[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Thu, 15 Apr 2021 10:32:31 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 21/04/15 10:32:31
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po pt-br.po ru.po
tr.po zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.302&r2=1.303
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.428&r2=1.429
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.528&r2=1.529
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.302&r2=1.303
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.310&r2=1.311
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.303&r2=1.304
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.302&r2=1.303
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.301&r2=1.302
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.178&r2=1.179
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.388&r2=1.389
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.180&r2=1.181
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.623&r2=1.624
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.244&r2=1.245
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.400&r2=1.401
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.262&r2=1.263
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.382&r2=1.383
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.321&r2=1.322
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.704&r2=1.705
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.373&r2=1.374
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.630&r2=1.631
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.302&r2=1.303
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- de.po 11 Apr 2021 15:04:17 -0000 1.302
+++ de.po 15 Apr 2021 14:32:13 -0000 1.303
@@ -13310,6 +13310,13 @@
"\">Proprietary Tethers</a>."
msgstr ""
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org"
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
#. type: Content of: <div><div><div><h3>
msgid "Table of Contents"
msgstr "Inhaltsverzeichnis"
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.428
retrieving revision 1.429
diff -u -b -r1.428 -r1.429
--- es.po 12 Apr 2021 10:33:22 -0000 1.428
+++ es.po 15 Apr 2021 14:32:13 -0000 1.429
@@ -14021,6 +14021,13 @@
"propia página: <a href=\"/proprietary/proprietary-tethers.html"
"\">Subordinación a un servidor en el software privativo</a>."
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org"
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
#. type: Content of: <div><div><div><h3>
# | [-<a href=\"#TOC\">Table-]{+Table+} of [-contents</a>-] {+Contents+}
#, fuzzy
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.528
retrieving revision 1.529
diff -u -b -r1.528 -r1.529
--- fr.po 12 Apr 2021 09:50:40 -0000 1.528
+++ fr.po 15 Apr 2021 14:32:14 -0000 1.529
@@ -11872,6 +11872,13 @@
"ont une page dédiée : <a
href=\"/proprietary/proprietary-tethers.html#about-"
"page\">Dépendance privatrice d'un serveur</a>."
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org"
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
#. type: Content of: <div><div><div><h3>
msgid "Table of Contents"
msgstr "Table des matières"
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- it.po 11 Apr 2021 15:04:17 -0000 1.302
+++ it.po 15 Apr 2021 14:32:15 -0000 1.303
@@ -12388,6 +12388,13 @@
"\">Proprietary Tethers</a>."
msgstr ""
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org"
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
#. type: Content of: <div><div><div><h3>
msgid "Table of Contents"
msgstr "Indice"
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.310
retrieving revision 1.311
diff -u -b -r1.310 -r1.311
--- ja.po 11 Apr 2021 15:04:17 -0000 1.310
+++ ja.po 15 Apr 2021 14:32:15 -0000 1.311
@@ -9830,6 +9830,13 @@
"\">Proprietary Tethers</a>."
msgstr ""
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org"
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
#. type: Content of: <div><div><div><h3>
msgid "Table of Contents"
msgstr "ããã"
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.303
retrieving revision 1.304
diff -u -b -r1.303 -r1.304
--- nl.po 11 Apr 2021 15:04:18 -0000 1.303
+++ nl.po 15 Apr 2021 14:32:15 -0000 1.304
@@ -9119,6 +9119,13 @@
"\">Proprietary Tethers</a>."
msgstr ""
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org"
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
#. type: Content of: <div><div><div><h3>
# || No change detected. The change might only be in amounts of spaces.
#, fuzzy
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- pl.po 11 Apr 2021 15:04:18 -0000 1.302
+++ pl.po 15 Apr 2021 14:32:16 -0000 1.303
@@ -8619,6 +8619,13 @@
"\">Proprietary Tethers</a>."
msgstr ""
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org"
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
#. type: Content of: <div><div><div><h3>
# || No change detected. The change might only be in amounts of spaces.
#, fuzzy
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.301
retrieving revision 1.302
diff -u -b -r1.301 -r1.302
--- pot 11 Apr 2021 15:04:18 -0000 1.301
+++ pot 15 Apr 2021 14:32:17 -0000 1.302
@@ -7900,6 +7900,13 @@
"\">Proprietary Tethers</a>."
msgstr ""
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org"
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
#. type: Content of: <div><div><div><h3>
msgid "Table of Contents"
msgstr ""
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.178
retrieving revision 1.179
diff -u -b -r1.178 -r1.179
--- proprietary-surveillance.de-diff.html 11 Apr 2021 15:04:18 -0000
1.178
+++ proprietary-surveillance.de-diff.html 15 Apr 2021 14:32:18 -0000
1.179
@@ -117,7 +117,9 @@
server are snoopers by nature. We do not list them here because they
have their own page: <a
href="/proprietary/proprietary-tethers.html#about-page">Proprietary
-Tethers</a>.</p>
+ Tethers</a>.</p>
+
+<p>There is a similar site named <a
href="https://spyware.neocities.org">Spyware Watchdog</a> that
classifies spyware programs, so that users can be more aware that they are
installing spyware.</p>
<div class="important" style="clear: both">
<p>If you know of an example that ought to be in this page but isn't
@@ -246,24 +248,21 @@
<span class="inserted"><ins><em><h4</em></ins></span>
id="LatestAdditions">Latest <span
class="removed"><del><strong>additions</h3>
-<p>Latest additions</strong></del></span> <span
class="inserted"><ins><em>additions</h4>
+<p>Latest</strong></del></span> <span
class="inserted"><ins><em>additions</h4>
-<p>Entries in each category</em></ins></span> are <span
class="removed"><del><strong>found</strong></del></span> <span
class="inserted"><ins><em>in reverse chronological order,
based</em></ins></span>
-on <span class="removed"><del><strong>top under each category.</p>
+<p>Entries in each category are in reverse chronological order, based
+on the dates of publication of linked articles.
+The latest</em></ins></span> additions are <span
class="removed"><del><strong>found</strong></del></span> <span
class="inserted"><ins><em>listed</em></ins></span> on <span
class="removed"><del><strong>top under each category.</p>
<!-- #OSSpyware -->
-<!-- WEBMASTERS: make sure to place new items</strong></del></span> <span
class="inserted"><ins><em>the dates of publication of linked articles.
-The latest additions are listed</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section">
- <h3</strong></del></span> <span class="inserted"><ins><em>the <a
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>the <a
href="/proprietary/proprietary.html#latest">main page</a> of the
-Malware section.</p>
+Malware section.</p></em></ins></span>
<div class="big-section">
- <h3</em></ins></span> id="OSSpyware">Spyware in <span
class="removed"><del><strong>Operating Systems</h3></strong></del></span>
<span class="inserted"><ins><em>Laptops and
Desktops</h3></em></ins></span>
+ <h3 id="OSSpyware">Spyware in <span
class="removed"><del><strong>Operating Systems</h3></strong></del></span>
<span class="inserted"><ins><em>Laptops and
Desktops</h3></em></ins></span>
<span class="anchor-reference-id">(<a
href="#OSSpyware">#OSSpyware</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -646,10 +645,11 @@
snoopers</a>.</p>
<p>Google did not intend to make these apps spy;</strong></del></span>
<span class="inserted"><ins><em>spyware via
- BIOS</a></em></ins></span> on <span
class="removed"><del><strong>the</strong></del></span> <span
class="inserted"><ins><em>Windows installs. Note that the specific
+ BIOS</a></em></ins></span> on <span
class="inserted"><ins><em>Windows installs. Note that</em></ins></span> the
<span class="removed"><del><strong>contrary, it
+ worked</strong></del></span> <span class="inserted"><ins><em>specific
sabotage method Lenovo used did not affect GNU/Linux; also, a
“clean” Windows install is not really clean since <a
- href="/proprietary/malware-microsoft.html">Microsoft puts in its
+ href="/proprietary/malware-microsoft.html">Microsoft
puts</em></ins></span> in <span class="removed"><del><strong>various ways to
prevent that,</strong></del></span> <span class="inserted"><ins><em>its
own malware</a>.</p>
</li>
</ul>
@@ -672,31 +672,49 @@
<!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The proprietary program Clubhouse
- is malware and a privacy disaster. Clubhouse <a
+ is malware</em></ins></span> and <span
class="removed"><del><strong>deleted these apps
+ after discovering what they did. So we cannot blame Google
+ specifically for the snooping</strong></del></span> <span
class="inserted"><ins><em>a privacy disaster. Clubhouse <a
href="https://www.theguardian.com/commentisfree/2021/feb/20/why-hot-new-social-app-clubhouse-spells-nothing-but-trouble">collects
people's personal data such as recordings of people's
conversations</a>, and, as a secondary problem, does not encrypt
them,
- which shows a bad security part of the issue.</p>
+ which shows a bad security part</em></ins></span> of <span
class="removed"><del><strong>these apps.</p>
- <p>A user's unique Clubhouse ID number and chatroom ID are
transmitted
- in plaintext, and Agora (the company behind the app) would likely
- have access to users' raw audio, potentially providing access to
- the Chinese government.</p>
+ <p>On</strong></del></span> the <span
class="removed"><del><strong>other hand, Google redistributes nonfree Android
apps,</strong></del></span> <span class="inserted"><ins><em>issue.</p>
- <p>Even with good security of data transmission, collecting personal
- data of people is wrong and a violation of people's privacy
rights.</p>
+ <p>A user's unique Clubhouse ID number</em></ins></span> and
+ <span class="removed"><del><strong>therefore shares</strong></del></span>
<span class="inserted"><ins><em>chatroom ID are transmitted</em></ins></span>
+ in <span class="inserted"><ins><em>plaintext, and Agora (the company
behind</em></ins></span> the <span class="removed"><del><strong>responsibility
for</strong></del></span> <span class="inserted"><ins><em>app) would likely
+ have access to users' raw audio, potentially providing access
to</em></ins></span>
+ the <span class="removed"><del><strong>injustice</strong></del></span>
<span class="inserted"><ins><em>Chinese government.</p>
+
+ <p>Even with good security</em></ins></span> of <span
class="removed"><del><strong>their
+ being nonfree. It also distributes its own nonfree apps, such as
+ Google
+ Play, <a
href="/philosophy/free-software-even-more-important.html">which
+ are malicious</a>.</p>
+
+ <p>Could Google have done</strong></del></span> <span
class="inserted"><ins><em>data transmission, collecting personal
+ data of people is wrong and</em></ins></span> a <span
class="removed"><del><strong>better job</strong></del></span> <span
class="inserted"><ins><em>violation</em></ins></span> of <span
class="removed"><del><strong>preventing apps from
+ cheating? There</strong></del></span> <span
class="inserted"><ins><em>people's privacy rights.</p>
</li>
<li id="M202101080">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a
+ <p>As of 2021, WhatsApp (one of Facebook's
subsidiaries)</em></ins></span> is <span class="removed"><del><strong>no
systematic way for Google, or Android
+ users,</strong></del></span> <span class="inserted"><ins><em><a
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/">forcing
- its users to hand over sensitive personal data</a> to its parent
- company. This increases Facebook's power over users, and further
+ its users</em></ins></span> to <span class="removed"><del><strong>inspect
executable proprietary apps</strong></del></span> <span
class="inserted"><ins><em>hand over sensitive personal
data</a></em></ins></span> to <span class="removed"><del><strong>see what
they
+ do.</p>
+
+ <p>Google could demand the source code for these
apps,</strong></del></span> <span class="inserted"><ins><em>its parent
+ company. This increases Facebook's power over users,</em></ins></span> and
<span class="removed"><del><strong>study the
+ source code somehow to determine whether they mistreat users in
+ various ways. If it did a good job</strong></del></span> <span
class="inserted"><ins><em>further
jeopardizes people's privacy and security.</p>
- <p>Instead of WhatsApp you can use <a
+ <p>Instead</em></ins></span> of <span
class="removed"><del><strong>this, it could more or</strong></del></span> <span
class="inserted"><ins><em>WhatsApp you can use <a
href="https://directory.fsf.org/wiki/Jami">GNU Jami</a>, which is
free software and will not collect your data.</p>
</li>
@@ -710,10 +728,15 @@
especially nasty malware, helping companies snoop on users as well
as snooping on them itself</a>.</p>
- <p>The article says that Biden's app has a less manipulative overall
+ <p>The article says that Biden's app has a</em></ins></span> less
+ <span class="removed"><del><strong>prevent</strong></del></span> <span
class="inserted"><ins><em>manipulative overall
approach, but that does not tell us whether it has functionalities we
- consider malicious, such as sending data the user has not explicitly
- asked to send.</p>
+ consider malicious,</em></ins></span> such <span
class="removed"><del><strong>snooping, except when</strong></del></span> <span
class="inserted"><ins><em>as sending data</em></ins></span> the <span
class="removed"><del><strong>app developers are clever
+ enough</strong></del></span> <span class="inserted"><ins><em>user has not
explicitly
+ asked</em></ins></span> to <span class="removed"><del><strong>outsmart the
checking.</p>
+
+ <p>But since Google itself develops malicious apps, we cannot trust
+ Google</strong></del></span> <span
class="inserted"><ins><em>send.</p>
</li>
<li id="M201809121">
@@ -723,29 +746,36 @@
by Google, Twitter and three other companies are facing a lawsuit <a
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html">for
violating people's privacy by collecting their data from mobile games
- and handing over these data to other
companies/advertisers</a>.</p>
+ and handing over these data</em></ins></span> to <span
class="removed"><del><strong>protect us. We must demand
release</strong></del></span> <span class="inserted"><ins><em>other
companies/advertisers</a>.</p>
</li>
<li id="M201601110">
<!--#set var="DATE" value='<small
class="date-tag">2016-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The natural extension of monitoring
+ <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>source code</strong></del></span> <span
class="inserted"><ins><em>monitoring
people through “their” phones is <a
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software to make sure they can't “fool”
- the monitoring</a>.</p>
+ proprietary software</em></ins></span> to <span
class="inserted"><ins><em>make sure they can't
“fool”</em></ins></span>
+ the
+ <span class="removed"><del><strong>public, so we can depend on each
other.</p></strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li>
+ <p>A</strong></del></span>
- <li id="M201510050">
+ <span class="inserted"><ins><em><li id="M201510050">
<!--#set var="DATE" value='<small
class="date-tag">2015-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>According to Edward Snowden, <a
- href="http://www.bbc.com/news/uk-34444233">agencies can take over
+ <p>According to Edward Snowden,</em></ins></span> <a <span
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a> that investigated</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233">agencies
can take over
smartphones</a> by sending hidden text messages which enable
- them to turn the phones on and off, listen to the microphone,
+ them to turn</em></ins></span> the <span
class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>phones on</em></ins></span> and <span
class="removed"><del><strong>security
+ of 283 Android VPN apps concluded that “in spite
of</strong></del></span> <span class="inserted"><ins><em>off, listen
to</em></ins></span> the
+ <span class="removed"><del><strong>promises for privacy,
security,</strong></del></span> <span class="inserted"><ins><em>microphone,
retrieve geo-location data from the GPS, take photographs, read
- text messages, read call, location and web browsing history, and
- read the contact list. This malware is designed to disguise itself
+ text messages, read call, location</em></ins></span> and <span
class="removed"><del><strong>anonymity given by</strong></del></span> <span
class="inserted"><ins><em>web browsing history, and
+ read</em></ins></span> the
+ <span class="removed"><del><strong>majority of VPN apps—millions of
users may be unawarely subject</strong></del></span> <span
class="inserted"><ins><em>contact list. This malware is
designed</em></ins></span> to <span class="removed"><del><strong>poor security
guarantees</strong></del></span> <span class="inserted"><ins><em>disguise itself
from investigation.</p>
</li>
@@ -755,12 +785,21 @@
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones,
- Android, and BlackBerry</a>. While there is not much
- detail here, it seems that this does not operate via
- the universal back door that we know nearly all portable
+ Android,</em></ins></span> and <span class="removed"><del><strong>abusive
practices inflicted by
+ VPN apps.”</p>
+
+ <p>Following</strong></del></span> <span
class="inserted"><ins><em>BlackBerry</a>. While there</em></ins></span>
is <span class="removed"><del><strong>a non-exhaustive list of proprietary VPN
apps from
+ the research paper</strong></del></span> <span
class="inserted"><ins><em>not much
+ detail here, it seems</em></ins></span> that <span
class="removed"><del><strong>tracks and infringes</strong></del></span> <span
class="inserted"><ins><em>this does not operate via</em></ins></span>
+ the <span class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>universal back door that we know nearly all portable
phones have. It may involve exploiting various bugs. There are <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots of bugs in the phones' radio software</a>.</p>
+ lots</em></ins></span> of
+ <span class="removed"><del><strong>users:</p>
+
+ <dl>
+ <dt>SurfEasy</dt>
+ <dd>Includes tracking libraries such as
NativeX</strong></del></span> <span class="inserted"><ins><em>bugs in the
phones' radio software</a>.</p>
</li>
<li id="M201307000">
@@ -768,9 +807,10 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Portable phones with GPS <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send their GPS location on remote command, and users cannot stop
- them</a>. (The US says it will eventually require all new portable
phones
- to have GPS.)</p>
+ will send their GPS location on remote command,</em></ins></span> and
<span class="removed"><del><strong>Appflood,
+ meant</strong></del></span> <span class="inserted"><ins><em>users cannot
stop
+ them</a>. (The US says it will eventually require all new portable
phones</em></ins></span>
+ to <span class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>have GPS.)</p>
</li>
</ul>
@@ -786,7 +826,11 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Facebook <a
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops
- on Instagram</a> users by surreptitously turning on the device's
+ on Instagram</a></em></ins></span> users <span
class="removed"><del><strong>and show them targeted ads.</dd>
+
+ <dt>sFly Network Booster</dt>
+ <dd>Requests</strong></del></span> <span
class="inserted"><ins><em>by surreptitously turning on</em></ins></span> the
<span class="removed"><del><strong><code>READ_SMS</code> and
<code>SEND_SMS</code>
+ permissions upon installation, meaning</strong></del></span> <span
class="inserted"><ins><em>device's
camera.</p>
</li>
@@ -797,17 +841,31 @@
made a practice of surreptitiously activating the Siri software to <a
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf">
record users' conversations when they had not activated Siri</a>.
- This was not just occasional, it was systematic practice.</p>
+ This was not just occasional,</em></ins></span> it <span
class="inserted"><ins><em>was systematic practice.</p>
<p>His job was to listen to these recordings, in a group that made
- transcripts of them. He does not believes that Apple has ceased this
+ transcripts of them. He does not believes that Apple</em></ins></span> has
<span class="removed"><del><strong>full</strong></del></span> <span
class="inserted"><ins><em>ceased this
practice.</p>
<p>The only reliable way to prevent this is, for the program that
- controls access to the microphone to decide when the user has
- “activated” any service, to be free software, and the
- operating system under it free as well. This way, users could make
- sure Apple can't listen to them.</p>
+ controls</em></ins></span> access to
+ <span class="removed"><del><strong>users' text messages.</dd>
+
+ <dt>DroidVPN and TigerVPN</dt>
+ <dd>Requests</strong></del></span> the <span
class="removed"><del><strong><code>READ_LOGS</code>
permission</strong></del></span> <span
class="inserted"><ins><em>microphone</em></ins></span> to <span
class="removed"><del><strong>read logs
+ for other apps</strong></del></span> <span
class="inserted"><ins><em>decide when the user has
+ “activated” any service, to be free
software,</em></ins></span> and <span class="removed"><del><strong>also
core</strong></del></span> <span class="inserted"><ins><em>the
+ operating</em></ins></span> system <span
class="removed"><del><strong>logs. TigerVPN developers
+ have confirmed this.</dd>
+
+ <dt>HideMyAss</dt>
+ <dd>Sends traffic to LinkedIn. Also,</strong></del></span> <span
class="inserted"><ins><em>under</em></ins></span> it <span
class="removed"><del><strong>stores detailed logs
+ and may turn them over</strong></del></span> <span
class="inserted"><ins><em>free as well. This way, users could make
+ sure Apple can't listen</em></ins></span> to <span
class="removed"><del><strong>the UK government if
+ requested.</dd>
+
+ <dt>VPN Services HotspotShield</dt>
+ <dd>Injects JavaScript code into the HTML pages
returned</strong></del></span> <span class="inserted"><ins><em>them.</p>
</li>
<li id="M201910131">
@@ -815,90 +873,134 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Safari occasionally <a
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
- sends browsing data from Apple devices in China to the Tencent Safe
- Browsing service</a>, to check URLs that possibly correspond to
+ sends browsing data from Apple devices in China</em></ins></span> to the
+ <span class="removed"><del><strong>users. The stated purpose of the JS
injection is</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
+ Browsing service</a>,</em></ins></span> to <span
class="removed"><del><strong>display
+ ads. Uses roughly 5 tracking libraries. Also, it redirects the
+ user's traffic through valueclick.com (an advertising
+ website).</dd>
+
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript code into HTML pages, and also uses
+ roughly 5 tracking libraries. Developers of this app have
+ confirmed</strong></del></span> <span class="inserted"><ins><em>check
URLs</em></ins></span> that <span class="inserted"><ins><em>possibly correspond
to
“fraudulent” websites. Since Tencent collaborates
- with the Chinese government, its Safe Browsing black list most certainly
- contains the websites of political opponents. By linking the requests
+ with</em></ins></span> the <span class="removed"><del><strong>non-premium
version</strong></del></span> <span class="inserted"><ins><em>Chinese
government, its Safe Browsing black list most certainly
+ contains the websites</em></ins></span> of <span
class="inserted"><ins><em>political opponents. By linking</em></ins></span> the
<span class="removed"><del><strong>app does
+ JavaScript injection for tracking</strong></del></span> <span
class="inserted"><ins><em>requests
originating from single IP addresses, the government can identify
- dissenters in China and Hong Kong, thus endangering their lives.</p>
+ dissenters in China</em></ins></span> and <span
class="removed"><del><strong>display ads.</dd>
+ </dl></strong></del></span> <span class="inserted"><ins><em>Hong Kong,
thus endangering their lives.</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li>
+ <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90%</strong></del></span>
- <li id="M201905280">
+ <span class="inserted"><ins><em><li id="M201905280">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>In spite of Apple's supposed commitment to
- privacy, iPhone apps contain trackers that are busy at night <a
+ <p>In spite</em></ins></span> of <span
class="removed"><del><strong>the top-ranked gratis
+ proprietary Android</strong></del></span> <span
class="inserted"><ins><em>Apple's supposed commitment to
+ privacy, iPhone</em></ins></span> apps <span
class="removed"><del><strong>contained recognizable tracking libraries. For
+ the paid proprietary apps, it was only 60%.</p></strong></del></span>
<span class="inserted"><ins><em>contain trackers that are busy at night <a
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
- sending users' personal information to third parties</a>.</p>
+ sending users' personal information to third
parties</a>.</p></em></ins></span>
- <p>The article mentions specific examples: Microsoft OneDrive,
+ <p>The article <span class="removed"><del><strong>confusingly
describes gratis</strong></del></span> <span class="inserted"><ins><em>mentions
specific examples: Microsoft OneDrive,
Intuit's Mint, Nike, Spotify, The Washington Post, The Weather
Channel (owned by IBM), the crime-alert service Citizen, Yelp
- and DoorDash. But it is likely that most nonfree apps contain
- trackers. Some of these send personally identifying data such as phone
+ and DoorDash. But it is likely that most nonfree</em></ins></span> apps
<span class="inserted"><ins><em>contain
+ trackers. Some of these send personally identifying data
such</em></ins></span> as <span class="removed"><del><strong>“free”,
+ but most</strong></del></span> <span class="inserted"><ins><em>phone
fingerprint, exact location, email address, phone number or even
- delivery address (in the case of DoorDash). Once this information
- is collected by the company, there is no telling what it will be
- used for.</p>
+ delivery address (in the case</em></ins></span> of <span
class="removed"><del><strong>them are not in fact
+ <a href="/philosophy/free-sw.html">free software</a>.
+ It also uses</strong></del></span> <span
class="inserted"><ins><em>DoorDash). Once this information
+ is collected by</em></ins></span> the <span
class="removed"><del><strong>ugly word “monetize”. A good
replacement
+ for that word</strong></del></span> <span class="inserted"><ins><em>company,
there</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always
that</strong></del></span> <span class="inserted"><ins><em>no telling what
it</em></ins></span> will <span class="removed"><del><strong>fit
+ perfectly.</p></strong></del></span> <span class="inserted"><ins><em>be
+ used for.</p></em></ins></span>
</li>
- <li id="M201711250">
+<span class="removed"><del><strong><li>
+ <p>Apps for BART</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711250">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The DMCA and the EU Copyright Directive make it <a
- href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr…apps spy on users</a>, because
- this would require circumventing the iOS DRM.</p>
+ <p>The DMCA and the EU Copyright Directive make it</em></ins></span>
<a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal to study how iOS cr…apps spy</em></ins></span> on <span
class="removed"><del><strong>users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With proprietary apps, one can only hope that they
don't.</p></strong></del></span> <span
class="inserted"><ins><em>users</a>, because
+ this would require circumventing the iOS DRM.</p></em></ins></span>
</li>
- <li id="M201709210">
+<span class="removed"><del><strong><li>
+ <p>A study found 234 Android apps that track users
by</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201709210">
<!--#set var="DATE" value='<small
class="date-tag">2017-09</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>In the latest iThings system,
- “turning off” WiFi and Bluetooth the obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ “turning off” WiFi and Bluetooth the obvious
way</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
them off—only until 5am. That's Apple for you—“We
- know you want to be spied on”.</p>
+ know you want</em></ins></span> to <span
class="removed"><del><strong>ultrasound from beacons placed in stores or played
by TV programs</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>be
spied on”.</p></em></ins></span>
</li>
- <li id="M201702150">
+<span class="removed"><del><strong><li>
+ <p>Pairs of Android apps can collude</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702150">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Apple proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
- fingerprint-scanning touch screen</a>—which would mean no way
- to use it without having your fingerprints taken. Users would have
- no way to tell whether the phone is snooping on them.</p>
+ fingerprint-scanning touch screen</a>—which would mean no
way</em></ins></span>
+ to <span class="removed"><del><strong>transmit users' personal
+ data</strong></del></span> <span class="inserted"><ins><em>use it
without having your fingerprints taken. Users would have
+ no way</em></ins></span> to <span
class="removed"><del><strong>servers.</strong></del></span> <span
class="inserted"><ins><em>tell whether the phone is snooping on them.</p>
</li>
<li id="M201611170">
<!--#set var="DATE" value='<small
class="date-tag">2016-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>iPhones <a
-
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots of personal data to Apple's servers</a>. Big Brother can get
- them from there.</p>
+ <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
+ lots</em></ins></span> of <span class="removed"><del><strong>pairs that
collude</a>.</p></strong></del></span> <span
class="inserted"><ins><em>personal data to Apple's servers</a>. Big
Brother can get
+ them from there.</p></em></ins></span>
</li>
- <li id="M201609280">
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609280">
<!--#set var="DATE" value='<small
class="date-tag">2016-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The iMessage app on iThings <a
-
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that the user types into it</a>; the
- server records these numbers for at least 30 days.</p>
+ <p>The iMessage</em></ins></span> app <span
class="removed"><del><strong>developers</strong></del></span> <span
class="inserted"><ins><em>on iThings</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+the personal details of users</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number</em></ins></span> that <span
class="removed"><del><strong>install</strong></del></span> the <span
class="removed"><del><strong>app</a>.</p>
+
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>user types into it</a>;</em></ins></span> the
<span class="removed"><del><strong>“consent” of users is not
enough</strong></del></span>
+ <span class="inserted"><ins><em>server records these numbers for at least
30 days.</p>
</li>
<li id="M201509240">
<!--#set var="DATE" value='<small
class="date-tag">2015-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>iThings automatically upload to Apple's servers all the photos
- and videos they make.</p>
-
- <blockquote><p> iCloud Photo Library stores every photo and
video you
- take, and keeps them up to date on all your devices. Any edits you
+ <p>iThings automatically upload</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>Apple's
servers all</em></ins></span> the <span
class="removed"><del><strong>“Terms</strong></del></span> <span
class="inserted"><ins><em>photos</em></ins></span>
+ and <span class="removed"><del><strong>Conditions” that spell out
+what</strong></del></span> <span
class="inserted"><ins><em>videos</em></ins></span> they <span
class="removed"><del><strong>are “consenting” to. Google should
clearly</strong></del></span> <span class="inserted"><ins><em>make.</p>
+
+ <blockquote><p> iCloud Photo Library stores every
photo</em></ins></span> and <span class="removed"><del><strong>honestly
identify the information it collects</strong></del></span> <span
class="inserted"><ins><em>video you
+ take, and keeps them up to date</em></ins></span> on <span
class="removed"><del><strong>users, instead
+of hiding it in an obscurely</strong></del></span> <span
class="inserted"><ins><em>all your devices. Any edits you
make are automatically updated everywhere. […]
</p></blockquote>
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
@@ -1147,9 +1249,9 @@
reading the “Terms and Conditions” that spell out what
they are “consenting” to. Google should clearly and
honestly identify the information it collects on users, instead of
- hiding it in an obscurely worded EULA.</p>
+ hiding it in an obscurely</em></ins></span> worded EULA.</p>
- <p>However, to truly protect people's privacy, we must prevent Google
+ <p>However, to <span class="removed"><del><strong>truly protect
people's privacy, we must prevent Google</strong></del></span> <span
class="inserted"><ins><em>truly protect people's privacy, we must prevent Google
and other companies from getting this personal information in the
first place!</p>
</li>
@@ -1719,10 +1821,10 @@
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
calls and sent them and text messages and emails to
snoopers</a>.</p>
- <p>Google did not intend to make these apps spy; on
the</em></ins></span> contrary, it
+ <p>Google did not intend to make these apps spy; on the contrary, it
worked in various ways to prevent that, and deleted these apps after
discovering what they did. So we cannot blame Google specifically
- for the <span class="removed"><del><strong>snooping</strong></del></span>
<span class="inserted"><ins><em>snooping of these apps.</p>
+ for the snooping of these apps.</p>
<p>On the other hand, Google redistributes nonfree Android apps, and
therefore shares in the responsibility for the injustice of their being
@@ -1781,39 +1883,23 @@
<p>Users are suing Bose for <a
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
distributing a spyware app for its headphones</a>. Specifically,
- the app would record the names</em></ins></span> of <span
class="removed"><del><strong>these apps.</p>
-
- <p>On</strong></del></span> the <span
class="removed"><del><strong>other hand, Google redistributes nonfree Android
apps, and
- therefore shares in</strong></del></span> <span
class="inserted"><ins><em>audio files users listen to
- along with</em></ins></span> the <span
class="removed"><del><strong>responsibility for</strong></del></span> <span
class="inserted"><ins><em>headphone's unique serial number.</p>
-
- <p>The suit accuses that this was done without</em></ins></span> the
<span class="removed"><del><strong>injustice</strong></del></span> <span
class="inserted"><ins><em>users' consent.
- If the fine print</em></ins></span> of <span
class="removed"><del><strong>their
- being nonfree.</strong></del></span> <span class="inserted"><ins><em>the
app said that users gave consent for this,
- would that make it acceptable? No way!</em></ins></span> It <span
class="removed"><del><strong>also distributes its own nonfree apps, such as
- Google
- Play,</strong></del></span> <span class="inserted"><ins><em>should be flat
out</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
- are malicious</a>.</p>
+ the app would record the names of the audio files users listen to
+ along with the headphone's unique serial number.</p>
- <p>Could Google have done a better job</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">
illegal to design
+ <p>The suit accuses that this was done without the users' consent.
+ If the fine print of the app said that users gave consent for this,
+ would that make it acceptable? No way! It should be flat out <a
+ href="/philosophy/surveillance-vs-democracy.html"> illegal to design
the app to snoop at all</a>.</p>
</li>
<li id="M201704074">
<!--#set var="DATE" value='<small
class="date-tag">2017-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Pairs</em></ins></span> of <span
class="removed"><del><strong>preventing apps from
- cheating? There is no systematic way for Google, or</strong></del></span>
Android
- <span class="removed"><del><strong>users, to inspect executable
proprietary</strong></del></span> apps <span class="inserted"><ins><em>can
collude</em></ins></span>
- to <span class="removed"><del><strong>see what they
- do.</p>
-
- <p>Google could demand the source code for these apps, and study the
- source code somehow</strong></del></span> <span
class="inserted"><ins><em>transmit users' personal data</em></ins></span> to
<span class="removed"><del><strong>determine whether they mistreat users in
- various ways. If it did a good job</strong></del></span> <span
class="inserted"><ins><em>servers. <a
+ <p>Pairs of Android apps can collude
+ to transmit users' personal data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
- study found tens</em></ins></span> of <span
class="removed"><del><strong>this,</strong></del></span> <span
class="inserted"><ins><em>thousands of pairs that collude</a>.</p>
+ study found tens of thousands of pairs that collude</a>.</p>
</li>
<li id="M201703300">
@@ -1821,21 +1907,16 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that</em></ins></span> it <span
class="removed"><del><strong>could more or less
- prevent such snooping, except</strong></del></span> <span
class="inserted"><ins><em>will</a> pre-install
+ announced an opt-in proprietary search app that it will</a>
pre-install
on some of its phones. The app will give Verizon the same information
- about the users' searches that Google normally gets</em></ins></span> when
<span class="inserted"><ins><em>they use
+ about the users' searches that Google normally gets when they use
its search engine.</p>
<p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
being pre-installed on only one phone</a>, and the user must
- explicitly opt-in before the app takes effect. However,</em></ins></span>
the app <span class="removed"><del><strong>developers are clever
- enough to outsmart the checking.</p>
-
- <p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We must demand release</strong></del></span>
- <span class="inserted"><ins><em>remains spyware—an
“optional” piece</em></ins></span> of <span
class="removed"><del><strong>source code</strong></del></span> <span
class="inserted"><ins><em>spyware is
+ explicitly opt-in before the app takes effect. However, the app
+ remains spyware—an “optional” piece of spyware is
still spyware.</p>
</li>
@@ -1844,7 +1925,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Meitu photo-editing app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data</em></ins></span> to <span class="inserted"><ins><em>a Chinese
company</a>.</p>
+ user data to a Chinese company</a>.</p>
</li>
<li id="M201611280">
@@ -1852,18 +1933,16 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after</em></ins></span> the
- <span class="removed"><del><strong>public, so we can depend on each
other.</p></strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
+ movements before and after the ride</a>.</p>
<p>This example illustrates how “getting the user's
consent” for surveillance is inadequate as a protection against
- massive surveillance.</p></em></ins></span>
+ massive surveillance.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201611160">
+ <li id="M201611160">
<!--#set var="DATE" value='<small
class="date-tag">2016-11</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
+ --><!--#echo encoding="none" var="DATE" -->
<p>A <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated the privacy and security of
@@ -1872,15 +1951,11 @@
apps—millions of users may be unawarely subject to poor security
guarantees and abusive practices inflicted by VPN apps.”</p>
- <p>Following is a non-exhaustive <span
class="removed"><del><strong>list</strong></del></span> <span
class="inserted"><ins><em>list, taken from the research paper,</em></ins></span>
- of <span class="inserted"><ins><em>some</em></ins></span> proprietary VPN
apps <span class="removed"><del><strong>from
- the research paper</strong></del></span> that <span
class="removed"><del><strong>tracks</strong></del></span> <span
class="inserted"><ins><em>track users</em></ins></span> and <span
class="removed"><del><strong>infringes the privacy of
- users:</p>
-
- <dl></strong></del></span> <span class="inserted"><ins><em>infringe
their
+ <p>Following is a non-exhaustive list, taken from the research paper,
+ of some proprietary VPN apps that track users and infringe their
privacy:</p>
- <dl class="compact"></em></ins></span>
+ <dl class="compact">
<dt>SurfEasy</dt>
<dd>Includes tracking libraries such as NativeX and Appflood,
meant to track users and show them targeted ads.</dd>
@@ -1902,97 +1977,52 @@
<dt>VPN Services HotspotShield</dt>
<dd>Injects JavaScript code into the HTML pages returned to the
users. The stated purpose of the JS injection is to display ads. Uses
- roughly <span class="removed"><del><strong>5</strong></del></span> <span
class="inserted"><ins><em>five</em></ins></span> tracking libraries. Also, it
redirects the user's
+ roughly five tracking libraries. Also, it redirects the user's
traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses roughly
<span class="removed"><del><strong>5</strong></del></span>
- <span class="inserted"><ins><em>five</em></ins></span> tracking
libraries. Developers of this app have confirmed that
- the non-premium version of the app does JavaScript injection for
- tracking <span class="inserted"><ins><em>the user</em></ins></span> and
<span class="removed"><del><strong>display</strong></del></span> <span
class="inserted"><ins><em>displaying</em></ins></span> ads.</dd>
- </dl>
- </li>
-<span class="removed"><del><strong><li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of the top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries. For
- the paid proprietary apps, it was only 60%.</p>
-
- <p>The article confusingly describes gratis apps as “free”,
- but most of them are not in fact
- <a href="/philosophy/free-sw.html">free software</a>.
- It also uses the ugly word “monetize”. A good replacement
- for that word is “exploit”; nearly always that will fit
- perfectly.</p>
-</li>
-
-<li>
- <p>Apps for BART
- <a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With proprietary apps, one can only hope that they don't.</p>
+ <dd>Injects JavaScript code into HTML pages,</em></ins></span> and
<span class="removed"><del><strong>other companies from
getting</strong></del></span> <span class="inserted"><ins><em>also uses roughly
+ five tracking libraries. Developers of</em></ins></span> this <span
class="removed"><del><strong>personal information in</strong></del></span>
<span class="inserted"><ins><em>app have confirmed that</em></ins></span>
+ the <span class="removed"><del><strong>first
+place!</p>
</li>
-<li>
- <p>A study found 234 Android apps that track users by
- <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
programs</a>.
- </p>
-
-</li>
+ <li>
+ <p>Google Play (a component</strong></del></span> <span
class="inserted"><ins><em>non-premium version</em></ins></span> of <span
class="removed"><del><strong>Android) <a
+
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks</strong></del></span> the <span class="removed"><del><strong>users'
movements without their permission</a>.</p>
-<li>
- <p>Pairs of Android apps can collude to transmit users' personal
- data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that
collude</a>.</p></strong></del></span>
+ <p>Even if you disable Google Maps</strong></del></span> <span
class="inserted"><ins><em>app does JavaScript injection for
+ tracking the user</em></ins></span> and <span
class="removed"><del><strong>location tracking,</strong></del></span> <span
class="inserted"><ins><em>displaying ads.</dd>
+ </dl>
+ </li>
- <span class="inserted"><ins><em><li id="M201609210">
+ <li id="M201609210">
<!--#set var="DATE" value='<small
class="date-tag">2016-09</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></em></ins></span>
+ all conversations</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201606050">
+ <li id="M201606050">
<!--#set var="DATE" value='<small
class="date-tag">2016-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Facebook's new Magic Photo</em></ins></span> app <span
class="removed"><del><strong>developers</strong></del></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details of users that install the app</a>.</p>
-
-<p>Merely asking</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+ <p>Facebook's new Magic Photo app <a
+
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections for known faces</a>,
- and suggests you circulate</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>picture you take
according to who</em></ins></span> is <span class="removed"><del><strong>not
enough</strong></del></span>
+ and suggests</em></ins></span> you <span class="removed"><del><strong>must
+ disable Google Play itself to completely stop</strong></del></span> <span
class="inserted"><ins><em>circulate</em></ins></span> the <span
class="removed"><del><strong>tracking. This</strong></del></span> <span
class="inserted"><ins><em>picture you take according to who</em></ins></span> is
+ <span class="removed"><del><strong>yet another
example</strong></del></span>
<span class="inserted"><ins><em>in the frame.</p>
- <p>This spyware feature seems</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>require
online access to some
- known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>“Terms and Conditions” that spell out
-what they</strong></del></span> <span
class="inserted"><ins><em>pictures</em></ins></span> are <span
class="removed"><del><strong>“consenting” to. Google should clearly
-and honestly identify</strong></del></span> <span
class="inserted"><ins><em>likely to be
- sent across</em></ins></span> the <span
class="removed"><del><strong>information it collects on users, instead
-of hiding it in an obscurely worded EULA.</p>
-
-<p>However,</strong></del></span> <span
class="inserted"><ins><em>wire</em></ins></span> to <span
class="removed"><del><strong>truly protect people's privacy, we must prevent
Google</strong></del></span> <span class="inserted"><ins><em>Facebook's
servers</em></ins></span> and <span class="removed"><del><strong>other
companies from getting this personal information in the first
-place!</p>
-</li>
-
- <li>
- <p>Google Play (a component</strong></del></span> <span
class="inserted"><ins><em>face-recognition
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means the pictures are likely to be
+ sent across the wire to Facebook's servers and face-recognition
algorithms.</p>
- <p>If so, none</em></ins></span> of <span
class="removed"><del><strong>Android) <a
-
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the</strong></del></span> <span
class="inserted"><ins><em>Facebook</em></ins></span> users' <span
class="removed"><del><strong>movements without their
permission</a>.</p>
-
- <p>Even</strong></del></span> <span
class="inserted"><ins><em>pictures are private anymore,
- even</em></ins></span> if <span class="removed"><del><strong>you disable
Google Maps and location tracking, you must
- disable Google Play itself to completely stop</strong></del></span> the
<span class="removed"><del><strong>tracking. This is
- yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>user didn't “upload”
them</em></ins></span> to <span
class="removed"><del><strong>obey</strong></del></span> the <span
class="removed"><del><strong>user,
+ <p>If so, none</em></ins></span> of <span
class="removed"><del><strong>nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>Facebook users' pictures are private anymore,
+ even if the user didn't “upload” them</em></ins></span> to
<span class="removed"><del><strong>obey</strong></del></span> the <span
class="removed"><del><strong>user,
when it's actually doing something else. Such a thing
would</strong></del></span> <span class="inserted"><ins><em>service.</p>
</li>
@@ -4440,7 +4470,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/11 15:04:18 $
+$Date: 2021/04/15 14:32:18 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.388
retrieving revision 1.389
diff -u -b -r1.388 -r1.389
--- proprietary-surveillance.de.po 11 Apr 2021 15:04:18 -0000 1.388
+++ proprietary-surveillance.de.po 15 Apr 2021 14:32:20 -0000 1.389
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 14:25+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -153,6 +153,13 @@
"\">Proprietary Tethers</a>."
msgstr ""
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org"
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
#. type: Content of: <div><div><div><p>
# | If you know of an example that ought to be in this page but isn't here,
# | please write to <a
Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.180
retrieving revision 1.181
diff -u -b -r1.180 -r1.181
--- proprietary-surveillance.es.po 12 Apr 2021 10:33:23 -0000 1.180
+++ proprietary-surveillance.es.po 15 Apr 2021 14:32:22 -0000 1.181
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 14:25+0000\n"
"PO-Revision-Date: 2021-04-12 12:06+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 14:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -126,6 +127,13 @@
"propia página: <a href=\"/proprietary/proprietary-tethers.html#about-page"
"\">Subordinación a un servidor en el software privativo</a>."
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org"
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
#. type: Content of: <div><div><div><p>
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.623
retrieving revision 1.624
diff -u -b -r1.623 -r1.624
--- proprietary-surveillance.fr.po 12 Apr 2021 09:50:40 -0000 1.623
+++ proprietary-surveillance.fr.po 15 Apr 2021 14:32:22 -0000 1.624
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 14:25+0000\n"
"PO-Revision-Date: 2021-04-12 11:45+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 14:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -121,6 +122,13 @@
"ont une page dédiée : <a
href=\"/proprietary/proprietary-tethers.html#about-"
"page\">Dépendance privatrice d'un serveur</a>."
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org"
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
#. type: Content of: <div><div><div><p>
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.244
retrieving revision 1.245
diff -u -b -r1.244 -r1.245
--- proprietary-surveillance.it-diff.html 11 Apr 2021 15:04:18 -0000
1.244
+++ proprietary-surveillance.it-diff.html 15 Apr 2021 14:32:25 -0000
1.245
@@ -117,7 +117,9 @@
server are snoopers by nature. We do not list them here because they
have their own page: <a
href="/proprietary/proprietary-tethers.html#about-page">Proprietary
-Tethers</a>.</p>
+ Tethers</a>.</p>
+
+<p>There is a similar site named <a
href="https://spyware.neocities.org">Spyware Watchdog</a> that
classifies spyware programs, so that users can be more aware that they are
installing spyware.</p>
<div class="important" style="clear: both">
<p>If you know of an example that ought to be in this page but isn't
@@ -433,33 +435,30 @@
turns off its Bing search and Cortana features, and activates the
privacy-protection settings.</p></li>
- <li><p></strong></del></span> <span
class="inserted"><ins><em>ads.</p>
-
- <p>We can suppose</em></ins></span> Microsoft <span
class="removed"><del><strong>uses Windows 10's “privacy policy” to
overtly impose a
- “right” to look at users' files at any time. Windows 10 full disk
- encryption <a
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/">
- gives Microsoft a key</a>.</p>
-
- <p>Thus, Windows is overt malware in regard to surveillance,
- as in other issues.</p>
+ <li><p>
+ Microsoft uses</strong></del></span> <span
class="inserted"><ins><em>ads.</p>
- <p>We can suppose Microsoft look</strong></del></span> <span
class="inserted"><ins><em>looks</em></ins></span> at users' files for the US
government
- on demand, though the “privacy policy” does not <span
class="removed"><del><strong>explicit</strong></del></span> <span
class="inserted"><ins><em>explicitly</em></ins></span>
+ <p>We can suppose Microsoft looks at users' files for the US
government
+ on demand, though the “privacy policy” does not explicitly
say so. Will it look at users' files for the Chinese government
on demand?</p>
- <span class="inserted"><ins><em></li>
+ </li>
<li id="M201506170">
<!--#set var="DATE" value='<small
class="date-tag">2015-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft uses Windows 10's “privacy policy”
+ <p>Microsoft uses</em></ins></span> Windows 10's “privacy
policy”
to overtly impose a “right” to look at
- users' files at any time. Windows 10 full disk encryption <a
-
href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/">
+ users' files at any time. Windows 10 full disk encryption <a <span
class="removed"><del><strong>href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/"></em></ins></span>
gives Microsoft a key</a>.</p>
<p>Thus, Windows is overt malware in regard to surveillance, as in
- other issues.</p></em></ins></span>
+ other issues.</p>
+
+ <span class="removed"><del><strong><p>We can suppose Microsoft look at
users' files for the US government on
+ demand, though the “privacy policy” does not explicit say so.
Will it
+ look at users' files for the Chinese government on
demand?</p></strong></del></span>
<p>The unique “advertising ID” for each user enables
other companies to track the browsing of each specific user.</p>
@@ -684,201 +683,237 @@
</li>
<li>
- <p>Pairs</strong></del></span>
+ <p>Pairs of Android apps can collude to transmit
users'</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/commentisfree/2021/feb/20/why-hot-new-social-app-clubhouse-spells-nothing-but-trouble">collects
- people's personal data such as recordings</em></ins></span> of <span
class="removed"><del><strong>Android apps can collude</strong></del></span>
<span class="inserted"><ins><em>people's
+ people's</em></ins></span> personal data <span
class="removed"><del><strong>to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens</strong></del></span> <span class="inserted"><ins><em>such as
recordings</em></ins></span> of <span
class="removed"><del><strong>thousands</strong></del></span> <span
class="inserted"><ins><em>people's
conversations</a>, and, as a secondary problem, does not encrypt
them,
- which shows a bad security part of the issue.</p>
+ which shows a bad security part</em></ins></span> of <span
class="removed"><del><strong>pairs that collude</a>.</p>
+</li>
+
+<li>
+<p>Google Play intentionally sends app developers <a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>issue.</p>
<p>A user's unique Clubhouse ID number and chatroom ID are
transmitted
- in plaintext, and Agora (the company behind the app) would likely
- have access</em></ins></span> to <span
class="removed"><del><strong>transmit</strong></del></span> users' <span
class="inserted"><ins><em>raw audio, potentially providing access to
- the Chinese government.</p>
+ in plaintext, and Agora (the company behind</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
- <p>Even with good security of data transmission,
collecting</em></ins></span> personal
- data <span class="removed"><del><strong>to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens</strong></del></span> of <span
class="removed"><del><strong>thousands</strong></del></span> <span
class="inserted"><ins><em>people is wrong and a violation</em></ins></span> of
<span class="removed"><del><strong>pairs that
collude</a>.</p></strong></del></span> <span
class="inserted"><ins><em>people's privacy rights.</p></em></ins></span>
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>app) would likely
+ have access to users' raw audio, potentially providing access
to</em></ins></span>
+ the <span
class="removed"><del><strong>“consent”</strong></del></span> <span
class="inserted"><ins><em>Chinese government.</p>
+
+ <p>Even with good security</em></ins></span> of <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>data transmission, collecting personal
+ data of people</em></ins></span> is <span class="removed"><del><strong>not
enough
+to legitimize actions like this. At this point, most users have
+stopped reading the “Terms and Conditions” that spell out
+what they are “consenting” to. Google should
clearly</strong></del></span> <span
class="inserted"><ins><em>wrong</em></ins></span> and <span
class="removed"><del><strong>honestly identify the information it collects on
users, instead</strong></del></span> <span class="inserted"><ins><em>a
violation</em></ins></span> of <span class="removed"><del><strong>hiding it in
an obscurely worded EULA.</p>
+
+<p>However, to truly protect</strong></del></span> people's <span
class="removed"><del><strong>privacy, we must prevent Google
+and other companies from getting this personal information in the first
+place!</p></strong></del></span> <span class="inserted"><ins><em>privacy
rights.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details</strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>Google Play (a component</strong></del></span>
<span class="inserted"><ins><em><li id="M202101080">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>As</em></ins></span> of <span class="removed"><del><strong>users
that install the app</a>.</p>
+ <p>As</em></ins></span> of <span
class="removed"><del><strong>Android)</strong></del></span> <span
class="inserted"><ins><em>2021, WhatsApp (one of Facebook's subsidiaries)
is</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks the users' movements without their permission</a>.</p>
-<p>Merely asking the “consent”</strong></del></span> <span
class="inserted"><ins><em>2021, WhatsApp (one</em></ins></span> of <span
class="inserted"><ins><em>Facebook's subsidiaries) is <a
-
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/">forcing
- its</em></ins></span> users <span class="inserted"><ins><em>to hand over
sensitive personal data</a> to its parent
- company. This increases Facebook's power over users, and further
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/">forcing
+ its users</em></ins></span> to <span
class="removed"><del><strong>completely stop the
tracking.</strong></del></span> <span class="inserted"><ins><em>hand over
sensitive personal data</a> to its parent
+ company.</em></ins></span> This <span class="removed"><del><strong>is
+ yet another example</strong></del></span> <span
class="inserted"><ins><em>increases Facebook's power over users, and further
jeopardizes people's privacy and security.</p>
- <p>Instead of WhatsApp you can use <a
- href="https://directory.fsf.org/wiki/Jami">GNU Jami</a>,
which</em></ins></span> is
- <span class="inserted"><ins><em>free software and will</em></ins></span>
not <span class="removed"><del><strong>enough
-to legitimize actions</strong></del></span> <span
class="inserted"><ins><em>collect your data.</p>
+ <p>Instead</em></ins></span> of <span
class="removed"><del><strong>nonfree software pretending to obey the user,
+ when it's actually doing something else. Such a thing would be almost
+ unthinkable with</strong></del></span> <span
class="inserted"><ins><em>WhatsApp you can use <a
+ href="https://directory.fsf.org/wiki/Jami">GNU Jami</a>, which
is</em></ins></span>
+ free <span
class="removed"><del><strong>software.</p></strong></del></span> <span
class="inserted"><ins><em>software and will not collect your
data.</p></em></ins></span>
</li>
- <li id="M202006260">
+ <span class="removed"><del><strong><li><p>More than 73% of the
most popular Android</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202006260">
<!--#set var="DATE" value='<small
class="date-tag">2020-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Most apps are malware, but
- Trump's campaign app,</em></ins></span> like <span
class="removed"><del><strong>this. At this point, most</strong></del></span>
<span class="inserted"><ins><em>Modi's campaign app, is <a
-
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
- especially nasty malware, helping companies snoop on</em></ins></span>
users <span class="removed"><del><strong>have
-stopped reading the “Terms and Conditions” that spell out
-what they are “consenting” to. Google should clearly
-and honestly identify the information it collects</strong></del></span> <span
class="inserted"><ins><em>as well
- as snooping</em></ins></span> on <span class="removed"><del><strong>users,
instead
-of hiding</strong></del></span> <span class="inserted"><ins><em>them
itself</a>.</p>
+ <p>Most</em></ins></span> apps <span class="inserted"><ins><em>are
malware, but
+ Trump's campaign app, like Modi's campaign app, is</em></ins></span> <a
<span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral and location information</a> of their</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
+ especially nasty malware, helping companies snoop on</em></ins></span>
users <span class="removed"><del><strong>with third parties.</p>
+ </li>
- <p>The article says that Biden's app has a less manipulative overall
- approach, but that does not tell us whether</em></ins></span> it <span
class="removed"><del><strong>in an obscurely worded EULA.</p>
+ <li><p>“Cryptic communication,” unrelated to the
app's functionality,
+ was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in the 500 most popular gratis Android
apps</a>.</p></strong></del></span> <span
class="inserted"><ins><em>as well
+ as snooping on them itself</a>.</p></em></ins></span>
-<p>However, to truly protect people's privacy,</strong></del></span>
<span class="inserted"><ins><em>has functionalities</em></ins></span> we <span
class="removed"><del><strong>must prevent Google</strong></del></span>
- <span class="inserted"><ins><em>consider malicious, such as sending data
the user has not explicitly
- asked to send.</p>
- </li>
+ <p>The article <span
class="removed"><del><strong>should</strong></del></span> <span
class="inserted"><ins><em>says that Biden's app has a less manipulative overall
+ approach, but that does</em></ins></span> not <span
class="removed"><del><strong>have described these apps</strong></del></span>
<span class="inserted"><ins><em>tell us whether it has functionalities we
+ consider malicious, such</em></ins></span> as
+ <span class="removed"><del><strong>“free”—they
are</strong></del></span> <span class="inserted"><ins><em>sending data the user
has</em></ins></span> not <span class="removed"><del><strong>free software.
The clear way to say
+ “zero price” is “gratis.”</p>
- <li id="M201809121">
+ <p>The article takes for granted that the usual analytics tools are
+ legitimate, but is that valid? Software developers have no
right</strong></del></span> <span class="inserted"><ins><em>explicitly
+ asked</em></ins></span> to
+ <span class="removed"><del><strong>analyze what users are doing or how.
“Analytics” tools that snoop are
+ just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>send.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li><p>Gratis Android apps
(but not <a href="/philosophy/free-sw.html">free software</a>)
+ connect to 100
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201809121">
<!--#set var="DATE" value='<small
class="date-tag">2018-09</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Tiny Lab Productions, along with online ad businesses run
- by Google, Twitter</em></ins></span> and <span
class="inserted"><ins><em>three</em></ins></span> other companies <span
class="removed"><del><strong>from getting this personal information in the first
-place!</p>
-</li>
-
- <li>
- <p>Google Play (a component of Android)</strong></del></span> <span
class="inserted"><ins><em>are facing a lawsuit</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without</strong></del></span>
+ by Google, Twitter</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
+ on the average.</p>
+ </li>
+ <li><p>Spyware is present in some Android devices when
they</strong></del></span> <span class="inserted"><ins><em>three other
companies</em></ins></span> are <span class="removed"><del><strong>sold.
+ Some Motorola phones modify Android to</strong></del></span> <span
class="inserted"><ins><em>facing a lawsuit</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html">for
- violating people's privacy by collecting</em></ins></span> their <span
class="removed"><del><strong>permission</a>.</p>
-
- <p>Even if you disable Google Maps</strong></del></span> <span
class="inserted"><ins><em>data from mobile games</em></ins></span>
- and <span class="removed"><del><strong>location tracking, you must
- disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>handing over these data</em></ins></span> to <span
class="removed"><del><strong>completely stop the tracking. This is
- yet another example</strong></del></span> <span
class="inserted"><ins><em>other companies/advertisers</a>.</p>
+ violating people's privacy by collecting their data from mobile games
+ and handing over these</em></ins></span> data to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
<span class="inserted"><ins><em>other
companies/advertisers</a>.</p></em></ins></span>
</li>
- <li id="M201601110">
+ <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201601110">
<!--#set var="DATE" value='<small
class="date-tag">2016-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>nonfree</strong></del></span> <span
class="inserted"><ins><em>monitoring
- people through “their” phones is <a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary</em></ins></span> software <span
class="removed"><del><strong>pretending</strong></del></span> to <span
class="removed"><del><strong>obey</strong></del></span> <span
class="inserted"><ins><em>make sure they can't
“fool”</em></ins></span>
- the <span class="removed"><del><strong>user,
- when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p></em></ins></span>
+ <p>The natural extension of monitoring
+ people through “their” phones is</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p>
</li>
- <span class="removed"><del><strong><li><p>More than 73% of the
most popular Android apps</strong></del></span>
+ <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary software</em></ins></span> to <span
class="removed"><del><strong>any file on</strong></del></span> <span
class="inserted"><ins><em>make sure they can't
“fool”</em></ins></span>
+ the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+
+
+<!-- #SpywareOnMobiles</strong></del></span>
<span class="inserted"><ins><em><li id="M201510050">
<!--#set var="DATE" value='<small
class="date-tag">2015-10</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>According to Edward Snowden,</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral</strong></del></span>
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>According</em></ins></span> to
<span class="removed"><del><strong>place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareIniThings">Spyware in iThings</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+</div>
+
+<ul>
+ <li><p>Apple proposes</strong></del></span> <span
class="inserted"><ins><em>Edward Snowden,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ —</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233">agencies
can take over
- smartphones</a> by sending hidden text messages which enable
- them to turn the phones on</em></ins></span> and <span
class="removed"><del><strong>location information</a> of their users with
third parties.</p>
+ smartphones</a> by sending hidden text messages</em></ins></span>
which <span class="removed"><del><strong>would mean no way to use it without
having your fingerprints
+ taken. Users would have no way</strong></del></span> <span
class="inserted"><ins><em>enable
+ them</em></ins></span> to <span class="removed"><del><strong>tell
whether</strong></del></span> <span
class="inserted"><ins><em>turn</em></ins></span> the <span
class="removed"><del><strong>phone is snooping</strong></del></span> <span
class="inserted"><ins><em>phones</em></ins></span> on
+ <span class="removed"><del><strong>them.</p></li>
+
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots of personal data</strong></del></span> <span
class="inserted"><ins><em>and off, listen</em></ins></span> to <span
class="removed"><del><strong>Apple's servers</a>. Big Brother can
+ get them</strong></del></span> <span class="inserted"><ins><em>the
microphone,
+ retrieve geo-location data</em></ins></span> from <span
class="removed"><del><strong>there.</p>
</li>
- <li><p>“Cryptic communication,”
unrelated</strong></del></span> <span class="inserted"><ins><em>off,
listen</em></ins></span> to the <span class="removed"><del><strong>app's
functionality,
- was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in</strong></del></span> <span class="inserted"><ins><em>microphone,
- retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>500 most popular gratis Android
apps</a>.</p>
+ <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that the user types into
it</a>;</strong></del></span> the <span
class="removed"><del><strong>server records these numbers for at least 30
+ days.</p>
+ </li>
- <p>The article should not have described these apps as
- “free”—they are not free software. The clear
way</strong></del></span> <span class="inserted"><ins><em>GPS, take
photographs, read
- text messages, read call, location and web browsing history, and
- read the contact list. This malware is designed</em></ins></span> to <span
class="removed"><del><strong>say
- “zero price”</strong></del></span> <span
class="inserted"><ins><em>disguise itself
- from investigation.</p>
+ <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
+ without giving a valid email address</strong></del></span> <span
class="inserted"><ins><em>GPS, take photographs, read
+ text messages, read call, location</em></ins></span> and <span
class="removed"><del><strong>receiving</strong></del></span> <span
class="inserted"><ins><em>web browsing history, and
+ read</em></ins></span> the <span class="removed"><del><strong>code Apple
+ sends</strong></del></span> <span class="inserted"><ins><em>contact
list. This malware is designed</em></ins></span> to <span
class="removed"><del><strong>it.</p></strong></del></span> <span
class="inserted"><ins><em>disguise itself
+ from investigation.</p></em></ins></span>
</li>
- <li id="M201311120">
+ <span class="removed"><del><strong><li><p>Around 47%
of</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201311120">
<!--#set var="DATE" value='<small
class="date-tag">2013-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones,
- Android, and BlackBerry</a>. While there</em></ins></span> is <span
class="removed"><del><strong>“gratis.”</p>
-
- <p>The article takes for granted</strong></del></span> <span
class="inserted"><ins><em>not much
- detail here, it seems</em></ins></span> that <span
class="inserted"><ins><em>this does not operate via</em></ins></span>
- the <span class="removed"><del><strong>usual analytics tools are
- legitimate, but is that valid? Software developers have no right to
- analyze what users are doing or how. “Analytics”
tools</strong></del></span> <span class="inserted"><ins><em>universal back
door</em></ins></span> that <span
class="removed"><del><strong>snoop</strong></del></span> <span
class="inserted"><ins><em>we know nearly all portable
- phones have. It may involve exploiting various bugs.
There</em></ins></span> are
- <span class="removed"><del><strong>just as wrong as any other
snooping.</p>
- </li>
- <li><p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
- connect to 100</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
- on</strong></del></span>
+ Android, and BlackBerry</a>. While there is not much
+ detail here, it seems that this does not operate via</em></ins></span>
+ the <span class="removed"><del><strong>most popular iOS
apps</strong></del></span> <span class="inserted"><ins><em>universal back door
that we know nearly all portable
+ phones have. It may involve exploiting various bugs. There
are</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots of bugs in</em></ins></span> the <span
class="removed"><del><strong>average.</p></strong></del></span> <span
class="inserted"><ins><em>phones' radio
software</a>.</p></em></ins></span>
+ lots</em></ins></span> of <span class="inserted"><ins><em>bugs in the
phones' radio software</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware is present in
some Android devices when they are sold.
- Some Motorola</strong></del></span>
- <span class="inserted"><ins><em><li id="M201307000">
+ <li id="M201307000">
<!--#set var="DATE" value='<small
class="date-tag">2013-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Portable</em></ins></span> phones <span
class="removed"><del><strong>modify Android to</strong></del></span> <span
class="inserted"><ins><em>with GPS</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will</em></ins></span> send <span class="removed"><del><strong>personal
data</strong></del></span> <span class="inserted"><ins><em>their GPS location
on remote command, and users cannot stop
- them</a>. (The US says it will eventually require all new portable
phones</em></ins></span>
- to <span class="removed"><del><strong>Motorola</a>.</p>
- </li>
+ <p>Portable phones with GPS <a
+
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+ will send</em></ins></span> their <span class="inserted"><ins><em>GPS
location on remote command, and</em></ins></span> users <span
class="removed"><del><strong>with third parties.</p>
+ </li>
+
+ <li><p>iThings automatically upload to Apple's
servers</strong></del></span> <span class="inserted"><ins><em>cannot stop
+ them</a>. (The US says it will eventually require</em></ins></span>
all <span class="removed"><del><strong>the photos and
+ videos they make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you take,
+ and keeps them up</strong></del></span> <span
class="inserted"><ins><em>new portable phones</em></ins></span>
+ to <span class="removed"><del><strong>date on all your devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
- <li><p>Some manufacturers add a
- <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p>
- </li>
-
- <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file on the
system.</p></strong></del></span> <span class="inserted"><ins><em>have
GPS.)</p></em></ins></span>
+ <p>(From</strong></del></span> <span class="inserted"><ins><em>have
GPS.)</p>
</li>
</ul>
-
-<span class="removed"><del><strong><!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
-</div>
-<div style="clear: left;"></div></strong></del></span>
-
-
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareIniThings">Spyware
in iThings</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareIniThings">iThings</h4></em></ins></span>
+ <h4 id="SpywareIniThings">iThings</h4>
<span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Apple proposes</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202009183">
<!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Facebook</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without having your
fingerprints
- taken. Users would have no way to tell whether the phone is
snooping</strong></del></span>
+ <p>Facebook</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
+ information</a> as accessed</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops</em></ins></span>
- on
- <span class="removed"><del><strong>them.</p></li>
+ on <span class="removed"><del><strong>24 Sep 2015.) The iCloud feature is
+ <a
href="https://support.apple.com/en-us/HT202033">activated</strong></del></span>
<span class="inserted"><ins><em>Instagram</a> users</em></ins></span> by
<span class="inserted"><ins><em>surreptitously turning on</em></ins></span> the
+ <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
+ “please don't ask where.”</p>
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots</strong></del></span> <span
class="inserted"><ins><em>Instagram</a> users by surreptitously turning
on the device's
+ <p>There is</strong></del></span> <span
class="inserted"><ins><em>device's
camera.</p>
</li>
@@ -886,101 +921,134 @@
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Apple whistleblower Thomas Le Bonniec reports that Apple
- made a practice</em></ins></span> of <span
class="removed"><del><strong>personal data</strong></del></span> <span
class="inserted"><ins><em>surreptitiously activating the Siri
software</em></ins></span> to <span class="removed"><del><strong>Apple's
servers</a>. Big Brother can
- get them from there.</p>
- </li>
+ made</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>practice of surreptitiously activating the Siri
software</em></ins></span> to <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default so it still
counts as a
+ surveillance functionality.</p>
- <li><p>The iMessage app on iThings</strong></del></span> <a
<span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells</strong></del></span>
+ <p>Unknown people apparently took advantage</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf">
record users' conversations when they had not activated Siri</a>.
This was not just occasional, it was systematic practice.</p>
- <p>His job was to listen to these recordings, in</em></ins></span> a
<span class="removed"><del><strong>server every phone
number</strong></del></span> <span class="inserted"><ins><em>group that made
- transcripts of them. He does not believes that Apple has ceased this
- practice.</p>
-
- <p>The only reliable way to prevent this is, for the
program</em></ins></span> that
- <span class="inserted"><ins><em>controls access to the microphone to
decide when</em></ins></span> the user <span class="removed"><del><strong>types
into it</a>;</strong></del></span> <span class="inserted"><ins><em>has
- “activated” any service, to be free software,
and</em></ins></span> the <span class="removed"><del><strong>server records
these numbers for at least 30
- days.</p>
- </li>
-
- <li><p>Users cannot</strong></del></span>
- <span class="inserted"><ins><em>operating system under it free as well.
This way, users could</em></ins></span> make <span
class="removed"><del><strong>an</strong></del></span>
- <span class="inserted"><ins><em>sure</em></ins></span> Apple <span
class="removed"><del><strong>ID</strong></del></span> <span
class="inserted"><ins><em>can't listen to them.</p>
+ <p>His job was to listen to these recordings, in a group that made
+ transcripts</em></ins></span> of <span class="inserted"><ins><em>them. He
does not believes that Apple has ceased</em></ins></span> this
+ <span class="inserted"><ins><em>practice.</p>
+
+ <p>The only reliable way</em></ins></span> to
+ <span class="removed"><del><strong><a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They
needed</strong></del></span> <span class="inserted"><ins><em>prevent this is,
for the program that
+ controls access</em></ins></span> to <span
class="removed"><del><strong>break Apple's
+ security</strong></del></span> <span class="inserted"><ins><em>the
microphone</em></ins></span> to <span class="removed"><del><strong>get at them,
but NSA can access</strong></del></span> <span class="inserted"><ins><em>decide
when the user has
+ “activated”</em></ins></span> any <span
class="removed"><del><strong>of them through</strong></del></span> <span
class="inserted"><ins><em>service, to be free software, and the
+ operating system under it free as well. This way, users could make
+ sure Apple can't listen to them.</p>
</li>
<li id="M201910131">
<!--#set var="DATE" value='<small
class="date-tag">2019-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Safari occasionally</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
- sends browsing data from Apple devices in China</em></ins></span> to <span
class="removed"><del><strong>install even gratis apps)</a>
- without giving a valid email address and receiving</strong></del></span>
the <span class="removed"><del><strong>code Apple
- sends</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
- Browsing service</a>,</em></ins></span> to <span
class="removed"><del><strong>it.</p>
- </li>
+ <p>Safari occasionally</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
- <li><p>Around 47% of</strong></del></span> <span
class="inserted"><ins><em>check URLs that possibly correspond to
+ <li><p>Spyware</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing data from Apple devices</em></ins></span> in <span
class="removed"><del><strong>iThings:</strong></del></span> <span
class="inserted"><ins><em>China to</em></ins></span> the <span
class="removed"><del><strong><a class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly
where</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
+ Browsing service</a>, to check URLs that possibly correspond to
“fraudulent” websites. Since Tencent collaborates
- with</em></ins></span> the <span class="inserted"><ins><em>Chinese
government, its Safe Browsing black list</em></ins></span> most <span
class="removed"><del><strong>popular iOS apps
- <a class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a></strong></del></span>
<span class="inserted"><ins><em>certainly
- contains the websites</em></ins></span> of <span
class="inserted"><ins><em>political opponents. By linking the requests
+ with</em></ins></span> the <span class="removed"><del><strong>iThing
is,</strong></del></span> <span class="inserted"><ins><em>Chinese government,
its Safe Browsing black list most certainly
+ contains the websites of political opponents. By linking the requests
originating from single IP addresses, the government can identify
- dissenters in China and Hong Kong, thus endangering</em></ins></span>
their <span class="removed"><del><strong>users with third
parties.</p></strong></del></span> <span
class="inserted"><ins><em>lives.</p></em></ins></span>
+ dissenters in China</em></ins></span> and <span
class="removed"><del><strong>get other info
too.</p></strong></del></span> <span class="inserted"><ins><em>Hong Kong,
thus endangering their lives.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>iThings</strong></del></span>
+ <span class="removed"><del><strong><li><p>There is also a
feature for web sites</strong></del></span>
<span class="inserted"><ins><em><li id="M201905280">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>In spite of Apple's supposed commitment to
- privacy, iPhone apps contain trackers that are busy at night <a
-
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
+ <p>In spite of Apple's supposed commitment</em></ins></span> to
<span class="removed"><del><strong>track users, which is</strong></del></span>
+ <span class="inserted"><ins><em>privacy, iPhone apps contain trackers that
are busy at night</em></ins></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
sending users' personal information to third parties</a>.</p>
- <p>The article mentions specific examples: Microsoft OneDrive,
+ <p>The</em></ins></span> article <span
class="removed"><del><strong>talks about iOS 6, but</strong></del></span> <span
class="inserted"><ins><em>mentions specific examples: Microsoft OneDrive,
Intuit's Mint, Nike, Spotify, The Washington Post, The Weather
Channel (owned by IBM), the crime-alert service Citizen, Yelp
- and DoorDash. But it is likely that most nonfree apps contain
+ and DoorDash. But</em></ins></span> it is <span
class="removed"><del><strong>still true in iOS 7.)</p>
+ </li>
+
+ <li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default,
though</strong></del></span> <span
class="inserted"><ins><em>likely</em></ins></span> that <span
class="removed"><del><strong>can</strong></del></span> <span
class="inserted"><ins><em>most nonfree apps contain
trackers. Some of these send personally identifying data such as phone
fingerprint, exact location, email address, phone number or even
delivery address (in the case of DoorDash). Once this information
- is collected by the company, there is no telling what it will be
- used for.</p>
+ is collected by the company, there is no telling what it
will</em></ins></span> be
+ <span class="removed"><del><strong>turned
off.</p></strong></del></span>
+ <span class="inserted"><ins><em>used for.</p></em></ins></span>
</li>
- <li id="M201711250">
+ <span class="removed"><del><strong><li><p>Apple
can,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711250">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The DMCA and the EU Copyright Directive make it <a
- href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr…apps spy on users</a>, because
- this would require circumventing the iOS DRM.</p>
+ <p>The DMCA</em></ins></span> and <span
class="removed"><del><strong>regularly does,</strong></del></span> <span
class="inserted"><ins><em>the EU Copyright Directive make it</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for the
state</a>.</p>
+ </li>
+
+ <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps the NSA snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal to study how iOS cr…apps spy</em></ins></span> on <span
class="removed"><del><strong>all</strong></del></span> <span
class="inserted"><ins><em>users</a>, because
+ this would require circumventing</em></ins></span> the <span
class="removed"><del><strong>data in an iThing,
+ or it is totally incompetent.</a></p>
+ </li>
+
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of</strong></del></span> iOS <span
class="removed"><del><strong>seem to exist for no
+ possible purpose other than surveillance</a>. Here
is</strong></del></span> <span class="inserted"><ins><em>DRM.</p>
</li>
<li id="M201709210">
<!--#set var="DATE" value='<small
class="date-tag">2017-09</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>In the latest iThings system,
- “turning off” WiFi and Bluetooth the obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ “turning off” WiFi and Bluetooth</em></ins></span> the <span
class="inserted"><ins><em>obvious way</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+</div>
+
+<ul>
+ <li><p>According</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
them off—only until 5am. That's Apple for you—“We
- know you want to be spied on”.</p>
+ know you want</em></ins></span> to <span
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>be spied on”.</p>
</li>
<li id="M201702150">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apple proposes <a
-
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
- fingerprint-scanning touch screen</a>—which would mean no way
- to use it without having your fingerprints taken. Users would have
- no way to tell whether the phone is snooping on them.</p>
+ <p>Apple proposes</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
+ by sending hidden text messages which enable them</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
+ fingerprint-scanning touch screen</a>—which would mean no
way</em></ins></span>
+ to <span class="removed"><del><strong>turn the phones
+ on and off, listen</strong></del></span> <span
class="inserted"><ins><em>use it without having your fingerprints taken. Users
would have
+ no way</em></ins></span> to <span class="inserted"><ins><em>tell
whether</em></ins></span> the <span class="removed"><del><strong>microphone,
retrieve geo-location data from the
+ GPS, take photographs, read text messages, read call, location and web
+ browsing history, and read the contact list. This
malware</strong></del></span> <span
class="inserted"><ins><em>phone</em></ins></span> is <span
class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>snooping on them.</p>
</li>
<li id="M201611170">
@@ -988,71 +1056,112 @@
--><!--#echo encoding="none" var="DATE" -->
<p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots of personal data to Apple's servers</a>. Big Brother can get
- them from there.</p>
+ lots of personal data</em></ins></span> to
+ <span class="removed"><del><strong>disguise itself</strong></del></span>
<span class="inserted"><ins><em>Apple's servers</a>. Big Brother can get
+ them</em></ins></span> from <span
class="removed"><del><strong>investigation.</p></strong></del></span>
<span class="inserted"><ins><em>there.</p></em></ins></span>
</li>
- <li id="M201609280">
+ <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609280">
<!--#set var="DATE" value='<small
class="date-tag">2016-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The iMessage app on iThings <a
-
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that the user types into it</a>; the
- server records these numbers for at least 30 days.</p>
+ <p>The iMessage app on iThings</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
+ and they send so much data that their transmission
is</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells</em></ins></span>
+ a
+ <span class="removed"><del><strong>substantial expense for users. Said
transmission, not wanted or
+ requested by the user, clearly must constitute spying of some
+ kind.</p></li>
+
+ <li><p>A Motorola</strong></del></span> <span
class="inserted"><ins><em>server every</em></ins></span> phone
+ <span class="removed"><del><strong><a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</strong></del></span> <span
class="inserted"><ins><em>number that</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+ </li>
+
+ <li><p>Spyware in Android phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us by a paywall)
+ reports that
+ <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
<span class="inserted"><ins><em>user types into
it</a>;</em></ins></span> the <span class="removed"><del><strong>FBI can
remotely activate</strong></del></span>
+ <span class="inserted"><ins><em>server records these numbers for at least
30 days.</p>
</li>
<li id="M201509240">
<!--#set var="DATE" value='<small
class="date-tag">2015-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>iThings</em></ins></span> automatically upload to Apple's servers
all the photos
- and videos they make.</p>
+ <p>iThings automatically upload to Apple's servers
all</em></ins></span> the <span
class="removed"><del><strong>GPS</strong></del></span> <span
class="inserted"><ins><em>photos</em></ins></span>
+ and <span class="removed"><del><strong>microphone in Android
+ phones</strong></del></span> <span class="inserted"><ins><em>videos they
make.</p>
+
+ <blockquote><p> iCloud Photo Library stores every
photo</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
+ (I suspect this means Windows laptops.) Here is
+ <a href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ </li>
- <blockquote><p> iCloud Photo Library stores every photo and
video you
- take, and keeps them up to date on all your devices. Any edits you
- make are automatically updated everywhere. <span
class="removed"><del><strong>[...]</strong></del></span> <span
class="inserted"><ins><em>[…]</em></ins></span>
</p></blockquote>
+ <li><p>Portable phones with GPS will send their GPS location on
+ remote command</strong></del></span> <span
class="inserted"><ins><em>video you
+ take,</em></ins></span> and <span class="removed"><del><strong>users
cannot stop them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable
phones</strong></del></span> <span class="inserted"><ins><em>keeps them
up</em></ins></span> to <span class="removed"><del><strong>have GPS.)</p>
+ </li>
+
+ <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span> <span class="inserted"><ins><em>date on all your
devices. Any edits you
+ make are automatically updated everywhere. […]
</p></blockquote>
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated by the
- startup of iOS</a>. The term “cloud” means “please
+ information</a> as accessed on 24 Sep 2015.) The iCloud
feature</em></ins></span> is <span class="removed"><del><strong>to
restrict</strong></del></span>
+ <span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT202033">activated
by</em></ins></span> the <span
class="removed"><del><strong>use</strong></del></span>
+ <span class="inserted"><ins><em>startup</em></ins></span> of <span
class="removed"><del><strong>data on the user's computer,</strong></del></span>
<span class="inserted"><ins><em>iOS</a>. The term “cloud”
means “please
don't ask where.”</p>
<p>There is a way to
<a href="https://support.apple.com/en-us/HT201104"> deactivate
- iCloud</a>, but it's active by default so it still counts as a
- surveillance functionality.</p>
-
- <p>Unknown people apparently took advantage of this to <a
-
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ iCloud</a>,</em></ins></span> but <span
class="inserted"><ins><em>it's active by default so</em></ins></span> it <span
class="removed"><del><strong>does</strong></del></span> <span
class="inserted"><ins><em>still counts as a</em></ins></span>
+ surveillance
+ <span class="removed"><del><strong>too:</strong></del></span> <span
class="inserted"><ins><em>functionality.</p>
+
+ <p>Unknown people apparently took advantage of this
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA can access any of them through <a
<span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware in iThings:
- the</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+ security</em></ins></span> to get <span class="removed"><del><strong>the
user's list</strong></del></span> <span class="inserted"><ins><em>at them, but
NSA can access any</em></ins></span> of <span
class="removed"><del><strong>other people's phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>them through <a
+
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201409220">
+
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201409220">
<!--#set var="DATE" value='<small
class="date-tag">2014-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apple can, and regularly does,</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly
where</strong></del></span>
+ <p>Apple can, and regularly does,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands to personal</strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</em></ins></span> the <span
class="removed"><del><strong>iThing is,
- and get other info too.</p></strong></del></span> <span
class="inserted"><ins><em>state</a>.</p>
+ remotely extract some</em></ins></span> data <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>from iPhones for</em></ins></span> the <span
class="removed"><del><strong>device</a>.
+ </p>
+ </li>
+
+ <li>
+ <p>Verizon</strong></del></span> <span
class="inserted"><ins><em>state</a>.</p>
<p>This may have improved with <a
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">
iOS 8 security improvements</a>; but <a
href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not as much as Apple claims</a>.</p></em></ins></span>
+ not as much as Apple claims</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>There is
also</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201407230">
+ <li id="M201407230">
<!--#set var="DATE" value='<small
class="date-tag">2014-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
@@ -1093,69 +1202,40 @@
<li id="M201210170">
<!--#set var="DATE" value='<small
class="date-tag">2012-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>There is also</em></ins></span> a feature for web sites to track
users, which is <a
+ <p>There is also a feature for web sites to track users, which is
<a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it is
still true in iOS 7.)</p>
</li>
- <span class="removed"><del><strong><li><p>The iThing also
- <a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201204280">
+ <li id="M201204280">
<!--#set var="DATE" value='<small
class="date-tag">2012-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Users cannot make an</em></ins></span> Apple <span
class="removed"><del><strong>its geolocation</a> by default, though that
can be
- turned off.</p>
- </li>
-
- <li><p>Apple can,</strong></del></span> <span
class="inserted"><ins><em>ID (<a
+ <p>Users cannot make an Apple ID (<a
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary
to install even gratis apps</a>) without giving a valid
- email address</em></ins></span> and <span
class="removed"><del><strong>regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>receiving</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p>
- </li>
-
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either</strong></del></span> <span
class="inserted"><ins><em>verification code</em></ins></span> Apple <span
class="removed"><del><strong>helps the NSA snoop on all the data in an iThing,
- or it is totally incompetent.</a></p>
- </li>
-
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em>sends</em></ins></span>
- to <span class="removed"><del><strong>exist for no
- possible purpose other than surveillance</a>. Here is the
- <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>it.</p></em></ins></span>
+ email address and receiving the verification code Apple sends
+ to it.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware
in</strong></del></span> <span
class="inserted"><ins><em>id="SpywareInAndroid">Android</em></ins></span>
Telephones</h4>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInAndroid">#SpywareInAndroid</a>)</span></em></ins></span>
+ <h4 id="SpywareInAndroid">Android Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInAndroid">#SpywareInAndroid</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>According to Edward Snowden,</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202012070">
<!--#set var="DATE" value='<small
class="date-tag">2020-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Baidu apps were</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/">
- caught collecting sensitive personal data</a> that</em></ins></span>
can <span class="removed"><del><strong>take over smartphones</a>
- by sending hidden text messages which enable</strong></del></span> <span
class="inserted"><ins><em>be used for
- lifetime tracking of users, and putting</em></ins></span> them <span
class="removed"><del><strong>to turn the phones
- on</strong></del></span> <span class="inserted"><ins><em>in danger. More
than 1.4
- billion people worldwide are affected by these proprietary
apps,</em></ins></span> and <span class="removed"><del><strong>off,
listen</strong></del></span>
- <span class="inserted"><ins><em>users' privacy is jeopardized by this
surveillance tool. Data collected
- by Baidu may be handed over</em></ins></span> to the <span
class="removed"><del><strong>microphone, retrieve geo-location data from the
- GPS, take photographs, read text messages, read
call,</strong></del></span> <span class="inserted"><ins><em>Chinese government,
possibly
+ <p>Baidu apps were <a
+
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/">
+ caught collecting sensitive personal data</a> that can be used for
+ lifetime tracking of users, and putting them in danger. More than 1.4
+ billion people worldwide are affected by these proprietary apps, and
+ users' privacy is jeopardized by this surveillance tool. Data collected
+ by Baidu may be handed over to the Chinese government, possibly
putting Chinese people in danger.</p>
</li>
@@ -1199,11 +1279,10 @@
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>An Android phone was observed to track location even while
- in airplane mode. It didn't send the</em></ins></span> location <span
class="inserted"><ins><em>data while in
+ in airplane mode. It didn't send the location data while in
airplane mode. Instead, <a
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up the data,</em></ins></span> and <span
class="removed"><del><strong>web
- browsing history,</strong></del></span> <span
class="inserted"><ins><em>sent them all later</a>.</p>
+ it saved up the data, and sent them all later</a>.</p>
</li>
<li id="M201711210">
@@ -1230,36 +1309,25 @@
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
tracks the users' movements without their permission</a>.</p>
- <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>location tracking, you must
- disable Google Play itself to completely stop</em></ins></span> the <span
class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>tracking.</em></ins></span> This <span
class="removed"><del><strong>malware</strong></del></span> is <span
class="removed"><del><strong>designed</strong></del></span>
- <span class="inserted"><ins><em>yet another example of nonfree software
pretending</em></ins></span> to
- <span class="removed"><del><strong>disguise itself from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>obey the user,
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself to completely stop the tracking. This is
+ yet another example of nonfree software pretending to obey the user,
when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p></em></ins></span>
+ unthinkable with free software.</p>
</li>
- <span
class="removed"><del><strong><li><p>Samsung</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201507030">
+ <li id="M201507030">
<!--#set var="DATE" value='<small
class="date-tag">2015-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Samsung</em></ins></span> phones come with <a
+ <p>Samsung phones come with <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>, and they send so much data that their
transmission is a substantial expense for users. Said transmission,
not wanted or requested by the user, clearly must constitute spying
- of some
- <span class="removed"><del><strong>kind.</p></li>
-
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>kind.</p></em></ins></span>
+ of some kind.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware in Android
phones (and Windows? laptops): The Wall
- Street Journal (in an</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201403120">
+ <li id="M201403120">
<!--#set var="DATE" value='<small
class="date-tag">2014-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a href="/proprietary/proprietary-back-doors.html#samsung">
@@ -1270,32 +1338,24 @@
<!--#set var="DATE" value='<small
class="date-tag">2013-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Spyware in Android phones (and Windows? laptops): The Wall Street
- Journal (in an</em></ins></span> article blocked from us by a paywall)
reports that <a
+ Journal (in an article blocked from us by a paywall) reports that <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
the FBI can remotely activate the GPS and microphone in Android phones
- and <span class="removed"><del><strong>laptops</a>.
- (I suspect this means</strong></del></span> <span
class="inserted"><ins><em>laptops</a> (presumably</em></ins></span>
Windows <span class="removed"><del><strong>laptops.)</strong></del></span>
<span class="inserted"><ins><em>laptops).</em></ins></span> Here is <a
+ and laptops</a> (presumably Windows laptops). Here is <a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
- remote command and users cannot stop them:</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201307280">
+ <li id="M201307280">
<!--#set var="DATE" value='<small
class="date-tag">2013-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Spyware is present in some Android devices when they are
sold. Some Motorola phones, made when this company was owned
- by Google, use a modified version of Android that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable
phones</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal data</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p></em></ins></span>
+ by Google, use a modified version of Android that <a
+
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ sends personal data to Motorola</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201307250">
+ <li id="M201307250">
<!--#set var="DATE" value='<small
class="date-tag">2013-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>A Motorola phone <a
@@ -1310,16 +1370,14 @@
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
the personal details of users that install the app</a>.</p>
- <p>Merely asking the “consent” of
users</em></ins></span> is <span class="inserted"><ins><em>not
enough</em></ins></span> to <span
class="removed"><del><strong>restrict</strong></del></span>
- <span class="inserted"><ins><em>legitimize actions like this. At this
point, most users have stopped
- reading</em></ins></span> the <span class="removed"><del><strong>use of
data on</strong></del></span> <span class="inserted"><ins><em>“Terms and
Conditions” that spell out what
+ <p>Merely asking the “consent” of users is not enough to
+ legitimize actions like this. At this point, most users have stopped
+ reading the “Terms and Conditions” that spell out what
they are “consenting” to. Google should clearly and
- honestly identify</em></ins></span> the <span
class="removed"><del><strong>user's computer, but</strong></del></span> <span
class="inserted"><ins><em>information</em></ins></span> it <span
class="removed"><del><strong>does surveillance
- too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"></strong></del></span>
<span class="inserted"><ins><em>collects on users, instead of
- hiding</em></ins></span> it <span
class="removed"><del><strong>tries</strong></del></span> <span
class="inserted"><ins><em>in an obscurely worded EULA.</p>
+ honestly identify the information it collects on users, instead of
+ hiding it in an obscurely worded EULA.</p>
- <p>However,</em></ins></span> to <span
class="removed"><del><strong>get the user's list of other</strong></del></span>
<span class="inserted"><ins><em>truly protect</em></ins></span> people's <span
class="removed"><del><strong>phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>privacy, we must prevent Google
+ <p>However, to truly protect people's privacy, we must prevent Google
and other companies from getting this personal information in the
first place!</p>
</li>
@@ -1329,81 +1387,48 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Some manufacturers add a <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ</a>.</p></em></ins></span>
+ hidden general surveillance package such as Carrier IQ</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
+ <h4 id="SpywareInElectronicReaders">E-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li>
- <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201603080">
<!--#set var="DATE" value='<small
class="date-tag">2016-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>E-books can contain JavaScript code, and</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data in the
device</a>.
- </p>
- </li>
-
- <li>
- <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
- pre-install</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops</em></ins></span> on <span
class="removed"><del><strong>some of its phones. The app will give Verizon the
same
- information about the users' searches that Google normally gets when
- they use its search engine.</p>
-
- <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>readers</a>.</p>
+ <p>E-books can contain JavaScript code, and <a
+
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops on readers</a>.</p>
</li>
<li id="M201410080">
<!--#set var="DATE" value='<small
class="date-tag">2014-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Adobe made “Digital Editions,”</em></ins></span>
- the <span class="removed"><del><strong>app is</strong></del></span> <span
class="inserted"><ins><em>e-reader used by most US libraries,</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and the
- user must explicitly opt-in before the app takes effect. However, the
- app remains spyware—an “optional”
piece</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</em></ins></span> of <span class="removed"><del><strong>spyware
is
- still spyware.</p>
- </li>
-
- <li><p>The Meitu photo-editing
- app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user</strong></del></span> data to <span class="removed"><del><strong>a
Chinese company</a>.</p></li>
-
- <li><p>A pregnancy test controller application
not</strong></del></span> <span class="inserted"><ins><em>Adobe</a>.
Adobe's “excuse”: it's
+ <p>Adobe made “Digital Editions,”
+ the e-reader used by most US libraries, <a
+
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
needed to check DRM!</p>
</li>
<li id="M201212030">
<!--#set var="DATE" value='<small
class="date-tag">2012-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Spyware in many e-readers—not</em></ins></span> only
- <span class="removed"><del><strong>can</strong></del></span> <span
class="inserted"><ins><em>the Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts of data in</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
- report even which page</em></ins></span> the <span
class="removed"><del><strong>phone, and</strong></del></span> <span
class="inserted"><ins><em>user reads at what time</a>.</p>
+ <p>Spyware in many e-readers—not only the Kindle: <a
+ href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
+ report even which page the user reads at what time</a>.</p>
</li>
</ul>
<div class="big-section">
- <h3 id="SpywareInApplications">Spyware</em></ins></span> in <span
class="removed"><del><strong>server accounts, it can
- alter them too</a>.
- </p></li>
-
- <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>Applications</h3>
+ <h3 id="SpywareInApplications">Spyware in Applications</h3>
<span class="anchor-reference-id">(<a
href="#SpywareInApplications">#SpywareInApplications</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -1417,45 +1442,25 @@
<li id="M202011260">
<!--#set var="DATE" value='<small
class="date-tag">2020-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft's Office 365 suite enables employers</em></ins></span>
<a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
-
- <p>This example illustrates how “getting the user's
consent”
- for surveillance is inadequate as</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance">to
- snoop on each employee</a>. After</em></ins></span>
- a <span class="removed"><del><strong>protection against massive
- surveillance.</p>
+ <p>Microsoft's Office 365 suite enables employers <a
+
href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance">to
+ snoop on each employee</a>. After
+ a public outburst, Microsoft stated that <a
+
href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance">it
+ would remove this capability</a>. Let's hope so.</p>
</li>
- <li><p>Google's new voice messaging app</strong></del></span>
<span class="inserted"><ins><em>public outburst, Microsoft stated
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance">it
- would remove this capability</a>. Let's hope
so.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201912190">
+ <li id="M201912190">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Some Avast and AVG extensions
- for Firefox and Chrome were found to</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"></em></ins></span>
- snoop on <span class="removed"><del><strong>what
radio</strong></del></span> <span class="inserted"><ins><em>users' detailed
browsing habits</a>. Mozilla</em></ins></span> and <span
class="removed"><del><strong>TV programs</strong></del></span> <span
class="inserted"><ins><em>Google
+ for Firefox and Chrome were found to <a
+
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
+ snoop on users' detailed browsing habits</a>. Mozilla and Google
removed the problematic extensions from their stores, but this shows
- once more how unsafe nonfree software can be. Tools that</em></ins></span>
are <span class="removed"><del><strong>playing nearby</a>. Also on what
users post on various sites
- such as Facebook, Google+ and Twitter.</p>
- </li>
-
- <li><p>Facebook's new Magic Photo app
- <a
-href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known faces</a>,
- and suggests you</strong></del></span> <span
class="inserted"><ins><em>supposed</em></ins></span>
- to <span class="removed"><del><strong>share</strong></del></span> <span
class="inserted"><ins><em>protect a proprietary system are, instead, infecting
it with
- additional malware (the system itself being</em></ins></span> the <span
class="removed"><del><strong>picture you take according</strong></del></span>
<span class="inserted"><ins><em>original malware).</p>
+ once more how unsafe nonfree software can be. Tools that are supposed
+ to protect a proprietary system are, instead, infecting it with
+ additional malware (the system itself being the original
malware).</p>
</li>
<li id="M201811020">
@@ -1463,13 +1468,13 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Foundry's graphics software <a
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information</em></ins></span> to <span
class="inserted"><ins><em>identify</em></ins></span> who is <span
class="removed"><del><strong>in the frame.</p></strong></del></span>
<span class="inserted"><ins><em>running it</a>. The result is
+ reports information to identify who is running it</a>. The result is
often a legal threat demanding a lot of money.</p>
<p>The fact that this is used for repression of forbidden sharing
- makes it even more vicious.</p></em></ins></span>
+ makes it even more vicious.</p>
- <p>This <span class="removed"><del><strong>spyware feature seems to
require online access</strong></del></span> <span
class="inserted"><ins><em>illustrates that making unauthorized copies of
nonfree software
+ <p>This illustrates that making unauthorized copies of nonfree
software
is not a cure for the injustice of nonfree software. It may avoid
paying for the nasty thing, but cannot make it less nasty.</p>
</li>
@@ -1487,33 +1492,23 @@
<p>Many cr…apps, developed by various
companies for various organizations, do <a
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth">
- location tracking unknown</em></ins></span> to <span
class="inserted"><ins><em>those companies and those
- organizations</a>. It's actually</em></ins></span> some
- <span class="removed"><del><strong>known-faces database, which
means</strong></del></span> <span class="inserted"><ins><em>widely used
libraries that do</em></ins></span>
- the <span class="removed"><del><strong>pictures are
likely</strong></del></span> <span class="inserted"><ins><em>tracking.</p>
+ location tracking unknown to those companies and those
+ organizations</a>. It's actually some widely used libraries that do
+ the tracking.</p>
<p>What's unusual here is that proprietary software developer A
tricks
proprietary software developers B1 … B50 into making platforms for
- A</em></ins></span> to <span class="removed"><del><strong>be
- sent across</strong></del></span> <span
class="inserted"><ins><em>mistreat</em></ins></span> the <span
class="removed"><del><strong>wire to Facebook's servers and face-recognition
- algorithms.</p>
-
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>end user.</p>
+ A to mistreat the end user.</p>
</li>
<li id="M202003260">
<!--#set var="DATE" value='<small
class="date-tag">2020-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Apple iOS version</em></ins></span> of <span
class="removed"><del><strong>Facebook</strong></del></span> <span
class="inserted"><ins><em>Zoom <a
+ <p>The Apple iOS version of Zoom <a
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account">is
- sending</em></ins></span> users' <span
class="removed"><del><strong>pictures are private
- anymore,</strong></del></span> <span class="inserted"><ins><em>data to
Facebook</a></em></ins></span> even if the user <span
class="removed"><del><strong>didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>doesn't have
- a Facebook account. According</em></ins></span> to the <span
class="removed"><del><strong>service.</p>
- </li>
-
- <li><p>Like most “music screaming” disservices,
Spotify
- is based</strong></del></span> <span class="inserted"><ins><em>article,
Zoom and Facebook
- don't even mention this surveillance</em></ins></span> on <span
class="removed"><del><strong>proprietary malware (DRM</strong></del></span>
<span class="inserted"><ins><em>their privacy policy page,
+ sending users' data to Facebook</a> even if the user doesn't have
+ a Facebook account. According to the article, Zoom and Facebook
+ don't even mention this surveillance on their privacy policy page,
making this an obvious violation of people's privacy even in their
own terms.</p>
</li>
@@ -1522,111 +1517,73 @@
<!--#set var="DATE" value='<small
class="date-tag">2020-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The Alipay Health Code app
- estimates whether the user has Covid-19</em></ins></span> and <span
class="removed"><del><strong>snooping). In August
- 2015 it</strong></del></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some
- are starting to realize that it is nasty.</p>
-
- <p>This article shows</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
- tells</em></ins></span> the <span class="inserted"><ins><em>cops
directly</a>.</p>
+ estimates whether the user has Covid-19 and <a
+
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
+ tells the cops directly</a>.</p>
</li>
<li id="M202001290">
<!--#set var="DATE" value='<small
class="date-tag">2020-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Amazon Ring app does</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
- surveillance for other companies</em></ins></span> as <span
class="removed"><del><strong>a way</strong></del></span> <span
class="inserted"><ins><em>well as for Amazon</a>.</p>
+ <p>The Amazon Ring app does <a
+
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
+ surveillance for other companies as well as for Amazon</a>.</p>
</li>
<li id="M201912220">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The ToToc messaging app seems</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
- whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>be</em></ins></span> a <span
class="removed"><del><strong>typical example of</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>The ToToc messaging app seems to be a <a
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
- spying tool for</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>government</em></ins></span> of the <span
class="removed"><del><strong>proprietary</strong></del></span> <span
class="inserted"><ins><em>United Arab Emirates</a>.
+ spying tool for the government of the United Arab Emirates</a>.
Any nonfree program could be doing this, and that is a good
- reason to use free</em></ins></span> software <span
class="removed"><del><strong>industry towards
- those they have subjugated.</p>
-
- <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>instead.</p>
+ reason to use free software instead.</p>
<p><small>Note: this article uses the word “free”
in
- the sense of
“gratis.”</small></p></em></ins></span>
+ the sense of “gratis.”</small></p>
</li>
- <span class="removed"><del><strong><li><p>Many proprietary
apps</strong></del></span>
- <span class="inserted"><ins><em><li id="M201912090">
+ <li id="M201912090">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>iMonsters and Android phones,
- when used</em></ins></span> for <span class="removed"><del><strong>mobile
devices report which other
- apps the user has
- installed.</strong></del></span> <span class="inserted"><ins><em>work,
give employers powerful</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
+ when used for work, give employers powerful <a
+
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
snooping and sabotage capabilities</a> if they install their own
software on the device. Many employers demand to do this. For the
- employee,</em></ins></span> this <span class="removed"><del><strong>in a
way that at least</strong></del></span> is <span
class="removed"><del><strong>visible</strong></del></span> <span
class="inserted"><ins><em>simply nonfree software, as fundamentally
unjust</em></ins></span>
- and
- <span class="removed"><del><strong>optional</a>.
Not</strong></del></span> as <span
class="removed"><del><strong>bad</strong></del></span> <span
class="inserted"><ins><em>dangerous</em></ins></span> as <span
class="removed"><del><strong>what the others do.</p>
- </li>
-
- <li><p>FTC says most mobile apps for children don't respect
privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>any other nonfree
software.</p></em></ins></span>
+ employee, this is simply nonfree software, as fundamentally unjust
+ and as dangerous as any other nonfree software.</p>
</li>
- <span class="removed"><del><strong><li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201910130">
+ <li id="M201910130">
<!--#set var="DATE" value='<small
class="date-tag">2019-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Chinese Communist Party's “Study</em></ins></span>
- the <span class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>Great
Nation” app requires users to grant it <a
+ <p>The Chinese Communist Party's “Study
+ the Great Nation” app requires users to grant it <a
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access</em></ins></span> to the <span
class="removed"><del><strong>snooping done by</strong></del></span> <span
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts,
and
- internet history</a>, and</em></ins></span> the <span
class="removed"><del><strong>phone company,</strong></del></span> <span
class="inserted"><ins><em>Android version was found to contain a
+ access to the phone's microphone, photos, text messages, contacts, and
+ internet history</a>, and the Android version was found to contain a
back-door allowing developers to run any code they wish in the users'
- phone, as “superusers.” Downloading</em></ins></span> and
<span class="removed"><del><strong>perhaps by</strong></del></span> <span
class="inserted"><ins><em>using this
+ phone, as “superusers.” Downloading and using this
app is mandatory at some workplaces.</p>
<p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of</em></ins></span> the <span
class="removed"><del><strong>OS</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated, but
- readable after copy-pasting</em></ins></span> in <span
class="inserted"><ins><em>a text editor) includes a clarification
- saying that</em></ins></span> the
- <span class="removed"><del><strong>phone.</p>
-
- <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>tests were only performed on</em></ins></span> the
<span class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em>Android version</em></ins></span>
- of <span class="removed"><del><strong>whether</strong></del></span> the
<span class="removed"><del><strong>app developers get
- users to say “I agree”. That is no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>app,
and that, according to Apple, “this kind of
+ Washington Post version of the article</a> (partly obfuscated, but
+ readable after copy-pasting in a text editor) includes a clarification
+ saying that the tests were only performed on the Android version
+ of the app, and that, according to Apple, “this kind of
‘superuser’ surveillance could not be conducted on
- Apple's operating system.”</p></em></ins></span>
+ Apple's operating system.”</p>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201909091">
+ <li id="M201909091">
<!--#set var="DATE" value='<small
class="date-tag">2019-09</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p>The <span class="removed"><del><strong>FTC criticized
this</strong></del></span> <span
class="inserted"><ins><em>Facebook</em></ins></span> app <span
class="removed"><del><strong>because</strong></del></span> <span
class="inserted"><ins><em><a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The Facebook app <a
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks users even when</em></ins></span> it <span
class="removed"><del><strong>asked the user to
- approve sending personal data to</strong></del></span> <span
class="inserted"><ins><em>is turned off</a>, after tricking them
- into giving</em></ins></span> the app <span
class="removed"><del><strong>developer but did not
- ask about sending it</strong></del></span> <span
class="inserted"><ins><em>broad permissions in order</em></ins></span> to <span
class="removed"><del><strong>other companies. This shows the
- weakness</strong></del></span> <span class="inserted"><ins><em>use
one</em></ins></span> of <span class="removed"><del><strong>the
reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should a flashlight
- app</strong></del></span> <span class="inserted"><ins><em>its
+ tracks users even when it is turned off</a>, after tricking them
+ into giving the app broad permissions in order to use one of its
functionalities.</p>
</li>
@@ -1634,8 +1591,8 @@
<!--#set var="DATE" value='<small
class="date-tag">2019-09</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Some nonfree period-tracking apps including MIA Fem and Maya <a
-
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"></em></ins></span>
- send <span class="removed"><del><strong>any
information</strong></del></span> <span class="inserted"><ins><em>intimate
details of users' lives</em></ins></span> to <span
class="removed"><del><strong>anyone?</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
+
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
+ send intimate details of users' lives to Facebook</a>.</p>
</li>
<li id="M201909060">
@@ -1644,33 +1601,21 @@
<p>Keeping track of who downloads a proprietary
program is a form of surveillance. There is a
proprietary program for adjusting a certain telescopic rifle sight. <a
-
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"></em></ins></span>
- A <span class="inserted"><ins><em>US prosecutor has demanded the list of
all the 10,000 or more people
+
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded the list of all the 10,000 or more people
who have installed it</a>.</p>
- <p>With a</em></ins></span> free <span
class="removed"><del><strong>software flashlight
- app</strong></del></span> <span class="inserted"><ins><em>program
there</em></ins></span> would <span
class="removed"><del><strong>not.</p></strong></del></span> <span
class="inserted"><ins><em>not be a list of who has installed
- it.</p></em></ins></span>
+ <p>With a free program there would not be a list of who has installed
+ it.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware in Games</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
-</div>
-
-<ul>
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201907081">
+ <li id="M201907081">
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many unscrupulous mobile-app developers keep finding ways
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
- bypass user's settings</a>, regulations,</em></ins></span> and <span
class="removed"><del><strong>then sends personal</strong></del></span> <span
class="inserted"><ins><em>privacy-enhancing features
- of the operating system, in order to gather as much
private</em></ins></span> data <span
class="removed"><del><strong>about</strong></del></span> <span
class="inserted"><ins><em>as
+ <p>Many unscrupulous mobile-app developers keep finding ways to <a
+
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations, and privacy-enhancing
features
+ of the operating system, in order to gather as much private data as
they possibly can.</p>
<p>Thus, we can't trust rules against spying. What we can trust is
@@ -1683,235 +1628,102 @@
<p>Many Android apps can track
users' movements even when the user says <a
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow</em></ins></span> them <span
class="inserted"><ins><em>access</em></ins></span> to
- <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>locations</a>.</p>
+ not to allow them access to locations</a>.</p>
<p>This involves an apparently unintentional weakness in Android,
- exploited intentionally by malicious apps.</p></em></ins></span>
+ exploited intentionally by malicious apps.</p>
</li>
- <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905300">
+ <li id="M201905300">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Femm “fertility” app is secretly
a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
- tool</em></ins></span> for <span class="removed"><del><strong>companies,
and the NSA takes advantage to spy through it too</a>.
- Here's information on
- <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>propaganda</a> by natalist Christians.
It spreads distrust
+ <p>The Femm “fertility” app is secretly a <a
+
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
+ tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
<p>It snoops on users, too, as you must expect from nonfree
- programs.</p></em></ins></span>
+ programs.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-<ul>
- <li>
- <p>The “smart” toys My Friend Cayla and i-Que
transmit</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905060">
+ <li id="M201905060">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement</em></ins></span> to <span class="removed"><del><strong>Nuance
Communications</a>,</strong></del></span> <span
class="inserted"><ins><em>run</em></ins></span> a <span
class="removed"><del><strong>speech recognition company based in the
U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</strong></del></span> <span
class="inserted"><ins><em>proprietary phone app</a> to be allowed
into</em></ins></span>
- the <span class="removed"><del><strong>toys with</strong></del></span>
<span class="inserted"><ins><em>event.</p>
-
- <p>This app is</em></ins></span> a <span
class="removed"><del><strong>mobile phone. This would
- enable crackers to listen in</strong></del></span> <span
class="inserted"><ins><em>spyware that can snoop</em></ins></span> on a <span
class="removed"><del><strong>child's speech,</strong></del></span> <span
class="inserted"><ins><em>lot of
- sensitive data, including user's location</em></ins></span> and <span
class="removed"><del><strong>even speak
- into the toys themselves.</p>
- </li>
-
- <li>
- <p>A computerized vibrator</strong></del></span> <span
class="inserted"><ins><em>contact list, and has</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
-
- <p>The app was reporting the temperature of</strong></del></span>
- <span
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether it was
surrounded</strong></del></span> <span
class="inserted"><ins><em>phone.</p>
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a proprietary phone app</a> to be allowed into
+ the event.</p>
+
+ <p>This app is a spyware that can snoop on a lot of
+ sensitive data, including user's location and contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ near-complete control</a> over the phone.</p>
</li>
<li id="M201904131">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Data collected</em></ins></span> by <span
class="removed"><del><strong>a person's
- body), as well as the vibration frequency.</p>
-
- <p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about
- their products, rather than free software which users could have
- checked</strong></del></span> <span
class="inserted"><ins><em>menstrual</em></ins></span> and <span
class="removed"><del><strong>changed.</p>
-
- <p>The company that made the vibrator</strong></del></span> <span
class="inserted"><ins><em>pregnancy monitoring apps is often</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how
- people used it</a>.</p>
-
- <p>The company's statement that it was
anonymizing</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>. Even
though</em></ins></span> the
- data <span class="removed"><del><strong>may be
- true, but it doesn't really matter. If</strong></del></span> <span
class="inserted"><ins><em>is “anonymized and
aggregated,”</em></ins></span> it <span class="removed"><del><strong>had
sold the data</strong></del></span> <span class="inserted"><ins><em>can easily
be
- traced back</em></ins></span> to <span class="removed"><del><strong>a
- data broker,</strong></del></span> the <span
class="removed"><del><strong>data broker would have been able to figure
out</strong></del></span> <span
class="inserted"><ins><em>woman</em></ins></span> who <span
class="inserted"><ins><em>uses</em></ins></span> the <span
class="removed"><del><strong>user was.</p>
-
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company</strong></del></span> <span
class="inserted"><ins><em>app.</p>
-
- <p>This</em></ins></span> has <span
class="removed"><del><strong>been ordered</strong></del></span> <span
class="inserted"><ins><em>harmful implications for women's
rights</em></ins></span> to <span class="removed"><del><strong>pay a total of
C$4m</a></strong></del></span> <span class="inserted"><ins><em>equal
employment
- and freedom</em></ins></span> to <span class="removed"><del><strong>its
customers.</p>
- </li>
-
- <li><p> “CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span> <span
class="inserted"><ins><em>make their own pregnancy choices. Don't use
- these apps, even if someone offers you a reward</em></ins></span> to <span
class="inserted"><ins><em>do so. A
- free-software app that does more or less</em></ins></span> the
- <span class="removed"><del><strong>manufacturer</a>. Guess
what?</strong></del></span> <span class="inserted"><ins><em>same thing without
- spying on you is available from</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span>
- <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,
and <a
-
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"></em></ins></span>
- a <span class="removed"><del><strong>way to access the data</a>
- collected by the manufacturer's snooping.</p>
-
- <p>That</strong></del></span> <span class="inserted"><ins><em>new
one is being developed</a>.</p>
+ <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
+
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
+ available to employers and insurance companies</a>. Even though the
+ data is “anonymized and aggregated,” it can easily be
+ traced back to the woman who uses the app.</p>
+
+ <p>This has harmful implications for women's rights to equal
employment
+ and freedom to make their own pregnancy choices. Don't use
+ these apps, even if someone offers you a reward to do so. A
+ free-software app that does more or less the same thing without
+ spying on you is available from <a
+ href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
+
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
+ a new one is being developed</a>.</p>
</li>
<li id="M201904130">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google tracks</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>movements of Android phones and iPhones
- running Google apps,</em></ins></span> and <span
class="inserted"><ins><em>sometimes <a
+ <p>Google tracks the movements of Android phones and iPhones
+ running Google apps, and sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves</em></ins></span> the <span class="removed"><del><strong>FBI could
listen</strong></del></span> <span class="inserted"><ins><em>data for
years</a>.</p>
+ saves the data for years</a>.</p>
- <p>Nonfree software in the phone has</em></ins></span> to <span
class="removed"><del><strong>these conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span class="inserted"><ins><em>be responsible for
sending
- the location data</em></ins></span> to <span
class="removed"><del><strong>spy on children and
adults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Google.</p></em></ins></span>
+ <p>Nonfree software in the phone has to be responsible for sending
+ the location data to Google.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items on top under each
subsection</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201903251">
+ <li id="M201903251">
<!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
-
-<ul>
-<li><p></strong></del></span>
- <span class="inserted"><ins><em><p>Many Android phones come with a
huge number of</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Many Android phones come with a huge number of <a
+
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
preinstalled nonfree apps that have access to sensitive data without
users' knowledge</a>. These hidden apps may either call home with
- the data, or pass it</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>to user-installed
apps</em></ins></span> that <span class="inserted"><ins><em>have access
to</em></ins></span>
- the <span class="removed"><del><strong>specific sabotage method Lenovo
used did not affect
-GNU/Linux; also, a “clean” Windows install is not really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>network but no direct access</em></ins></span> to
<span class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>the data. This results in massive
- surveillance</em></ins></span> on <span class="removed"><del><strong>top
under each subsection</strong></del></span> <span
class="inserted"><ins><em>which the user has absolutely no control.</p>
+ the data, or pass it on to user-installed apps that have access to
+ the network but no direct access to the data. This results in massive
+ surveillance on which the user has absolutely no control.</p>
</li>
<li id="M201903201">
<!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it can collect the emails</strong></del></span>
- <span class="inserted"><ins><em><p>A study</em></ins></span> of
<span class="removed"><del><strong>members</strong></del></span> <span
class="inserted"><ins><em>24 “health” apps found that
19</em></ins></span> of <span class="removed"><del><strong>Parliament
- this way, because they pass it through Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>them</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A study of 24 “health” apps found that 19 of them
<a
+
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
send sensitive personal data to third parties</a>, which can use it
- for invasive advertising or discriminating against
people</em></ins></span> in <span class="removed"><del><strong>Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>poor
+ for invasive advertising or discriminating against people in poor
medical condition.</p>
- <p>Whenever user “consent” is sought, it is
buried</em></ins></span> in <span class="removed"><del><strong>Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype
- <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>lengthy terms of service that are
difficult to understand. In any case,
- “consent” is not sufficient to legitimize
snooping.</p></em></ins></span>
+ <p>Whenever user “consent” is sought, it is buried in
+ lengthy terms of service that are difficult to understand. In any case,
+ “consent” is not sufficient to legitimize snooping.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareOnTheRoad</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902230">
+ <li id="M201902230">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>Facebook offered a convenient
proprietary
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Facebook offered a convenient proprietary
library for building mobile apps, which also <a
href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each
subsection</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots of companies built apps that
+ sent personal data to Facebook</a>. Lots of companies built apps that
way and released them, apparently not realizing that all the personal
data they collected would go to Facebook as well.</p>
@@ -1921,43 +1733,15 @@
<li id="M201902140">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
-
-<ul>
- <li></strong></del></span>
- <p>The <span class="removed"><del><strong>Nest Cam
“smart” camera is</strong></del></span> <span
class="inserted"><ins><em>AppCensus database gives information
on</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when the “owner” switches it
“off.”</p>
- <p>A “smart” device means</strong></del></span>
- <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android apps use and
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The AppCensus database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps use and
misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span class="removed"><del><strong>manufacturer
is using it</strong></del></span> <span class="inserted"><ins><em><a
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>outsmart
- you.</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-
-<ul>
- <li><p>E-books can contain Javascript
code,</strong></del></span> <span class="inserted"><ins><em>other
companies,</em></ins></span> and <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link</em></ins></span> this <span
class="removed"><del><strong>code snoops</strong></del></span> <span
class="inserted"><ins><em>ID to hardware identifiers</a>,
+ Advertising ID</a> to other companies, and <a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of the total) link this ID to hardware identifiers</a>,
so that users cannot escape tracking by resetting it.</p>
<p>Collecting hardware identifiers is in apparent violation of
@@ -2501,8 +2285,9 @@
<li id="M201312060">
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Brightest Flashlight app <a
-
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ <p>The Brightest Flashlight app</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
sends user data, including geolocation, for use by
companies</a>.</p>
<p>The FTC criticized this app because it asked the user to
@@ -2510,7 +2295,7 @@
about sending it to other companies. This shows the weakness of
the reject-it-if-you-dislike-snooping “solution” to
surveillance: why should a flashlight app send any information to
- anyone? A free software flashlight app would not.</p>
+ anyone? A free software flashlight</em></ins></span> app <span
class="inserted"><ins><em>would not.</p>
</li>
<li id="M201212100">
@@ -2569,7 +2354,8 @@
<p>Minecraft players <a
href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
- instead. The essential advantage of Minetest is that it is free
+ instead. The essential advantage of Minetest is</em></ins></span> that it
<span class="removed"><del><strong>will</a>
+ pre-install</strong></del></span> <span class="inserted"><ins><em>is
free
software, meaning it respects the user's computer freedom. As a bonus,
it offers more options.</p>
</li>
@@ -2601,15 +2387,15 @@
program along with an update to the massive
multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
- to snoop on all open processes running on its user's
computer</a>.</p>
+ to snoop on all open processes running</em></ins></span> on <span
class="removed"><del><strong>some of</strong></del></span> its <span
class="removed"><del><strong>phones. The app will give Verizon the
same</strong></del></span> <span class="inserted"><ins><em>user's
computer</a>.</p>
</li>
<li id="M201711070">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The driver for a certain gaming keyboard <a
-
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
- information to China</a>.</p>
+
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends</em></ins></span>
+ information <span class="removed"><del><strong>about</strong></del></span>
<span class="inserted"><ins><em>to China</a>.</p>
</li>
<li id="M201512290">
@@ -2617,8 +2403,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Many <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and report to the
- internet</a>—even what their users weigh.</p>
+ video game consoles snoop on their users and report to</em></ins></span>
the
+ <span class="inserted"><ins><em>internet</a>—even what their
users weigh.</p>
<p>A game console is a computer, and you can't trust a computer with
a nonfree operating system.</p>
@@ -2629,16 +2415,18 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Modern gratis game cr…apps <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data about their users and their users'
- friends and associates</a>.</p>
+ collect a wide range of data about their users and their</em></ins></span>
users' <span class="removed"><del><strong>searches that Google normally gets
when</strong></del></span>
+ <span class="inserted"><ins><em>friends and associates</a>.</p>
- <p>Even nastier, they do it through ad networks that merge the data
+ <p>Even nastier,</em></ins></span> they <span
class="inserted"><ins><em>do it through ad networks that merge the data
collected by various cr…apps and sites made by different
companies.</p>
- <p>They use this data to manipulate people to buy things, and hunt
for
+ <p>They</em></ins></span> use <span class="removed"><del><strong>its
search engine.</p>
+
+ <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>this data to manipulate people to buy things, and
hunt for
“whales” who can be led to spend a lot of money. They also
- use a back door to manipulate the game play for specific players.</p>
+ use a back door to manipulate</em></ins></span> the <span
class="removed"><del><strong>app is</strong></del></span> <span
class="inserted"><ins><em>game play for specific players.</p>
<p>While the article describes gratis games, games that cost money
can use the same tactics.</p>
@@ -2647,12 +2435,15 @@
<li id="M201401280">
<!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Angry Birds <a
-
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and the NSA takes advantage
+ <p>Angry Birds</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies,</em></ins></span> and the
+ <span class="removed"><del><strong>user must explicitly opt-in before the
app</strong></del></span> <span class="inserted"><ins><em>NSA</em></ins></span>
takes <span class="removed"><del><strong>effect. However, the
+ app remains spyware—an “optional” piece
of</strong></del></span> <span class="inserted"><ins><em>advantage
to spy through it too</a>. Here's information on <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
+ more</em></ins></span> spyware <span
class="inserted"><ins><em>apps</a>.</p>
<p><a
href="https://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
@@ -2662,14 +2453,18 @@
<li id="M200510200">
<!--#set var="DATE" value='<small
class="date-tag">2005-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Blizzard Warden is a hidden
+ <p>Blizzard Warden</em></ins></span> is
+ <span class="removed"><del><strong>still
spyware.</p></strong></del></span> <span class="inserted"><ins><em>a
hidden
“cheating-prevention” program that <a
href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
spies on every process running on a gamer's computer and sniffs a
good deal of personal data</a>, including lots of activities which
- have nothing to do with cheating.</p>
+ have nothing to do with cheating.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>The Meitu photo-editing
+ app</strong></del></span>
+<span class="inserted"><ins><em></ul>
@@ -2683,31 +2478,50 @@
<li id="M202101050">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Most Internet connected devices in Mozilla's <a
-
href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
- Not Included”</a> list <a
-
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
- designed to snoop on users</a> even if they meet
+ <p>Most Internet connected devices in Mozilla's</em></ins></span>
<a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to a Chinese company</a>.</p></li>
+
+ <li><p>A pregnancy test controller application not only
+ can</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
+ Not Included”</a> list</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
+ designed to snoop</em></ins></span> on <span
class="removed"><del><strong>many sorts</strong></del></span> <span
class="inserted"><ins><em>users</a> even if they meet
Mozilla's “Minimum Security Standards.” Insecure
- design of the program running on some of these devices <a
+ design</em></ins></span> of <span class="removed"><del><strong>data
in</strong></del></span> the <span
class="removed"><del><strong>phone,</strong></del></span> <span
class="inserted"><ins><em>program running on some of these devices <a
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes
- the user susceptible to be snooped and exploited by crackers as
+ the user susceptible to be snooped</em></ins></span> and <span
class="inserted"><ins><em>exploited by crackers as
well</a>.</p>
</li>
<li id="M201708280">
<!--#set var="DATE" value='<small
class="date-tag">2017-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The bad security in many Internet of Stings devices allows <a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on the people that use them</a>.</p>
+ <p>The bad security</em></ins></span> in <span
class="removed"><del><strong>server accounts, it can
+ alter them too</a>.
+ </p></li>
+
+ <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
+
+ <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>people
that use them</a>.</p>
- <p>Don't be a sucker—reject all the stings.</p>
+ <p>Don't be a sucker—reject all</em></ins></span> the <span
class="removed"><del><strong>user's consent”
+ for surveillance</strong></del></span> <span
class="inserted"><ins><em>stings.</p>
- <p><small>(It is unfortunate that the article uses the term
<a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p>
+ <p><small>(It</em></ins></span> is <span
class="removed"><del><strong>inadequate as a protection against massive
+ surveillance.</p>
+ </li>
+
+ <li><p>Google's new voice messaging app</strong></del></span>
<span class="inserted"><ins><em>unfortunate that the article uses the
term</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p></em></ins></span>
</li>
-</ul>
+
+ <span
class="removed"><del><strong><li><p>Apps</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -2717,7 +2531,7 @@
<p>Emo Phillips made a joke: The other day a woman came up to me and
said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
+don't know. You can't see out the other way.”
Evidently</em></ins></span> that <span class="inserted"><ins><em>was
before Amazon “smart” TVs.</p>
<ul class="blurbs">
@@ -2725,61 +2539,82 @@
<!--#set var="DATE" value='<small
class="date-tag">2020-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>TV manufacturers are turning to produce only
- “Smart” TV sets (which include spyware) that <a
- href="https://frame.work/blog/in-defense-of-dumb-tvs">it's now very
- hard to find a TV that doesn't spy on you</a>.</p>
+ “Smart” TV sets (which</em></ins></span> include <span
class="inserted"><ins><em>spyware) that</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://frame.work/blog/in-defense-of-dumb-tvs">it's
now very
+ hard to find a TV that doesn't spy</em></ins></span> on <span
class="removed"><del><strong>what radio and</strong></del></span> <span
class="inserted"><ins><em>you</a>.</p>
- <p>It appears that those manufacturers business model is not to
produce
- TV and sell them for money, but to collect your personal data and
+ <p>It appears that those manufacturers business model is not to
produce</em></ins></span>
+ TV <span class="removed"><del><strong>programs</strong></del></span> <span
class="inserted"><ins><em>and sell them for money, but to collect your personal
data and
(possibly) hand over them to others for benefit.</p>
</li>
<li id="M202006250">
<!--#set var="DATE" value='<small
class="date-tag">2020-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>TV manufacturers are able to <a
+ <p>TV manufacturers</em></ins></span> are <span
class="removed"><del><strong>playing nearby</a>. Also
on</strong></del></span> <span class="inserted"><ins><em>able to <a
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
- every second of what the user is watching</a>. This is illegal due to
+ every second of</em></ins></span> what <span
class="removed"><del><strong>users post on various sites
+ such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>the user is watching</a>. This is illegal
due to
the Video Privacy Protection Act of 1988, but they're circumventing
- it through EULAs.</p>
+ it through EULAs.</p></em></ins></span>
</li>
- <li id="M201901070">
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201901070">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio TVs <a
-
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ <p>Vizio TVs</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
collect “whatever the TV sees,”</a> in the own words of
the company's
- CTO, and this data is sold to third parties. This is in return for
- “better service” (meaning more intrusive ads?) and slightly
+ CTO, and this data is sold to third parties. This is in
return</em></ins></span> for <span class="removed"><del><strong>known
faces</a>,</strong></del></span>
+ <span class="inserted"><ins><em>“better service” (meaning more
intrusive ads?)</em></ins></span> and <span
class="removed"><del><strong>suggests you</strong></del></span> <span
class="inserted"><ins><em>slightly
lower retail prices.</p>
- <p>What is supposed to make this spying acceptable, according to him,
- is that it is opt-in in newer models. But since the Vizio software is
+ <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>share the picture you take</strong></del></span>
<span class="inserted"><ins><em>make this spying acceptable,</em></ins></span>
according to <span class="removed"><del><strong>who</strong></del></span> <span
class="inserted"><ins><em>him,</em></ins></span>
+ is <span class="inserted"><ins><em>that it is opt-in</em></ins></span> in
<span class="inserted"><ins><em>newer models. But since</em></ins></span> the
<span class="removed"><del><strong>frame.</p>
+
+ <p>This spyware feature seems</strong></del></span> <span
class="inserted"><ins><em>Vizio software is
nonfree, we don't know what is actually happening behind the scenes,
and there is no guarantee that all future updates will leave the
settings unchanged.</p>
<p>If you already own a Vizio “smart” TV (or any
“smart” TV, for that
- matter), the easiest way to make sure it isn't spying on you is
- to disconnect it from the Internet, and use a terrestrial antenna
+ matter), the easiest way</em></ins></span> to <span
class="removed"><del><strong>require online access</strong></del></span> <span
class="inserted"><ins><em>make sure it isn't spying on you is</em></ins></span>
+ to <span class="removed"><del><strong>some
+ known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>disconnect it from</em></ins></span> the <span
class="removed"><del><strong>pictures</strong></del></span> <span
class="inserted"><ins><em>Internet, and use a terrestrial antenna
instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is to get your own router (which can
- be an old computer running completely free software), and set up a
- firewall to block connections to Vizio's servers. Or, as a last resort,
- you can replace your TV with another model.</p>
+ if you</em></ins></span> are <span
class="removed"><del><strong>likely</strong></del></span> <span
class="inserted"><ins><em>technically oriented, is</em></ins></span> to <span
class="inserted"><ins><em>get your own router (which can</em></ins></span>
+ be
+ <span class="removed"><del><strong>sent across the wire to Facebook's
servers</strong></del></span> <span class="inserted"><ins><em>an old computer
running completely free software),</em></ins></span> and <span
class="removed"><del><strong>face-recognition
+ algorithms.</p>
+
+ <p>If so, none of Facebook users' pictures are private
+ anymore, even if the user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>set up a
+ firewall</em></ins></span> to <span class="removed"><del><strong>the
service.</p></strong></del></span> <span class="inserted"><ins><em>block
connections to Vizio's servers. Or, as a last resort,
+ you can replace your TV with another model.</p></em></ins></span>
</li>
- <li id="M201804010">
+ <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
+ is based on proprietary malware (DRM and snooping). In August
+ 2015 it</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804010">
<!--#set var="DATE" value='<small
class="date-tag">2018-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some “Smart” TVs automatically <a
-
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ <p>Some “Smart” TVs automatically</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
- <p>We link to the article for the facts it presents. It
+ <p>We link</em></ins></span> to <span
class="removed"><del><strong>increased snooping</a>, and some
+ are starting</strong></del></span> <span class="inserted"><ins><em>the
article for the facts it presents. It
is too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix app <a
+ moral weakness of surrendering</em></ins></span> to <span
class="removed"><del><strong>realize</strong></del></span> <span
class="inserted"><ins><em>Netflix. The Netflix app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
@@ -2789,36 +2624,48 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts and
- cable</a>. Even if the image is coming from the user's own computer,
- the TV reports what it is. The existence of a way to disable the
- surveillance, even if it were not hidden as it was in these TVs,
- does not legitimize the surveillance.</p>
+ report everything</em></ins></span> that <span
class="removed"><del><strong>it</strong></del></span> is <span
class="removed"><del><strong>nasty.</p>
+
+ <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>viewed on them, and not just broadcasts and
+ cable</a>. Even if the image is coming from</em></ins></span> the
<span class="removed"><del><strong><a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as</strong></del></span> <span
class="inserted"><ins><em>user's own computer,
+ the TV reports what it is. The existence of</em></ins></span> a way to
<span class="removed"><del><strong>“serve” users
better</a>—never mind
+ whether they want that. This is a typical example
of</strong></del></span> <span
class="inserted"><ins><em>disable</em></ins></span> the <span
class="removed"><del><strong>attitude of</strong></del></span>
+ <span class="inserted"><ins><em>surveillance, even if it were not hidden
as it was in these TVs,
+ does not legitimize</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
+ those they have subjugated.</p>
+
+ <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>surveillance.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Many</strong></del></span>
- <li id="M201511130">
+ <span class="inserted"><ins><em><li id="M201511130">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Some web and TV advertisements play inaudible
- sounds to be picked up by proprietary malware running
- on other devices in range so as to determine that they
+ sounds to be picked up by</em></ins></span> proprietary <span
class="removed"><del><strong>apps for mobile</strong></del></span> <span
class="inserted"><ins><em>malware running
+ on other</em></ins></span> devices <span
class="removed"><del><strong>report which</strong></del></span> <span
class="inserted"><ins><em>in range so as to determine that they
are nearby. Once your Internet devices are paired with
- your TV, advertisers can correlate ads with Web activity, and other <a
-
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
+ your TV, advertisers can correlate ads with Web activity,
and</em></ins></span> other
+ <span class="removed"><del><strong>apps the user has
+ installed.</strong></del></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
cross-device tracking</a>.</p>
</li>
<li id="M201511060">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio goes a step further than other TV
+ <p>Vizio goes</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>step further than other TV
manufacturers in spying on their users: their <a
href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
“smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so that advertisers can track you
+ link them your IP address</a> so</em></ins></span> that <span
class="removed"><del><strong>at least</strong></del></span> <span
class="inserted"><ins><em>advertisers can track you
across devices.</p>
- <p>It is possible to turn this off, but having it enabled by default
+ <p>It</em></ins></span> is <span
class="removed"><del><strong>visible</strong></del></span> <span
class="inserted"><ins><em>possible to turn this off, but having it enabled by
default
is an injustice already.</p>
</li>
@@ -2838,26 +2685,33 @@
<li id="M201507240">
<!--#set var="DATE" value='<small
class="date-tag">2015-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio “smart” TVs recognize and <a
- href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are watching</a>, even if it isn't a TV
channel.</p>
+ <p>Vizio “smart” TVs recognize</em></ins></span> and
+ <span class="removed"><del><strong>optional</a>. Not as bad
as</strong></del></span> <span class="inserted"><ins><em><a
+
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track</em></ins></span>
+ what <span class="removed"><del><strong>the others
do.</p></strong></del></span> <span class="inserted"><ins><em>people are
watching</a>, even if it isn't a TV channel.</p></em></ins></span>
</li>
- <li id="M201505290">
+ <span class="removed"><del><strong><li><p>FTC says most mobile
apps for children don't respect privacy:</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505290">
<!--#set var="DATE" value='<small
class="date-tag">2015-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Verizon cable TV <a
-
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
snoops on what programs people watch, and even what they wanted to
- record</a>.</p>
+ record</a>.</p></em></ins></span>
</li>
- <li id="M201504300">
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201504300">
<!--#set var="DATE" value='<small
class="date-tag">2015-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio <a
-
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade” to make its TVs snoop on what
+ <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ used a firmware “upgrade” to make its TVs</em></ins></span>
snoop on <span class="inserted"><ins><em>what
users watch</a>. The TVs did not do that when first sold.</p>
</li>
@@ -2866,11 +2720,15 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Samsung “Smart” TV <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on the internet to another company,
Nuance</a>.
- Nuance can save it and would then have to give it to the US or some
+ transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span
class="inserted"><ins><em>internet</em></ins></span> to
+ <span class="removed"><del><strong>the snooping done by the
phone</strong></del></span> <span
class="inserted"><ins><em>another</em></ins></span> company, <span
class="inserted"><ins><em>Nuance</a>.
+ Nuance can save it</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span
class="inserted"><ins><em>would then have to give it to</em></ins></span> the
+ <span class="removed"><del><strong>phone.</p>
+
+ <p>Don't</strong></del></span> <span class="inserted"><ins><em>US
or some
other government.</p>
- <p>Speech recognition is not to be trusted unless it is done by free
+ <p>Speech recognition is not to</em></ins></span> be <span
class="removed"><del><strong>distracted</strong></del></span> <span
class="inserted"><ins><em>trusted unless it is done</em></ins></span> by <span
class="inserted"><ins><em>free
software in your own computer.</p>
<p>In its privacy policy, Samsung explicitly confirms that <a
@@ -2884,7 +2742,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Amazon “Smart” TV is <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all the time</a>.</p>
+ snooping all</em></ins></span> the <span
class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
</li>
<li id="M201409290">
@@ -2894,38 +2752,48 @@
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
- <p>The report was as of 2014, but we don't expect this has got
+ <p>The report was as</em></ins></span> of <span
class="removed"><del><strong>whether the app developers</strong></del></span>
<span class="inserted"><ins><em>2014, but we don't expect this has got
better.</p>
- <p>This shows that laws requiring products to get users' formal
+ <p>This shows that laws requiring products to</em></ins></span> get
+ <span class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>users' formal
consent before collecting personal data are totally inadequate.
And what happens if a user declines consent? Probably the TV will
say, “Without your consent to tracking, the TV will not
work.”</p>
- <p>Proper laws would say that TVs are not allowed to report what the
- user watches—no exceptions!</p>
+ <p>Proper laws would say that TVs are not allowed</em></ins></span>
to <span class="removed"><del><strong>say “I agree”. That is no
excuse for malware.</p></strong></del></span> <span
class="inserted"><ins><em>report what the
+ user watches—no exceptions!</p></em></ins></span>
</li>
- <li id="M201405200">
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201405200">
<!--#set var="DATE" value='<small
class="date-tag">2014-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Spyware in LG “smart” TVs <a
-
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches, and the switch to turn this off has
- no effect</a>. (The fact that the transmission reports a 404 error
+ <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p>
+
+ <p>The FTC criticized this app because it
asked</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what</em></ins></span> the user <span
class="inserted"><ins><em>watches, and the switch</em></ins></span> to
+ <span class="removed"><del><strong>approve sending personal data
to</strong></del></span> <span class="inserted"><ins><em>turn this off has
+ no effect</a>. (The fact that</em></ins></span> the <span
class="removed"><del><strong>app developer but did not
+ ask about sending</strong></del></span> <span
class="inserted"><ins><em>transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
- <p>Even worse, it <a
+ <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em><a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network</a>.</p>
+ snoops on</em></ins></span> other <span
class="removed"><del><strong>companies. This shows</strong></del></span> <span
class="inserted"><ins><em>devices on</em></ins></span> the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
<p>LG later said it had installed a patch to stop this, but any
product could spy this way.</p>
<p>Meanwhile, LG TVs <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots of spying anyway</a>.</p>
+ do lots</em></ins></span> of <span class="removed"><del><strong>the
reject-it-if-you-dislike-snooping
+ “solution”</strong></del></span> <span
class="inserted"><ins><em>spying anyway</a>.</p>
</li>
<li id="M201212170">
@@ -2933,23 +2801,29 @@
--><!--#echo encoding="none" var="DATE" -->
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a “smart”
TV</a>
- and use its camera to watch the people who are watching TV.</p>
+ Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>break security on</em></ins></span> a <span
class="removed"><del><strong>flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>“smart” TV</a>
+ and use its camera</em></ins></span> to <span
class="removed"><del><strong>anyone? A free software flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>watch the people who are watching
TV.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInCameras">Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInGames">Spyware in
Games</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInGames">#SpywareInGames</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201901100">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Amazon Ring “security” devices <a
-
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about
them</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
send the video they capture to Amazon servers</a>, which save it
long-term.</p>
@@ -2973,45 +2847,61 @@
<p>When Consumer Reports tested them, it suggested that these
manufacturers promise not to look at what's in the videos. That's not
- security for your home. Security means making sure they don't get to
- see through your camera.</p>
+ security for your home. Security means making sure they don't
get</em></ins></span> to
+ <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>see through your
camera.</p></em></ins></span>
</li>
- <li id="M201603220">
+ <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201603220">
<!--#set var="DATE" value='<small
class="date-tag">2016-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Over 70 brands of network-connected surveillance cameras have
<a
-
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone to watch through them</a>.</p>
+ <p>Over 70 brands of network-connected surveillance cameras
have</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and the NSA takes advantage</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ security bugs that allow anyone</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>watch</em></ins></span> through <span
class="removed"><del><strong>it too</a>.
+ Here's information on</strong></del></span> <span
class="inserted"><ins><em>them</a>.</p>
</li>
<li id="M201511250">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Nest Cam “smart” camera is <a
- href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
+ <p>The Nest Cam “smart” camera is</em></ins></span>
<a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
even when the “owner” switches it “off.”</p>
<p>A “smart” device means the manufacturer is using it
- to outsmart you.</p>
+ to outsmart you.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInToys">Toys</h4>
+ <h4 <span class="removed"><del><strong>id="SpywareInToys">Spyware in
Toys</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
<span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li></strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711244">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The Furby Connect has a <a
+ --><!--#echo encoding="none" var="DATE" --></em></ins></span>
+ <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla and i-Que transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,</strong></del></span> <span
class="inserted"><ins><em>Furby Connect has</em></ins></span> a <span
class="removed"><del><strong>speech recognition company based in the
U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If the product as shipped doesn't act as a
- listening device, remote changes to the code could surely convert it
- into one.</p>
+ universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>toys with</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as</em></ins></span> a
<span class="removed"><del><strong>mobile phone. This would
+ enable crackers</strong></del></span>
+ <span class="inserted"><ins><em>listening device, remote
changes</em></ins></span> to <span class="removed"><del><strong>listen in on a
child's speech, and even speak</strong></del></span> <span
class="inserted"><ins><em>the code could surely convert it</em></ins></span>
+ into <span class="inserted"><ins><em>one.</p>
</li>
<li id="M201711100">
@@ -3019,12 +2909,14 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of the conversation between two users</a>.</p>
+ recordings of</em></ins></span> the <span
class="removed"><del><strong>toys themselves.</p></strong></del></span>
<span class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
</li>
- <li id="M201703140">
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201703140">
<!--#set var="DATE" value='<small
class="date-tag">2017-03</small>'
- --><!--#echo encoding="none" var="DATE" -->
+ --><!--#echo encoding="none" var="DATE" --></em></ins></span>
<p>A computerized vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
was snooping on its users through the proprietary control
app</a>.</p>
@@ -3054,66 +2946,120 @@
customers.</p>
</li>
- <li id="M201702280">
+ <span class="removed"><del><strong><li><p>
“CloudPets”</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702280">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>“CloudPets” toys with microphones <a
-
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess what?
<a
-
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a> collected by the
+ <p>“CloudPets”</em></ins></span> toys with microphones
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak</em></ins></span> childrens' conversations to the
manufacturer</a>. Guess what? <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers</em></ins></span> found a way to access the data</a>
collected by the
manufacturer's snooping.</p>
<p>That the manufacturer and the FBI could listen to these
- conversations was unacceptable by itself.</p>
+ conversations was unacceptable by <span
class="removed"><del><strong>itself.</p></li>
+
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>itself.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<!-- #SpywareAtLowLevel</strong></del></span>
- <li id="M201612060">
+ <span class="inserted"><ins><em><li id="M201612060">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>The “smart” toys My
Friend Cayla and i-Que transmit <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>, a speech recognition
- company based in the U.S.</p>
+ conversations</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>Nuance Communications</a>, a speech recognition
+ company based</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p>
+<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
+Note that</strong></del></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would enable
- crackers to listen in on a child's speech, and even speak into the
+ can remotely control the toys with</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts</strong></del></span> <span class="inserted"><ins><em>mobile phone. This
would enable
+ crackers to listen</em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork</strong></del></span> <span
class="inserted"><ins><em>on a child's speech, and even speak into the
toys themselves.</p>
</li>
<li id="M201502180">
<!--#set var="DATE" value='<small
class="date-tag">2015-02</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Barbie <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>Barbie <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going to spy on children and adults</a>.</p>
+ going</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>children and
adults</a>.</p>
</li>
-</ul>
+</ul></em></ins></span>
-<div class="big-subsection">
- <h4 id="SpywareInDrones">Drones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareAtWork">Spyware at
Work</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtWork">#SpywareAtWork</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear: left;"></div>
-<ul class="blurbs">
+<ul>
+ <li><p>Investigation
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect the emails of members of Parliament
+ this way, because they pass it through Microsoft.</p></li>
+
+ <li><p>Spyware</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708040">
<!--#set var="DATE" value='<small
class="date-tag">2017-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>While you're using a DJI drone
- to snoop on other people, DJI is in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p>
+ to snoop on other people, DJI is</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span
class="inserted"><ins><em>many cases</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4>
+ <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>Spyware</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202009270">
<!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -3121,18 +3067,21 @@
software, including videoconference software, to <a
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
surveil and monitor staff working at home</a>. If the program reports
- whether you are “active,” that is in effect a malicious
+ whether you are “active,” that is</em></ins></span> in <span
class="removed"><del><strong>Skype:</strong></del></span> <span
class="inserted"><ins><em>effect a malicious
surveillance feature.</p>
</li>
<li id="M202008030">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google Nest <a
-
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
+ <p>Google Nest</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
is taking over ADT</a>. Google sent out a software
- update to its speaker devices using their back door <a
- href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that
+ update to its speaker devices using their back door</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.protocol.com/google-smart-speaker-alarm-adt">
that
listens for things like smoke alarms</a> and then notifies your phone
that an alarm is happening. This means the devices now listen for more
than just their wake words. Google says the software update was sent
@@ -3152,16 +3101,22 @@
an adequate basis for protecting digital privacy. The boss can coerce
most workers into consenting to almost anything, even probable exposure
to contagious disease that can be fatal. Software like this should
- be illegal and bosses that demand it should be prosecuted for it.</p>
+ be illegal and bosses that demand it should be
prosecuted</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>it.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+
+<!-- #SpywareOnTheRoad</strong></del></span>
- <li id="M201911190">
+ <span class="inserted"><ins><em><li id="M201911190">
<!--#set var="DATE" value='<small
class="date-tag">2019-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Internet-tethered Amazon Ring had
- a security vulnerability that enabled attackers to <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>Internet-tethered Amazon Ring had
+ a security vulnerability that enabled attackers</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
- access the user's wifi password</a>, and snoop on the household
+ access the user's wifi password</a>, and snoop</em></ins></span> on
<span class="removed"><del><strong>top under each
subsection</strong></del></span> <span class="inserted"><ins><em>the household
through connected surveillance devices.</p>
<p>Knowledge of the wifi password would not be sufficient to carry
@@ -3173,31 +3128,60 @@
<li id="M201907210">
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Google “Assistant” records users' conversations <a
-
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
- when it is not supposed to listen</a>. Thus, when one of Google's
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>The Nest Cam “smart” camera is</strong></del></span>
+ <span class="inserted"><ins><em><p>Google “Assistant”
records users' conversations</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even</em></ins></span>
+ when <span class="removed"><del><strong>the “owner”
switches</strong></del></span> it <span
class="removed"><del><strong>“off.”</p>
+ <p>A “smart” device means the
manufacturer</strong></del></span> is <span
class="removed"><del><strong>using</strong></del></span> <span
class="inserted"><ins><em>not supposed to listen</a>. Thus, when one of
Google's
subcontractors discloses a thousand confidential voice recordings,
users were easily identified from these recordings.</p>
<p>Since Google “Assistant” uses proprietary software,
there is no
- way to see or control what it records or sends.</p>
+ way to see or control what</em></ins></span> it <span
class="inserted"><ins><em>records or sends.</p>
- <p>Rather than trying to better control the use of recordings, Google
+ <p>Rather than trying</em></ins></span> to <span
class="removed"><del><strong>outsmart
+ you.</p></strong></del></span> <span
class="inserted"><ins><em>better control the use of recordings, Google
should not record or listen to the person's voice. It should only
- get commands that the user wants to send to some Google service.</p>
+ get commands that the user wants to send to some Google
service.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul>
+ <li><p>E-books can contain Javascript code,</strong></del></span>
- <li id="M201905061">
+ <span class="inserted"><ins><em><li id="M201905061">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Amazon Alexa collects a lot more information from users
than is necessary for correct functioning (time, location,
- recordings made without a legitimate prompt), and sends
+ recordings made without a legitimate prompt),</em></ins></span> and <span
class="inserted"><ins><em>sends
it to Amazon's servers, which store it indefinitely. Even
worse, Amazon forwards it to third-party companies. Thus,
- even if users request deletion of their data from Amazon's servers, <a
-
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
+ even if users request deletion of their data from Amazon's
servers,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
the data remain on other servers</a>, where they can be accessed by
advertising companies and government agencies. In other words,
deleting the collected information doesn't cancel the wrong of
@@ -4282,7 +4266,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/11 15:04:18 $
+$Date: 2021/04/15 14:32:25 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.400
retrieving revision 1.401
diff -u -b -r1.400 -r1.401
--- proprietary-surveillance.it.po 11 Apr 2021 15:04:18 -0000 1.400
+++ proprietary-surveillance.it.po 15 Apr 2021 14:32:26 -0000 1.401
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 14:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -150,6 +150,13 @@
"\">Proprietary Tethers</a>."
msgstr ""
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org"
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
#. type: Content of: <div><div><div><p>
# || No change detected. The change might only be in amounts of spaces.
#, fuzzy
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.262
retrieving revision 1.263
diff -u -b -r1.262 -r1.263
--- proprietary-surveillance.ja-diff.html 11 Apr 2021 15:04:18 -0000
1.262
+++ proprietary-surveillance.ja-diff.html 15 Apr 2021 14:32:28 -0000
1.263
@@ -117,7 +117,9 @@
server are snoopers by nature. We do not list them here because they
have their own page: <a
href="/proprietary/proprietary-tethers.html#about-page">Proprietary
-Tethers</a>.</p>
+ Tethers</a>.</p>
+
+<p>There is a similar site named <a
href="https://spyware.neocities.org">Spyware Watchdog</a> that
classifies spyware programs, so that users can be more aware that they are
installing spyware.</p>
<div class="important" style="clear: both">
<p>If you know of an example that ought to be in this page but isn't
@@ -431,31 +433,27 @@
<li><p></strong></del></span> <span
class="inserted"><ins><em>ads.</p>
- <p>We can suppose</em></ins></span> Microsoft <span
class="removed"><del><strong>uses Windows 10's “privacy policy” to
overtly impose a
- “right” to look at users' files at any time. Windows 10 full disk
- encryption <a
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/">
- gives Microsoft a key</a>.</p>
-
- <p>Thus, Windows is overt malware in regard to surveillance,
- as in other issues.</p>
-
- <p>We can suppose Microsoft look</strong></del></span> <span
class="inserted"><ins><em>looks</em></ins></span> at users' files for the US
government
- on demand, though the “privacy policy” does not <span
class="removed"><del><strong>explicit</strong></del></span> <span
class="inserted"><ins><em>explicitly</em></ins></span>
+ <p>We can suppose</em></ins></span> Microsoft <span
class="removed"><del><strong>uses Windows 10's “privacy policy”
to</strong></del></span> <span class="inserted"><ins><em>looks at users' files
for the US government
+ on demand, though the “privacy policy” does not explicitly
say so. Will it look at users' files for the Chinese government
on demand?</p>
- <span class="inserted"><ins><em></li>
+ </li>
<li id="M201506170">
<!--#set var="DATE" value='<small
class="date-tag">2015-06</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Microsoft uses Windows 10's “privacy policy”
- to overtly impose a “right” to look at
- users' files at any time. Windows 10 full disk encryption <a
-
href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/">
+ to</em></ins></span> overtly impose a “right” to look at
+ users' files at any time. Windows 10 full disk encryption <a <span
class="removed"><del><strong>href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/"></em></ins></span>
gives Microsoft a key</a>.</p>
<p>Thus, Windows is overt malware in regard to surveillance, as in
- other issues.</p></em></ins></span>
+ other issues.</p>
+
+ <span class="removed"><del><strong><p>We can suppose Microsoft look at
users' files for the US government on
+ demand, though the “privacy policy” does not explicit say so.
Will it
+ look at users' files for the Chinese government on
demand?</p></strong></del></span>
<p>The unique “advertising ID” for each user enables
other companies to track the browsing of each specific user.</p>
@@ -1040,37 +1038,47 @@
<p>The article mentions specific examples: Microsoft OneDrive,
Intuit's Mint, Nike, Spotify, The Washington Post, The Weather
Channel (owned</em></ins></span> by <span
class="inserted"><ins><em>IBM),</em></ins></span> the <span
class="removed"><del><strong>phone company,</strong></del></span> <span
class="inserted"><ins><em>crime-alert service Citizen, Yelp</em></ins></span>
- and <span class="removed"><del><strong>perhaps by the OS in the
- phone.</p>
-
- <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>DoorDash. But it is likely that most nonfree apps
contain
+ and <span class="removed"><del><strong>perhaps by</strong></del></span>
<span class="inserted"><ins><em>DoorDash. But it is likely that most nonfree
apps contain
trackers. Some of these send personally identifying data such as phone
fingerprint, exact location, email address, phone number or even
- delivery address (in</em></ins></span> the <span
class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em>case</em></ins></span> of <span
class="removed"><del><strong>whether</strong></del></span> <span
class="inserted"><ins><em>DoorDash). Once this information
- is collected by</em></ins></span> the <span
class="removed"><del><strong>app developers get
- users to say “I agree”. That</strong></del></span> <span
class="inserted"><ins><em>company, there</em></ins></span> is no <span
class="removed"><del><strong>excuse for
malware.</p></strong></del></span> <span
class="inserted"><ins><em>telling what it will be
- used for.</p></em></ins></span>
+ delivery address (in</em></ins></span> the <span
class="removed"><del><strong>OS in</strong></del></span> <span
class="inserted"><ins><em>case of DoorDash). Once this information
+ is collected by</em></ins></span> the
+ <span class="removed"><del><strong>phone.</p>
+
+ <p>Don't</strong></del></span> <span
class="inserted"><ins><em>company, there is no telling what it
will</em></ins></span> be <span class="removed"><del><strong>distracted
by</strong></del></span>
+ <span class="inserted"><ins><em>used for.</p>
+ </li>
+
+ <li id="M201711250">
+ <!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The DMCA and</em></ins></span> the <span
class="removed"><del><strong>question of whether the app developers get
+ users to say “I agree”. That is no excuse for
malware.</p>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app
+ <li><p>The Brightest Flashlight app
<a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
+ sends user data, including geolocation, for use by
companies.</a></p>
- <span class="inserted"><ins><em><li id="M201711250">
- <!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p>The <span class="removed"><del><strong>FTC criticized this app
because it asked the user to
- approve sending personal data to</strong></del></span> <span
class="inserted"><ins><em>DMCA and</em></ins></span> the <span
class="removed"><del><strong>app developer but did not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>EU Copyright Directive make</em></ins></span> it
<span class="inserted"><ins><em><a
+ <p>The FTC criticized this app because</strong></del></span> <span
class="inserted"><ins><em>EU Copyright Directive make</em></ins></span> it
<span class="removed"><del><strong>asked the user to
+ approve sending personal data</strong></del></span> <span
class="inserted"><ins><em><a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</em></ins></span> to <span class="removed"><del><strong>other
companies. This shows the
- weakness of the reject-it-if-you-dislike-snooping
+ illegal</em></ins></span> to <span class="inserted"><ins><em>study how iOS
cr…apps spy on users</a>, because
+ this would require circumventing</em></ins></span> the <span
class="removed"><del><strong>app developer but did not
+ ask about sending it to other companies. This
shows</strong></del></span> <span class="inserted"><ins><em>iOS DRM.</p>
+ </li>
+
+ <li id="M201709210">
+ <!--#set var="DATE" value='<small
class="date-tag">2017-09</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>In</em></ins></span> the
+ <span class="removed"><del><strong>weakness of</strong></del></span>
<span class="inserted"><ins><em>latest iThings system,
+ “turning off” WiFi and Bluetooth</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
“solution” to surveillance: why should a flashlight
app send any information to anyone? A free software flashlight
- app</strong></del></span> <span class="inserted"><ins><em>study how iOS
cr…apps spy on users</a>, because
- this</em></ins></span> would <span
class="removed"><del><strong>not.</p></strong></del></span> <span
class="inserted"><ins><em>require circumventing the iOS
DRM.</p></em></ins></span>
+ app would not.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<div class="big-subsection">
@@ -1079,15 +1087,9 @@
</div>
<ul>
- <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201709210">
- <!--#set var="DATE" value='<small
class="date-tag">2017-09</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>In the latest iThings system,
- “turning off” WiFi</em></ins></span> and <span
class="removed"><del><strong>then sends personal data
about</strong></del></span> <span class="inserted"><ins><em>Bluetooth the
obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ <li><p>nVidia's proprietary GeForce
Experience</strong></del></span> <span class="inserted"><ins><em>obvious
way</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data
about</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn</em></ins></span>
them <span class="inserted"><ins><em>off—only until 5am. That's
Apple for you—“We
know you want</em></ins></span> to
@@ -1139,22 +1141,23 @@
</li>
<span class="removed"><del><strong><li><p>A computerized
- vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops
- on its users through the proprietary control
app</a>.</p></strong></del></span>
+ vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops</strong></del></span>
<span class="inserted"><ins><em><li id="M201609280">
<!--#set var="DATE" value='<small
class="date-tag">2016-09</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p>The <span class="inserted"><ins><em>iMessage</em></ins></span>
app <span class="removed"><del><strong>reports the temperature of the vibrator
minute</strong></del></span> <span class="inserted"><ins><em>on iThings <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The iMessage app</em></ins></span> on <span
class="removed"><del><strong>its users through</strong></del></span> <span
class="inserted"><ins><em>iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that the user types into it</a>; the
- server records these numbers for at least 30 days.</p>
+ a server every phone number that</em></ins></span> the <span
class="removed"><del><strong>proprietary control app</a>.</p>
+
+ <p>The app reports</strong></del></span> <span
class="inserted"><ins><em>user types into it</a>;</em></ins></span> the
<span class="removed"><del><strong>temperature of</strong></del></span>
+ <span class="inserted"><ins><em>server records these numbers for at least
30 days.</p>
</li>
<li id="M201509240">
<!--#set var="DATE" value='<small
class="date-tag">2015-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>iThings automatically upload to Apple's servers all the photos
+ <p>iThings automatically upload to Apple's servers
all</em></ins></span> the <span class="removed"><del><strong>vibrator
minute</strong></del></span> <span class="inserted"><ins><em>photos
and videos they make.</p>
<blockquote><p> iCloud Photo Library stores every photo and
video you
@@ -1203,7 +1206,7 @@
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
Several “features” of iOS seem to exist
- for no possible purpose other than surveillance</a>. Here is the
<a
+ for no possible purpose other than surveillance</a>. Here
is</em></ins></span> the <span class="removed"><del><strong>totally inadequate
proposed response:</strong></del></span> <span class="inserted"><ins><em><a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
@@ -1222,8 +1225,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop on all</em></ins></span> the <span
class="inserted"><ins><em>data in an iThing, or it
- is</em></ins></span> totally <span class="removed"><del><strong>inadequate
proposed</strong></del></span> <span
class="inserted"><ins><em>incompetent</a>.</p>
+ Either Apple helps the NSA snoop on all the data in an iThing, or it
+ is totally incompetent</a>.</p>
</li>
<li id="M201308080">
@@ -2853,9 +2856,7 @@
minute (thus, indirectly, whether it was surrounded by a person's
body), as well as the vibration frequency.</p>
- <p>Note the totally inadequate proposed</em></ins></span> response:
a <span class="removed"><del><strong>labeling
- standard with which manufacturers would make statements about
- their products, rather than free software which
users</strong></del></span> <span class="inserted"><ins><em>labeling
+ <p>Note the totally inadequate proposed response: a labeling
standard with which manufacturers would make statements about their
products, rather than free software which users could have checked
and changed.</p>
@@ -3104,8 +3105,10 @@
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
listen to everyone in the house, all the time</a>.</p>
- <p>Today's technological practice does not include any way of making
- a device that</em></ins></span> can <span
class="removed"><del><strong>check
+ <p>Today's technological practice does not include any way of
making</em></ins></span>
+ a <span class="removed"><del><strong>labeling
+ standard with which manufacturers would make statements about
+ their products, rather than free software which
users</strong></del></span> <span class="inserted"><ins><em>device
that</em></ins></span> can <span class="removed"><del><strong>check
and change.</p></strong></del></span> <span
class="inserted"><ins><em>obey your voice commands without potentially spying
on you. Even if it is air-gapped, it could be saving up records
about you for later examination.</p></em></ins></span>
@@ -4151,7 +4154,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/11 15:04:18 $
+$Date: 2021/04/15 14:32:28 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.382
retrieving revision 1.383
diff -u -b -r1.382 -r1.383
--- proprietary-surveillance.ja.po 11 Apr 2021 15:04:19 -0000 1.382
+++ proprietary-surveillance.ja.po 15 Apr 2021 14:32:28 -0000 1.383
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 14:25+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -131,6 +131,13 @@
"\">Proprietary Tethers</a>."
msgstr ""
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org"
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
#. type: Content of: <div><div><div><p>
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.321
retrieving revision 1.322
diff -u -b -r1.321 -r1.322
--- proprietary-surveillance.pot 11 Apr 2021 15:04:19 -0000 1.321
+++ proprietary-surveillance.pot 15 Apr 2021 14:32:28 -0000 1.322
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 14:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -100,6 +100,14 @@
"Tethers</a>."
msgstr ""
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a "
+"href=\"https://spyware.neocities.org\">Spyware Watchdog</a> that classifies "
+"spyware programs, so that users can be more aware that they are installing "
+"spyware."
+msgstr ""
+
#. type: Content of: <div><div><div><p>
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.704
retrieving revision 1.705
diff -u -b -r1.704 -r1.705
--- proprietary-surveillance.ru.po 12 Apr 2021 08:04:25 -0000 1.704
+++ proprietary-surveillance.ru.po 15 Apr 2021 14:32:30 -0000 1.705
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 14:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 14:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -121,6 +122,13 @@
"ниÑ
еÑÑÑ ÑÐ²Ð¾Ñ ÑÑÑаниÑа: <a
href=\"/proprietary/proprietary-tethers."
"html#about-page\">ÐÑивÑзка в неÑвободнÑÑ
пÑогÑаммаÑ
</a>."
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org"
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
#. type: Content of: <div><div><div><p>
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.373
retrieving revision 1.374
diff -u -b -r1.373 -r1.374
--- pt-br.po 11 Apr 2021 15:04:20 -0000 1.373
+++ pt-br.po 15 Apr 2021 14:32:30 -0000 1.374
@@ -9838,6 +9838,13 @@
"\">Proprietary Tethers</a>."
msgstr ""
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org"
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
#. type: Content of: <div><div><div><h3>
#, fuzzy
#| msgid "<a href=\"#TOC\">Table of contents</a>"
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.630
retrieving revision 1.631
diff -u -b -r1.630 -r1.631
--- ru.po 12 Apr 2021 08:33:02 -0000 1.630
+++ ru.po 15 Apr 2021 14:32:30 -0000 1.631
@@ -11810,6 +11810,13 @@
"ниÑ
еÑÑÑ ÑÐ²Ð¾Ñ ÑÑÑаниÑа: <a
href=\"/proprietary/proprietary-tethers."
"html#about-page\">ÐÑивÑзка в неÑвободнÑÑ
пÑогÑаммаÑ
</a>."
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org"
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
#. type: Content of: <div><div><div><h3>
msgid "Table of Contents"
msgstr "СодеÑжание"
Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- tr.po 14 Apr 2021 18:29:51 -0000 1.166
+++ tr.po 15 Apr 2021 14:32:30 -0000 1.167
@@ -8928,6 +8928,13 @@
"\">Proprietary Tethers</a>."
msgstr ""
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org"
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
#. type: Content of: <div><div><div><h3>
#, fuzzy
#| msgid "<a href=\"#TOC\">Table of contents</a>"
Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- zh-cn.po 13 Apr 2021 05:59:43 -0000 1.167
+++ zh-cn.po 15 Apr 2021 14:32:30 -0000 1.168
@@ -8627,6 +8627,13 @@
"\">Proprietary Tethers</a>."
msgstr ""
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org"
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
#. type: Content of: <div><div><div><h3>
#, fuzzy
#| msgid "<a href=\"#TOC\">Table of contents</a>"
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- zh-tw.po 11 Apr 2021 15:04:20 -0000 1.302
+++ zh-tw.po 15 Apr 2021 14:32:30 -0000 1.303
@@ -8509,6 +8509,13 @@
"\">Proprietary Tethers</a>."
msgstr ""
+#. type: Content of: <div><div><p>
+msgid ""
+"There is a similar site named <a href=\"https://spyware.neocities.org"
+"\">Spyware Watchdog</a> that classifies spyware programs, so that users can "
+"be more aware that they are installing spyware."
+msgstr ""
+
#. type: Content of: <div><div><div><h3>
# || No change detected. The change might only be in amounts of spaces.
#, fuzzy