strong>conversations</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the time</a>.</p></em></ins></span>
+ <p>The Amazon “Smart” TV</em></ins></span> is <span
class="removed"><del><strong>no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em><a
+
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ snooping all the time</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
<span class="inserted"><ins><em><li id="M201409290">
<!--#set var="DATE" value='<small
class="date-tag">2014-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</em></ins></span>
- on <span class="removed"><del><strong>what radio and</strong></del></span>
<span class="inserted"><ins><em>their users</a>.</p>
+ <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p></em></ins></span>
- <p>The report was as of 2014, but we don't expect this has got
+ <p>The <span class="removed"><del><strong>FTC
criticized</strong></del></span> <span class="inserted"><ins><em>report was as
of 2014, but we don't expect</em></ins></span> this <span
class="removed"><del><strong>app because it asked the
user</strong></del></span> <span class="inserted"><ins><em>has got
better.</p>
- <p>This shows that laws requiring products to get users' formal
- consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent? Probably
the</em></ins></span> TV <span
class="removed"><del><strong>programs</strong></del></span> <span
class="inserted"><ins><em>will
- say, “Without your consent to tracking, the TV will not
- work.”</p>
-
- <p>Proper laws would say that TVs</em></ins></span> are <span
class="removed"><del><strong>playing nearby</a>. Also
on</strong></del></span> <span class="inserted"><ins><em>not allowed to
report</em></ins></span> what <span class="removed"><del><strong>users post on
various sites
- such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>the
- user watches—no exceptions!</p></em></ins></span>
- </li>
+ <p>This shows that laws requiring products</em></ins></span> to
+ <span class="removed"><del><strong>approve sending</strong></del></span>
<span class="inserted"><ins><em>get users' formal
+ consent before collecting</em></ins></span> personal data <span
class="inserted"><ins><em>are totally inadequate.
+ And what happens if a user declines consent? Probably the TV will
+ say, “Without your consent</em></ins></span> to <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>app developer but did</strong></del></span> <span
class="inserted"><ins><em>TV will</em></ins></span> not
+ <span class="removed"><del><strong>ask about
sending</strong></del></span>
+ <span class="inserted"><ins><em>work.”</p>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
+ <p>Proper laws would say that TVs are not allowed to report what the
+ user watches—no exceptions!</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201405200">
+ <li id="M201405200">
<!--#set var="DATE" value='<small
class="date-tag">2014-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Spyware in LG “smart” TVs</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known
faces</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches,</em></ins></span> and <span
class="removed"><del><strong>suggests you to share</strong></del></span> the
<span class="removed"><del><strong>picture you take
according</strong></del></span> <span
class="inserted"><ins><em>switch</em></ins></span> to <span
class="removed"><del><strong>who
- is in</strong></del></span> <span class="inserted"><ins><em>turn this
off has
- no effect</a>. (The fact that</em></ins></span> the <span
class="removed"><del><strong>frame.</p>
-
- <p>This spyware feature seems to require online access to some
- known-faces database, which</strong></del></span> <span
class="inserted"><ins><em>transmission reports a 404 error
- really</em></ins></span> means <span
class="inserted"><ins><em>nothing;</em></ins></span> the <span
class="removed"><del><strong>pictures are likely to be
- sent across</strong></del></span> <span class="inserted"><ins><em>server
could save that data anyway.)</p>
+ <p>Spyware in LG “smart” TVs <a
+
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what the user watches, and the switch to turn this off has
+ no effect</a>. (The fact that the transmission reports a 404 error
+ really means nothing; the server could save that data anyway.)</p>
<p>Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
-
- <p>LG later said it had installed a patch</em></ins></span> to <span
class="removed"><del><strong>Facebook's servers and face-recognition
- algorithms.</p>
+ snoops on other devices on the user's local network</a>.</p>
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>stop this, but any
+ <p>LG later said</em></ins></span> it <span
class="inserted"><ins><em>had installed a patch</em></ins></span> to <span
class="removed"><del><strong>other companies. This shows the
+ weakness</strong></del></span> <span class="inserted"><ins><em>stop
this, but any
product could spy this way.</p>
<p>Meanwhile, LG TVs <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots</em></ins></span> of <span class="removed"><del><strong>Facebook
users' pictures are private
- anymore, even if the user didn't “upload” them to the
service.</p></strong></del></span> <span class="inserted"><ins><em>spying
anyway</a>.</p></em></ins></span>
+ do lots</em></ins></span> of <span class="removed"><del><strong>the
reject-it-if-you-dislike-snooping
+ “solution”</strong></del></span> <span
class="inserted"><ins><em>spying anyway</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
- is based</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201212170">
+ <li id="M201212170">
<!--#set var="DATE" value='<small
class="date-tag">2012-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security</em></ins></span> on <span
class="removed"><del><strong>proprietary malware (DRM</strong></del></span>
<span class="inserted"><ins><em>a “smart”
TV</a></em></ins></span>
- and <span class="removed"><del><strong>snooping). In August
- 2015 it</strong></del></span> <span class="inserted"><ins><em>use its
camera to watch the people who are watching TV.</p>
+ Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>break security on</em></ins></span> a <span
class="removed"><del><strong>flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>“smart” TV</a>
+ and use its camera</em></ins></span> to <span
class="removed"><del><strong>anyone? A free software flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>watch the people who are watching
TV.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInCameras">Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInGames">Spyware in
Games</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInGames">#SpywareInGames</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201901100">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Amazon Ring “security” devices</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</strong></del></span>
+ <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about
them</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture to Amazon servers</a>, which save it
+ send the video they capture</em></ins></span> to
+ <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Amazon servers</a>, which save it
long-term.</p>
<p>In many cases, the video shows everyone that comes near, or merely
passes by, the user's front door.</p>
- <p>The article focuses on how Ring used</em></ins></span> to <span
class="removed"><del><strong>increased snooping</a>, and some
- are starting</strong></del></span> <span class="inserted"><ins><em>let
individual employees look
- at the videos freely. It appears Amazon has tried</em></ins></span> to
<span class="removed"><del><strong>realize</strong></del></span> <span
class="inserted"><ins><em>prevent</em></ins></span> that <span
class="removed"><del><strong>it is nasty.</p>
-
- <p>This article shows</strong></del></span>
- <span class="inserted"><ins><em>secondary abuse, but the primary
abuse—that Amazon gets</em></ins></span> the
- <span class="inserted"><ins><em>video—Amazon expects society to
surrender to.</p>
+ <p>The article focuses on how Ring used to let individual employees
look
+ at the videos freely. It appears Amazon has tried to prevent that
+ secondary abuse, but the primary abuse—that Amazon gets the
+ video—Amazon expects society to surrender
to.</p></em></ins></span>
</li>
- <li id="M201810300">
+ <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810300">
<!--#set var="DATE" value='<small
class="date-tag">2018-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Nearly all “home security cameras”</em></ins></span>
<a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that</strong></del></span>
+ <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy of everything</em></ins></span>
they <span class="removed"><del><strong>present snooping
as</strong></del></span>
- <span class="inserted"><ins><em>see</a>. “Home insecurity
camera” would be</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>better
+ give</em></ins></span> the <span class="removed"><del><strong>NSA takes
advantage</strong></del></span> <span class="inserted"><ins><em>manufacturer an
unencrypted copy of everything they
+ see</a>. “Home insecurity camera” would be a better
name!</p>
<p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
- whether they want that. This is a typical example of
- the attitude of</strong></del></span> <span
class="inserted"><ins><em>look at what's in</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
- those</strong></del></span> <span class="inserted"><ins><em>videos.
That's not
- security for your home. Security means making sure</em></ins></span> they
<span class="inserted"><ins><em>don't get to
- see through your camera.</p>
+ manufacturers promise not</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>look at what's in the videos. That's not
+ security for your home. Security means making sure they don't get to
+ see</em></ins></span> through <span class="removed"><del><strong>it
too</a>.
+ Here's information on</strong></del></span> <span
class="inserted"><ins><em>your camera.</p>
</li>
<li id="M201603220">
<!--#set var="DATE" value='<small
class="date-tag">2016-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Over 70 brands of network-connected surveillance
cameras</em></ins></span> have <span
class="removed"><del><strong>subjugated.</p>
-
- <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone to watch through
them</a>.</p></em></ins></span>
+ <p>Over 70 brands of network-connected surveillance cameras
have</em></ins></span> <a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ security bugs that allow anyone to watch through them</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other
- apps the user has
- installed.</strong></del></span>
- <span class="inserted"><ins><em><li id="M201511250">
+ <li id="M201511250">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Nest Cam “smart” camera is</em></ins></span>
<a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
+ <p>The Nest Cam “smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
even when the “owner” switches it “off.”</p>
- <p>A “smart” device means the
manufacturer</em></ins></span> is <span class="removed"><del><strong>doing this
in</strong></del></span> <span class="inserted"><ins><em>using it
- to outsmart you.</p>
+ <p>A “smart” device means the manufacturer is using it
+ to outsmart you.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInToys">Toys</h4>
+ <h4 <span class="removed"><del><strong>id="SpywareInToys">Spyware in
Toys</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
<span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li>
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711244">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Furby Connect has</em></ins></span> a <span
class="removed"><del><strong>way that at least is visible and
- optional</a>. Not</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>The Furby Connect has</em></ins></span> a <span
class="removed"><del><strong>speech recognition company based in the
U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If the product</em></ins></span> as <span
class="removed"><del><strong>bad</strong></del></span> <span
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span
class="removed"><del><strong>what</strong></del></span> <span
class="inserted"><ins><em>a
- listening device, remote changes to</em></ins></span> the <span
class="removed"><del><strong>others do.</p></strong></del></span> <span
class="inserted"><ins><em>code could surely convert it
- into one.</p></em></ins></span>
+ universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>toys with</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as</em></ins></span> a
<span class="removed"><del><strong>mobile phone. This would
+ enable crackers</strong></del></span>
+ <span class="inserted"><ins><em>listening device, remote
changes</em></ins></span> to <span class="removed"><del><strong>listen in on a
child's speech, and even speak</strong></del></span> <span
class="inserted"><ins><em>the code could surely convert it</em></ins></span>
+ into <span class="inserted"><ins><em>one.</p>
</li>
- <span class="removed"><del><strong><li><p>FTC says most mobile
apps for children don't respect privacy:</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711100">
+ <li id="M201711100">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of the conversation between two
users</a>.</p></em></ins></span>
+ <p>A remote-control sex toy was found to make <a
+
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings of</em></ins></span> the <span
class="removed"><del><strong>toys themselves.</p></strong></del></span>
<span class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+ <span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201703140">
<!--#set var="DATE" value='<small
class="date-tag">2017-03</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping</em></ins></span> on <span class="inserted"><ins><em>its
users through</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is in addition
to</strong></del></span> <span class="inserted"><ins><em>proprietary control
app</a>.</p>
-
- <p>The app was reporting</em></ins></span> the <span
class="removed"><del><strong>snooping done by</strong></del></span> <span
class="inserted"><ins><em>temperature of</em></ins></span> the <span
class="removed"><del><strong>phone company, and perhaps</strong></del></span>
<span class="inserted"><ins><em>vibrator minute</em></ins></span> by <span
class="removed"><del><strong>the OS in the
- phone.</p>
-
- <p>Don't be distracted</strong></del></span>
- <span class="inserted"><ins><em>minute (thus, indirectly, whether it was
surrounded</em></ins></span> by <span class="inserted"><ins><em>a person's
- body), as well as</em></ins></span> the <span
class="removed"><del><strong>question of whether</strong></del></span> <span
class="inserted"><ins><em>vibration frequency.</p>
+ --><!--#echo encoding="none" var="DATE" --></em></ins></span>
+ <p>A computerized vibrator <a
+
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through the proprietary control
app</a>.</p>
+
+ <p>The app was reporting the temperature of the vibrator minute by
+ minute (thus, indirectly, whether it was surrounded by a person's
+ body), as well as the vibration frequency.</p>
- <p>Note</em></ins></span> the <span class="removed"><del><strong>app
developers get</strong></del></span> <span class="inserted"><ins><em>totally
inadequate proposed response: a labeling
+ <p>Note the totally inadequate proposed response: a labeling
standard with which manufacturers would make statements about their
- products, rather than free software which</em></ins></span> users <span
class="removed"><del><strong>to say “I agree”. That is no excuse
for malware.</p>
- </li>
-
- <li><p>The Brightest Flashlight app</strong></del></span> <span
class="inserted"><ins><em>could have checked
+ products, rather than free software which users could have checked
and changed.</p>
- <p>The company that made the vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued</em></ins></span> for <span class="removed"><del><strong>use by
companies.</a></p></strong></del></span> <span
class="inserted"><ins><em>collecting lots of personal information about how
people
- used it</a>.</p></em></ins></span>
-
- <p>The <span class="removed"><del><strong>FTC criticized this app
because</strong></del></span> <span class="inserted"><ins><em>company's
statement that</em></ins></span> it <span
class="removed"><del><strong>asked</strong></del></span> <span
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span
class="removed"><del><strong>user to
- approve sending personal</strong></del></span> data <span
class="removed"><del><strong>to the app developer</strong></del></span> <span
class="inserted"><ins><em>may be
- true,</em></ins></span> but <span class="removed"><del><strong>did not
- ask about sending</strong></del></span> it <span
class="inserted"><ins><em>doesn't really matter. If it had sold the
data</em></ins></span> to <span class="removed"><del><strong>other companies.
This shows</strong></del></span> <span class="inserted"><ins><em>a data
- broker,</em></ins></span> the
- <span class="removed"><del><strong>weakness of</strong></del></span>
<span class="inserted"><ins><em>data broker would have been able to figure out
who</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution”</strong></del></span>
- <span class="inserted"><ins><em>user was.</p>
+ <p>The company that made the vibrator <a
+
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal information about how people
+ used it</a>.</p>
+
+ <p>The company's statement that it was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold the data to a data
+ broker, the data broker would have been able to figure out who the
+ user was.</p>
<p>Following this lawsuit, <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered</em></ins></span> to <span
class="removed"><del><strong>surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>pay</em></ins></span> a <span
class="removed"><del><strong>flashlight
- app send any information</strong></del></span> <span
class="inserted"><ins><em>total of C$4m</a></em></ins></span> to <span
class="removed"><del><strong>anyone? A free software flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>its
- customers.</p></em></ins></span>
+ the company has been ordered to pay a total of C$4m</a> to its
+ customers.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware in Games</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
-</div>
-
-<ul>
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
+ <span class="removed"><del><strong><li><p>
“CloudPets”</strong></del></span>
<span class="inserted"><ins><em><li id="M201702280">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends personal data about
them</strong></del></span>
+ <p>“CloudPets”</em></ins></span> toys with microphones
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations</em></ins></span> to
- <span class="removed"><del><strong>nVidia servers</a>.</p>
- </li>
-
- <li><p>Angry Birds</strong></del></span> <span
class="inserted"><ins><em>the manufacturer</a>. Guess
what?</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</strong></del></span>
+ leak</em></ins></span> childrens' conversations to the
manufacturer</a>. Guess what? <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a> collected by the
+ Crackers</em></ins></span> found a way to access the data</a>
collected by the
manufacturer's snooping.</p>
- <p>That the manufacturer</em></ins></span> and the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
- Here's information on
- <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>these
- conversations was unacceptable by itself.</p></em></ins></span>
+ <p>That the manufacturer and <span class="removed"><del><strong>the
FBI could listen to these conversations</strong></del></span> <span
class="inserted"><ins><em>the FBI could listen to these
+ conversations was unacceptable by itself.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
- <li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201612060">
+ <li id="M201612060">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
+ --><!--#echo encoding="none" var="DATE" -->
<p>The “smart” toys My Friend Cayla and i-Que transmit
<a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>, a speech recognition
@@ -2969,8 +2953,8 @@
<p>Those toys also contain major security vulnerabilities; crackers
can remotely control the toys with a mobile phone. This would enable
- crackers to listen in on a child's speech, and even speak into the <span
class="removed"><del><strong>toys themselves.</p></strong></del></span>
- <span class="inserted"><ins><em>toys themselves.</p>
+ crackers to listen in on a child's speech, and even speak into the
+ toys themselves.</p>
</li>
<li id="M201502180">
@@ -3027,31 +3011,97 @@
listens for things like smoke alarms</a> and then notifies your phone
that an alarm is happening. This means the devices now listen for more
than just their wake words. Google says the software update was sent
- out prematurely and on accident and Google was planning on disclosing
- this new feature and offering it to customers who pay for it.</p>
+ out prematurely and on accident and Google</em></ins></span> was <span
class="removed"><del><strong>unacceptable by itself.</p></li>
+
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy</strong></del></span> <span
class="inserted"><ins><em>planning</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>disclosing
+ this new feature</em></ins></span> and <span
class="removed"><del><strong>adults</a>.</p>
+ </li>
+</ul>
+
+
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>offering it</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each
subsection</strong></del></span> <span class="inserted"><ins><em>customers who
pay for it.</p>
</li>
<li id="M202006300">
<!--#set var="DATE" value='<small
class="date-tag">2020-06</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>“Bossware” is malware that bosses <a
-
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p></strong></del></span>
+ <span class="inserted"><ins><em><p>“Bossware” is malware
that bosses</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
coerce workers into installing in their own computers</a>, so the
- bosses can spy on them.</p>
+ bosses can spy</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
+Note that</strong></del></span> <span class="inserted"><ins><em>them.</p>
+
+ <p>This shows why requiring</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a “clean” Windows install</strong></del></span>
<span class="inserted"><ins><em>user's “consent”</em></ins></span>
is not <span class="removed"><del><strong>really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+ <span class="inserted"><ins><em>an adequate basis for protecting digital
privacy. The boss can coerce
+ most workers into consenting</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
- <p>This shows why requiring the user's “consent” is not
- an adequate basis for protecting digital privacy. The boss can coerce
- most workers into consenting to almost anything, even probable exposure
- to contagious disease that can be fatal. Software like this should
- be illegal and bosses that demand it should be prosecuted for it.</p>
+<ul>
+ <li><p>Investigation
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it</strong></del></span> <span
class="inserted"><ins><em>almost anything, even probable exposure
+ to contagious disease that</em></ins></span> can <span
class="removed"><del><strong>collect the emails of members of
Parliament</strong></del></span> <span class="inserted"><ins><em>be fatal.
Software like</em></ins></span> this <span class="removed"><del><strong>way,
because they pass</strong></del></span> <span class="inserted"><ins><em>should
+ be illegal and bosses that demand</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>should be prosecuted for
it.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201911190">
+
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201911190">
<!--#set var="DATE" value='<small
class="date-tag">2019-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Internet-tethered Amazon Ring had
- a security vulnerability that enabled attackers to <a
-
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ a security vulnerability that enabled attackers to</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
access the user's wifi password</a>, and snoop on the household
through connected surveillance devices.</p>
@@ -3059,137 +3109,235 @@
out any significant surveillance if the devices implemented proper
security, including encryption. But many devices with proprietary
software lack this. Of course, they are also used by their
- manufacturers for snooping.</p></em></ins></span>
+ manufacturers</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>snooping.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <span class="removed"><del><strong><li>
- <p>A computerized vibrator</strong></del></span>
+
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure to place new items on top under each
subsection</strong></del></span>
<span class="inserted"><ins><em><li id="M201907210">
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Google “Assistant” records users'
conversations</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
- when it is not supposed to listen</a>. Thus, when one of Google's
- subcontractors discloses a thousand confidential voice
recordings,</em></ins></span>
- users <span class="removed"><del><strong>through the</strong></del></span>
<span class="inserted"><ins><em>were easily identified from these
recordings.</p>
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>The Nest Cam “smart” camera is</strong></del></span>
+ <span class="inserted"><ins><em><p>Google “Assistant”
records users' conversations</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even</em></ins></span>
+ when <span class="removed"><del><strong>the “owner”
switches</strong></del></span> it <span
class="removed"><del><strong>“off.”</p>
+ <p>A “smart” device means the
manufacturer</strong></del></span> is <span
class="removed"><del><strong>using</strong></del></span> <span
class="inserted"><ins><em>not supposed to listen</a>. Thus, when one of
Google's
+ subcontractors discloses a thousand confidential voice recordings,
+ users were easily identified from these recordings.</p>
+
+ <p>Since Google “Assistant” uses proprietary software,
there is no
+ way to see or control what</em></ins></span> it <span
class="inserted"><ins><em>records or sends.</p>
+
+ <p>Rather than trying</em></ins></span> to <span
class="removed"><del><strong>outsmart
+ you.</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
- <p>Since Google “Assistant” uses</em></ins></span>
proprietary <span class="inserted"><ins><em>software, there is no
- way to see or control what it records or sends.</p>
+<ul>
+ <li><p>E-books can contain Javascript code,
+ and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
+ </li>
- <p>Rather than trying to better</em></ins></span> control <span
class="removed"><del><strong>app</a>.</p>
+ <li><p>Spyware in many e-readers—not
only</strong></del></span> <span class="inserted"><ins><em>better
control</em></ins></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>use of recordings, Google
+ should not record or listen to</em></ins></span> the <span
class="removed"><del><strong>user reads at what time</a>.</p>
+ </li>
+
+ <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>person's
voice. It should only
+ get commands that</em></ins></span> the <span
class="removed"><del><strong>e-reader used
+ by most US libraries,
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data</strong></del></span> <span
class="inserted"><ins><em>user wants</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
+ needed</strong></del></span> <span
class="inserted"><ins><em>send</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
+ </li>
+</ul>
- <p>The app was reporting</strong></del></span> the <span
class="removed"><del><strong>temperature</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> of <span
class="inserted"><ins><em>recordings, Google
- should not record or listen to</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether it was surrounded by
a</strong></del></span> person's
- <span class="removed"><del><strong>body), as well as the vibration
frequency.</p>
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
- <p>Note</strong></del></span> <span class="inserted"><ins><em>voice.
It should only
- get commands that</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed
response:</strong></del></span> <span class="inserted"><ins><em>user wants to
send to some Google service.</p>
+<ul>
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>some Google service.</p></em></ins></span>
</li>
- <li id="M201905061">
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>id="M201905061">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Amazon Alexa collects</em></ins></span> a <span
class="removed"><del><strong>labeling
- standard with which manufacturers would make statements about
- their products, rather</strong></del></span> <span
class="inserted"><ins><em>lot more information from users</em></ins></span>
- than <span class="removed"><del><strong>free
software</strong></del></span> <span class="inserted"><ins><em>is necessary for
correct functioning (time, location,
- recordings made without a legitimate prompt), and sends
- it to Amazon's servers,</em></ins></span> which <span
class="inserted"><ins><em>store it indefinitely. Even
+ <p>Amazon Alexa collects</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
+ effectively
+ anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely</strong></del></span> <span
class="inserted"><ins><em>lot more information from users
+ than is necessary for correct functioning (time, location,
+ recordings made without a legitimate prompt),</em></ins></span> and <span
class="removed"><del><strong>make changes in various
+ settings</a>.</p>
+
+ <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>sends
+ it</em></ins></span> to <span class="removed"><del><strong>do because the
system has no authentication when
+ accessed through</strong></del></span> <span
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
worse, Amazon forwards it to third-party companies. Thus,
- even if</em></ins></span> users <span class="removed"><del><strong>could
have
- checked</strong></del></span> <span class="inserted"><ins><em>request
deletion of their data from Amazon's servers, <a
-
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
- the data remain on other servers</a>, where they can be accessed by
- advertising companies</em></ins></span> and <span
class="removed"><del><strong>changed.</p>
-
- <p>The company that made</strong></del></span> <span
class="inserted"><ins><em>government agencies. In other words,
- deleting</em></ins></span> the <span class="removed"><del><strong>vibrator
- <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for</strong></del></span> <span
class="inserted"><ins><em>collected information doesn't cancel the wrong
of</em></ins></span>
- collecting <span class="removed"><del><strong>lots</strong></del></span>
<span class="inserted"><ins><em>it.</p>
-
- <p>Data collected by devices such as the Nest thermostat, the Philips
- Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
- speakers are likewise stored longer than necessary on the servers
- the devices are tethered to. Moreover, they are made available to
- Alexa. As a result, Amazon has a very precise picture</em></ins></span> of
<span class="removed"><del><strong>personal information about how
- people used it</a>.</p>
-
- <p>The company's statement that it was
anonymizing</strong></del></span> <span class="inserted"><ins><em>users' life
- at home, not only in</em></ins></span> the <span
class="removed"><del><strong>data may be
- true,</strong></del></span> <span
class="inserted"><ins><em>present,</em></ins></span> but <span
class="removed"><del><strong>it doesn't really matter. If it had
sold</strong></del></span> <span class="inserted"><ins><em>in</em></ins></span>
the <span class="removed"><del><strong>data to a
- data broker,</strong></del></span> <span class="inserted"><ins><em>past
(and, who knows,
- in</em></ins></span> the <span class="removed"><del><strong>data broker
would have been able</strong></del></span> <span
class="inserted"><ins><em>future too?)</p>
+ even if users request deletion of their data from Amazon's servers, <a
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
+ the <span class="removed"><del><strong>modem. However, even if it asked
for
+ authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>data remain on other servers</a>, where they
can</em></ins></span> be <span class="removed"><del><strong>confident that
Nissan has no
+ access. The software in</strong></del></span> <span
class="inserted"><ins><em>accessed by
+ advertising companies and government agencies. In other words,
+ deleting</em></ins></span> the <span class="removed"><del><strong>car is
+ proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects to</strong></del></span> <span
class="inserted"><ins><em>collected information doesn't
cancel</em></ins></span> the <span class="removed"><del><strong>car
remotely,</strong></del></span> <span class="inserted"><ins><em>wrong of
+ collecting it.</p>
+
+ <p>Data collected by devices such as</em></ins></span> the <span
class="removed"><del><strong>cell phone
+ modem enables</strong></del></span> <span class="inserted"><ins><em>Nest
thermostat,</em></ins></span> the <span class="removed"><del><strong>phone
company to track</strong></del></span> <span class="inserted"><ins><em>Philips
+ Hue-connected lights,</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>Chamberlain MyQ garage opener and</em></ins></span>
the <span class="removed"><del><strong>time; it is possible to physically
remove</strong></del></span> <span class="inserted"><ins><em>Sonos
+ speakers are likewise stored longer than necessary on</em></ins></span>
the <span class="removed"><del><strong>cell phone modem
+ though.</p>
+ </li>
+
+ <li id="records-drivers"><p>Proprietary software in cars
+ <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is</strong></del></span> <span class="inserted"><ins><em>servers
+ the devices are tethered to. Moreover, they are</em></ins></span> made
available to <span class="removed"><del><strong>car manufacturers, insurance
companies, and
+ others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
is not
+ really</strong></del></span>
+ <span class="inserted"><ins><em>Alexa. As</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
+ intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>result, Amazon has a very precise
picture</em></ins></span> of <span class="removed"><del><strong>privacy, and
should be replaced with anonymous
+ payment systems,</strong></del></span> <span
class="inserted"><ins><em>users' life
+ at home, not only in the present,</em></ins></span> but <span
class="inserted"><ins><em>in</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
+ cases mentioned are done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>past (and, who knows,</em></ins></span>
+ in the <span class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>future too?)</p>
</li>
<li id="M201904240">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some of users' commands</em></ins></span> to <span
class="removed"><del><strong>figure out
- who</strong></del></span> the <span class="removed"><del><strong>user
was.</p>
-
- <p>Following this lawsuit,</strong></del></span> <span
class="inserted"><ins><em>Alexa service are</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees to listen to</a>. The Google and Apple
+ <p>Some of users' commands to</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>Alexa service are <a
+
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees</em></ins></span> to <span
class="removed"><del><strong>extract data remotely</strong></del></span> <span
class="inserted"><ins><em>listen to</a>. The Google</em></ins></span> and
+ <span class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>Apple
voice assistants do similar things.</p>
- <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even</em></ins></span> has <span
class="removed"><del><strong>been ordered</strong></del></span> <span
class="inserted"><ins><em>access</em></ins></span> to <span
class="removed"><del><strong>pay a total</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
- location and other personal data</a>.</p>
+ <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span class="inserted"><ins><em>Alexa service staff
even has access to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
+ location</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
+ store this information, but if</strong></del></span> <span
class="inserted"><ins><em>other personal data</a>.</p>
- <p>Since the client program is nonfree, and data processing is done
+ <p>Since</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>client program is nonfree, and data processing is done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
- the cloud</a>” (a soothing way</em></ins></span> of <span
class="removed"><del><strong>C$4m</a></strong></del></span> <span
class="inserted"><ins><em>saying “We won't
- tell you how and where it's done”), users have no
way</em></ins></span>
- to <span class="removed"><del><strong>its
customers.</p></strong></del></span> <span class="inserted"><ins><em>know
what happens to the recordings unless human eavesdroppers <a
+ the cloud</a>” (a soothing way of saying “We won't
+ tell you how and where it's done”), users have no way
+ to know what happens</em></ins></span> to <span
class="removed"><del><strong>get the data
+ and hand it over,</strong></del></span> the <span
class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>recordings
unless human eavesdroppers <a
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
break their non-disclosure
agreements</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
+
+<!-- #SpywareAtHome</strong></del></span>
<span class="inserted"><ins><em><li id="M201902080">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The HP</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS:</strong></del></span>
+ <span class="inserted"><ins><em><p>The HP <a
+ href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a></em></ins></span> to <span
class="inserted"><ins><em>make sure</em></ins></span> the
- <span class="removed"><del><strong>manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
<span class="inserted"><ins><em>user is still
- paying for the subscription, and hasn't printed more pages than were
- paid for.</p>
+ communicates with HP servers</a> to</em></ins></span> make sure
<span class="removed"><del><strong>to place new items on top under each
subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Nest thermometers
+ send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot of data about</strong></del></span> the <span
class="removed"><del><strong>user</a>.</p>
+ </li>
+
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers</strong></del></span> <span
class="inserted"><ins><em>user is still
+ paying for the subscription, and hasn't printed more pages
than</em></ins></span> were <span class="removed"><del><strong>programmed to
spy</strong></del></span>
+ <span class="inserted"><ins><em>paid for.</p>
<p>Even though the ink subscription program may be cheaper in some
- specific cases, it spies on users, and involves totally unacceptable
- restrictions in the use of ink cartridges that would otherwise be in
+ specific cases, it spies</em></ins></span> on <span
class="removed"><del><strong>their renters</a>.</p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInTVSets">Spyware</strong></del></span> <span
class="inserted"><ins><em>users, and involves totally unacceptable
+ restrictions</em></ins></span> in <span class="removed"><del><strong>TV
Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+</div>
+
+<p>Emo Phillips made a joke: The other day</strong></del></span> <span
class="inserted"><ins><em>the use of ink cartridges that would otherwise be in
working order.</p>
</li>
<li id="M201808120">
<!--#set var="DATE" value='<small
class="date-tag">2018-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Crackers</em></ins></span> found a way to <span
class="removed"><del><strong>access</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>data</a>
- collected by</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,
- and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span> to <span
class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>break the security of an Amazon
device,</em></ins></span>
+ and
+<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I
+don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
<p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>manufacturer's
snooping.</p>
+ easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>other way.”
Evidently</strong></del></span> <span class="inserted"><ins><em>US
+ told Amazon to do this, or cease to sell the product in</em></ins></span>
that <span class="removed"><del><strong>was
+before</strong></del></span> <span class="inserted"><ins><em>country,
+ do you think</em></ins></span> Amazon <span
class="removed"><del><strong>“smart” TVs.</p>
- <p>That</strong></del></span> <span class="inserted"><ins><em>US
- told Amazon to do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>manufacturer and</strong></del></span> <span
class="inserted"><ins><em>product in that country,
- do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>FBI could listen</strong></del></span> <span
class="inserted"><ins><em>moral fiber</em></ins></span> to <span
class="removed"><del><strong>these conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>say no?</p>
+<ul>
+ <li>
+ <p>Vizio
+ “smart”</strong></del></span> <span
class="inserted"><ins><em>would have the moral fiber to say no?</p>
- <p><small>(These crackers are probably hackers too, but
please</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <p><small>(These crackers are probably hackers too, but
please</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything</strong></del></span>
<span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
- “hacking”</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>mean “breaking
security”</a>.)</small></p>
+ “hacking” to mean “breaking
security”</a>.)</small></p>
</li>
<li id="M201804140">
@@ -3197,457 +3345,365 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A medical insurance company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops</em></ins></span> on
<span class="removed"><del><strong>children and
adults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>its user by
- sending usage data back over the
Internet</a>.</p></em></ins></span>
+ offers a gratis electronic toothbrush</em></ins></span> that <span
class="removed"><del><strong>is viewed</strong></del></span> <span
class="inserted"><ins><em>snoops</em></ins></span> on <span
class="removed"><del><strong>them, and not just broadcasts
+ and cable</a>. Even if</strong></del></span> <span
class="inserted"><ins><em>its user by
+ sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>image is coming from</strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareAtLowLevel</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201706204">
+ <li id="M201706204">
<!--#set var="DATE" value='<small
class="date-tag">2017-06</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>Lots of “smart”
products are designed <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Lots of “smart” products are designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen</em></ins></span> to <span class="removed"><del><strong>place new
items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
+ listen to everyone in</em></ins></span> the <span
class="removed"><del><strong>user's own
+ computer,</strong></del></span> <span class="inserted"><ins><em>house,
all</em></ins></span> the <span class="removed"><del><strong>TV reports what it
is. The existence</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>everyone</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
-
-<ul>
-<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note that</strong></del></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used
did</strong></del></span> <span class="inserted"><ins><em>house, all the
time</a>.</p>
-
- <p>Today's technological practice does</em></ins></span> not <span
class="removed"><del><strong>affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>include
any way of making</em></ins></span>
- a <span class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>device that can
obey your voice commands without potentially spying
- on you. Even if it</em></ins></span> is <span
class="removed"><del><strong>not really
-clean since</strong></del></span> <span class="inserted"><ins><em>air-gapped,
it could be saving up records
- about you for later examination.</p>
+ <p>Today's technological practice does not include any
way</em></ins></span> of <span
class="inserted"><ins><em>making</em></ins></span>
+ a <span class="removed"><del><strong>way to
+ disable the surveillance, even</strong></del></span> <span
class="inserted"><ins><em>device that can obey your voice commands without
potentially spying
+ on you. Even</em></ins></span> if it <span
class="removed"><del><strong>were not hidden as</strong></del></span> <span
class="inserted"><ins><em>is air-gapped,</em></ins></span> it <span
class="removed"><del><strong>was in
+ these TVs, does not legitimize the
surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>could be saving up records
+ about you for later examination.</p></em></ins></span>
</li>
- <li id="M201407170">
+ <span class="removed"><del><strong><li><p>More or less all
“smart” TVs</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407170">
<!--#set var="DATE" value='<small
class="date-tag">2014-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
+ <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report was as</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot</em></ins></span> of <span class="removed"><del><strong>2014, but we don't
expect this has got better.</p>
-<!-- #SpywareAtWork</strong></del></span>
- <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot of
- data about the user</a>.</p>
+ <p>This shows that laws requiring products to get users' formal
+ consent before collecting personal</strong></del></span>
+ data <span class="removed"><del><strong>are totally inadequate.
+ And what happens if a user declines consent?
Probably</strong></del></span> <span
class="inserted"><ins><em>about</em></ins></span> the <span
class="removed"><del><strong>TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>user</a>.</p>
</li>
<li id="M201310260">
<!--#set var="DATE" value='<small
class="date-tag">2013-10</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p><a
-
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it can collect the emails of members of Parliament
- this way, because they pass it through Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>their
renters</a>.</p></em></ins></span>
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</em></ins></span> to <span
class="removed"><del><strong>tracking, the TV</strong></del></span> <span
class="inserted"><ins><em>spy on their renters</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareOnWearables">Wearables</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnWearables">#SpywareOnWearables</a>)</span></em></ins></span>
+ <h4 id="SpywareOnWearables">Wearables</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnWearables">#SpywareOnWearables</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Spyware in Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201807260">
<!--#set var="DATE" value='<small
class="date-tag">2018-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tommy Hilfiger clothing</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
+ <p>Tommy Hilfiger clothing <a
+
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
monitor how often people wear it</a>.</p>
- <p>This will teach the sheeple to find it normal that companies
- monitor every aspect of what they do.</p></em></ins></span>
- </li>
-</ul>
-
-
+ <p>This</em></ins></span> will
+ <span class="removed"><del><strong>not work.”</p>
-<span class="removed"><del><strong><!--
#SpywareOnTheRoad</strong></del></span>
+ <p>Proper laws would say that TVs are not
allowed</strong></del></span> <span class="inserted"><ins><em>teach the
sheeple</em></ins></span> to <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>find it normal that companies
+ monitor every aspect of</em></ins></span> what
+ <span class="removed"><del><strong>the user watches — no
exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>they do.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li><p>Vizio
goes</strong></del></span>
+<span class="inserted"><ins><em></ul>
-<span class="inserted"><ins><em><h5
id="SpywareOnSmartWatches">“Smart” Watches</h5>
+<h5 id="SpywareOnSmartWatches">“Smart” Watches</h5>
<ul class="blurbs">
<li id="M202009100">
<!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>Internet-enabled watches with
proprietary software
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Internet-enabled watches with proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they have a lot of security flaws. They <a
-
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
- permit security breakers (and unauthorized people)</em></ins></span> to
<span class="removed"><del><strong>place new items on top under each
subsection</strong></del></span> <span
class="inserted"><ins><em>access</a> the watch.</p>
+ privacy. In addition, they have</em></ins></span> a <span
class="removed"><del><strong>step further than other TV manufacturers in spying
on
+ their users: their</strong></del></span> <span
class="inserted"><ins><em>lot of security flaws. They</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in
detail</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
+ permit security breakers (and unauthorized people) to access</a> the
watch.</p>
+
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent</em></ins></span> and
+ <span class="removed"><del><strong>link them your IP address</a>
so</strong></del></span> <span class="inserted"><ins><em>child and spoof
messages to and from the watch, possibly endangering the child.</p>
- <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
+ <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>advertisers can track you
+ across devices.</p>
- <p><small>(Note that this article misuses the word “<a
+ <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>this article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
to mean “crackers.”)</small></p>
</li>
<li id="M201603020">
<!--#set var="DATE" value='<small
class="date-tag">2016-03</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware</strong></del></span>
- <span class="inserted"><ins><em><p>A very cheap “smart
watch” comes with an Android app <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A very cheap “smart watch” comes with an Android app
<a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects to an unidentified site</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
-
-<ul>
- <li></strong></del></span> <span
class="inserted"><ins><em>China</a>.</p></em></ins></span>
+ that connects</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
- <p>The <span class="removed"><del><strong>Nest Cam
“smart” camera</strong></del></span> <span
class="inserted"><ins><em>article says this</em></ins></span> is <span
class="removed"><del><strong><a
- href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when the “owner”
switches</strong></del></span> <span class="inserted"><ins><em>a back door, but
that could be a
- misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
- <p>A</strong></del></span> <span class="inserted"><ins><em>is
certainly surveillance, at least.</p>
+ <p>The article says</em></ins></span> this <span
class="removed"><del><strong>off,</strong></del></span> <span
class="inserted"><ins><em>is a back door,</em></ins></span> but <span
class="removed"><del><strong>having</strong></del></span> <span
class="inserted"><ins><em>that could be a
+ misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>certainly surveillance, at
least.</p></em></ins></span>
</li>
- <li id="M201407090">
+ <span class="removed"><del><strong><li><p>Tivo's
alliance</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407090">
<!--#set var="DATE" value='<small
class="date-tag">2014-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>An LG</em></ins></span> “smart” <span
class="removed"><del><strong>device means the
manufacturer</strong></del></span> <span
class="inserted"><ins><em>watch</em></ins></span> is <span
class="removed"><del><strong>using it</strong></del></span> <span
class="inserted"><ins><em>designed <a
-
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
- to <span class="removed"><del><strong>outsmart
- you.</p></strong></del></span> <span
class="inserted"><ins><em>report its location to someone else and to transmit
conversations
- too</a>.</p></em></ins></span>
+ <p>An LG “smart” watch is designed <a
+
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+ to report its location to someone else and to transmit conversations
+ too</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInVehicles">Vehicles</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></em></ins></span>
+ <h4 id="SpywareInVehicles">Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>E-books can contain Javascript code,
- and</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202008181">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>New Toyotas will</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/">
+ <p>New Toyotas will <a
+ href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/">
upload data to AWS to help create custom insurance premiums</a>
- based</em></ins></span> on <span
class="removed"><del><strong>readers</a>.</p>
- </li>
-
- <li><p>Spyware in many e-readers—not only the
- Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even</strong></del></span> <span
class="inserted"><ins><em>driver behaviour.</p>
+ based on driver behaviour.</p>
<p>Before you buy a “connected” car, make sure you can
disconnect its cellular antenna and its GPS antenna. If you want
- GPS navigation, get a separate navigator</em></ins></span> which <span
class="removed"><del><strong>page the user reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>runs free software
- and works with Open Street Map.</p></em></ins></span>
+ GPS navigation, get a separate navigator which runs free software
+ and works</em></ins></span> with <span class="removed"><del><strong>Viacom
adds 2.3 million households</strong></del></span> <span
class="inserted"><ins><em>Open Street Map.</p>
</li>
- <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used
- by most US libraries,</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201912171">
+ <li id="M201912171">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Most modern cars now</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
- record and</em></ins></span> send <span
class="removed"><del><strong>lots</strong></del></span> <span
class="inserted"><ins><em>various kinds</em></ins></span> of data to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
- needed</strong></del></span> <span class="inserted"><ins><em>the
manufacturer</a>. For
- the user, access</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
-
-<ul>
-<li><p>Computerized cars</strong></del></span> <span
class="inserted"><ins><em>the data is nearly impossible, as it involves
- cracking the car's computer, which is always hidden and
running</em></ins></span> with <span class="removed"><del><strong>nonfree
software are
- <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>proprietary
software.</p></em></ins></span>
+ <p>Most modern cars now <a
+
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
+ record and send various kinds of data</em></ins></span> to the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. For</em></ins></span>
+ the <span class="removed"><del><strong>company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>user, access to the data is nearly impossible,
as it involves
+ cracking the car's computer, which is always hidden and
running</em></ins></span> with <span class="removed"><del><strong>online
+ social media participation, Tivo can now</strong></del></span>
+ <span class="inserted"><ins><em>proprietary software.</p>
</li>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
- effectively
- anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely</strong></del></span> <span
class="inserted"><ins><em>id="M201903290">
+ <li id="M201903290">
<!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tesla cars collect lots of personal data,</em></ins></span> and
<span class="removed"><del><strong>make changes in various
- settings</a>.</p>
-
- <p>That's easy to do because the system has no
authentication</strong></del></span> <span class="inserted"><ins><em><a
-
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"></em></ins></span>
- when
- <span class="removed"><del><strong>accessed through</strong></del></span>
<span class="inserted"><ins><em>they go to a junkyard</em></ins></span> the
<span class="removed"><del><strong>modem. However, even if it asked for
- authentication, you couldn't be confident that
Nissan</strong></del></span> <span class="inserted"><ins><em>driver's personal
data goes with
- them</a>.</p>
+ <p>Tesla cars collect lots of personal data, and</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
+ when they go to a junkyard the driver's personal data
goes</em></ins></span> with <span class="removed"><del><strong>online
purchases</a>, exposing all users</strong></del></span>
+ <span class="inserted"><ins><em>them</a>.</p>
</li>
<li id="M201902011">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The FordPass Connect feature of some Ford
vehicles</em></ins></span> has <span class="removed"><del><strong>no
- access. The software in</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>The FordPass Connect feature of some Ford vehicles has <a
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access to</em></ins></span> the <span
class="inserted"><ins><em>internal</em></ins></span> car <span
class="inserted"><ins><em>network</a>. It</em></ins></span> is
- <span class="removed"><del><strong>proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from its users</a>.</p>
-
- <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>constantly
- connected</em></ins></span> to the <span
class="inserted"><ins><em>cellular phone network and sends Ford a lot of data,
- including</em></ins></span> car <span
class="removed"><del><strong>remotely,</strong></del></span> <span
class="inserted"><ins><em>location. This feature operates even
when</em></ins></span> the <span class="removed"><del><strong>cell phone
- modem enables</strong></del></span> <span
class="inserted"><ins><em>ignition
+ near-complete access</em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>the internal car
network</a>. It is constantly
+ connected</em></ins></span> to <span class="removed"><del><strong>be
+ picked up</strong></del></span> <span class="inserted"><ins><em>the
cellular phone network and sends Ford a lot of data,
+ including car location. This feature operates even when the ignition
key is removed, and users report that they can't disable it.</p>
- <p>If you own one of these cars, have you succeeded in
breaking</em></ins></span> the <span class="removed"><del><strong>phone company
to track</strong></del></span>
- <span class="inserted"><ins><em>connectivity by
disconnecting</em></ins></span> the <span class="removed"><del><strong>car's
movements all</strong></del></span> <span class="inserted"><ins><em>cellular
modem, or wrapping</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span>
- <span class="inserted"><ins><em>antenna in aluminum foil?</p>
+ <p>If you own one of these cars, have you succeeded in breaking the
+ connectivity</em></ins></span> by <span
class="removed"><del><strong>proprietary malware running on other
devices</strong></del></span> <span class="inserted"><ins><em>disconnecting the
cellular modem, or wrapping the
+ antenna</em></ins></span> in
+ <span class="removed"><del><strong>range so as</strong></del></span>
<span class="inserted"><ins><em>aluminum foil?</p>
</li>
<li id="M201811300">
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>In China,</em></ins></span> it is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>mandatory for electric
- cars to be equipped with a terminal that <a
- href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ <p>In China, it is mandatory for electric
+ cars</em></ins></span> to <span class="removed"><del><strong>determine
that they are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads</strong></del></span> <span class="inserted"><ins><em>be
equipped</em></ins></span> with <span class="removed"><del><strong>Web
activity, and
+ other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
+ </li>
+ <li><p>Vizio “smart” TVs recognize
and</strong></del></span> <span class="inserted"><ins><em>a terminal
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if it isn't</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
transfers technical data, including car location,
- to a government-run platform</a>. In practice, <a
- href="/proprietary/proprietary-surveillance.html#car-spying">
+ to</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p>
+ </li>
+ <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>government-run platform</a>. In
practice,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching and listening all</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying">
manufacturers collect this data</a> as part of their own spying, then
- forward it</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> the <span
class="removed"><del><strong>cell phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>government-run platform.</p></em></ins></span>
+ forward it to</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>government-run
platform.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
- <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201810230">
+ <span class="inserted"><ins><em><li id="M201810230">
<!--#set var="DATE" value='<small
class="date-tag">2018-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available to car manufacturers, insurance companies, and
- others.</p>
-
- <p>The case</strong></del></span>
+ <p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
<span
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked the choices</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span class="inserted"><ins><em>radio
programs</a></em></ins></span> in <span class="removed"><del><strong>this
article, is</strong></del></span> <span class="inserted"><ins><em>its
+ tracked</em></ins></span> the <span class="removed"><del><strong>internet
to another
+ company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>choices of radio programs</a> in its
“connected” cars, minute by minute.</p>
- <p>GM did</em></ins></span> not
- <span class="removed"><del><strong>really a matter of proprietary
surveillance. These systems are an
- intolerable invasion of privacy, and should be replaced with anonymous
- payment systems,</strong></del></span> <span
class="inserted"><ins><em>get users' consent,</em></ins></span> but <span
class="removed"><del><strong>the invasion isn't done by malware. The other
- cases mentioned are done</strong></del></span> <span
class="inserted"><ins><em>it could have got that easily</em></ins></span> by
<span class="removed"><del><strong>proprietary malware in</strong></del></span>
- <span class="inserted"><ins><em>sneaking it into</em></ins></span> the
<span class="removed"><del><strong>car.</p></li>
-
- <li><p>Tesla</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for some digital service
- or other. A requirement for consent is effectively no protection.</p>
-
- <p>The</em></ins></span> cars <span
class="removed"><del><strong>allow the company</strong></del></span> <span
class="inserted"><ins><em>can also collect lots of other data:
listening</em></ins></span> to <span
class="removed"><del><strong>extract</strong></del></span> <span
class="inserted"><ins><em>you,
- watching you, following your movements, tracking passengers' cell
- phones. <em>All</em> such</em></ins></span> data <span
class="removed"><del><strong>remotely and
- determine</strong></del></span> <span
class="inserted"><ins><em>collection should be forbidden.</p>
-
- <p>But if you really want to be safe, we must make
sure</em></ins></span> the car's <span class="removed"><del><strong>location
at</strong></del></span>
- <span class="inserted"><ins><em>hardware cannot collect</em></ins></span>
any <span class="removed"><del><strong>time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The company says it doesn't
- store this information, but if the state orders it to
get</strong></del></span> <span class="inserted"><ins><em>of that data, or
that</em></ins></span> the <span class="removed"><del><strong>data
- and hand</strong></del></span> <span class="inserted"><ins><em>software
- is free so we know</em></ins></span> it <span
class="removed"><del><strong>over, the state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>won't
collect any of that data.</p></em></ins></span>
+ <p>GM did not get users' consent, but</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>could</em></ins></span> have <span
class="removed"><del><strong>to
+ give</strong></del></span> <span class="inserted"><ins><em>got that
easily by
+ sneaking</em></ins></span> it <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>into</em></ins></span> the <span
class="removed"><del><strong>US or</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for</em></ins></span> some
<span class="removed"><del><strong>other government.</p>
+ <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>digital service
+ or other. A requirement for consent</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>effectively no protection.</p>
+
+ <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="removed"><del><strong>be trusted
unless it is done
+ by free software in</strong></del></span> <span
class="inserted"><ins><em>you,
+ watching you, following</em></ins></span> your <span
class="removed"><del><strong>own computer.</p>
+
+ <p>In its privacy policy, Samsung explicitly confirms
+ that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice</strong></del></span>
<span class="inserted"><ins><em>movements, tracking passengers' cell
+ phones. <em>All</em> such</em></ins></span> data <span
class="removed"><del><strong>containing sensitive information
will</strong></del></span> <span class="inserted"><ins><em>collection
should</em></ins></span> be <span
class="removed"><del><strong>transmitted</strong></del></span> <span
class="inserted"><ins><em>forbidden.</p>
+
+ <p>But if you really want</em></ins></span> to
+ <span class="removed"><del><strong>third parties</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
+ <li><p>Spyware in
+ <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a> reports what the user watches,
and</strong></del></span> <span class="inserted"><ins><em>be safe, we must make
sure</em></ins></span> the <span class="removed"><del><strong>switch to turn
this off has no effect. (The fact</strong></del></span> <span
class="inserted"><ins><em>car's
+ hardware cannot collect any of</em></ins></span> that <span
class="removed"><del><strong>the
+ transmission reports a 404 error really means nothing; the server
+ could save</strong></del></span> <span class="inserted"><ins><em>data,
or</em></ins></span> that <span class="removed"><del><strong>data
anyway.)</p>
+
+ <p>Even worse, it
+ <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on the user's local network.</a></p>
+ <p>LG later said it had installed a patch to stop this,
but</strong></del></span> <span class="inserted"><ins><em>the software
+ is free so we know it won't collect</em></ins></span> any <span
class="removed"><del><strong>product
+ could spy this way.</p>
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure to place new items on top under each
subsection</strong></del></span>
+ <p>Meanwhile, LG TVs
+ <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span> of <span class="removed"><del><strong>spying
anyway</a>.</p></strong></del></span> <span
class="inserted"><ins><em>that data.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they wanted to
record.</a></p></strong></del></span>
<span class="inserted"><ins><em><li id="M201711230">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Nest thermometers
- send</strong></del></span>
- <span class="inserted"><ins><em><p>AI-powered driving apps
can</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot of data about the user</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>AI-powered driving apps can <a
+
href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
track your every move</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy on their
renters</a>.</p></strong></del></span>
+<!-- #SpywareAtPlay</strong></del></span>
<span class="inserted"><ins><em><li id="M201607160">
<!--#set var="DATE" value='<small
class="date-tag">2016-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p id="car-spying">Computerized cars with nonfree software are <a
-
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
- snooping devices</a>.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareAtPlay">Spyware at Play</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
</div>
+<div style="clear: left;"></div>
-<p>Emo Phillips made a joke: The other day</strong></del></span>
+<ul>
+<li><p>Users</strong></del></span>
+ <span class="inserted"><ins><em><p id="car-spying">Computerized cars
with nonfree software</em></ins></span> are <span
class="removed"><del><strong>suing Bose for</strong></del></span> <a
+<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+distributing</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ snooping devices</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201602240">
+ <li id="M201602240">
<!--#set var="DATE" value='<small
class="date-tag">2016-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p id="nissan-modem">The Nissan Leaf has</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>built-in
- cell phone modem which allows effectively anyone</em></ins></span> to
<span class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em><a
+ <p id="nissan-modem">The Nissan Leaf has</em></ins></span> a <span
class="removed"><del><strong>spyware app for</strong></del></span> <span
class="inserted"><ins><em>built-in
+ cell phone modem which allows effectively anyone to <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
- access its computers remotely</em></ins></span> and
-<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I
-don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>make changes in various
+ access</em></ins></span> its <span
class="removed"><del><strong>headphones</a>.
+Specifically,</strong></del></span> <span class="inserted"><ins><em>computers
remotely and make changes in various
settings</a>.</p>
- <p>That's easy to do because</em></ins></span> the <span
class="removed"><del><strong>other way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li>
- <p>Vizio
- “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything</strong></del></span> <span
class="inserted"><ins><em>system has no authentication
- when accessed through the modem. However, even if it asked
- for authentication, you couldn't be confident</em></ins></span> that <span
class="inserted"><ins><em>Nissan
- has no access. The software in the car</em></ins></span> is <span
class="removed"><del><strong>viewed on them, and not just broadcasts
- and cable</a>. Even</strong></del></span> <span
class="inserted"><ins><em>proprietary, <a
+ <p>That's easy to do because</em></ins></span> the <span
class="removed"><del><strong>app would record</strong></del></span> <span
class="inserted"><ins><em>system has no authentication
+ when accessed through</em></ins></span> the <span
class="removed"><del><strong>names of</strong></del></span> <span
class="inserted"><ins><em>modem. However, even if it asked
+ for authentication, you couldn't be confident that Nissan
+ has no access. The software in</em></ins></span> the <span
class="removed"><del><strong>audio files
+users listen</strong></del></span> <span class="inserted"><ins><em>car is
proprietary, <a
href="/philosophy/free-software-even-more-important.html">which means
it demands blind faith from its users</a>.</p>
- <p>Even</em></ins></span> if <span class="inserted"><ins><em>no one
connects to</em></ins></span> the <span class="removed"><del><strong>image is
coming from</strong></del></span> <span class="inserted"><ins><em>car
remotely,</em></ins></span> the <span class="removed"><del><strong>user's own
- computer,</strong></del></span> <span class="inserted"><ins><em>cell phone
modem
- enables</em></ins></span> the <span class="removed"><del><strong>TV
reports what it is. The existence of a way</strong></del></span> <span
class="inserted"><ins><em>phone company</em></ins></span> to
- <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>track</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden
as</strong></del></span> <span class="inserted"><ins><em>car's movements all
the time;</em></ins></span>
- it <span class="removed"><del><strong>was in
- these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>is possible to physically remove</em></ins></span>
the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>cell phone modem,
though.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>More or less all
“smart” TVs <a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
+ <p>Even if no one connects</em></ins></span> to <span
class="removed"><del><strong>along with</strong></del></span> the <span
class="removed"><del><strong>headphone's unique serial number.
+</p>
- <p>The report was as of 2014, but we don't expect this has got
better.</p>
+<p>The suit accuses that this was done without</strong></del></span>
<span class="inserted"><ins><em>car remotely,</em></ins></span> the <span
class="removed"><del><strong>users' consent.
+If</strong></del></span> <span class="inserted"><ins><em>cell phone modem
+ enables</em></ins></span> the <span class="removed"><del><strong>fine
print of</strong></del></span> <span class="inserted"><ins><em>phone company to
track</em></ins></span> the <span class="removed"><del><strong>app said that
users gave consent for this,
+would that make</strong></del></span> <span class="inserted"><ins><em>car's
movements all the time;</em></ins></span>
+ it <span class="removed"><del><strong>acceptable? No way! It should be
flat out
+<a href="/philosophy/surveillance-vs-democracy.html">
+illegal</strong></del></span> <span class="inserted"><ins><em>is
possible</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>physically remove</em></ins></span> the <span
class="removed"><del><strong>app to snoop at all</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>cell phone
modem, though.</p></em></ins></span>
+ </li>
- <p>This shows that laws requiring products</strong></del></span>
+ <span class="removed"><del><strong><li><p>Many
+ <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users</strong></del></span>
<span class="inserted"><ins><em><li id="M201306140">
<!--#set var="DATE" value='<small
class="date-tag">2013-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tesla cars allow the company</em></ins></span> to <span
class="removed"><del><strong>get users' formal
- consent before collecting personal</strong></del></span> <span
class="inserted"><ins><em>extract</em></ins></span>
- data <span class="removed"><del><strong>are totally inadequate.
- And what happens</strong></del></span> <span
class="inserted"><ins><em>remotely and determine the car's location
- at any time. (See Section 2, paragraphs b and c of the <a
+ <p>Tesla cars allow the company to extract
+ data remotely and determine the car's location
+ at any time. (See Section 2, paragraphs b</em></ins></span> and <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>c of the <a
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf">
privacy statement</a>.) The company says it doesn't store this
- information, but</em></ins></span> if <span class="removed"><del><strong>a
user declines consent? Probably</strong></del></span> the <span
class="removed"><del><strong>TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>state orders it</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>get</em></ins></span> the <span
class="removed"><del><strong>TV will
- not work.”</p>
+ information, but if the state orders it</em></ins></span> to <span
class="inserted"><ins><em>get</em></ins></span> the
+ <span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
- <p>Proper laws would say that TVs are not allowed to report
what</strong></del></span> <span class="inserted"><ins><em>data and hand it
- over,</em></ins></span> the <span class="removed"><del><strong>user
watches — no exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>state can store it.</p></em></ins></span>
+ <p>A game console is a computer,</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> and <span
class="removed"><del><strong>you can't trust a computer with
+ a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>hand it
+ over, the state can store it.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers</strong></del></span>
+
+ <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps</strong></del></span>
<span class="inserted"><ins><em><li id="M201303250">
<!--#set var="DATE" value='<small
class="date-tag">2013-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p id="records-drivers">Proprietary software</em></ins></span> in
<span class="removed"><del><strong>spying on
- their users: their</strong></del></span> <span
class="inserted"><ins><em>cars</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so that advertisers can track you
- across devices.</p>
-
- <p>It</strong></del></span>
+ <p id="records-drivers">Proprietary software in
cars</em></ins></span> <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of data</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
- records information about drivers' movements</a>,
which</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>made
- available</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>car manufacturers, insurance companies, and
others.</p>
-
- <p>The case of toll-collection systems, mentioned
in</em></ins></span> this <span class="removed"><del><strong>off, but having it
enabled by default</strong></del></span> <span
class="inserted"><ins><em>article,</em></ins></span>
- is <span class="inserted"><ins><em>not really a matter of proprietary
surveillance. These systems
- are</em></ins></span> an <span class="removed"><del><strong>injustice
already.</p>
- </li>
+ records information</em></ins></span> about <span
class="removed"><del><strong>their users</strong></del></span> <span
class="inserted"><ins><em>drivers' movements</a>, which is made
+ available to car manufacturers, insurance companies,</em></ins></span> and
<span class="removed"><del><strong>their users'
+ friends</strong></del></span> <span
class="inserted"><ins><em>others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
+ is not really a matter of proprietary surveillance. These systems
+ are an intolerable invasion of privacy,</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
+
+ <p>Even nastier, they do it through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>should be replaced
with
+ anonymous payment systems, but</em></ins></span> the <span
class="removed"><del><strong>data
+ collected</strong></del></span> <span class="inserted"><ins><em>invasion
isn't done</em></ins></span> by <span class="removed"><del><strong>various
cr…apps and sites made</strong></del></span> <span
class="inserted"><ins><em>malware. The
+ other cases mentioned are done</em></ins></span> by <span
class="removed"><del><strong>different
+ companies.</p>
- <li><p>Tivo's alliance</strong></del></span> <span
class="inserted"><ins><em>intolerable invasion of privacy, and should be
replaced</em></ins></span> with <span class="removed"><del><strong>Viacom adds
2.3 million households to
- the 600 millions social media profiles</strong></del></span>
- <span class="inserted"><ins><em>anonymous payment systems,
but</em></ins></span> the <span class="removed"><del><strong>company already
- monitors. Tivo customers</strong></del></span> <span
class="inserted"><ins><em>invasion isn't done by malware. The
- other cases mentioned</em></ins></span> are <span
class="removed"><del><strong>unaware they're being
watched</strong></del></span> <span
class="inserted"><ins><em>done</em></ins></span> by
- <span class="removed"><del><strong>advertisers. By combining TV viewing
information with online
- social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>proprietary malware in the car.</p>
+ <p>They use this data to manipulate people</strong></del></span>
<span class="inserted"><ins><em>proprietary malware in the car.</p>
</li>
</ul>
@@ -3661,164 +3717,121 @@
<li id="M202008182">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Oculus headsets</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing
all</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require</em></ins></span>
- users to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>identify
themselves</em></ins></span> to <span class="removed"><del><strong>be
- picked up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. This will give Facebook
- free rein to pervasively snoop</em></ins></span> on <span
class="inserted"><ins><em>Oculus users.</p>
+ <p>Oculus headsets <a
+
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
+ users</em></ins></span> to <span class="removed"><del><strong>buy things,
and hunt
+ for “whales” who can be led</strong></del></span> <span
class="inserted"><ins><em>identify themselves</em></ins></span> to <span
class="removed"><del><strong>spend a lot of money. They
+ also use a back door</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. This will give Facebook
+ free rein</em></ins></span> to <span
class="removed"><del><strong>manipulate</strong></del></span> <span
class="inserted"><ins><em>pervasively snoop on Oculus users.</p>
</li>
<li id="M201612230">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>VR equipment, measuring every slight motion,
- creates the potential for the most intimate
+ creates</em></ins></span> the <span class="removed"><del><strong>game
play</strong></del></span> <span
class="inserted"><ins><em>potential</em></ins></span> for <span
class="removed"><del><strong>specific players.</p>
+
+ <p>While</strong></del></span> the <span
class="removed"><del><strong>article describes gratis games, games that cost
money</strong></del></span> <span class="inserted"><ins><em>most intimate
surveillance ever. All it takes to make this potential real <a
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
- software as malicious as many</em></ins></span> other <span
class="removed"><del><strong>devices</strong></del></span> <span
class="inserted"><ins><em>programs listed</em></ins></span> in
- <span class="removed"><del><strong>range so as to determine that they
are nearby. Once your
- Internet devices are paired with your TV,
advertisers</strong></del></span> <span class="inserted"><ins><em>this
+ software as malicious as many other programs listed in this
page</a>.</p>
- <p>You</em></ins></span> can
- <span class="removed"><del><strong>correlate ads with Web activity, and
- other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
- </li>
- <li><p>Vizio “smart” TVs recognize and
- <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people are watching</a>,
- even if it isn't</strong></del></span> <span
class="inserted"><ins><em>bet Facebook will implement the maximum possible
- surveillance on Oculus Rift devices. The moral is, never
trust</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p></strong></del></span> <span class="inserted"><ins><em>VR
+ <p>You</em></ins></span> can <span
class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>bet Facebook will implement</em></ins></span> the
<span class="removed"><del><strong>same
tactics.</p></strong></del></span> <span
class="inserted"><ins><em>maximum possible
+ surveillance on Oculus Rift devices. The moral is, never trust a VR
system with nonfree software in it.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV
- <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching and listening all</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
+
+<span class="removed"><del><strong><!-- #SpywareOnTheWeb
--></strong></del></span>
<div class="big-section">
- <h3 id="SpywareOnTheWeb">Spyware on</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
- </li>
- <li><p>The Samsung “Smart” TV
- <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice</strong></del></span> <span
class="inserted"><ins><em>Web</h3>
+ <h3 id="SpywareOnTheWeb">Spyware on the Web</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnTheWeb">#SpywareOnTheWeb</a>)</span>
</div>
<div style="clear: left;"></div>
-<p>In addition, many web sites spy</em></ins></span> on <span
class="removed"><del><strong>the internet to another
- company, Nuance</a>. Nuance can save it and would then have to
- give</strong></del></span> <span class="inserted"><ins><em>their
visitors. Web sites are not
- programs, so</em></ins></span> it
- <span class="inserted"><ins><em><a
href="/philosophy/network-services-arent-free-or-nonfree.html">
- makes no sense</em></ins></span> to <span class="removed"><del><strong>the
US</strong></del></span> <span class="inserted"><ins><em>call them
“free”</em></ins></span> or <span class="removed"><del><strong>some
other government.</p>
- <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>“proprietary”</a>,
- but the surveillance</em></ins></span> is <span
class="removed"><del><strong>not to be trusted unless</strong></del></span>
<span class="inserted"><ins><em>an abuse all the same.</p>
+<p>In addition, many web sites spy on their visitors. Web sites are not
+ programs, so it
+ <a href="/philosophy/network-services-arent-free-or-nonfree.html">
+ makes no sense to call them “free” or
“proprietary”</a>,
+ but the surveillance is an abuse all the same.</p>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+
+ <li><p>When</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201904210">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>As of April 2019,</em></ins></span> it is <span
class="removed"><del><strong>done
- by free software in your own computer.</p>
-
- <p>In its privacy policy, Samsung explicitly confirms
- that</strong></del></span> <a <span
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be
transmitted</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/">no
- longer possible</em></ins></span> to
- <span class="removed"><del><strong>third parties</a>.</p>
- </li>
- <li><p>Spyware in</strong></del></span> <span
class="inserted"><ins><em>disable an
- unscrupulous tracking anti-feature</a> that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports what the user
watches,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
+ <p>As of April 2019, it is <a
+
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/">no
+ longer possible to disable an
+ unscrupulous tracking anti-feature</a> that <a
+
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
users when they follow ping links</a> in Apple Safari, Google Chrome,
- Opera, Microsoft Edge</em></ins></span> and <span
class="inserted"><ins><em>also in</em></ins></span> the <span
class="removed"><del><strong>switch</strong></del></span> <span
class="inserted"><ins><em>upcoming Microsoft Edge that is
- going</em></ins></span> to <span class="removed"><del><strong>turn this
off has no effect. (The fact</strong></del></span> <span
class="inserted"><ins><em>be based on Chromium.</p>
+ Opera, Microsoft Edge and also in the upcoming Microsoft Edge that is
+ going to be based on Chromium.</p>
</li>
<li id="M201901101">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Until 2015, any tweet</em></ins></span> that <span
class="removed"><del><strong>the
- transmission reports</strong></del></span> <span
class="inserted"><ins><em>listed</em></ins></span> a <span
class="removed"><del><strong>404 error really means nothing; the server
- could save that data anyway.)</p>
-
- <p>Even worse, it</strong></del></span> <span
class="inserted"><ins><em>geographical tag</em></ins></span> <a <span
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on</strong></del></span>
- <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/">
- sent</em></ins></span> the <span class="removed"><del><strong>user's local
network.</a></p>
-
- <p>LG later said it had installed a patch</strong></del></span>
<span class="inserted"><ins><em>precise GPS location</em></ins></span> to <span
class="removed"><del><strong>stop this, but any product
- could spy this way.</p>
-
- <p>Meanwhile, LG TVs
- <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Twitter's server</a>. It still
- contains these GPS locations.</p></em></ins></span>
+ <p>Until 2015, any tweet that listed a geographical tag <a
+
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/">
+ sent the precise GPS location to Twitter's server</a>. It still
+ contains these GPS locations.</p>
</li>
- <span class="removed"><del><strong><li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops</strong></del></span>
- <span class="inserted"><ins><em><li id="M201805170">
+ <li id="M201805170">
<!--#set var="DATE" value='<small
class="date-tag">2018-05</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The Storyful program <a
-
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies</em></ins></span>
- on <span class="removed"><del><strong>what programs people watch, and even
what they wanted to record.</a></p></strong></del></span> <span
class="inserted"><ins><em>the reporters that use
it</a>.</p></em></ins></span>
+
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies
+ on the reporters that use it</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-<!-- #SpywareAtPlay</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201701060">
+ <li id="M201701060">
<!--#set var="DATE" value='<small
class="date-tag">2017-01</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareAtPlay">Spyware at Play</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
-<li><p>Users are suing Bose for <a
-href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
-distributing</strong></del></span>
- <span class="inserted"><ins><em><p>When</em></ins></span> a <span
class="removed"><del><strong>spyware app</strong></del></span> <span
class="inserted"><ins><em>page uses Disqus</em></ins></span>
- for <span class="removed"><del><strong>its headphones</a>.
-Specifically,</strong></del></span> <span
class="inserted"><ins><em>comments,</em></ins></span> the <span
class="removed"><del><strong>app would record</strong></del></span> <span
class="inserted"><ins><em>proprietary Disqus software <a
-
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">loads
- a Facebook software package into</em></ins></span> the <span
class="removed"><del><strong>names</strong></del></span> <span
class="inserted"><ins><em>browser</em></ins></span> of <span
class="removed"><del><strong>the audio files
-users listen</strong></del></span> <span class="inserted"><ins><em>every
anonymous visitor</em></ins></span>
- to <span class="removed"><del><strong>along with the headphone's unique
serial number.
-</p>
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>When</em></ins></span> a page uses Disqus
+ for comments, <span class="removed"><del><strong><a
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">the</strong></del></span>
<span class="inserted"><ins><em>the</em></ins></span> proprietary Disqus
software <span class="removed"><del><strong>loads</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">loads</em></ins></span>
+ a Facebook software package into the browser of every anonymous visitor
+ to the page, and makes the page's URL available to <span
class="removed"><del><strong>Facebook</a>.
+ </p></li>
-<p>The suit accuses that this was done without</strong></del></span> the
<span class="removed"><del><strong>users' consent.
-If</strong></del></span> <span class="inserted"><ins><em>page, and
makes</em></ins></span> the <span class="removed"><del><strong>fine
print</strong></del></span> <span class="inserted"><ins><em>page's URL
available to Facebook</a>.</p>
+ <li><p>Online</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
</li>
<li id="M201612064">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Online sales, with tracking and surveillance</em></ins></span> of
<span class="removed"><del><strong>the app said that users gave consent for
this,
-would that make it acceptable? No way! It should be flat
out</strong></del></span> <span
class="inserted"><ins><em>customers,</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">
-illegal</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
- businesses</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>show different people different prices</a>.
Most of</em></ins></span>
- the <span class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>tracking is done by recording interactions with
servers, but
+ <p>Online</em></ins></span> sales, with tracking and surveillance of
customers, <a
+
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
+ businesses to show different people different prices</a>. Most of
+ the tracking is done by recording interactions with servers, but
proprietary software contributes.</p>
</li>
- <li id="M201405140">
+ <span class="removed"><del><strong><li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
+ Baidu's Japanese-input and Chinese-input apps spy on
users.</a></p>
+ </li>
+
+ <li><p>Pages that contain “Like” buttons
+ <a
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
+ enable Facebook to track visitors</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201405140">
<!--#set var="DATE" value='<small
class="date-tag">2014-05</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
- Microsoft SkyDrive allows the NSA</em></ins></span> to <span
class="removed"><del><strong>snoop at all</a>.
-</p></strong></del></span> <span class="inserted"><ins><em>directly
examine users'
+ Microsoft SkyDrive allows the NSA</em></ins></span> to <span
class="removed"><del><strong>those pages</a>—even
+ users that don't have Facebook accounts.</p></strong></del></span>
<span class="inserted"><ins><em>directly examine users'
data</a>.</p></em></ins></span>
</li>
@@ -3827,35 +3840,29 @@
<span class="inserted"><ins><em><li id="M201210240">
<!--#set var="DATE" value='<small
class="date-tag">2012-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many web sites rat their visitors to advertising
- networks that track users. Of the top 1000 web sites,</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
- (as of 5/17/2012) fed</em></ins></span> their <span
class="removed"><del><strong>users and</strong></del></span> <span
class="inserted"><ins><em>visitors third-party cookies, allowing
+ <p>Many</em></ins></span> web sites rat their visitors to advertising
+ networks that track users. Of the top 1000 web sites, <a
+
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
+ (as of 5/17/2012) fed their visitors third-party cookies, allowing
other sites to track them</a>.</p>
</li>
- <li id="M201208210">
+ <span
class="removed"><del><strong><li><p>Many</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201208210">
<!--#set var="DATE" value='<small
class="date-tag">2012-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many web sites</em></ins></span> report <span
class="inserted"><ins><em>all their visitors</em></ins></span>
- to <span class="inserted"><ins><em>Google by using</em></ins></span> the
- <span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
-
- <p>A game console is a computer,</strong></del></span> <span
class="inserted"><ins><em>Google Analytics service, which <a
+ <p>Many</em></ins></span> web sites report all their visitors
+ to Google by using the Google Analytics service, which <a
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
- tells Google the IP address</em></ins></span> and <span
class="removed"><del><strong>you can't trust a computer with
- a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>the page that was
visited</a>.</p></em></ins></span>
+ tells Google the IP address and the page that was <span
class="removed"><del><strong>visited.</a></p></strong></del></span>
<span class="inserted"><ins><em>visited</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps
- <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201200000">
+ <li id="M201200000">
<!--#set var="DATE" value='<small
class="date-tag">[2012]</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many web sites try to</em></ins></span> collect <span
class="removed"><del><strong>a wide range</strong></del></span> <span
class="inserted"><ins><em>users' address books (the user's
list</em></ins></span>
- of <span class="removed"><del><strong>data about
their</strong></del></span> <span class="inserted"><ins><em>other people's
phone numbers or email addresses). This violates
+ <p>Many web sites try to collect users' address books (the user's
list
+ of other people's phone numbers or email addresses). This violates
the privacy of those other people.</p>
</li>
@@ -3864,12 +3871,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Pages that contain “Like” buttons <a
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
- enable Facebook to track visitors to those
pages</a>—even</em></ins></span> users <span
class="removed"><del><strong>and their users'
- friends and associates</a>.</p>
-
- <p>Even nastier, they do it through ad
networks</strong></del></span>
- that <span class="removed"><del><strong>merge the data
- collected by various cr…apps and</strong></del></span> <span
class="inserted"><ins><em>don't have Facebook accounts.</p>
+ enable Facebook to track visitors to those pages</a>—even users
+ that don't have Facebook accounts.</p>
</li>
</ul>
@@ -3883,35 +3886,36 @@
<li id="M201811270">
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many web</em></ins></span> sites <span
class="removed"><del><strong>made by different
- companies.</p>
-
- <p>They</strong></del></span> use <span
class="removed"><del><strong>this data</strong></del></span> <span
class="inserted"><ins><em>JavaScript code <a
-
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"></em></ins></span>
- to <span class="removed"><del><strong>manipulate
people</strong></del></span> <span class="inserted"><ins><em>snoop on
information that users have typed into a
- form but not sent</a>, in order</em></ins></span> to <span
class="removed"><del><strong>buy things, and hunt</strong></del></span> <span
class="inserted"><ins><em>learn their identity. Some are <a
+ <p>Many web sites use JavaScript code <a
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
+ to snoop on information that users have typed into a
+ form but not sent</a>, in order to learn their identity. Some are
<a
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege">
- getting sued</a></em></ins></span> for <span
class="removed"><del><strong>“whales” who can be led to spend a
lot</strong></del></span> <span class="inserted"><ins><em>this.</p>
+ getting sued</a> for this.</p>
- <p>The chat facilities</em></ins></span> of <span
class="removed"><del><strong>money. They
- also</strong></del></span> <span class="inserted"><ins><em>some customer
services</em></ins></span> use <span class="removed"><del><strong>a back
door</strong></del></span> <span class="inserted"><ins><em>the same sort of
- malware</em></ins></span> to <span
class="removed"><del><strong>manipulate</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>The chat facilities of some customer services use the same sort of
+ malware to <a
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
- read what</em></ins></span> the <span class="removed"><del><strong>game
play for specific players.</p>
-
- <p>While</strong></del></span> <span
class="inserted"><ins><em>user is typing before it is
posted</a>.</p>
+ read what the user is typing before it is
posted</a>.</p></em></ins></span>
</li>
- <li id="M201807190">
+ <span
class="removed"><del><strong><li><p>Many</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201807190">
<!--#set var="DATE" value='<small
class="date-tag">2018-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
- JavaScript on its web site to give other companies personal data on
- its customers</a>.</p>
+ JavaScript on its</em></ins></span> web <span
class="removed"><del><strong>sites try</strong></del></span> <span
class="inserted"><ins><em>site</em></ins></span> to <span
class="removed"><del><strong>collect users' address books (the
+ user's list of other people's phone numbers or email addresses).
+ This violates the privacy of those</strong></del></span> <span
class="inserted"><ins><em>give</em></ins></span> other <span
class="removed"><del><strong>people.</p></strong></del></span> <span
class="inserted"><ins><em>companies personal data on
+ its customers</a>.</p></em></ins></span>
</li>
- <li id="M201712300">
+ <span class="removed"><del><strong><li><p><a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
+ Microsoft SkyDrive allows</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201712300">
<!--#set var="DATE" value='<small
class="date-tag">2017-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Some JavaScript malware <a
@@ -3923,234 +3927,181 @@
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Some websites send
- JavaScript code to collect all</em></ins></span> the <span
class="removed"><del><strong>article describes gratis games, games that cost
money</strong></del></span> <span class="inserted"><ins><em>user's input, <a
-
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which</em></ins></span>
- can <span class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>then be used to reproduce</em></ins></span> the <span
class="removed"><del><strong>same tactics.</p></strong></del></span>
<span class="inserted"><ins><em>whole session</a>.</p>
+ JavaScript code to collect all</em></ins></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>user's input, <a
+
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
+ can then be used</em></ins></span> to <span
class="removed"><del><strong>directly examine users'
data</a>.</p></strong></del></span> <span
class="inserted"><ins><em>reproduce the whole session</a>.</p>
<p>If you use LibreJS, it will block that malicious JavaScript
code.</p></em></ins></span>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareOnTheWeb
--></strong></del></span>
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareOnTheWeb">Spyware on the
Web</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInFlash">Flash</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareOnTheWeb">#SpywareOnTheWeb</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInFlash">#SpywareInFlash</a>)</span></em></ins></span>
+<span class="inserted"><ins><em><div class="big-subsection">
+ <h4 id="SpywareInFlash">Flash</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
-<p>In addition, many</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201310110">
<!--#set var="DATE" value='<small
class="date-tag">2013-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Flash and JavaScript are used for <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices</a> to identify users.</p>
+ “fingerprinting” devices</a></em></ins></span> to <span
class="removed"><del><strong>place new items on top under each
subsection</strong></del></span> <span class="inserted"><ins><em>identify
users.</p>
</li>
<li id="M201003010">
<!--#set var="DATE" value='<small
class="date-tag">2010-03</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Flash Player's <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+ <span class="inserted"><ins><em><p>Flash Player's <a
href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/">
- cookie feature helps</em></ins></span> web sites <span
class="removed"><del><strong>spy on their visitors. Web sites are not
- programs, so it</strong></del></span> <span class="inserted"><ins><em>track
visitors</a>.</p>
+ cookie feature helps web sites track visitors</a>.</p>
</li>
-</ul>
+</ul></em></ins></span>
<div class="big-subsection">
- <h4 id="SpywareInChrome">Chrome</h4>
+ <h4 <span class="removed"><del><strong>id="SpywareInChrome">Spyware in
Chrome</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInChrome">Chrome</h4></em></ins></span>
<span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>Google</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201906220">
<!--#set var="DATE" value='<small
class="date-tag">2019-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google Chrome is an</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/network-services-arent-free-or-nonfree.html">
- makes no sense</strong></del></span>
+ <p>Google</em></ins></span> Chrome <span
class="removed"><del><strong>contains a key logger that</strong></del></span>
<span class="inserted"><ins><em>is an</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
+ sends Google every URL typed in</a>, one key
at</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/">
instrument of surveillance</a>. It lets thousands of trackers invade
- users' computers and report the sites they visit</em></ins></span> to
<span class="removed"><del><strong>call</strong></del></span> <span
class="inserted"><ins><em>advertising and
- data companies, first of all to Google. Moreover, if users have a
- Gmail account, Chrome automatically logs</em></ins></span> them <span
class="removed"><del><strong>“free” or
“proprietary”</a>,
- but</strong></del></span> <span class="inserted"><ins><em>in
to</em></ins></span> the <span class="inserted"><ins><em>browser for
+ users' computers and report the sites they visit to advertising and
+ data companies, first of all to Google. Moreover, if users
have</em></ins></span> a <span class="removed"><del><strong>time.</p>
+ </li>
+
+ <li><p>Google</strong></del></span>
+ <span class="inserted"><ins><em>Gmail account,</em></ins></span> Chrome
<span class="removed"><del><strong>includes</strong></del></span> <span
class="inserted"><ins><em>automatically logs them in to the browser for
more convenient profiling. On Android, Chrome also reports their
location to Google.</p>
- <p>The best way to escape</em></ins></span> surveillance is <span
class="removed"><del><strong>an abuse all the same.</p>
-
-<ul>
-
- <li><p>When</strong></del></span> <span
class="inserted"><ins><em>to switch to <a
- href="/software/icecat/">IceCat</a>,</em></ins></span> a <span
class="removed"><del><strong>page uses Disqus</strong></del></span> <span
class="inserted"><ins><em>modified version of Firefox
+ <p>The best way to escape surveillance is to switch to <a
+ href="/software/icecat/">IceCat</a>,</em></ins></span> a <span
class="removed"><del><strong>module</strong></del></span> <span
class="inserted"><ins><em>modified version of Firefox
with several changes to protect users' privacy.</p>
</li>
<li id="M201704131">
<!--#set var="DATE" value='<small
class="date-tag">2017-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Low-priced Chromebooks</em></ins></span> for
- <span class="removed"><del><strong>comments,</strong></del></span> <span
class="inserted"><ins><em>schools are</em></ins></span> <a <span
class="removed"><del><strong>href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">the
- proprietary Disqus software loads a Facebook software package
into</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
+ <p>Low-priced Chromebooks for schools are <a
+ href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
collecting far more data on students than is necessary, and store
- it indefinitely</a>. Parents and students complain
about</em></ins></span> the <span
class="removed"><del><strong>browser</strong></del></span> <span
class="inserted"><ins><em>lack</em></ins></span>
- of <span class="removed"><del><strong>every anonymous visitor
to</strong></del></span> <span class="inserted"><ins><em>transparency
on</em></ins></span> the <span class="removed"><del><strong>page, and
makes</strong></del></span> <span class="inserted"><ins><em>part of
both</em></ins></span> the
- <span class="removed"><del><strong>page's URL available to
Facebook</a>.
- </p></li>
-
- <li><p>Online sales, with tracking</strong></del></span> <span
class="inserted"><ins><em>educational services</em></ins></span> and <span
class="removed"><del><strong>surveillance</strong></del></span> <span
class="inserted"><ins><em>the
- schools, the difficulty</em></ins></span> of <span
class="removed"><del><strong>customers, <a
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
- businesses to show different people different prices</a>.
Most</strong></del></span> <span class="inserted"><ins><em>opting
out</em></ins></span> of <span class="inserted"><ins><em>these services,
and</em></ins></span> the <span
class="removed"><del><strong>tracking</strong></del></span> <span
class="inserted"><ins><em>lack
+ it indefinitely</a>. Parents and students complain about the lack
+ of transparency on the part of both the educational services and the
+ schools, the difficulty of opting out of these services, and the lack
of proper privacy policies, among other things.</p>
- <p>But complaining</em></ins></span> is <span
class="removed"><del><strong>done by recording interactions with
- servers, but proprietary software contributes.</p>
- </li>
-
- <li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
- Baidu's Japanese-input</strong></del></span> <span
class="inserted"><ins><em>not sufficient. Parents, students</em></ins></span>
and <span class="removed"><del><strong>Chinese-input apps spy on
users.</a></p>
- </li>
-
- <li><p>Pages</strong></del></span> <span
class="inserted"><ins><em>teachers
- should realize</em></ins></span> that <span
class="removed"><del><strong>contain “Like” buttons
- <a
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
- enable Facebook</strong></del></span> <span
class="inserted"><ins><em>the software Google uses</em></ins></span> to <span
class="removed"><del><strong>track visitors</strong></del></span> <span
class="inserted"><ins><em>spy on students is
- nonfree, so they can't verify what it really does. The only remedy
is</em></ins></span>
- to <span class="removed"><del><strong>those pages</a>—even
- users that don't have Facebook accounts.</p>
- </li>
-
- <li><p>Many web sites rat their visitors</strong></del></span>
<span class="inserted"><ins><em>persuade school officials</em></ins></span> to
<span class="removed"><del><strong>advertising networks that track
- users. Of the top 1000 web sites,</strong></del></span> <a
- <span
class="removed"><del><strong>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
- (as of 5/17/2012) fed their visitors third-party cookies, allowing other
- sites to track them</a>.</p>
- </li>
-
- <li><p>Many web sites report all</strong></del></span> <span
class="inserted"><ins><em>href="/education/edu-schools.html">
- exclusively use free software</a> for both education and school
+ <p>But complaining is not sufficient. Parents, students and teachers
+ should realize</em></ins></span> that <span class="inserted"><ins><em>the
software Google uses to spy on students is
+ nonfree, so they can't verify what it really does. The only remedy is
+ to persuade school officials to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
+ activates microphones</strong></del></span> <span
class="inserted"><ins><em>href="/education/edu-schools.html">
+ exclusively use free software</a> for both
education</em></ins></span> and <span class="removed"><del><strong>transmits
audio</strong></del></span> <span class="inserted"><ins><em>school
administration. If the school is run locally, parents and teachers
- can mandate</em></ins></span> their <span
class="removed"><del><strong>visitors</strong></del></span> <span
class="inserted"><ins><em>representatives at the School Board</em></ins></span>
to <span class="removed"><del><strong>Google by using</strong></del></span>
<span class="inserted"><ins><em>refuse</em></ins></span> the <span
class="removed"><del><strong>Google Analytics service, which
- <a
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
- tells Google</strong></del></span>
- <span class="inserted"><ins><em>budget unless</em></ins></span> the <span
class="removed"><del><strong>IP address and</strong></del></span> <span
class="inserted"><ins><em>school initiates a switch to free software. If
+ can mandate their representatives at the School Board</em></ins></span> to
<span class="removed"><del><strong>its
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>refuse the
+ budget unless the school initiates a switch to free software. If
education is run nation-wide, they need to persuade legislators
(e.g., through free software organizations, political parties,
- etc.) to migrate</em></ins></span> the <span
class="removed"><del><strong>page that was
visited.</a></p></strong></del></span> <span
class="inserted"><ins><em>public schools to free
software.</p></em></ins></span>
+ etc.) to migrate the public schools to free
software.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Many web sites
try</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Google</strong></del></span>
<span class="inserted"><ins><em><li id="M201507280">
<!--#set var="DATE" value='<small
class="date-tag">2015-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google Chrome makes it easy for an extension</em></ins></span> to
<span class="removed"><del><strong>collect users' address books (the
- user's list of other people's phone numbers or email addresses).
- This violates</strong></del></span> <span class="inserted"><ins><em>do
<a
+ <p>Google</em></ins></span> Chrome makes it easy for an extension to
do <a
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
- snooping on</em></ins></span> the <span
class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>user's browsing</a>, and many</em></ins></span>
of <span class="removed"><del><strong>those other
people.</p></strong></del></span> <span class="inserted"><ins><em>them do
so.</p></em></ins></span>
+ snooping on the user's browsing</a>, and many of them do
so.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
- Microsoft SkyDrive allows the NSA</strong></del></span>
-
<span class="inserted"><ins><em><li id="M201506180">
<!--#set var="DATE" value='<small
class="date-tag">2015-06</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Google Chrome includes a module that <a
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
- activates microphones and transmits audio</em></ins></span> to <span
class="removed"><del><strong>directly examine users'
data</a>.</p></strong></del></span> <span
class="inserted"><ins><em>its servers</a>.</p></em></ins></span>
+ activates microphones and transmits audio to its
servers</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-<!-- WEBMASTERS: make sure to place new items</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201308040">
+ <li id="M201308040">
<!--#set var="DATE" value='<small
class="date-tag">2013-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Google Chrome <a
href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/">
- spies</em></ins></span> on <span class="removed"><del><strong>top under
each subsection</strong></del></span> <span class="inserted"><ins><em>browser
history, affiliations</a>, and other installed
+ spies on browser history, affiliations</a>, and other installed
software.</p>
</li>
<li id="M200809060">
<!--#set var="DATE" value='<small
class="date-tag">2008-09</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><div class="big-subsection">
- <h4 id="SpywareInChrome">Spyware in Chrome</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
-</div>
-
-<ul>
- <li><p>Google</strong></del></span>
- <span class="inserted"><ins><em><p>Google</em></ins></span> Chrome
contains a key logger that <a <span
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/"></em></ins></span>
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Google Chrome contains a key logger that <a
+
href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/">
sends Google every URL typed in</a>, one key at a time.</p>
- </li>
-
- <span class="removed"><del><strong><li><p>Google Chrome
includes</strong></del></span>
-<span class="inserted"><ins><em></ul>
+ </li></em></ins></span>
+</ul>
-<div class="big-section">
- <h3 id="SpywareInNetworks">Spyware in Networks</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInNetworks">#SpywareInNetworks</a>)</span>
+<div <span class="removed"><del><strong>class="big-subsection">
+ <h4 id="SpywareInFlash">Spyware</strong></del></span> <span
class="inserted"><ins><em>class="big-section">
+ <h3 id="SpywareInNetworks">Spyware</em></ins></span> in <span
class="removed"><del><strong>Flash</h4></strong></del></span> <span
class="inserted"><ins><em>Networks</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInFlash">#SpywareInFlash</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInNetworks">#SpywareInNetworks</a>)</span></em></ins></span>
</div>
-<div style="clear: left;"></div>
+
+<span class="removed"><del><strong><ul>
+ <li><p>Flash Player's</strong></del></span>
+<span class="inserted"><ins><em><div style="clear: left;"></div>
<ul class="blurbs">
- <li id="M202012250">
- <!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
+ <li id="M202102160">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The HonorLock online exam
- proctoring program is</em></ins></span> a <span
class="removed"><del><strong>module</strong></del></span> <span
class="inserted"><ins><em>surveillance tool</em></ins></span> that <a <span
class="removed"><del><strong>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
- activates microphones</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps">tracks
- students</em></ins></span> and <span
class="removed"><del><strong>transmits audio to its servers</a>.</p>
+ <p>Google has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
+ cookie feature helps web sites track
visitors</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16">handed
+ over personal data of Indian protesters and activists to Indian
+ police</a> which leaded to their arrest. The cops requested the IP
+ address and the location where a document was created and with those
+ information, they identified protesters and
activists.</p></em></ins></span>
</li>
- <li><p>Google Chrome makes it easy for</strong></del></span>
<span class="inserted"><ins><em>collects data</a> such as face, driving
license, and
+ <span
class="removed"><del><strong><li><p>Flash</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202012250">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The HonorLock online exam
+ proctoring program</em></ins></span> is <span
class="removed"><del><strong>also used</strong></del></span> <span
class="inserted"><ins><em>a surveillance tool that <a
+
href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps">tracks
+ students and collects data</a> such as face, driving license, and
network information, among others, in blatant violation of students'
privacy.</p>
- <p>Preventing students from cheating should not be</em></ins></span>
an <span class="removed"><del><strong>extension to do <a
-
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
- snooping</strong></del></span> <span class="inserted"><ins><em>excuse for
- running malware/spyware</em></ins></span> on <span
class="removed"><del><strong>the user's
browsing</a>,</strong></del></span> <span class="inserted"><ins><em>their
computers,</em></ins></span> and <span
class="removed"><del><strong>many</strong></del></span> <span
class="inserted"><ins><em>it's good that students
+ <p>Preventing students from cheating should not be an
excuse</em></ins></span> for
+ <span class="inserted"><ins><em>running malware/spyware on their
computers, and it's good that students
are protesting. But their petitions overlook a crucial issue, namely,
- the injustice</em></ins></span> of <span class="removed"><del><strong>them
do so.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInFlash">Spyware</strong></del></span> <span
class="inserted"><ins><em>being forced to run nonfree
software</em></ins></span> in <span
class="removed"><del><strong>Flash</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
-</div>
-
-<ul>
- <li><p>Flash Player's
- <a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
- cookie feature helps web sites track
visitors</a>.</p></strong></del></span> <span
class="inserted"><ins><em>order to
- get an education.</p></em></ins></span>
+ the injustice of being forced to run nonfree software in order to
+ get an education.</p>
</li>
- <span
class="removed"><del><strong><li><p>Flash</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M202009070">
+ <li id="M202009070">
<!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>While the world</em></ins></span> is <span
class="removed"><del><strong>also used for</strong></del></span> <span
class="inserted"><ins><em>still
+ <p>While the world is still
struggling with COVID-19 coronavirus, many</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
“fingerprinting” devices </a></strong></del></span>
<span
class="inserted"><ins><em>href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/">people
@@ -4320,7 +4271,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/03/16 17:33:27 $
+$Date: 2021/04/11 13:04:34 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.398
retrieving revision 1.399
diff -u -b -r1.398 -r1.399
--- proprietary-surveillance.it.po 16 Mar 2021 17:33:28 -0000 1.398
+++ proprietary-surveillance.it.po 11 Apr 2021 13:04:34 -0000 1.399
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-03-16 17:25+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -5454,6 +5454,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The HonorLock online exam proctoring program is a surveillance tool that <a "
"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.260
retrieving revision 1.261
diff -u -b -r1.260 -r1.261
--- proprietary-surveillance.ja-diff.html 16 Mar 2021 17:33:28 -0000
1.260
+++ proprietary-surveillance.ja-diff.html 11 Apr 2021 13:04:34 -0000
1.261
@@ -1184,9 +1184,11 @@
<li id="M201409220">
<!--#set var="DATE" value='<small
class="date-tag">2014-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apple can, and regularly does, <a
+ <p>Apple can,</em></ins></span> and <span
class="inserted"><ins><em>regularly does, <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the state</a>.</p>
+ remotely extract some data from iPhones for</em></ins></span> the <span
class="removed"><del><strong>vibration frequency.</p>
+
+ <p>Note</strong></del></span> <span
class="inserted"><ins><em>state</a>.</p>
<p>This may have improved with <a
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">
@@ -1211,8 +1213,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The <a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing
is,</em></ins></span> and
- <span class="inserted"><ins><em>get other info too.</p>
+ iBeacon</a> lets stores determine exactly where the iThing is, and
+ get other info too.</p>
</li>
<li id="M201312300">
@@ -3075,20 +3077,13 @@
turn it into a listening device</a> for them.</p>
<p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>vibration
frequency.</p>
-
- <p>Note</strong></del></span> <span class="inserted"><ins><em>US
- told Amazon to do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
- standard with which manufacturers</strong></del></span> <span
class="inserted"><ins><em>product in that country,
- do you think Amazon</em></ins></span> would <span
class="removed"><del><strong>make statements about
- their products, rather than free software which users can check
- and change.</p>
- </li>
- <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>have the moral fiber to say no?</p>
-
- <p><small>(These crackers are probably hackers too, but
please</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
- <span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
- “hacking”</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>mean “breaking
security”</a>.)</small></p>
+ easier for Amazon. And if some government such as China or the US
+ told Amazon to do this, or cease to sell the product in that country,
+ do you think Amazon would have the moral fiber to say no?</p>
+
+ <p><small>(These crackers are probably hackers too, but please
<a
+ href="https://stallman.org/articles/on-hacking.html"> don't use
+ “hacking” to mean “breaking
security”</a>.)</small></p>
</li>
<li id="M201804140">
@@ -3096,96 +3091,82 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A medical insurance company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops</em></ins></span> on
<span class="removed"><del><strong>children and
adults.</a>.</p></strong></del></span> <span
class="inserted"><ins><em>its user by
- sending usage data back over the
Internet</a>.</p></em></ins></span>
+ offers a gratis electronic toothbrush that snoops on its user by
+ sending usage data back over the Internet</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareAtLowLevel</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201706204">
+ <li id="M201706204">
<!--#set var="DATE" value='<small
class="date-tag">2017-06</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>Lots of “smart”
products are designed <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Lots of “smart” products are designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen</em></ins></span> to <span class="removed"><del><strong>place new
items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
+ listen to everyone in</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed
response:</strong></del></span> <span class="inserted"><ins><em>house, all the
time</a>.</p>
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>everyone</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
-
-<ul>
-<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note that</strong></del></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used
did</strong></del></span> <span class="inserted"><ins><em>house, all the
time</a>.</p>
-
- <p>Today's technological practice does</em></ins></span> not <span
class="removed"><del><strong>affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>include
any way of making</em></ins></span>
- a <span class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>device that can
obey your voice commands without potentially spying
- on you. Even if it</em></ins></span> is <span
class="removed"><del><strong>not really
-clean since</strong></del></span> <span class="inserted"><ins><em>air-gapped,
it could be saving up records
- about you for later examination.</p>
+ <p>Today's technological practice does not include any way of
making</em></ins></span>
+ a <span class="removed"><del><strong>labeling
+ standard with which manufacturers would make statements about
+ their products, rather than free software which
users</strong></del></span> <span class="inserted"><ins><em>device
that</em></ins></span> can <span class="removed"><del><strong>check
+ and change.</p></strong></del></span> <span
class="inserted"><ins><em>obey your voice commands without potentially spying
+ on you. Even if it is air-gapped, it could be saving up records
+ about you for later examination.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
- <li id="M201407170">
+ <span class="inserted"><ins><em><li id="M201407170">
<!--#set var="DATE" value='<small
class="date-tag">2014-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork</strong></del></span>
+ <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
<span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot of
data about the user</a>.</p>
</li>
<li id="M201310260">
<!--#set var="DATE" value='<small
class="date-tag">2013-10</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p><a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>their
renters</a>.</p>
+ Rent-to-own computers were programmed</em></ins></span> to spy on <span
class="removed"><del><strong>children and
adults.</a>.</p></strong></del></span> <span
class="inserted"><ins><em>their renters</a>.</p></em></ins></span>
</li>
-</ul></em></ins></span>
+</ul>
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareAtWork">Spyware at
Work</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareOnWearables">Wearables</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtWork">#SpywareAtWork</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnWearables">#SpywareOnWearables</a>)</span></em></ins></span>
+<span class="removed"><del><strong><!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
+<div style="clear: left;"></div></strong></del></span>
-<ul>
- <li><p>Investigation
- Shows</strong></del></span>
+
+<div class="big-subsection">
+ <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareOnWearables">Wearables</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnWearables">#SpywareOnWearables</a>)</span></em></ins></span>
+</div>
+
+<span class="removed"><del><strong><ul>
+<li><p></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201807260">
<!--#set var="DATE" value='<small
class="date-tag">2018-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tommy Hilfiger clothing</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically,</strong></del></span>
+ <p>Tommy Hilfiger clothing</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
+Note that</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
monitor how often people wear it</a>.</p>
- <p>This will teach the sheeple to find</em></ins></span> it <span
class="inserted"><ins><em>normal that companies
+ <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a “clean” Windows install is not really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>sheeple</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each
subsection</strong></del></span> <span class="inserted"><ins><em>find it normal
that companies
monitor every aspect of what they do.</p>
</li>
</ul>
@@ -3196,18 +3177,30 @@
<ul class="blurbs">
<li id="M202009100">
<!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Internet-enabled watches with proprietary software
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows</strong></del></span>
+ <span class="inserted"><ins><em><p>Internet-enabled watches with
proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they have a lot of security flaws. They <a
-
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
+ privacy. In addition, they have a lot of security flaws.
They</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
permit security breakers (and unauthorized people) to access</a> the
watch.</p>
<p>Thus, ill-intentioned unauthorized people</em></ins></span> can
<span class="removed"><del><strong>collect</strong></del></span> <span
class="inserted"><ins><em>intercept communications between parent and child and
spoof messages to and from</em></ins></span> the <span
class="removed"><del><strong>emails of members of
Parliament</strong></del></span> <span class="inserted"><ins><em>watch,
possibly endangering the child.</p>
- <p><small>(Note that</em></ins></span> this <span
class="removed"><del><strong>way, because they pass it through
Microsoft.</p></li>
-
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>article misuses the word “<a
+ <p><small>(Note that</em></ins></span> this <span
class="removed"><del><strong>way, because they pass</strong></del></span> <span
class="inserted"><ins><em>article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
to mean “crackers.”)</small></p>
</li>
@@ -3217,10 +3210,12 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A very cheap “smart watch” comes with an Android app
<a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects to an unidentified site</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span
class="inserted"><ins><em>China</a>.</p>
+ that connects to an unidentified site in China</a>.</p>
<p>The article says this is a back door, but that could be a
- misunderstanding. However, it is certainly surveillance, at
least.</p>
+ misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>is certainly surveillance, at least.</p>
</li>
<li id="M201407090">
@@ -3241,18 +3236,28 @@
</div>
<span class="removed"><del><strong><ul>
- <li><p>Spyware in Skype:</strong></del></span>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype
+ <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
+ </li>
+</ul>
+
+
+
+<!-- #SpywareOnTheRoad</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202008181">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>New Toyotas will</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/">
- upload data to AWS to help create custom insurance premiums</a>
- based on driver behaviour.</p>
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>New Toyotas will <a
+ href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/">
+ upload data</em></ins></span> to <span class="removed"><del><strong>place
new items</strong></del></span> <span class="inserted"><ins><em>AWS to help
create custom insurance premiums</a>
+ based</em></ins></span> on <span class="removed"><del><strong>top under
each subsection</strong></del></span> <span class="inserted"><ins><em>driver
behaviour.</p>
<p>Before you buy a “connected” car, make sure you can
disconnect its cellular antenna and its GPS antenna. If you want
@@ -3262,33 +3267,6 @@
<li id="M201912171">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Most modern cars now</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
- record and send various kinds of data to the manufacturer</a>. For
- the user, access to the data is nearly impossible, as it involves
- cracking the car's computer, which is always hidden and running with
- proprietary software.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
-
-
-
-<!-- #SpywareOnTheRoad</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201903290">
- <!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>Tesla cars collect lots of
personal data, and <a
-
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
- when they go</em></ins></span> to <span class="removed"><del><strong>place
new items on top under each subsection</strong></del></span> <span
class="inserted"><ins><em>a junkyard the driver's personal data goes with
- them</a>.</p>
- </li>
-
- <li id="M201902011">
- <!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE"</em></ins></span> -->
<span class="removed"><del><strong><div class="big-section">
@@ -3303,30 +3281,20 @@
</div>
<ul>
- <li></strong></del></span>
- <p>The <span class="removed"><del><strong>Nest Cam
“smart” camera is</strong></del></span> <span
class="inserted"><ins><em>FordPass Connect feature of some Ford vehicles
has</em></ins></span> <a
+ <li>
+ <p>The Nest Cam “smart” camera is</strong></del></span>
+ <span class="inserted"><ins><em><p>Most modern cars
now</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access to the internal car network</a>. It is
constantly
- connected to the cellular phone network and sends Ford a lot of data,
- including car location. This feature operates</em></ins></span> even when
the <span class="removed"><del><strong>“owner” switches it
“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>ignition
- key is removed, and users report that they can't disable it.</p>
-
- <p>If you own one of these cars, have you succeeded in breaking the
- connectivity by disconnecting</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using</strong></del></span> <span
class="inserted"><ins><em>cellular modem, or wrapping the
- antenna in aluminum foil?</p>
- </li>
-
- <li id="M201811300">
- <!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>In China,</em></ins></span> it <span class="inserted"><ins><em>is
mandatory for electric
- cars</em></ins></span> to <span class="removed"><del><strong>outsmart
- you.</p>
+ watching</a>, even when</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
+ record and send various kinds of data to</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. For</em></ins></span>
+ the <span class="removed"><del><strong>manufacturer</strong></del></span>
<span class="inserted"><ins><em>user, access to the data</em></ins></span> is
<span class="removed"><del><strong>using</strong></del></span> <span
class="inserted"><ins><em>nearly impossible, as</em></ins></span> it <span
class="removed"><del><strong>to outsmart
+ you.</p></strong></del></span> <span
class="inserted"><ins><em>involves
+ cracking the car's computer, which is always hidden and running with
+ proprietary software.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
<h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
@@ -3334,14 +3302,42 @@
</div>
<ul>
- <li><p>E-books can contain Javascript code,
- and</strong></del></span> <span class="inserted"><ins><em>be equipped with
a terminal that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
+ <li><p>E-books can contain Javascript code,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201903290">
+ <!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Tesla cars collect lots of personal data,</em></ins></span> and
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
+ when they go to a junkyard the driver's personal data goes with
+ them</a>.</p></em></ins></span>
</li>
- <li><p>Spyware in many e-readers—not only the
- Kindle:</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902011">
+ <!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The FordPass Connect feature of some Ford vehicles has <a
+
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ near-complete access to the internal car network</a>. It is
constantly
+ connected to the cellular phone network and sends Ford a lot of data,
+ including car location. This feature operates even when the ignition
+ key is removed, and users report that they can't disable it.</p>
+
+ <p>If you own one of these cars, have you
succeeded</em></ins></span> in <span class="removed"><del><strong>many
e-readers—not only</strong></del></span> <span
class="inserted"><ins><em>breaking</em></ins></span> the
+ <span class="removed"><del><strong>Kindle:</strong></del></span>
+ <span class="inserted"><ins><em>connectivity by disconnecting the cellular
modem, or wrapping the
+ antenna in aluminum foil?</p>
+ </li>
+
+ <li id="M201811300">
+ <!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>In China, it is mandatory for electric
+ cars to be equipped with a terminal that <a
+ href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
transfers technical data, including car location,
to a government-run platform</a>. In practice,</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they report even which page</strong></del></span>
@@ -3449,15 +3445,16 @@
<p>The case of toll-collection systems, mentioned in this article,
is not really a matter of proprietary surveillance. These systems
are an intolerable invasion of privacy, and should be replaced with
- anonymous payment systems, but the invasion isn't done by malware. The
- other cases mentioned are done by proprietary malware in the <span
class="removed"><del><strong>car.</p></li>
+ anonymous payment systems, but the <span
class="removed"><del><strong>invasion isn't done by malware. The other
+ cases mentioned are done by proprietary malware in the
car.</p></li>
<li><p>Tesla cars allow the company to extract data remotely and
determine the car's location at any time. (See
<a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
Section 2, paragraphs b and c.</a>). The company says it doesn't
store this information, but if the state orders it to get the data
- and hand it over, the state can store it.</p>
+ and hand it over,</strong></del></span> <span
class="inserted"><ins><em>invasion isn't done by malware. The
+ other cases mentioned are done by proprietary malware in</em></ins></span>
the <span class="removed"><del><strong>state can store it.</p>
</li>
</ul>
@@ -3483,46 +3480,47 @@
<span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInVR">#SpywareInVR</a>)</span></em></ins></span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li><p>More or less all “smart”
TVs</strong></del></span>
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202008182">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Oculus headsets</em></ins></span> <a <span
class="removed"><del><strong>href="
-
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
-
- <p>The report was as of 2014, but we don't expect this has got
better.</p>
-
- <p>This shows that laws requiring products</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
- users</em></ins></span> to <span class="removed"><del><strong>get users'
formal
- consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent? Probably the
TV</strong></del></span> <span class="inserted"><ins><em>identify themselves to
Facebook</a>. This</em></ins></span> will <span
class="removed"><del><strong>say, “Without your
consent</strong></del></span> <span class="inserted"><ins><em>give Facebook
- free rein</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>pervasively snoop on Oculus users.</p>
+ <p>Oculus headsets <a
+
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
+ users</em></ins></span> to <span class="removed"><del><strong>me and
+said, “Didn't I see you</strong></del></span> <span
class="inserted"><ins><em>identify themselves to Facebook</a>. This will
give Facebook
+ free rein to pervasively snoop</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
+don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>Oculus users.</p>
</li>
<li id="M201612230">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>VR equipment, measuring every slight motion,
- creates</em></ins></span> the <span class="removed"><del><strong>TV will
- not work.”</p>
+ creates</em></ins></span> the <span class="removed"><del><strong>other
way.” Evidently that was
+before Amazon “smart” TVs.</p>
- <p>Proper laws would say that TVs are not
allowed</strong></del></span> <span class="inserted"><ins><em>potential for the
most intimate
- surveillance ever. All it takes</em></ins></span> to <span
class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>make this potential real <a
-
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
- software as malicious as many other programs listed in this
- page</a>.</p>
+<ul>
+ <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>potential for the
most intimate
+ surveillance ever. All it takes to make this potential
real</em></ins></span> <a <span class="removed"><del><strong>href="
+
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report was</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
+ software</em></ins></span> as <span class="removed"><del><strong>of 2014,
but we don't expect</strong></del></span> <span
class="inserted"><ins><em>malicious as many other programs listed
in</em></ins></span> this <span class="removed"><del><strong>has got
better.</p>
+
+ <p>This shows that laws requiring products to get users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if a user declines consent? Probably the TV
+ will say, “Without your consent to tracking, the
TV</strong></del></span>
+ <span class="inserted"><ins><em>page</a>.</p>
- <p>You can bet Facebook will implement</em></ins></span> the <span
class="removed"><del><strong>user watches — no exceptions!</p>
+ <p>You can bet Facebook</em></ins></span> will
+ <span class="removed"><del><strong>not work.”</p>
+
+ <p>Proper laws would say that TVs are not allowed to report
what</strong></del></span> <span
class="inserted"><ins><em>implement</em></ins></span> the <span
class="removed"><del><strong>user watches — no exceptions!</p>
</li>
<li><p>Vizio goes</strong></del></span> <span
class="inserted"><ins><em>maximum possible
surveillance on Oculus Rift devices. The moral is, never
trust</em></ins></span> a <span class="removed"><del><strong>step further than
other TV manufacturers</strong></del></span> <span class="inserted"><ins><em>VR
@@ -3561,54 +3559,53 @@
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>As of April 2019, it is</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all users to
- new combined surveillance by default.</p></li>
- <li><p>Some web and TV advertisements play inaudible sounds to be
- picked up by proprietary malware running on other devices in
- range so as</strong></del></span>
+ advertisement with online purchases</a>, exposing all
users</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/">no
- longer possible</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>disable an
- unscrupulous tracking anti-feature</a></em></ins></span> that <span
class="removed"><del><strong>they are nearby. Once your
+ longer possible</em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>disable an
+ unscrupulous tracking anti-feature</a> that <a
+
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
+ users when they follow ping links</a> in Apple Safari, Google Chrome,
+ Opera, Microsoft Edge</em></ins></span> and <span
class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>also in the
upcoming Microsoft Edge that is
+ going</em></ins></span> to be
+ <span class="removed"><del><strong>picked up by proprietary malware
running</strong></del></span> <span
class="inserted"><ins><em>based</em></ins></span> on <span
class="removed"><del><strong>other devices in
+ range so as to determine that they are nearby. Once your
Internet devices are paired with your TV, advertisers can
correlate ads with Web activity, and
- other</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
- </li>
- <li><p>Vizio “smart” TVs
recognize</strong></del></span>
- <span
class="inserted"><ins><em>href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
- users when they follow ping links</a> in Apple Safari, Google Chrome,
- Opera, Microsoft Edge</em></ins></span> and
- <span class="removed"><del><strong><a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people are watching</a>,
- even if it isn't a TV channel.</p></strong></del></span> <span
class="inserted"><ins><em>also in the upcoming Microsoft Edge that is
- going to be based on Chromium.</p></em></ins></span>
+ other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Chromium.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
+ <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and
+ <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people are watching</a>,
+ even if it isn't</strong></del></span>
<span class="inserted"><ins><em><li id="M201901101">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Until 2015, any tweet that listed a geographical
tag</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching and listening all</strong></del></span>
- <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/">
- sent</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>precise GPS location to Twitter's
server</a>. It still
+ <p>Until 2015, any tweet that listed</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p></strong></del></span> <span
class="inserted"><ins><em>geographical tag <a
+
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/">
+ sent the precise GPS location to Twitter's server</a>. It still
contains these GPS locations.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
<span class="inserted"><ins><em><li id="M201805170">
<!--#set var="DATE" value='<small
class="date-tag">2018-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Storyful program</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies</em></ins></span>
- on the <span class="removed"><del><strong>internet</strong></del></span>
<span class="inserted"><ins><em>reporters that use it</a>.</p>
+ <p>The Storyful program</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching and listening all</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies
+ on</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>reporters that use
it</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
- <li id="M201701060">
+ <span class="inserted"><ins><em><li id="M201701060">
<!--#set var="DATE" value='<small
class="date-tag">2017-01</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>When a page uses Disqus
- for comments, the proprietary Disqus software <a
-
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">loads
- a Facebook software package into the browser of every anonymous
visitor</em></ins></span>
+ for comments, the proprietary Disqus software</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">loads
+ a Facebook software package into</em></ins></span> the <span
class="removed"><del><strong>internet</strong></del></span> <span
class="inserted"><ins><em>browser of every anonymous visitor</em></ins></span>
to <span class="removed"><del><strong>another
company, Nuance</a>. Nuance can save it</strong></del></span> <span
class="inserted"><ins><em>the page,</em></ins></span> and <span
class="removed"><del><strong>would then have</strong></del></span> <span
class="inserted"><ins><em>makes the page's URL available</em></ins></span> to
<span class="removed"><del><strong>give it</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
@@ -3624,16 +3621,14 @@
<p>Speech recognition is not to be trusted unless
it</strong></del></span> <span
class="inserted"><ins><em>tracking</em></ins></span> is done by <span
class="removed"><del><strong>free</strong></del></span> <span
class="inserted"><ins><em>recording interactions with servers, but
proprietary</em></ins></span> software <span
class="removed"><del><strong>in your own
computer.</p></strong></del></span> <span
class="inserted"><ins><em>contributes.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Spyware in
- <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports what the user watches,
and</strong></del></span>
+ <span class="removed"><del><strong><li><p>Spyware
in</strong></del></span>
<span class="inserted"><ins><em><li id="M201405140">
<!--#set var="DATE" value='<small
class="date-tag">2014-05</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
- Microsoft SkyDrive allows</em></ins></span> the <span
class="removed"><del><strong>switch</strong></del></span> <span
class="inserted"><ins><em>NSA</em></ins></span> to <span
class="removed"><del><strong>turn this off has no effect. (The
fact</strong></del></span> <span class="inserted"><ins><em>directly examine
users'
+ Microsoft SkyDrive allows the NSA to directly examine users'
data</a>.</p>
</li>
@@ -3641,103 +3636,75 @@
<!--#set var="DATE" value='<small
class="date-tag">2012-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many web sites rat their visitors to advertising
- networks</em></ins></span> that <span class="inserted"><ins><em>track
users. Of</em></ins></span> the
- <span class="removed"><del><strong>transmission reports a 404 error
really means nothing; the server
- could save that data anyway.)</p>
-
- <p>Even worse, it</strong></del></span> <span
class="inserted"><ins><em>top 1000 web sites,</em></ins></span> <a <span
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on</strong></del></span>
+ networks that track users. Of the top 1000 web sites,</em></ins></span>
<a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a> reports what</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
- (as of 5/17/2012) fed their visitors third-party cookies,
allowing</em></ins></span>
- other <span class="removed"><del><strong>devices on the user's local
network.</a></p>
-
- <p>LG later said it had installed a patch</strong></del></span>
<span class="inserted"><ins><em>sites</em></ins></span> to <span
class="removed"><del><strong>stop this, but any product
- could spy this way.</p>
-
- <p>Meanwhile, LG TVs</strong></del></span> <span
class="inserted"><ins><em>track them</a>.</p>
+ (as of 5/17/2012) fed their visitors third-party cookies, allowing
+ other sites to track them</a>.</p>
</li>
<li id="M201208210">
<!--#set var="DATE" value='<small
class="date-tag">2012-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many web sites report all their visitors
- to Google by using the Google Analytics service, which</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
- tells Google the IP address and the page that was
visited</a>.</p>
+ to Google by using</em></ins></span> the <span
class="removed"><del><strong>user watches,</strong></del></span> <span
class="inserted"><ins><em>Google Analytics service, which <a
+
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
+ tells Google the IP address</em></ins></span> and the <span
class="removed"><del><strong>switch</strong></del></span> <span
class="inserted"><ins><em>page that was visited</a>.</p>
</li>
<li id="M201200000">
<!--#set var="DATE" value='<small
class="date-tag">[2012]</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many web sites try to collect users' address books (the user's
list</em></ins></span>
- of <span class="removed"><del><strong>spying
anyway</a>.</p></strong></del></span> <span
class="inserted"><ins><em>other people's phone numbers or email addresses).
This violates
- the privacy of those other people.</p></em></ins></span>
+ <p>Many web sites try</em></ins></span> to <span
class="removed"><del><strong>turn this off has no effect. (The
fact</strong></del></span> <span class="inserted"><ins><em>collect users'
address books (the user's list
+ of other people's phone numbers or email addresses). This violates
+ the privacy of those other people.</p>
</li>
- <span class="removed"><del><strong><li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they
wanted</strong></del></span>
- <span class="inserted"><ins><em><li id="M201110040">
+ <li id="M201110040">
<!--#set var="DATE" value='<small
class="date-tag">2011-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Pages that contain “Like” buttons <a
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
- enable Facebook to track visitors</em></ins></span> to <span
class="removed"><del><strong>record.</a></p></strong></del></span>
<span class="inserted"><ins><em>those pages</a>—even users
- that don't have Facebook accounts.</p></em></ins></span>
+ enable Facebook to track visitors to those pages</a>—even users
+ that don't have Facebook accounts.</p>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareAtPlay
--></strong></del></span>
-
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareAtPlay">Spyware at
Play</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInJavaScript">JavaScript</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtPlay">#SpywareAtPlay</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInJavaScript">#SpywareInJavaScript</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 id="SpywareInJavaScript">JavaScript</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInJavaScript">#SpywareInJavaScript</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
-
-<ul>
- <li><p>Many</strong></del></span>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201811270">
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many web sites use JavaScript code</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles</strong></del></span>
- <span
class="inserted"><ins><em>href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- to</em></ins></span> snoop on <span
class="removed"><del><strong>their</strong></del></span> <span
class="inserted"><ins><em>information that</em></ins></span> users <span
class="removed"><del><strong>and report</strong></del></span> <span
class="inserted"><ins><em>have typed into a
- form but not sent</a>, in order</em></ins></span> to <span
class="inserted"><ins><em>learn their identity. Some are <a
+ <p>Many web sites use JavaScript code <a
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
+ to snoop on information</em></ins></span> that <span
class="inserted"><ins><em>users have typed into a
+ form but not sent</a>, in order to learn their identity. Some are
<a
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege">
getting sued</a> for this.</p>
<p>The chat facilities of some customer services
use</em></ins></span> the
- <span class="removed"><del><strong>internet</a>—
even</strong></del></span> <span class="inserted"><ins><em>same sort of
+ <span class="removed"><del><strong>transmission reports a 404 error
really means nothing;</strong></del></span> <span
class="inserted"><ins><em>same sort of
malware to <a
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
- read</em></ins></span> what <span class="removed"><del><strong>their users
weigh.</p>
+ read what</em></ins></span> the <span class="removed"><del><strong>server
+ could save that data anyway.)</p>
- <p>A game console</strong></del></span> <span
class="inserted"><ins><em>the user</em></ins></span> is <span
class="removed"><del><strong>a computer, and you can't trust a computer with
- a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>typing before it is
posted</a>.</p></em></ins></span>
+ <p>Even worse,</strong></del></span> <span
class="inserted"><ins><em>user is typing before</em></ins></span> it <span
class="inserted"><ins><em>is posted</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201807190">
+ <li id="M201807190">
<!--#set var="DATE" value='<small
class="date-tag">2018-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>British Airways used</em></ins></span> <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data about their users and their users'
- friends and associates</a>.</p>
-
- <p>Even nastier, they do it through ad networks that merge the data
- collected by various cr…apps and sites made by different
- companies.</p>
-
- <p>They use this data</strong></del></span>
+ <p>British Airways used</em></ins></span> <a <span
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
- JavaScript on its web site</em></ins></span> to <span
class="removed"><del><strong>manipulate people</strong></del></span> <span
class="inserted"><ins><em>give other companies personal data on
- its customers</a>.</p>
+ JavaScript</em></ins></span> on <span class="inserted"><ins><em>its web
site to give</em></ins></span> other <span
class="removed"><del><strong>devices</strong></del></span> <span
class="inserted"><ins><em>companies personal data</em></ins></span> on
+ <span class="inserted"><ins><em>its customers</a>.</p>
</li>
<li id="M201712300">
@@ -3752,49 +3719,59 @@
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Some websites send
- JavaScript code</em></ins></span> to <span
class="removed"><del><strong>buy things, and hunt
- for “whales” who</strong></del></span> <span
class="inserted"><ins><em>collect all the user's input, <a
-
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which</em></ins></span>
- can <span class="inserted"><ins><em>then</em></ins></span> be <span
class="removed"><del><strong>led to spend a lot of money. They
- also use a back door</strong></del></span> <span
class="inserted"><ins><em>used</em></ins></span> to <span
class="removed"><del><strong>manipulate</strong></del></span> <span
class="inserted"><ins><em>reproduce</em></ins></span> the <span
class="removed"><del><strong>game play for specific players.</p>
+ JavaScript code to collect all</em></ins></span> the user's <span
class="removed"><del><strong>local network.</a></p>
- <p>While the article describes gratis games, games that cost money
- can</strong></del></span> <span class="inserted"><ins><em>whole
session</a>.</p>
+ <p>LG later said it had installed a patch to stop this, but any
product
+ could spy this way.</p>
- <p>If you</em></ins></span> use <span
class="removed"><del><strong>the same tactics.</p></strong></del></span>
<span class="inserted"><ins><em>LibreJS, it will block that malicious JavaScript
+ <p>Meanwhile, LG TVs</strong></del></span> <span
class="inserted"><ins><em>input,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
+ </li>
+ <li>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they
wanted</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
+ can then be used</em></ins></span> to <span
class="removed"><del><strong>record.</a></p></strong></del></span>
<span class="inserted"><ins><em>reproduce the whole session</a>.</p>
+
+ <p>If you use LibreJS, it will block that malicious JavaScript
code.</p></em></ins></span>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareOnTheWeb
--></strong></del></span>
+<span class="removed"><del><strong><!-- #SpywareAtPlay
--></strong></del></span>
<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareOnTheWeb">Spyware on the
Web</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h3 id="SpywareAtPlay">Spyware at
Play</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
<h4 id="SpywareInFlash">Flash</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareOnTheWeb">#SpywareOnTheWeb</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInFlash">#SpywareInFlash</a>)</span></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtPlay">#SpywareAtPlay</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInFlash">#SpywareInFlash</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><div style="clear: left;"></div>
-<p>In addition, many web sites spy on their visitors. Web
sites</strong></del></span>
+<ul>
+ <li><p>Many
+ <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201310110">
<!--#set var="DATE" value='<small
class="date-tag">2013-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Flash and JavaScript</em></ins></span> are <span
class="removed"><del><strong>not
- programs, so it</strong></del></span> <span class="inserted"><ins><em>used
for</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/network-services-arent-free-or-nonfree.html">
- makes no sense</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices</a></em></ins></span> to <span
class="removed"><del><strong>call them “free” or
“proprietary”</a>,
- but the surveillance</strong></del></span> <span
class="inserted"><ins><em>identify users.</p>
+ <p>Flash</em></ins></span> and <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>JavaScript are used for <a
+
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ “fingerprinting” devices</a></em></ins></span> to <span
class="removed"><del><strong>the
+ internet</a>— even what their users weigh.</p>
+
+ <p>A game console is a computer, and you can't trust a computer
with
+ a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>identify users.</p></em></ins></span>
</li>
- <li id="M201003010">
+ <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201003010">
<!--#set var="DATE" value='<small
class="date-tag">2010-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Flash Player's <a
-
href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/">
+ <p>Flash Player's</em></ins></span> <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/">
cookie feature helps web sites track visitors</a>.</p>
</li>
</ul>
@@ -3809,38 +3786,69 @@
<li id="M201906220">
<!--#set var="DATE" value='<small
class="date-tag">2019-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google Chrome</em></ins></span> is an <span
class="removed"><del><strong>abuse all</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Google Chrome is an <a
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/">
- instrument of surveillance</a>. It lets thousands of trackers invade
- users' computers and report</em></ins></span> the <span
class="removed"><del><strong>same.</p>
+ instrument</em></ins></span> of <span class="removed"><del><strong>data
about their users and their</strong></del></span> <span
class="inserted"><ins><em>surveillance</a>. It lets thousands of trackers
invade</em></ins></span>
+ users'
+ <span class="removed"><del><strong>friends</strong></del></span> <span
class="inserted"><ins><em>computers</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
-<ul>
+ <p>Even nastier, they do it through ad networks that
merge</strong></del></span> <span
class="inserted"><ins><em>report</em></ins></span> the <span
class="removed"><del><strong>data
+ collected by various cr…apps and</strong></del></span> sites
<span class="removed"><del><strong>made by different
+ companies.</p>
- <li><p>Online sales, with tracking</strong></del></span> <span
class="inserted"><ins><em>sites they visit to advertising</em></ins></span> and
<span class="removed"><del><strong>surveillance</strong></del></span>
- <span class="inserted"><ins><em>data companies, first</em></ins></span> of
<span class="removed"><del><strong>customers, <a
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
- businesses</strong></del></span> <span class="inserted"><ins><em>all to
Google. Moreover, if users have a
- Gmail account, Chrome automatically logs them in</em></ins></span> to
<span class="removed"><del><strong>show different people different
prices</a>. Most
- of</strong></del></span> the <span
class="removed"><del><strong>tracking</strong></del></span> <span
class="inserted"><ins><em>browser for
+ <p>They use this</strong></del></span> <span
class="inserted"><ins><em>they visit to advertising and</em></ins></span>
+ data <span class="inserted"><ins><em>companies, first of all to Google.
Moreover, if users have a
+ Gmail account, Chrome automatically logs them in to the browser for
more convenient profiling. On Android, Chrome also reports their
location to Google.</p>
- <p>The best way to escape surveillance</em></ins></span> is <span
class="removed"><del><strong>done by recording
interactions</strong></del></span> <span class="inserted"><ins><em>to switch to
<a
- href="/software/icecat/">IceCat</a>, a modified version of
Firefox</em></ins></span>
- with
- <span class="removed"><del><strong>servers, but proprietary software
contributes.</p></strong></del></span> <span
class="inserted"><ins><em>several changes to protect users'
privacy.</p></em></ins></span>
+ <p>The best way</em></ins></span> to <span
class="removed"><del><strong>manipulate people</strong></del></span> <span
class="inserted"><ins><em>escape surveillance is</em></ins></span> to <span
class="removed"><del><strong>buy things, and hunt
+ for “whales” who can be led</strong></del></span> <span
class="inserted"><ins><em>switch</em></ins></span> to <span
class="removed"><del><strong>spend</strong></del></span> <span
class="inserted"><ins><em><a
+ href="/software/icecat/">IceCat</a>,</em></ins></span> a <span
class="removed"><del><strong>lot</strong></del></span> <span
class="inserted"><ins><em>modified version</em></ins></span> of <span
class="removed"><del><strong>money. They
+ also use a back door</strong></del></span> <span
class="inserted"><ins><em>Firefox
+ with several changes</em></ins></span> to <span
class="removed"><del><strong>manipulate the game play for specific
players.</p>
+
+ <p>While the article describes gratis games, games that cost money
+ can use the same tactics.</p></strong></del></span> <span
class="inserted"><ins><em>protect users' privacy.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <span class="removed"><del><strong><li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
- Baidu's Japanese-input</strong></del></span>
+<!-- #SpywareOnTheWeb</strong></del></span>
<span class="inserted"><ins><em><li id="M201704131">
<!--#set var="DATE" value='<small
class="date-tag">2017-04</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Low-priced Chromebooks for schools are <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareOnTheWeb">Spyware</strong></del></span>
+ <span class="inserted"><ins><em><p>Low-priced Chromebooks for
schools are <a
href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
- collecting far more data on students than is necessary,</em></ins></span>
and <span class="removed"><del><strong>Chinese-input apps
spy</strong></del></span> <span class="inserted"><ins><em>store
- it indefinitely</a>. Parents and students complain about the lack
- of transparency</em></ins></span> on <span
class="removed"><del><strong>users.</a></p>
+ collecting far more data</em></ins></span> on <span
class="inserted"><ins><em>students than is necessary, and store
+ it indefinitely</a>. Parents and students complain
about</em></ins></span> the <span class="removed"><del><strong>Web</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheWeb">#SpywareOnTheWeb</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<p>In addition, many web sites spy</strong></del></span> <span
class="inserted"><ins><em>lack
+ of transparency</em></ins></span> on <span
class="removed"><del><strong>their visitors. Web sites are not
+ programs, so it
+ <a href="/philosophy/network-services-arent-free-or-nonfree.html">
+ makes no sense to call them “free” or
“proprietary”</a>,
+ but</strong></del></span> the <span
class="removed"><del><strong>surveillance is an abuse all</strong></del></span>
<span class="inserted"><ins><em>part of both</em></ins></span> the <span
class="removed"><del><strong>same.</p>
+
+<ul>
+
+ <li><p>Online sales, with tracking</strong></del></span> <span
class="inserted"><ins><em>educational services</em></ins></span> and <span
class="removed"><del><strong>surveillance</strong></del></span> <span
class="inserted"><ins><em>the
+ schools, the difficulty</em></ins></span> of <span
class="removed"><del><strong>customers, <a
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
+ businesses to show different people different prices</a>.
Most</strong></del></span> <span class="inserted"><ins><em>opting
out</em></ins></span> of <span class="inserted"><ins><em>these services,
and</em></ins></span> the <span
class="removed"><del><strong>tracking</strong></del></span> <span
class="inserted"><ins><em>lack
+ of proper privacy policies, among other things.</p>
+
+ <p>But complaining</em></ins></span> is <span
class="removed"><del><strong>done by recording interactions with
+ servers, but proprietary software contributes.</p>
+ </li>
+
+ <li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
+ Baidu's Japanese-input</strong></del></span> <span
class="inserted"><ins><em>not sufficient. Parents, students</em></ins></span>
and <span class="removed"><del><strong>Chinese-input apps spy on
users.</a></p>
</li>
<li><p>Pages that contain “Like” buttons
@@ -3849,21 +3857,17 @@
users that don't have Facebook accounts.</p>
</li>
- <li><p>Many web sites rat their visitors to advertising networks
that track
+ <li><p>Many web sites rat their visitors to advertising
networks</strong></del></span> <span class="inserted"><ins><em>teachers
+ should realize</em></ins></span> that <span
class="removed"><del><strong>track
users. Of</strong></del></span> the <span
class="removed"><del><strong>top 1000 web sites, <a
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
- (as</strong></del></span> <span
class="inserted"><ins><em>part</em></ins></span> of <span
class="removed"><del><strong>5/17/2012) fed their visitors third-party cookies,
allowing</strong></del></span> <span class="inserted"><ins><em>both the
educational services and the
- schools, the difficulty of opting out of these services, and the lack
- of proper privacy policies, among</em></ins></span> other
- <span class="removed"><del><strong>sites</strong></del></span> <span
class="inserted"><ins><em>things.</p>
-
- <p>But complaining is not sufficient. Parents, students and teachers
- should realize that the software Google uses to spy on students is
- nonfree, so they can't verify what it really does. The only remedy
is</em></ins></span>
- to <span class="removed"><del><strong>track them</a>.</p>
+ (as of 5/17/2012) fed their visitors third-party cookies, allowing other
+ sites</strong></del></span> <span class="inserted"><ins><em>software
Google uses</em></ins></span> to <span class="removed"><del><strong>track
them</a>.</p>
</li>
- <li><p>Many web sites report all their
visitors</strong></del></span> <span class="inserted"><ins><em>persuade school
officials</em></ins></span> to <span class="removed"><del><strong>Google by
using
+ <li><p>Many web sites report all their
visitors</strong></del></span> <span class="inserted"><ins><em>spy on students
is
+ nonfree, so they can't verify what it really does. The only remedy is
+ to persuade school officials</em></ins></span> to <span
class="removed"><del><strong>Google by using
the Google Analytics service, which</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
tells Google</strong></del></span> <span
class="inserted"><ins><em>href="/education/edu-schools.html">
exclusively use free software</a> for both education and school
@@ -3942,30 +3946,41 @@
<span class="inserted"><ins><em><div style="clear: left;"></div>
<ul class="blurbs">
- <li id="M202012250">
+ <li id="M202102160">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Google has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
+ cookie feature helps web sites track
visitors</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16">handed
+ over personal data of Indian protesters and activists to Indian
+ police</a> which leaded to their arrest. The cops requested the IP
+ address and the location where a document was created and with those
+ information, they identified protesters and
activists.</p></em></ins></span>
+ </li>
+
+ <span
class="removed"><del><strong><li><p>Flash</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202012250">
<!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The HonorLock online exam
- proctoring program is a surveillance tool that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
- cookie feature helps web sites track
visitors</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps">tracks
+ proctoring program</em></ins></span> is <span
class="removed"><del><strong>also used</strong></del></span> <span
class="inserted"><ins><em>a surveillance tool that <a
+
href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps">tracks
students and collects data</a> such as face, driving license, and
network information, among others, in blatant violation of students'
privacy.</p>
- <p>Preventing students from cheating should not be an excuse for
- running malware/spyware on their computers, and it's good that students
+ <p>Preventing students from cheating should not be an
excuse</em></ins></span> for
+ <span class="inserted"><ins><em>running malware/spyware on their
computers, and it's good that students
are protesting. But their petitions overlook a crucial issue, namely,
the injustice of being forced to run nonfree software in order to
- get an education.</p></em></ins></span>
+ get an education.</p>
</li>
- <span
class="removed"><del><strong><li><p>Flash</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M202009070">
+ <li id="M202009070">
<!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>While the world</em></ins></span> is <span
class="removed"><del><strong>also used for</strong></del></span> <span
class="inserted"><ins><em>still
+ <p>While the world is still
struggling with COVID-19 coronavirus, many</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
“fingerprinting” devices </a></strong></del></span>
<span
class="inserted"><ins><em>href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/">people
@@ -4135,7 +4150,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/03/16 17:33:28 $
+$Date: 2021/04/11 13:04:34 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.380
retrieving revision 1.381
diff -u -b -r1.380 -r1.381
--- proprietary-surveillance.ja.po 16 Mar 2021 17:33:28 -0000 1.380
+++ proprietary-surveillance.ja.po 11 Apr 2021 13:04:34 -0000 1.381
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-03-16 17:25+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -4368,6 +4368,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The HonorLock online exam proctoring program is a surveillance tool that <a "
"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.319
retrieving revision 1.320
diff -u -b -r1.319 -r1.320
--- proprietary-surveillance.pot 16 Mar 2021 17:33:28 -0000 1.319
+++ proprietary-surveillance.pot 11 Apr 2021 13:04:34 -0000 1.320
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-03-16 17:25+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -3543,6 +3543,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Google has <a "
+"href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\">handed
"
+"over personal data of Indian protesters and activists to Indian police</a> "
+"which leaded to their arrest. The cops requested the IP address and the "
+"location where a document was created and with those information, they "
+"identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The HonorLock online exam proctoring program is a surveillance tool that <a "
"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps\">tracks
"
"students and collects data</a> such as face, driving license, and network "
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.701
retrieving revision 1.702
diff -u -b -r1.701 -r1.702
--- proprietary-surveillance.ru.po 16 Mar 2021 19:32:41 -0000 1.701
+++ proprietary-surveillance.ru.po 11 Apr 2021 13:04:34 -0000 1.702
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-03-16 17:25+0000\n"
+"POT-Creation-Date: 2021-04-11 12:56+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-11 12:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -5244,6 +5245,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The HonorLock online exam proctoring program is a surveillance tool that <a "
"href=\"https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-"
"against-proctoring-surveillance-apps\">tracks students and collects data</a> "
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.243
retrieving revision 1.244
diff -u -b -r1.243 -r1.244
--- proprietary.de-diff.html 11 Apr 2021 12:03:14 -0000 1.243
+++ proprietary.de-diff.html 11 Apr 2021 13:04:34 -0000 1.244
@@ -58,16 +58,16 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none; }
+#TOC a:hover { text-decoration: underline; }
-->
</style>
<style type="text/css" media="print,screen">
@@ -224,6 +224,27 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202102160">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Google has <a
+
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16">handed
+ over personal data of Indian protesters and activists to Indian
+ police</a> which leaded to their arrest. The cops requested the IP
+ address and the location where a document was created and with those
+ information, they identified protesters and activists.</p>
+ </li>
+
+ <li id="M202007020">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>BMW is trying to <a
+
href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates">lock
+ certain features of its cars, and force people to pay to use part of
+ the car they already bought</a>. This is done through forced update
+ of the car software via a radio-operated back door.</p>
+ </li>
+
<li id="M202103100">
<!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -272,29 +293,6 @@
TV and sell them for money, but to collect your personal data and
(possibly) hand over them to others for benefit.</p>
</li>
-
- <li id="M201809121">
- <!--#set var="DATE" value='<small
class="date-tag">2018-09</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Tiny Lab Productions, along with online ad businesses run
- by Google, Twitter and three other companies are facing a lawsuit <a
-
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html">for
- violating people's privacy by collecting their data from mobile games
- and handing over these data to other
companies/advertisers</a>.</p>
- </li>
-
- <li id="M202103050">
- <!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>At least 30 thousand organizations
- in the United States are newly “<a
- href="/philosophy/words-to-avoid.html#Hacker">cracked</a>”
via <a
-
href="https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/">holes
- in Microsoft's proprietary email software, named Microsoft 365</a>.
It
- is unclear whether there are other holes and vulnerabilities in the
- program or not but history and experience tells us it wouldn't be
- the last disaster with proprietary programs.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -358,7 +356,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/11 12:03:14 $
+$Date: 2021/04/11 13:04:34 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.278
retrieving revision 1.279
diff -u -b -r1.278 -r1.279
--- proprietary.de.po 11 Apr 2021 12:03:14 -0000 1.278
+++ proprietary.de.po 11 Apr 2021 13:04:34 -0000 1.279
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -480,6 +480,25 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/"
"technology/2021/03/10/amazon-library-ebook-monopoly/\">stopping public "
"libraries from lending e-books and audiobooks</a>. Amazon became powerful in "
@@ -546,27 +565,6 @@
"over them to others for benefit."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a href=\"https://www.nytimes."
-"com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
-"html\">for violating people's privacy by collecting their data from mobile "
-"games and handing over these data to other companies/advertisers</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-"
-"newly-hacked-via-holes-in-microsofts-email-software/\">holes in Microsoft's "
-"proprietary email software, named Microsoft 365</a>. It is unclear whether "
-"there are other holes and vulnerabilities in the program or not but history "
-"and experience tells us it wouldn't be the last disaster with proprietary "
-"programs."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.424
retrieving revision 1.425
diff -u -b -r1.424 -r1.425
--- proprietary.es.po 11 Apr 2021 12:03:14 -0000 1.424
+++ proprietary.es.po 11 Apr 2021 13:04:34 -0000 1.425
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -341,6 +341,25 @@
msgstr "Añadidos recientes"
#. type: Content of: <div><ul><li><p>
+msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
# | Amazon's monopoly and DRM is <a
# |
href=\"https://www.washingtonpost.com/technology/2021/03/10/amazon-library-ebook-monopoly{+/+}\">stopping
# | public libraries from lending e-books and audiobooks</a>. Amazon became
@@ -447,41 +466,6 @@
"datos personales y (probablemente) obtener beneficio cediéndoselos a "
"terceros."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a href=\"https://www.nytimes."
-"com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
-"html\">for violating people's privacy by collecting their data from mobile "
-"games and handing over these data to other companies/advertisers</a>."
-msgstr ""
-"Tiny Lab Productions, junto a negocios de publicidad en lÃnea controlados "
-"por Google, Twitter y tres compañÃas más, están haciendo frente a una <a "
-"href=\"https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-"
-"data-privacy-google-twitter.html\">demanda por violar la privacidad de la "
-"gente, al recopilar sus datos de juegos para el móvil y proporcionárselos a
"
-"otras compañÃas con fines publicitarios</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-"
-"newly-hacked-via-holes-in-microsofts-email-software/\">holes in Microsoft's "
-"proprietary email software, named Microsoft 365</a>. It is unclear whether "
-"there are other holes and vulnerabilities in the program or not but history "
-"and experience tells us it wouldn't be the last disaster with proprietary "
-"programs."
-msgstr ""
-"Al menos 30.000 organizaciones estadounidenses han sido recientemente “"
-"<a href=\"/philosophy/words-to-avoid.html#Hacker\">«crackeadas»</a>”
a "
-"través de <a href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-"
-"organizations-newly-hacked-via-holes-in-microsofts-email-software/"
-"\">agujeros en el software privativo de mensajerÃa electrónica de Microsoft
"
-"llamado Microsoft 365</a>. No está claro si hay o no otros agujeros y "
-"vulnerabilidades en el programa, pero la historia y la experiencia nos "
-"enseñan que no será el último desastre ocasionado por programas
privativos."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -561,3 +545,38 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima actualización:"
+
+#~ msgid ""
+#~ "Tiny Lab Productions, along with online ad businesses run by Google, "
+#~ "Twitter and three other companies are facing a lawsuit <a href=\"https://"
+#~ "www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-"
+#~ "google-twitter.html\">for violating people's privacy by collecting their "
+#~ "data from mobile games and handing over these data to other companies/"
+#~ "advertisers</a>."
+#~ msgstr ""
+#~ "Tiny Lab Productions, junto a negocios de publicidad en lÃnea controlados
"
+#~ "por Google, Twitter y tres compañÃas más, están haciendo frente a una
<a "
+#~ "href=\"https://www.nytimes.com/interactive/2018/09/12/technology/kids-"
+#~ "apps-data-privacy-google-twitter.html\">demanda por violar la privacidad "
+#~ "de la gente, al recopilar sus datos de juegos para el móvil y "
+#~ "proporcionárselos a otras compañÃas con fines publicitarios</a>."
+
+#~ msgid ""
+#~ "At least 30 thousand organizations in the United States are newly “"
+#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via "
+#~ "<a href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-"
+#~ "organizations-newly-hacked-via-holes-in-microsofts-email-software/"
+#~ "\">holes in Microsoft's proprietary email software, named Microsoft 365</"
+#~ "a>. It is unclear whether there are other holes and vulnerabilities in "
+#~ "the program or not but history and experience tells us it wouldn't be the "
+#~ "last disaster with proprietary programs."
+#~ msgstr ""
+#~ "Al menos 30.000 organizaciones estadounidenses han sido recientemente "
+#~ "“<a href=\"/philosophy/words-to-avoid.html#Hacker\">«crackeadas»</"
+#~ "a>” a través de <a href=\"https://krebsonsecurity.com/2021/03/at-"
+#~ "least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-"
+#~ "software/\">agujeros en el software privativo de mensajerÃa electrónica "
+#~ "de Microsoft llamado Microsoft 365</a>. No está claro si hay o no otros "
+#~ "agujeros y vulnerabilidades en el programa, pero la historia y la "
+#~ "experiencia nos enseñan que no será el último desastre ocasionado por "
+#~ "programas privativos."
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.467
retrieving revision 1.468
diff -u -b -r1.467 -r1.468
--- proprietary.fr.po 11 Apr 2021 12:03:14 -0000 1.467
+++ proprietary.fr.po 11 Apr 2021 13:04:34 -0000 1.468
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
"PO-Revision-Date: 2021-03-16 22:58+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -338,6 +338,25 @@
msgstr "Ajouts récents"
#. type: Content of: <div><ul><li><p>
+msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
# | Amazon's monopoly and DRM is <a
# |
href=\"https://www.washingtonpost.com/technology/2021/03/10/amazon-library-ebook-monopoly{+/+}\">stopping
# | public libraries from lending e-books and audiobooks</a>. Amazon became
@@ -439,40 +458,6 @@
"les vendre, mais de récolter vos données personnelles et (peut-être) de "
"faire leur marge en les vendant à d'autres."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a href=\"https://www.nytimes."
-"com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
-"html\">for violating people's privacy by collecting their data from mobile "
-"games and handing over these data to other companies/advertisers</a>."
-msgstr ""
-"Tiny Lab Productions, ainsi que des entreprises de pub en ligne contrôlées "
-"par Google, Twitter et trois autres sociétés, sont sous le coup d'une <a "
-"href=\"https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-"
-"data-privacy-google-twitter.html\">plainte pour non-respect de la vie "
-"privée</a> pour avoir communiqué les données personnelles d'utilisateurs
de "
-"jeux mobiles à des sociétés tierces, entre autres à des fins
publicitaires."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-"
-"newly-hacked-via-holes-in-microsofts-email-software/\">holes in Microsoft's "
-"proprietary email software, named Microsoft 365</a>. It is unclear whether "
-"there are other holes and vulnerabilities in the program or not but history "
-"and experience tells us it wouldn't be the last disaster with proprietary "
-"programs."
-msgstr ""
-"C'est une <a href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-"
-"organizations-newly-hacked-via-holes-in-microsofts-email-software/\">faille "
-"de sécurité dans le serveur de messagerie de Microsoft 365</a> qui a "
-"récemment permis un piratage affectant au moins trente mille organisations "
-"aux Ãtats-Unis. On ne sait pas s'il y en a d'autres, mais l'histoire et "
-"l'expérience nous disent que ce n'est pas la première fois qu'un programme "
-"privateur est responsable d'un désastre, et probablement pas la dernière."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -545,3 +530,38 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Tiny Lab Productions, along with online ad businesses run by Google, "
+#~ "Twitter and three other companies are facing a lawsuit <a href=\"https://"
+#~ "www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-"
+#~ "google-twitter.html\">for violating people's privacy by collecting their "
+#~ "data from mobile games and handing over these data to other companies/"
+#~ "advertisers</a>."
+#~ msgstr ""
+#~ "Tiny Lab Productions, ainsi que des entreprises de pub en ligne "
+#~ "contrôlées par Google, Twitter et trois autres sociétés, sont sous le "
+#~ "coup d'une <a href=\"https://www.nytimes.com/interactive/2018/09/12/"
+#~ "technology/kids-apps-data-privacy-google-twitter.html\">plainte pour non-"
+#~ "respect de la vie privée</a> pour avoir communiqué les données "
+#~ "personnelles d'utilisateurs de jeux mobiles à des sociétés tierces,
entre "
+#~ "autres à des fins publicitaires."
+
+#~ msgid ""
+#~ "At least 30 thousand organizations in the United States are newly “"
+#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via "
+#~ "<a href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-"
+#~ "organizations-newly-hacked-via-holes-in-microsofts-email-software/"
+#~ "\">holes in Microsoft's proprietary email software, named Microsoft 365</"
+#~ "a>. It is unclear whether there are other holes and vulnerabilities in "
+#~ "the program or not but history and experience tells us it wouldn't be the "
+#~ "last disaster with proprietary programs."
+#~ msgstr ""
+#~ "C'est une <a href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-"
+#~ "s-organizations-newly-hacked-via-holes-in-microsofts-email-software/"
+#~ "\">faille de sécurité dans le serveur de messagerie de Microsoft 365</a>
"
+#~ "qui a récemment permis un piratage affectant au moins trente mille "
+#~ "organisations aux Ãtats-Unis. On ne sait pas s'il y en a d'autres, mais "
+#~ "l'histoire et l'expérience nous disent que ce n'est pas la première fois
"
+#~ "qu'un programme privateur est responsable d'un désastre, et probablement "
+#~ "pas la dernière."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.255
retrieving revision 1.256
diff -u -b -r1.255 -r1.256
--- proprietary.it-diff.html 11 Apr 2021 12:03:14 -0000 1.255
+++ proprietary.it-diff.html 11 Apr 2021 13:04:34 -0000 1.256
@@ -58,16 +58,16 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none; }
+#TOC a:hover { text-decoration: underline; }
-->
</style>
<style type="text/css" media="print,screen">
@@ -139,16 +139,16 @@
<td>
<ul class="columns"></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
- <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
+ <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
<li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
@@ -223,6 +223,27 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202102160">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Google has <a
+
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16">handed
+ over personal data of Indian protesters and activists to Indian
+ police</a> which leaded to their arrest. The cops requested the IP
+ address and the location where a document was created and with those
+ information, they identified protesters and activists.</p>
+ </li>
+
+ <li id="M202007020">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>BMW is trying to <a
+
href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates">lock
+ certain features of its cars, and force people to pay to use part of
+ the car they already bought</a>. This is done through forced update
+ of the car software via a radio-operated back door.</p>
+ </li>
+
<li id="M202103100">
<!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -271,29 +292,6 @@
TV and sell them for money, but to collect your personal data and
(possibly) hand over them to others for benefit.</p>
</li>
-
- <li id="M201809121">
- <!--#set var="DATE" value='<small
class="date-tag">2018-09</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Tiny Lab Productions, along with online ad businesses run
- by Google, Twitter and three other companies are facing a lawsuit <a
-
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html">for
- violating people's privacy by collecting their data from mobile games
- and handing over these data to other
companies/advertisers</a>.</p>
- </li>
-
- <li id="M202103050">
- <!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>At least 30 thousand organizations
- in the United States are newly “<a
- href="/philosophy/words-to-avoid.html#Hacker">cracked</a>”
via <a
-
href="https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/">holes
- in Microsoft's proprietary email software, named Microsoft 365</a>.
It
- is unclear whether there are other holes and vulnerabilities in the
- program or not but history and experience tells us it wouldn't be
- the last disaster with proprietary programs.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -357,7 +355,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/11 12:03:14 $
+$Date: 2021/04/11 13:04:34 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.287
retrieving revision 1.288
diff -u -b -r1.287 -r1.288
--- proprietary.it.po 11 Apr 2021 12:03:14 -0000 1.287
+++ proprietary.it.po 11 Apr 2021 13:04:34 -0000 1.288
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -485,6 +485,25 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/"
"technology/2021/03/10/amazon-library-ebook-monopoly/\">stopping public "
"libraries from lending e-books and audiobooks</a>. Amazon became powerful in "
@@ -539,27 +558,6 @@
"over them to others for benefit."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a href=\"https://www.nytimes."
-"com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
-"html\">for violating people's privacy by collecting their data from mobile "
-"games and handing over these data to other companies/advertisers</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-"
-"newly-hacked-via-holes-in-microsofts-email-software/\">holes in Microsoft's "
-"proprietary email software, named Microsoft 365</a>. It is unclear whether "
-"there are other holes and vulnerabilities in the program or not but history "
-"and experience tells us it wouldn't be the last disaster with proprietary "
-"programs."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.260
retrieving revision 1.261
diff -u -b -r1.260 -r1.261
--- proprietary.ja-diff.html 11 Apr 2021 12:03:14 -0000 1.260
+++ proprietary.ja-diff.html 11 Apr 2021 13:04:34 -0000 1.261
@@ -63,8 +63,8 @@
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none; }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -181,9 +181,9 @@
</ul>
<ul>
<li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
- <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
- <li><a
href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
+ <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li>
+ <li><a
href="/proprietary/malware-google.html">Google</a></li>
<li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
@@ -228,6 +228,27 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202102160">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Google has <a
+
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16">handed
+ over personal data of Indian protesters and activists to Indian
+ police</a> which leaded to their arrest. The cops requested the IP
+ address and the location where a document was created and with those
+ information, they identified protesters and activists.</p>
+ </li>
+
+ <li id="M202007020">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>BMW is trying to <a
+
href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates">lock
+ certain features of its cars, and force people to pay to use part of
+ the car they already bought</a>. This is done through forced update
+ of the car software via a radio-operated back door.</p>
+ </li>
+
<li id="M202103100">
<!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -276,29 +297,6 @@
TV and sell them for money, but to collect your personal data and
(possibly) hand over them to others for benefit.</p>
</li>
-
- <li id="M201809121">
- <!--#set var="DATE" value='<small
class="date-tag">2018-09</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Tiny Lab Productions, along with online ad businesses run
- by Google, Twitter and three other companies are facing a lawsuit <a
-
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html">for
- violating people's privacy by collecting their data from mobile games
- and handing over these data to other
companies/advertisers</a>.</p>
- </li>
-
- <li id="M202103050">
- <!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>At least 30 thousand organizations
- in the United States are newly “<a
- href="/philosophy/words-to-avoid.html#Hacker">cracked</a>”
via <a
-
href="https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/">holes
- in Microsoft's proprietary email software, named Microsoft 365</a>.
It
- is unclear whether there are other holes and vulnerabilities in the
- program or not but history and experience tells us it wouldn't be
- the last disaster with proprietary programs.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -362,7 +360,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/11 12:03:14 $
+$Date: 2021/04/11 13:04:34 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.271
retrieving revision 1.272
diff -u -b -r1.271 -r1.272
--- proprietary.ja.po 11 Apr 2021 12:03:14 -0000 1.271
+++ proprietary.ja.po 11 Apr 2021 13:04:34 -0000 1.272
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -343,6 +343,25 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/"
"technology/2021/03/10/amazon-library-ebook-monopoly/\">stopping public "
"libraries from lending e-books and audiobooks</a>. Amazon became powerful in "
@@ -397,27 +416,6 @@
"over them to others for benefit."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a href=\"https://www.nytimes."
-"com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
-"html\">for violating people's privacy by collecting their data from mobile "
-"games and handing over these data to other companies/advertisers</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-"
-"newly-hacked-via-holes-in-microsofts-email-software/\">holes in Microsoft's "
-"proprietary email software, named Microsoft 365</a>. It is unclear whether "
-"there are other holes and vulnerabilities in the program or not but history "
-"and experience tells us it wouldn't be the last disaster with proprietary "
-"programs."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.256
retrieving revision 1.257
diff -u -b -r1.256 -r1.257
--- proprietary.nl-diff.html 11 Apr 2021 12:03:14 -0000 1.256
+++ proprietary.nl-diff.html 11 Apr 2021 13:04:34 -0000 1.257
@@ -58,16 +58,16 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none; }
+#TOC a:hover { text-decoration: underline; }
-->
</style>
<style type="text/css" media="print,screen">
@@ -223,6 +223,27 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202102160">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Google has <a
+
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16">handed
+ over personal data of Indian protesters and activists to Indian
+ police</a> which leaded to their arrest. The cops requested the IP
+ address and the location where a document was created and with those
+ information, they identified protesters and activists.</p>
+ </li>
+
+ <li id="M202007020">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>BMW is trying to <a
+
href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates">lock
+ certain features of its cars, and force people to pay to use part of
+ the car they already bought</a>. This is done through forced update
+ of the car software via a radio-operated back door.</p>
+ </li>
+
<li id="M202103100">
<!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -271,29 +292,6 @@
TV and sell them for money, but to collect your personal data and
(possibly) hand over them to others for benefit.</p>
</li>
-
- <li id="M201809121">
- <!--#set var="DATE" value='<small
class="date-tag">2018-09</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Tiny Lab Productions, along with online ad businesses run
- by Google, Twitter and three other companies are facing a lawsuit <a
-
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html">for
- violating people's privacy by collecting their data from mobile games
- and handing over these data to other
companies/advertisers</a>.</p>
- </li>
-
- <li id="M202103050">
- <!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>At least 30 thousand organizations
- in the United States are newly “<a
- href="/philosophy/words-to-avoid.html#Hacker">cracked</a>”
via <a
-
href="https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/">holes
- in Microsoft's proprietary email software, named Microsoft 365</a>.
It
- is unclear whether there are other holes and vulnerabilities in the
- program or not but history and experience tells us it wouldn't be
- the last disaster with proprietary programs.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -357,7 +355,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/11 12:03:14 $
+$Date: 2021/04/11 13:04:34 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.261
retrieving revision 1.262
diff -u -b -r1.261 -r1.262
--- proprietary.nl.po 11 Apr 2021 12:03:14 -0000 1.261
+++ proprietary.nl.po 11 Apr 2021 13:04:34 -0000 1.262
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -388,6 +388,25 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/"
"technology/2021/03/10/amazon-library-ebook-monopoly/\">stopping public "
"libraries from lending e-books and audiobooks</a>. Amazon became powerful in "
@@ -442,27 +461,6 @@
"over them to others for benefit."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a href=\"https://www.nytimes."
-"com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
-"html\">for violating people's privacy by collecting their data from mobile "
-"games and handing over these data to other companies/advertisers</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-"
-"newly-hacked-via-holes-in-microsofts-email-software/\">holes in Microsoft's "
-"proprietary email software, named Microsoft 365</a>. It is unclear whether "
-"there are other holes and vulnerabilities in the program or not but history "
-"and experience tells us it wouldn't be the last disaster with proprietary "
-"programs."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.273
retrieving revision 1.274
diff -u -b -r1.273 -r1.274
--- proprietary.pl-diff.html 11 Apr 2021 12:03:14 -0000 1.273
+++ proprietary.pl-diff.html 11 Apr 2021 13:04:35 -0000 1.274
@@ -176,9 +176,9 @@
<ul>
<li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
<li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
- <li><a
href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a
href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
+ <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -199,10 +199,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -222,6 +222,27 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202102160">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Google has <a
+
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16">handed
+ over personal data of Indian protesters and activists to Indian
+ police</a> which leaded to their arrest. The cops requested the IP
+ address and the location where a document was created and with those
+ information, they identified protesters and activists.</p>
+ </li>
+
+ <li id="M202007020">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>BMW is trying to <a
+
href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates">lock
+ certain features of its cars, and force people to pay to use part of
+ the car they already bought</a>. This is done through forced update
+ of the car software via a radio-operated back door.</p>
+ </li>
+
<li id="M202103100">
<!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -270,29 +291,6 @@
TV and sell them for money, but to collect your personal data and
(possibly) hand over them to others for benefit.</p>
</li>
-
- <li id="M201809121">
- <!--#set var="DATE" value='<small
class="date-tag">2018-09</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Tiny Lab Productions, along with online ad businesses run
- by Google, Twitter and three other companies are facing a lawsuit <a
-
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html">for
- violating people's privacy by collecting their data from mobile games
- and handing over these data to other
companies/advertisers</a>.</p>
- </li>
-
- <li id="M202103050">
- <!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>At least 30 thousand organizations
- in the United States are newly “<a
- href="/philosophy/words-to-avoid.html#Hacker">cracked</a>”
via <a
-
href="https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/">holes
- in Microsoft's proprietary email software, named Microsoft 365</a>.
It
- is unclear whether there are other holes and vulnerabilities in the
- program or not but history and experience tells us it wouldn't be
- the last disaster with proprietary programs.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -356,7 +354,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/11 12:03:14 $
+$Date: 2021/04/11 13:04:35 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.254
retrieving revision 1.255
diff -u -b -r1.254 -r1.255
--- proprietary.pl.po 11 Apr 2021 12:03:14 -0000 1.254
+++ proprietary.pl.po 11 Apr 2021 13:04:35 -0000 1.255
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -569,6 +569,25 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/"
"technology/2021/03/10/amazon-library-ebook-monopoly/\">stopping public "
"libraries from lending e-books and audiobooks</a>. Amazon became powerful in "
@@ -623,27 +642,6 @@
"over them to others for benefit."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a href=\"https://www.nytimes."
-"com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
-"html\">for violating people's privacy by collecting their data from mobile "
-"games and handing over these data to other companies/advertisers</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-"
-"newly-hacked-via-holes-in-microsofts-email-software/\">holes in Microsoft's "
-"proprietary email software, named Microsoft 365</a>. It is unclear whether "
-"there are other holes and vulnerabilities in the program or not but history "
-"and experience tells us it wouldn't be the last disaster with proprietary "
-"programs."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.251
retrieving revision 1.252
diff -u -b -r1.251 -r1.252
--- proprietary.pot 11 Apr 2021 12:03:14 -0000 1.251
+++ proprietary.pot 11 Apr 2021 13:04:35 -0000 1.252
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -280,6 +280,25 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Google has <a "
+"href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\">handed
"
+"over personal data of Indian protesters and activists to Indian police</a> "
+"which leaded to their arrest. The cops requested the IP address and the "
+"location where a document was created and with those information, they "
+"identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a "
+"href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates\">lock
"
+"certain features of its cars, and force people to pay to use part of the car "
+"they already bought</a>. This is done through forced update of the car "
+"software via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Amazon's monopoly and DRM is <a "
"href=\"https://www.washingtonpost.com/technology/2021/03/10/amazon-library-ebook-monopoly/\">stopping
"
"public libraries from lending e-books and audiobooks</a>. Amazon became "
@@ -336,26 +355,6 @@
"over them to others for benefit."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a "
-"href=\"https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html\">for
"
-"violating people's privacy by collecting their data from mobile games and "
-"handing over these data to other companies/advertisers</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/\">holes
"
-"in Microsoft's proprietary email software, named Microsoft 365</a>. It is "
-"unclear whether there are other holes and vulnerabilities in the program or "
-"not but history and experience tells us it wouldn't be the last disaster "
-"with proprietary programs."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.403
retrieving revision 1.404
diff -u -b -r1.403 -r1.404
--- proprietary.pt-br.po 11 Apr 2021 12:03:14 -0000 1.403
+++ proprietary.pt-br.po 11 Apr 2021 13:04:35 -0000 1.404
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
"PO-Revision-Date: 2021-02-07 15:33-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -341,6 +341,25 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/"
"technology/2021/03/10/amazon-library-ebook-monopoly/\">stopping public "
"libraries from lending e-books and audiobooks</a>. Amazon became powerful in "
@@ -402,27 +421,6 @@
"over them to others for benefit."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a href=\"https://www.nytimes."
-"com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
-"html\">for violating people's privacy by collecting their data from mobile "
-"games and handing over these data to other companies/advertisers</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-"
-"newly-hacked-via-holes-in-microsofts-email-software/\">holes in Microsoft's "
-"proprietary email software, named Microsoft 365</a>. It is unclear whether "
-"there are other holes and vulnerabilities in the program or not but history "
-"and experience tells us it wouldn't be the last disaster with proprietary "
-"programs."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.489
retrieving revision 1.490
diff -u -b -r1.489 -r1.490
--- proprietary.ru.po 11 Apr 2021 12:03:14 -0000 1.489
+++ proprietary.ru.po 11 Apr 2021 13:04:35 -0000 1.490
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -340,6 +340,25 @@
msgstr "ÐоÑледние добавлениÑ"
#. type: Content of: <div><ul><li><p>
+msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
# | Amazon's monopoly and DRM is <a
# |
href=\"https://www.washingtonpost.com/technology/2021/03/10/amazon-library-ebook-monopoly{+/+}\">stopping
# | public libraries from lending e-books and audiobooks</a>. Amazon became
@@ -442,42 +461,6 @@
"ÑелевизоÑÑ Ð¸ пÑодаваÑÑ Ð¸Ñ
за денÑги, а
ÑобиÑаÑÑ Ð²Ð°Ñи лиÑнÑе даннÑе и "
"(возможно) Ñ Ð²Ñгодой пеÑедаваÑÑ Ð¸Ñ
дÑÑгим."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a href=\"https://www.nytimes."
-"com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
-"html\">for violating people's privacy by collecting their data from mobile "
-"games and handing over these data to other companies/advertisers</a>."
-msgstr ""
-"Tiny Lab Productions, вмеÑÑе Ñ Ð¿ÑедпÑиÑÑиÑми по
Ñекламе в ÐнÑеÑнеÑе, "
-"ÑабоÑаÑÑими под ÑпÑавлением Google, Twitter и
ÑÑеÑ
дÑÑгиÑ
компаний, "
-"пÑедÑÑали пеÑед ÑÑдом за <a
href=\"https://www.nytimes.com/"
-"interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html"
-"\">наÑÑÑение непÑикоÑновенноÑÑи лиÑной
жизни лÑдей поÑÑедÑÑвом ÑбоÑа иÑ
"
-"даннÑÑ
из мобилÑнÑÑ
Ð¸Ð³Ñ Ð¸ пеÑедаÑи ÑÑиÑ
даннÑÑ
дÑÑгим компаниÑм и "
-"ÑекламодаÑелÑм</a>."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-"
-"newly-hacked-via-holes-in-microsofts-email-software/\">holes in Microsoft's "
-"proprietary email software, named Microsoft 365</a>. It is unclear whether "
-"there are other holes and vulnerabilities in the program or not but history "
-"and experience tells us it wouldn't be the last disaster with proprietary "
-"programs."
-msgstr ""
-"Ðо менÑÑей меÑе 30 ÑÑÑÑÑ Ð¾ÑганизаÑий в
СоединеннÑÑ
ШÑаÑаÑ
недавно “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">взломанÑ</a>”
Ñ "
-"помоÑÑÑ <a
href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-"
-"organizations-newly-hacked-via-holes-in-microsofts-email-software/\">дÑÑ
в "
-"неÑвободной поÑÑовой пÑогÑамме Microsoft под
названием Microsoft 365</a>. "
-"ÐеÑÑно, еÑÑÑ Ð»Ð¸ дÑÑгие дÑÑÑ Ð¸ ÑÑзвимоÑÑи в
ÑÑой пÑогÑамме, но иÑÑоÑÐ¸Ñ Ð¸ опÑÑ "
-"говоÑÑÑ Ð½Ð°Ð¼, ÑÑо едва ли ÑÑо поÑледнее
бедÑÑвие, ÑвÑзанное Ñ Ð½ÐµÑвободнÑми "
-"пÑоÑаммами."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -554,6 +537,41 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Tiny Lab Productions, along with online ad businesses run by Google, "
+#~ "Twitter and three other companies are facing a lawsuit <a href=\"https://"
+#~ "www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-"
+#~ "google-twitter.html\">for violating people's privacy by collecting their "
+#~ "data from mobile games and handing over these data to other companies/"
+#~ "advertisers</a>."
+#~ msgstr ""
+#~ "Tiny Lab Productions, вмеÑÑе Ñ Ð¿ÑедпÑиÑÑиÑми по
Ñекламе в ÐнÑеÑнеÑе, "
+#~ "ÑабоÑаÑÑими под ÑпÑавлением Google, Twitter и
ÑÑеÑ
дÑÑгиÑ
компаний, "
+#~ "пÑедÑÑали пеÑед ÑÑдом за <a
href=\"https://www.nytimes.com/"
+#~ "interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
+#~ "html\">наÑÑÑение непÑикоÑновенноÑÑи
лиÑной жизни лÑдей поÑÑедÑÑвом ÑбоÑа "
+#~ "иÑ
даннÑÑ
из мобилÑнÑÑ
Ð¸Ð³Ñ Ð¸ пеÑедаÑи
ÑÑиÑ
даннÑÑ
дÑÑгим компаниÑм и "
+#~ "ÑекламодаÑелÑм</a>."
+
+#~ msgid ""
+#~ "At least 30 thousand organizations in the United States are newly “"
+#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via "
+#~ "<a href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-"
+#~ "organizations-newly-hacked-via-holes-in-microsofts-email-software/"
+#~ "\">holes in Microsoft's proprietary email software, named Microsoft 365</"
+#~ "a>. It is unclear whether there are other holes and vulnerabilities in "
+#~ "the program or not but history and experience tells us it wouldn't be the "
+#~ "last disaster with proprietary programs."
+#~ msgstr ""
+#~ "Ðо менÑÑей меÑе 30 ÑÑÑÑÑ Ð¾ÑганизаÑий в
СоединеннÑÑ
ШÑаÑаÑ
недавно “"
+#~ "<a
href=\"/philosophy/words-to-avoid.html#Hacker\">взломанÑ</a>” Ñ "
+#~ "помоÑÑÑ <a
href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-"
+#~
"organizations-newly-hacked-via-holes-in-microsofts-email-software/\">дÑÑ "
+#~ "в неÑвободной поÑÑовой пÑогÑамме Microsoft
под названием Microsoft 365</"
+#~ "a>. ÐеÑÑно, еÑÑÑ Ð»Ð¸ дÑÑгие дÑÑÑ Ð¸
ÑÑзвимоÑÑи в ÑÑой пÑогÑамме, но иÑÑоÑÐ¸Ñ "
+#~ "и опÑÑ Ð³Ð¾Ð²Ð¾ÑÑÑ Ð½Ð°Ð¼, ÑÑо едва ли ÑÑо
поÑледнее бедÑÑвие, ÑвÑзанное Ñ "
+#~ "неÑвободнÑми пÑоÑаммами."
+
+#~ msgid ""
#~ "Researchers at the security firm SentinelOne discovered a <a href="
#~ "\"https://www.wired.com/story/windows-defender-vulnerability-twelve-years/"
#~ "\">security flaw in proprietary program Microsoft Windows Defender that "
Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- proprietary.tr.po 11 Apr 2021 12:03:14 -0000 1.143
+++ proprietary.tr.po 11 Apr 2021 13:04:35 -0000 1.144
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
"PO-Revision-Date: 2021-03-17 06:40+0100\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -336,6 +336,25 @@
msgstr "Son eklenenler"
#. type: Content of: <div><ul><li><p>
+msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
#, fuzzy
#| msgid ""
#| "Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/"
@@ -430,40 +449,6 @@
"karÅılıÄında satmaktan ziyade kiÅisel verinizi toplamak ve (muhtemelen)
"
"çıkar saÄlamak için onu baÅkalarına vermek."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a href=\"https://www.nytimes."
-"com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
-"html\">for violating people's privacy by collecting their data from mobile "
-"games and handing over these data to other companies/advertisers</a>."
-msgstr ""
-"Tiny Lab Productions Åirketi Google, Twitter ve diÄer üç Åirket
tarafından "
-"yürütülen çevrim içi reklam iÅletmeleriyle birlikte <a
href=\"https://www."
-"nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-"
-"twitter.html\">mobil oyunlarda verilerini toplayarak ve bu verileri diÄer "
-"Åirketlere/reklamcılara vererek insanların gizliliÄini ihlal ettikleri
için</"
-"a> bir davayla karÅı karÅıya."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-"
-"newly-hacked-via-holes-in-microsofts-email-software/\">holes in Microsoft's "
-"proprietary email software, named Microsoft 365</a>. It is unclear whether "
-"there are other holes and vulnerabilities in the program or not but history "
-"and experience tells us it wouldn't be the last disaster with proprietary "
-"programs."
-msgstr ""
-"BirleÅmiÅ Devletler\t'deki en azından 30 bin kuruluÅ, <a href=\"https://"
-"krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-"
-"via-holes-in-microsofts-email-software/\">Microsoft'un, Microsoft 365 adlı "
-"özel mülk e-posta yazılımındaki açıklar</a> nedeniyle “<a
href=\"/"
-"philosophy/words-to-avoid.html#Hacker\">kırıldılar</a>”. Programda "
-"baÅka açıkların veya zaafların olup olmadıÄı açık deÄil, ancak
tarih ve "
-"deneyim bize bunun özel mülk programların son felaketi olmayacaÄını
söylüyor."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -545,6 +530,40 @@
msgstr "Son Güncelleme:"
#~ msgid ""
+#~ "Tiny Lab Productions, along with online ad businesses run by Google, "
+#~ "Twitter and three other companies are facing a lawsuit <a href=\"https://"
+#~ "www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-"
+#~ "google-twitter.html\">for violating people's privacy by collecting their "
+#~ "data from mobile games and handing over these data to other companies/"
+#~ "advertisers</a>."
+#~ msgstr ""
+#~ "Tiny Lab Productions Åirketi Google, Twitter ve diÄer üç Åirket "
+#~ "tarafından yürütülen çevrim içi reklam iÅletmeleriyle birlikte <a
href="
+#~ "\"https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-"
+#~ "data-privacy-google-twitter.html\">mobil oyunlarda verilerini toplayarak "
+#~ "ve bu verileri diÄer Åirketlere/reklamcılara vererek insanların "
+#~ "gizliliÄini ihlal ettikleri için</a> bir davayla karÅı karÅıya."
+
+#~ msgid ""
+#~ "At least 30 thousand organizations in the United States are newly “"
+#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via "
+#~ "<a href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-"
+#~ "organizations-newly-hacked-via-holes-in-microsofts-email-software/"
+#~ "\">holes in Microsoft's proprietary email software, named Microsoft 365</"
+#~ "a>. It is unclear whether there are other holes and vulnerabilities in "
+#~ "the program or not but history and experience tells us it wouldn't be the "
+#~ "last disaster with proprietary programs."
+#~ msgstr ""
+#~ "BirleÅmiÅ Devletler\t'deki en azından 30 bin kuruluÅ, <a
href=\"https://"
+#~ "krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-"
+#~ "via-holes-in-microsofts-email-software/\">Microsoft'un, Microsoft 365 "
+#~ "adlı özel mülk e-posta yazılımındaki açıklar</a> nedeniyle
“<a href="
+#~ "\"/philosophy/words-to-avoid.html#Hacker\">kırıldılar</a>”. "
+#~ "Programda baÅka açıkların veya zaafların olup olmadıÄı açık
deÄil, ancak "
+#~ "tarih ve deneyim bize bunun özel mülk programların son felaketi "
+#~ "olmayacaÄını söylüyor."
+
+#~ msgid ""
#~ "Researchers at the security firm SentinelOne discovered a <a href="
#~ "\"https://www.wired.com/story/windows-defender-vulnerability-twelve-years/"
#~ "\">security flaw in proprietary program Microsoft Windows Defender that "
Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.180
retrieving revision 1.181
diff -u -b -r1.180 -r1.181
--- proprietary.zh-cn.po 11 Apr 2021 12:03:15 -0000 1.180
+++ proprietary.zh-cn.po 11 Apr 2021 13:04:35 -0000 1.181
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
"PO-Revision-Date: 2021-03-17 14:45+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -315,6 +315,25 @@
msgstr "ææ°æ·»å "
#. type: Content of: <div><ul><li><p>
+msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
#, fuzzy
#| msgid ""
#| "Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/"
@@ -400,37 +419,6 @@
"çèµ·æ¥è¿äºååä¸æ¯é ç产åéå®çµè§æºèµé±ï¼èæ¯é
æ¶é个人æ°æ®è¿èï¼å¯è½ï¼ææ°"
"æ®äº¤ç»å
¶ä»äººèè·å©ã"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a href=\"https://www.nytimes."
-"com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
-"html\">for violating people's privacy by collecting their data from mobile "
-"games and handing over these data to other companies/advertisers</a>."
-msgstr ""
-"Tiny Lab Productions å
¬å¸ï¼ä»¥åç± GoogleãTwitter åå¦å¤ä¸å®¶å
¶ä»è¿è¥å¨çº¿å¹¿å"
-"çå
¬å¸ç®åé¢ä¸´ <a
href=\"https://www.nytimes.com/interactive/2018/09/12/"
-"technology/kids-apps-data-privacy-google-twitter.html\">éè¿å¨çº¿æ¸¸ææ¶éæ°æ®"
-"åå°æ°æ®äº¤ç»å
¶ä»å
¬å¸å广ååèè¿åéç§æ</a>
çææ§ã."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-"
-"newly-hacked-via-holes-in-microsofts-email-software/\">holes in Microsoft's "
-"proprietary email software, named Microsoft 365</a>. It is unclear whether "
-"there are other holes and vulnerabilities in the program or not but history "
-"and experience tells us it wouldn't be the last disaster with proprietary "
-"programs."
-msgstr ""
-"æè¿ï¼ç¾å½æå°æ 3 ä¸ä¸ªç»ç»åæºæ被 “<a
href=\"/philosophy/words-to-"
-"avoid.html#Hacker\">ç ´å</a>”ï¼è¯¥ç ´åéè¿ <a href=\"https://"
-"krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-"
-"via-holes-in-microsofts-email-software/\">微软çä¸æçµåé®ä»¶è½¯ä»¶ï¼å³
"
-"Microsoft 365</a>
è¿è¡ãè½ç¶æ们并ä¸ç¥é该ä¸æç¨åºæ¯å¦è¿æå
¶ä»çæ¼æ´åå¼±ç¹ï¼"
-"ä½æ¯åå²åç»éªåè¯æ们è¿æ¬¡ä¸ä¼æ¯ä¸æ软件çæåæ¶æã"
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -508,6 +496,36 @@
msgstr "æåæ´æ°ï¼"
#~ msgid ""
+#~ "Tiny Lab Productions, along with online ad businesses run by Google, "
+#~ "Twitter and three other companies are facing a lawsuit <a href=\"https://"
+#~ "www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-"
+#~ "google-twitter.html\">for violating people's privacy by collecting their "
+#~ "data from mobile games and handing over these data to other companies/"
+#~ "advertisers</a>."
+#~ msgstr ""
+#~ "Tiny Lab Productions å
¬å¸ï¼ä»¥åç± GoogleãTwitter åå¦å¤ä¸å®¶å
¶ä»è¿è¥å¨çº¿å¹¿"
+#~ "åçå
¬å¸ç®åé¢ä¸´ <a
href=\"https://www.nytimes.com/interactive/2018/09/12/"
+#~
"technology/kids-apps-data-privacy-google-twitter.html\">éè¿å¨çº¿æ¸¸ææ¶éæ°"
+#~ "æ®åå°æ°æ®äº¤ç»å
¶ä»å
¬å¸å广ååèè¿åéç§æ</a>
çææ§ã."
+
+#~ msgid ""
+#~ "At least 30 thousand organizations in the United States are newly “"
+#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via "
+#~ "<a href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-"
+#~ "organizations-newly-hacked-via-holes-in-microsofts-email-software/"
+#~ "\">holes in Microsoft's proprietary email software, named Microsoft 365</"
+#~ "a>. It is unclear whether there are other holes and vulnerabilities in "
+#~ "the program or not but history and experience tells us it wouldn't be the "
+#~ "last disaster with proprietary programs."
+#~ msgstr ""
+#~ "æè¿ï¼ç¾å½æå°æ 3 ä¸ä¸ªç»ç»åæºæ被 “<a
href=\"/philosophy/words-to-"
+#~ "avoid.html#Hacker\">ç ´å</a>”ï¼è¯¥ç ´åéè¿ <a href=\"https://"
+#~ "krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-"
+#~
"via-holes-in-microsofts-email-software/\">微软çä¸æçµåé®ä»¶è½¯ä»¶ï¼å³
"
+#~ "Microsoft 365</a>
è¿è¡ãè½ç¶æ们并ä¸ç¥é该ä¸æç¨åºæ¯å¦è¿æå
¶ä»çæ¼æ´åå¼±"
+#~
"ç¹ï¼ä½æ¯åå²åç»éªåè¯æ们è¿æ¬¡ä¸ä¼æ¯ä¸æ软件çæåæ¶æã"
+
+#~ msgid ""
#~ "Researchers at the security firm SentinelOne discovered a <a href="
#~ "\"https://www.wired.com/story/windows-defender-vulnerability-twelve-years/"
#~ "\">security flaw in proprietary program Microsoft Windows Defender that "
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.236
retrieving revision 1.237
diff -u -b -r1.236 -r1.237
--- proprietary.zh-tw-diff.html 11 Apr 2021 12:03:15 -0000 1.236
+++ proprietary.zh-tw-diff.html 11 Apr 2021 13:04:35 -0000 1.237
@@ -58,16 +58,16 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a:hover { text-decoration: underline; }
+#TOC a { text-decoration: none; }
+#TOC a:hover { text-decoration: underline; }
-->
</style>
<style type="text/css" media="print,screen">
@@ -224,6 +224,27 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202102160">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Google has <a
+
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16">handed
+ over personal data of Indian protesters and activists to Indian
+ police</a> which leaded to their arrest. The cops requested the IP
+ address and the location where a document was created and with those
+ information, they identified protesters and activists.</p>
+ </li>
+
+ <li id="M202007020">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-07</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>BMW is trying to <a
+
href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates">lock
+ certain features of its cars, and force people to pay to use part of
+ the car they already bought</a>. This is done through forced update
+ of the car software via a radio-operated back door.</p>
+ </li>
+
<li id="M202103100">
<!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -272,29 +293,6 @@
TV and sell them for money, but to collect your personal data and
(possibly) hand over them to others for benefit.</p>
</li>
-
- <li id="M201809121">
- <!--#set var="DATE" value='<small
class="date-tag">2018-09</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Tiny Lab Productions, along with online ad businesses run
- by Google, Twitter and three other companies are facing a lawsuit <a
-
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html">for
- violating people's privacy by collecting their data from mobile games
- and handing over these data to other
companies/advertisers</a>.</p>
- </li>
-
- <li id="M202103050">
- <!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>At least 30 thousand organizations
- in the United States are newly “<a
- href="/philosophy/words-to-avoid.html#Hacker">cracked</a>”
via <a
-
href="https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/">holes
- in Microsoft's proprietary email software, named Microsoft 365</a>.
It
- is unclear whether there are other holes and vulnerabilities in the
- program or not but history and experience tells us it wouldn't be
- the last disaster with proprietary programs.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -358,7 +356,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/11 12:03:15 $
+$Date: 2021/04/11 13:04:35 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.241
retrieving revision 1.242
diff -u -b -r1.241 -r1.242
--- proprietary.zh-tw.po 11 Apr 2021 12:03:15 -0000 1.241
+++ proprietary.zh-tw.po 11 Apr 2021 13:04:36 -0000 1.242
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 11:56+0000\n"
+"POT-Creation-Date: 2021-04-11 12:55+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -458,6 +458,25 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/"
"technology/2021/03/10/amazon-library-ebook-monopoly/\">stopping public "
"libraries from lending e-books and audiobooks</a>. Amazon became powerful in "
@@ -512,27 +531,6 @@
"over them to others for benefit."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Tiny Lab Productions, along with online ad businesses run by Google, Twitter "
-"and three other companies are facing a lawsuit <a href=\"https://www.nytimes."
-"com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter."
-"html\">for violating people's privacy by collecting their data from mobile "
-"games and handing over these data to other companies/advertisers</a>."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"At least 30 thousand organizations in the United States are newly “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">cracked</a>” via <a "
-"href=\"https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-"
-"newly-hacked-via-holes-in-microsofts-email-software/\">holes in Microsoft's "
-"proprietary email software, named Microsoft 365</a>. It is unclear whether "
-"there are other holes and vulnerabilities in the program or not but history "
-"and experience tells us it wouldn't be the last disaster with proprietary "
-"programs."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.371
retrieving revision 1.372
diff -u -b -r1.371 -r1.372
--- pt-br.po 11 Apr 2021 12:03:15 -0000 1.371
+++ pt-br.po 11 Apr 2021 13:04:36 -0000 1.372
@@ -4445,6 +4445,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google Nest <a href=\"https://blog.google/products/google-nest/partnership-"
"adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
"software update to its speaker devices using their back door <a href="
@@ -8282,6 +8292,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
"door that can make it cease to function</a>."
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.626
retrieving revision 1.627
diff -u -b -r1.626 -r1.627
--- ru.po 11 Apr 2021 12:03:15 -0000 1.626
+++ ru.po 11 Apr 2021 13:04:37 -0000 1.627
@@ -5375,6 +5375,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google Nest <a href=\"https://blog.google/products/google-nest/partnership-"
"adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
"software update to its speaker devices using their back door <a href="
@@ -9982,6 +9992,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
"door that can make it cease to function</a>."
Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.163
retrieving revision 1.164
diff -u -b -r1.163 -r1.164
--- tr.po 11 Apr 2021 12:03:16 -0000 1.163
+++ tr.po 11 Apr 2021 13:04:37 -0000 1.164
@@ -3947,6 +3947,16 @@
msgstr ""
#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
#, fuzzy
#| msgid ""
#| "Google Nest <a href=\"https://blog.google/products/google-nest/"
@@ -7408,6 +7418,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
"door that can make it cease to function</a>."
Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.164
retrieving revision 1.165
diff -u -b -r1.164 -r1.165
--- zh-cn.po 11 Apr 2021 12:03:16 -0000 1.164
+++ zh-cn.po 11 Apr 2021 13:04:37 -0000 1.165
@@ -3891,6 +3891,16 @@
msgstr ""
#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
#, fuzzy
#| msgid ""
#| "Google Nest <a href=\"https://blog.google/products/google-nest/"
@@ -7156,6 +7166,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
"door that can make it cease to function</a>."
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.300
retrieving revision 1.301
diff -u -b -r1.300 -r1.301
--- zh-tw.po 11 Apr 2021 12:03:16 -0000 1.300
+++ zh-tw.po 11 Apr 2021 13:04:37 -0000 1.301
@@ -3820,6 +3820,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"Google has <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+"ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+"and activists to Indian police</a> which leaded to their arrest. The cops "
+"requested the IP address and the location where a document was created and "
+"with those information, they identified protesters and activists."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google Nest <a href=\"https://blog.google/products/google-nest/partnership-"
"adt-smarter-home-security/\"> is taking over ADT</a>. Google sent out a "
"software update to its speaker devices using their back door <a href="
@@ -6944,6 +6954,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"BMW is trying to <a href=\"https://www.theverge.com/2020/7/2/21311332/bmw-in-"
+"car-purchase-heated-seats-software-over-the-air-updates\">lock certain "
+"features of its cars, and force people to pay to use part of the car they "
+"already bought</a>. This is done through forced update of the car software "
+"via a radio-operated back door."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
"door that can make it cease to function</a>."
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=