[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Thu, 15 Apr 2021 15:01:26 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 21/04/15 15:01:25
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-google.de-diff.html
malware-google.de.po malware-google.es.po
malware-google.fr.po malware-google.pot
malware-google.ru.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.tr.po
proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.303&r2=1.304
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.429&r2=1.430
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.530&r2=1.531
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.303&r2=1.304
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.311&r2=1.312
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-diff.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.es.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr.po?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pot?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru.po?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.304&r2=1.305
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.303&r2=1.304
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.302&r2=1.303
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.179&r2=1.180
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.389&r2=1.390
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.181&r2=1.182
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.625&r2=1.626
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.245&r2=1.246
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.401&r2=1.402
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.263&r2=1.264
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.383&r2=1.384
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.322&r2=1.323
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.706&r2=1.707
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.245&r2=1.246
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.280&r2=1.281
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.428&r2=1.429
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.470&r2=1.471
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.257&r2=1.258
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.289&r2=1.290
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.262&r2=1.263
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.273&r2=1.274
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.258&r2=1.259
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.263&r2=1.264
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.275&r2=1.276
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.256&r2=1.257
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.253&r2=1.254
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.405&r2=1.406
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.492&r2=1.493
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.185&r2=1.186
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.238&r2=1.239
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.243&r2=1.244
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.374&r2=1.375
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.632&r2=1.633
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.303&r2=1.304
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.303
retrieving revision 1.304
diff -u -b -r1.303 -r1.304
--- de.po 15 Apr 2021 14:32:13 -0000 1.303
+++ de.po 15 Apr 2021 19:01:21 -0000 1.304
@@ -6327,7 +6327,7 @@
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.429
retrieving revision 1.430
diff -u -b -r1.429 -r1.430
--- es.po 15 Apr 2021 14:32:13 -0000 1.429
+++ es.po 15 Apr 2021 19:01:21 -0000 1.430
@@ -6311,11 +6311,25 @@
"no es una opción activada por defecto."
#. type: Content of: <div><div><ul><li><p>
+# | Google <a
+# |
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\">handed
+# | over personal data of Indian protesters and activists to Indian police</a>
+# | which [-leaded-] {+led+} to their arrest. The cops requested the IP
+# | address and the location where a document was created and with that
+# | information, they identified protesters and activists.
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
msgid ""
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
@@ -15488,6 +15502,22 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
#~ msgid ""
+#~ "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#~ "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#~ "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#~ "and activists to Indian police</a> which leaded to their arrest. The cops "
+#~ "requested the IP address and the location where a document was created "
+#~ "and with that information, they identified protesters and activists."
+#~ msgstr ""
+#~ "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#~ "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#~ "doubt-1769772-2021-02-16\">ha proporcionado a la policÃa india datos "
+#~ "personales de manifestantes</a> que condujeron a su arresto. La policÃa "
+#~ "solicitó la dirección IP y la ubicación del lugar donde se habÃa
creado "
+#~ "un documento y con esa información identificaron a los manifestantes y "
+#~ "activistas."
+
+#~ msgid ""
#~ "Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/"
#~ "technology/2021/03/10/amazon-library-ebook-monopoly\">stopping public "
#~ "libraries from lending e-books and audiobooks</a>. Amazon became powerful "
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.530
retrieving revision 1.531
diff -u -b -r1.530 -r1.531
--- fr.po 15 Apr 2021 18:11:10 -0000 1.530
+++ fr.po 15 Apr 2021 19:01:21 -0000 1.531
@@ -5394,11 +5394,25 @@
"activé par défaut)."
#. type: Content of: <div><div><ul><li><p>
+# | Google <a
+# |
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\">handed
+# | over personal data of Indian protesters and activists to Indian police</a>
+# | which [-leaded-] {+led+} to their arrest. The cops requested the IP
+# | address and the location where a document was created and with that
+# | information, they identified protesters and activists.
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
msgid ""
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
@@ -13160,3 +13174,19 @@
#. type: Content of: <div><div><dl><dd><ul><li>
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+
+#~ msgid ""
+#~ "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#~ "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#~ "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#~ "and activists to Indian police</a> which leaded to their arrest. The cops "
+#~ "requested the IP address and the location where a document was created "
+#~ "and with that information, they identified protesters and activists."
+#~ msgstr ""
+#~ "Google a <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#~ "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#~ "doubt-1769772-2021-02-16\">communiqué des données personnelles de "
+#~ "manifestants et activistes indiens à la police indienne</a>, ce qui a "
+#~ "conduit à leur arrestation. Les flics ont demandé l'adresse IP et la "
+#~ "localité d'où avait été créé un document et avec cette information
ont "
+#~ "identifié ces personnes."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.303
retrieving revision 1.304
diff -u -b -r1.303 -r1.304
--- it.po 15 Apr 2021 14:32:15 -0000 1.303
+++ it.po 15 Apr 2021 19:01:21 -0000 1.304
@@ -5922,7 +5922,7 @@
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.311
retrieving revision 1.312
diff -u -b -r1.311 -r1.312
--- ja.po 15 Apr 2021 14:32:15 -0000 1.311
+++ ja.po 15 Apr 2021 19:01:22 -0000 1.312
@@ -4614,7 +4614,7 @@
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: malware-google.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de-diff.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- malware-google.de-diff.html 11 Apr 2021 15:04:17 -0000 1.57
+++ malware-google.de-diff.html 15 Apr 2021 19:01:22 -0000 1.58
@@ -456,7 +456,7 @@
follow</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16">handed
over personal data of Indian protesters and activists to Indian
- police</a> which leaded to their arrest. The cops requested the IP
+ police</a> which led to their arrest. The cops requested the IP
address and the location where</em></ins></span> a <span
class="removed"><del><strong>user's movements around</strong></del></span>
<span class="inserted"><ins><em>document was created and with that
information, they identified protesters and activists.</p>
</li>
@@ -876,7 +876,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/11 15:04:17 $
+$Date: 2021/04/15 19:01:22 $
<!-- timestamp end -->
</p>
</div>
Index: malware-google.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- malware-google.de.po 11 Apr 2021 15:04:17 -0000 1.70
+++ malware-google.de.po 15 Apr 2021 19:01:22 -0000 1.71
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-google.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
"PO-Revision-Date: 2018-05-07 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -742,7 +742,7 @@
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: malware-google.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.es.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- malware-google.es.po 12 Apr 2021 10:33:22 -0000 1.69
+++ malware-google.es.po 15 Apr 2021 19:01:22 -0000 1.70
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
"PO-Revision-Date: 2021-04-12 11:35+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 18:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -577,11 +578,25 @@
msgstr "Vigilancia"
#. type: Content of: <div><div><ul><li><p>
+# | Google <a
+# |
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\">handed
+# | over personal data of Indian protesters and activists to Indian police</a>
+# | which [-leaded-] {+led+} to their arrest. The cops requested the IP
+# | address and the location where a document was created and with that
+# | information, they identified protesters and activists.
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
msgid ""
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: malware-google.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr.po,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- malware-google.fr.po 12 Apr 2021 09:50:40 -0000 1.123
+++ malware-google.fr.po 15 Apr 2021 19:01:22 -0000 1.124
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
"PO-Revision-Date: 2021-04-12 11:45+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 18:55+0000\n"
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -572,11 +573,25 @@
msgstr "Surveillance"
#. type: Content of: <div><div><ul><li><p>
+# | Google <a
+# |
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\">handed
+# | over personal data of Indian protesters and activists to Indian police</a>
+# | which [-leaded-] {+led+} to their arrest. The cops requested the IP
+# | address and the location where a document was created and with that
+# | information, they identified protesters and activists.
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
msgid ""
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: malware-google.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.pot,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- malware-google.pot 11 Apr 2021 15:04:17 -0000 1.65
+++ malware-google.pot 15 Apr 2021 19:01:22 -0000 1.66
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -418,7 +418,7 @@
"Google <a "
"href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\">handed
"
"over personal data of Indian protesters and activists to Indian police</a> "
-"which leaded to their arrest. The cops requested the IP address and the "
+"which led to their arrest. The cops requested the IP address and the "
"location where a document was created and with that information, they "
"identified protesters and activists."
msgstr ""
Index: malware-google.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- malware-google.ru.po 12 Apr 2021 08:04:24 -0000 1.134
+++ malware-google.ru.po 15 Apr 2021 19:01:22 -0000 1.135
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 18:55+0000\n"
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -572,11 +573,25 @@
msgstr "Слежка"
#. type: Content of: <div><div><ul><li><p>
+# | Google <a
+# |
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\">handed
+# | over personal data of Indian protesters and activists to Indian police</a>
+# | which [-leaded-] {+led+} to their arrest. The cops requested the IP
+# | address and the location where a document was created and with that
+# | information, they identified protesters and activists.
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
msgid ""
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.304
retrieving revision 1.305
diff -u -b -r1.304 -r1.305
--- nl.po 15 Apr 2021 14:32:15 -0000 1.304
+++ nl.po 15 Apr 2021 19:01:22 -0000 1.305
@@ -4301,7 +4301,7 @@
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.303
retrieving revision 1.304
diff -u -b -r1.303 -r1.304
--- pl.po 15 Apr 2021 14:32:16 -0000 1.303
+++ pl.po 15 Apr 2021 19:01:22 -0000 1.304
@@ -3825,7 +3825,7 @@
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- pot 15 Apr 2021 14:32:17 -0000 1.302
+++ pot 15 Apr 2021 19:01:22 -0000 1.303
@@ -3584,7 +3584,7 @@
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.179
retrieving revision 1.180
diff -u -b -r1.179 -r1.180
--- proprietary-surveillance.de-diff.html 15 Apr 2021 14:32:18 -0000
1.179
+++ proprietary-surveillance.de-diff.html 15 Apr 2021 19:01:22 -0000
1.180
@@ -1251,7 +1251,7 @@
honestly identify the information it collects on users, instead of
hiding it in an obscurely</em></ins></span> worded EULA.</p>
- <p>However, to <span class="removed"><del><strong>truly protect
people's privacy, we must prevent Google</strong></del></span> <span
class="inserted"><ins><em>truly protect people's privacy, we must prevent Google
+ <p>However, to <span class="removed"><del><strong>truly
protect</strong></del></span> <span class="inserted"><ins><em>truly protect
people's privacy, we must prevent Google
and other companies from getting this personal information in the
first place!</p>
</li>
@@ -1981,19 +1981,10 @@
traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages,</em></ins></span> and
<span class="removed"><del><strong>other companies from
getting</strong></del></span> <span class="inserted"><ins><em>also uses roughly
- five tracking libraries. Developers of</em></ins></span> this <span
class="removed"><del><strong>personal information in</strong></del></span>
<span class="inserted"><ins><em>app have confirmed that</em></ins></span>
- the <span class="removed"><del><strong>first
-place!</p>
-</li>
-
- <li>
- <p>Google Play (a component</strong></del></span> <span
class="inserted"><ins><em>non-premium version</em></ins></span> of <span
class="removed"><del><strong>Android) <a
-
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</strong></del></span> the <span class="removed"><del><strong>users'
movements without their permission</a>.</p>
-
- <p>Even if you disable Google Maps</strong></del></span> <span
class="inserted"><ins><em>app does JavaScript injection for
- tracking the user</em></ins></span> and <span
class="removed"><del><strong>location tracking,</strong></del></span> <span
class="inserted"><ins><em>displaying ads.</dd>
+ <dd>Injects JavaScript code into HTML pages, and also uses roughly
+ five tracking libraries. Developers of this app have confirmed that
+ the non-premium version of the app does JavaScript injection for
+ tracking the user and displaying ads.</dd>
</dl>
</li>
@@ -2011,19 +2002,16 @@
<p>Facebook's new Magic Photo app <a
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections for known faces</a>,
- and suggests</em></ins></span> you <span class="removed"><del><strong>must
- disable Google Play itself to completely stop</strong></del></span> <span
class="inserted"><ins><em>circulate</em></ins></span> the <span
class="removed"><del><strong>tracking. This</strong></del></span> <span
class="inserted"><ins><em>picture you take according to who</em></ins></span> is
- <span class="removed"><del><strong>yet another
example</strong></del></span>
- <span class="inserted"><ins><em>in the frame.</p>
+ and suggests you circulate the picture you take according to who is
+ in the frame.</p>
<p>This spyware feature seems to require online access to some
known-faces database, which means the pictures are likely to be
sent across the wire to Facebook's servers and face-recognition
algorithms.</p>
- <p>If so, none</em></ins></span> of <span
class="removed"><del><strong>nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>Facebook users' pictures are private anymore,
- even if the user didn't “upload” them</em></ins></span> to
<span class="removed"><del><strong>obey</strong></del></span> the <span
class="removed"><del><strong>user,
- when it's actually doing something else. Such a thing
would</strong></del></span> <span class="inserted"><ins><em>service.</p>
+ <p>If so, none of Facebook users' pictures are private anymore,
+ even if the user didn't “upload” them to the service.</p>
</li>
<li id="M201605310">
@@ -2032,79 +2020,86 @@
<p>Facebook's app listens all the time, <a
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html">to
snoop on what people are listening to or watching</a>. In addition,
- it may</em></ins></span> be <span class="removed"><del><strong>almost
- unthinkable</strong></del></span> <span
class="inserted"><ins><em>analyzing people's conversations to serve
them</em></ins></span> with <span class="removed"><del><strong>free
software.</p></strong></del></span> <span
class="inserted"><ins><em>targeted
- advertisements.</p></em></ins></span>
+ it may be analyzing</em></ins></span> people's <span
class="removed"><del><strong>privacy, we must prevent
Google</strong></del></span> <span class="inserted"><ins><em>conversations to
serve them with targeted
+ advertisements.</p>
</li>
- <span class="removed"><del><strong><li><p>More than
73%</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201604250">
+ <li id="M201604250">
<!--#set var="DATE" value='<small
class="date-tag">2016-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>A pregnancy test controller application not only can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts</em></ins></span> of <span
class="inserted"><ins><em>data in</em></ins></span> the <span
class="removed"><del><strong>most popular Android apps</strong></del></span>
<span class="inserted"><ins><em>phone, and in server accounts,
+ spy on many sorts of data in the phone, and in server accounts,
it can alter them too</a>.</p>
</li>
<li id="M201601130">
<!--#set var="DATE" value='<small
class="date-tag">2016-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apps that include</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio</em></ins></span> and
<span class="removed"><del><strong>location information</a> of
their</strong></del></span> <span class="inserted"><ins><em>TV programs
- are playing nearby</a>. Also on what</em></ins></span> users <span
class="removed"><del><strong>with third
parties.</p></strong></del></span> <span class="inserted"><ins><em>post
on various sites
- such as Facebook, Google+ and Twitter.</p></em></ins></span>
+ <p>Apps that include <a
+
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+</em></ins></span> and <span
class="removed"><del><strong>other companies from getting this personal
information in the first
+place!</p></strong></del></span> <span
class="inserted"><ins><em>Twitter.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>“Cryptic</strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>Google Play (a component of Android)</strong></del></span>
<span class="inserted"><ins><em><li id="M201511190">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>“Cryptic</em></ins></span> communication,”
- unrelated to the app's functionality, was <a
-
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis Android apps</a>.</p>
+ <p>“Cryptic communication,”
+ unrelated to the app's functionality, was</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in</em></ins></span> the <span class="removed"><del><strong>users'
movements without their permission</a>.</p>
+
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>500 most popular gratis Android
apps</a>.</p>
<p>The article should not have described these apps as
- “free”—they are not free software. The clear way
- to say “zero price” is “gratis.”</p>
+ “free”—they are not free software. The clear
way</em></ins></span>
+ to <span class="removed"><del><strong>completely
stop</strong></del></span> <span class="inserted"><ins><em>say “zero
price” is “gratis.”</p>
- <p>The article takes for granted that the usual analytics tools are
- legitimate, but is that valid? Software developers have no right to
- analyze what users are doing or how. “Analytics” tools
- that snoop are just as wrong as any other snooping.</p>
+ <p>The article takes for granted that</em></ins></span> the <span
class="removed"><del><strong>tracking. This</strong></del></span> <span
class="inserted"><ins><em>usual analytics tools are
+ legitimate, but</em></ins></span> is
+ <span class="removed"><del><strong>yet another example of nonfree software
pretending</strong></del></span> <span class="inserted"><ins><em>that valid?
Software developers have no right</em></ins></span> to <span
class="removed"><del><strong>obey the user,
+ when it's actually</strong></del></span>
+ <span class="inserted"><ins><em>analyze what users are</em></ins></span>
doing <span class="removed"><del><strong>something else. Such a thing would be
almost
+ unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>or how. “Analytics” tools
+ that snoop are just as wrong as any other
snooping.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Gratis</strong></del></span>
+
+ <span
class="removed"><del><strong><li><p>More</strong></del></span>
<span class="inserted"><ins><em><li id="M201510300">
<!--#set var="DATE" value='<small
class="date-tag">2015-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>More than 73% and 47% of mobile applications,
for</em></ins></span> Android <span class="removed"><del><strong>apps (but
not</strong></del></span> <span class="inserted"><ins><em>and iOS
- respectively</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>)
- connect</strong></del></span> <span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">hand
over
- personal, behavioral and location information</a> of their
users</em></ins></span> to <span
class="removed"><del><strong>100</strong></del></span>
- <span class="inserted"><ins><em>third parties.</p>
+ <p>More</em></ins></span> than 73% <span
class="inserted"><ins><em>and 47%</em></ins></span> of <span
class="removed"><del><strong>the most popular</strong></del></span> <span
class="inserted"><ins><em>mobile applications, for</em></ins></span> Android
<span class="removed"><del><strong>apps</strong></del></span> <span
class="inserted"><ins><em>and iOS
+ respectively</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share</strong></del></span>
<span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">hand
over</em></ins></span>
+ personal, behavioral and location information</a> of their users
<span class="removed"><del><strong>with</strong></del></span> <span
class="inserted"><ins><em>to</em></ins></span>
+ third parties.</p>
</li>
- <li id="M201508210">
+ <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201508210">
<!--#set var="DATE" value='<small
class="date-tag">2015-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Like most “music screaming” disservices, Spotify is
- based on proprietary malware (DRM and snooping). In August 2015
it</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>,</em></ins></span>
and <span class="removed"><del><strong>advertising</a> URLs,
- on the average.</p>
- </li>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>some are starting
- to realize that it</em></ins></span> is <span
class="inserted"><ins><em>nasty.</p>
-
- <p>This article shows the <a
-
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they</em></ins></span> present <span
class="inserted"><ins><em>snooping as a way to “serve”
+ based on proprietary malware (DRM and snooping). In August 2015 it <a
+
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased snooping</a>, and some are
starting</em></ins></span>
+ to <span class="inserted"><ins><em>realize that it is nasty.</p>
+
+ <p>This article shows</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
+ was</strong></del></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as a way to “serve”
users better</a>—never mind whether they want that. This is a
typical example of the attitude of the proprietary software industry
towards those they have subjugated.</p>
@@ -2117,51 +2112,91 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf">
- A study</em></ins></span> in <span
class="removed"><del><strong>some</strong></del></span> <span
class="inserted"><ins><em>2015</a> found that 90% of the top-ranked
gratis proprietary</em></ins></span>
- Android <span class="removed"><del><strong>devices when
they</strong></del></span> <span class="inserted"><ins><em>apps contained
recognizable tracking libraries. For the paid
- proprietary apps, it was only 60%.</p>
-
- <p>The article confusingly describes gratis apps as
- “free”, but most of them</em></ins></span> are <span
class="removed"><del><strong>sold.
- Some Motorola phones modify</strong></del></span> <span
class="inserted"><ins><em>not in fact <a
+ A study</em></ins></span> in <span
class="inserted"><ins><em>2015</a> found that 90% of</em></ins></span>
the <span class="removed"><del><strong>500 most popular</strong></del></span>
<span class="inserted"><ins><em>top-ranked</em></ins></span> gratis <span
class="inserted"><ins><em>proprietary</em></ins></span>
+ Android <span
class="removed"><del><strong>apps</a>.</p></strong></del></span>
<span class="inserted"><ins><em>apps contained recognizable tracking libraries.
For the paid
+ proprietary apps, it was only 60%.</p></em></ins></span>
+
+ <p>The article <span class="removed"><del><strong>should not have
described these</strong></del></span> <span
class="inserted"><ins><em>confusingly describes gratis</em></ins></span> apps as
+ <span
class="removed"><del><strong>“free”—they</strong></del></span>
+ <span class="inserted"><ins><em>“free”, but most of
them</em></ins></span> are not <span class="removed"><del><strong>free
software. The clear way to say
+ “zero price” is “gratis.”</p>
+
+ <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>in fact <a
href="/philosophy/free-sw.html">free software</a>. It also uses
the
- ugly word “monetize”. A good replacement for that word
- is “exploit”; nearly always that will fit perfectly.</p>
+ ugly word “monetize”. A good replacement</em></ins></span> for
<span class="removed"><del><strong>granted</strong></del></span> that <span
class="removed"><del><strong>the usual analytics tools are
+ legitimate, but</strong></del></span> <span
class="inserted"><ins><em>word</em></ins></span>
+ is <span class="inserted"><ins><em>“exploit”; nearly
always</em></ins></span> that <span class="removed"><del><strong>valid?
Software developers have no right to
+ analyze what users are doing or how. “Analytics” tools that
snoop are
+ just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>will fit perfectly.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Gratis</strong></del></span>
- <li id="M201505060">
+ <span class="inserted"><ins><em><li id="M201505060">
<!--#set var="DATE" value='<small
class="date-tag">2015-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Gratis</em></ins></span> Android <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>apps (but not</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ <p>Gratis</em></ins></span> Android apps (but not <a
+ href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
+
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
+ and advertising</a> URLs, on the average.</p>
+ </li>
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201504060">
+ <!--#set var="DATE" value='<small
class="date-tag">2015-04</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Widely used <a
+
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on the user</a>. This</em></ins></span>
is <span class="removed"><del><strong>present</strong></del></span> in <span
class="removed"><del><strong>some Android devices when they are sold.
+ Some Motorola phones modify Android</strong></del></span> <span
class="inserted"><ins><em>addition</em></ins></span> to
+ <span class="removed"><del><strong><a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
send personal data</strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>) connect</em></ins></span> to <span
class="removed"><del><strong>Motorola</a>.</p>
+ <span class="inserted"><ins><em>the snooping done by the phone company,
and perhaps by the OS in
+ the phone.</p>
+
+ <p>Don't be distracted by the question of whether the app developers
+ get users</em></ins></span> to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
<span class="inserted"><ins><em>say “I agree”. That is no excuse
for
+ malware.</p></em></ins></span>
</li>
- <li><p>Some manufacturers add a</strong></del></span> <span
class="inserted"><ins><em>100</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p>
+ <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201411260">
+ <!--#set var="DATE" value='<small
class="date-tag">2014-11</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Many proprietary apps for mobile devices
+ report which other apps the user has installed.</em></ins></span> <a
<span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way that at least is visible and optional</a>.
Not</em></ins></span>
+ as <span class="removed"><del><strong>Carrier IQ.</a></p>
</li>
<li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any
file</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
- and advertising</a> URLs,</em></ins></span> on the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>average.</p></em></ins></span>
+ Samsung's back door</a> provides access to any file
on</strong></del></span> <span class="inserted"><ins><em>bad as
what</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>others do.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
-<!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure to place new items on top under each
subsection</strong></del></span>
+<!-- #SpywareOnMobiles</strong></del></span>
- <span class="inserted"><ins><em><li id="M201504060">
- <!--#set var="DATE" value='<small
class="date-tag">2015-04</small>'
+ <span class="inserted"><ins><em><li id="M201401150.1">
+ <!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The Simeji keyboard is a smartphone version of Baidu's <a
+ href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
+ title="Input Method Editor">IME</abbr></a>.</p>
+ </li>
+
+ <li id="M201312270">
+ <!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>The nonfree Snapchat app's
principal purpose is</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware</strong></del></span>
- <span class="inserted"><ins><em><p>Widely used <a
-
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop</em></ins></span> on <span
class="removed"><del><strong>Mobiles</h3>
+<div class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware</strong></del></span> <span
class="inserted"><ins><em>restrict the
+ use of data</em></ins></span> on <span
class="removed"><del><strong>Mobiles</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -2173,139 +2208,76 @@
</div>
<ul>
- <li><p>The DMCA and</strong></del></span> the <span
class="removed"><del><strong>EU Copyright Directive make it <a
-href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</strong></del></span> <span
class="inserted"><ins><em>user</a>. This is in addition</em></ins></span>
to <span class="removed"><del><strong>study how iOS cr...apps spy on
users</a>, because this
- would require circumventing</strong></del></span>
- the <span class="removed"><del><strong>iOS DRM.</p>
+ <li><p>The DMCA and</strong></del></span> the <span
class="removed"><del><strong>EU Copyright Directive make</strong></del></span>
<span class="inserted"><ins><em>user's computer, but</em></ins></span> it <span
class="inserted"><ins><em>does surveillance too:</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries</em></ins></span> to <span class="removed"><del><strong>study how
iOS cr...apps spy on users</a>, because this
+ would require circumventing</strong></del></span> <span
class="inserted"><ins><em>get</em></ins></span> the <span
class="removed"><del><strong>iOS DRM.</p></strong></del></span> <span
class="inserted"><ins><em>user's list of other people's phone
+ numbers</a>.</p></em></ins></span>
</li>
- <li><p>In</strong></del></span> <span
class="inserted"><ins><em>snooping done by</em></ins></span> the <span
class="removed"><del><strong>latest iThings system, “turning off”
WiFi</strong></del></span> <span class="inserted"><ins><em>phone
company,</em></ins></span> and <span
class="removed"><del><strong>Bluetooth</strong></del></span> <span
class="inserted"><ins><em>perhaps by</em></ins></span> the
- <span class="removed"><del><strong>obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ <span class="removed"><del><strong><li><p>In the latest iThings
system, “turning off” WiFi and Bluetooth the
+ obvious way</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312060">
+ <!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The Brightest Flashlight app</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>.
A more advanced way really does turn them off—only until 5am.
- That's Apple for you—“We know you want
to</strong></del></span> <span class="inserted"><ins><em>OS in
- the phone.</p>
-
- <p>Don't</em></ins></span> be <span
class="removed"><del><strong>spied on”.</p>
+ That's Apple</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation,</em></ins></span> for <span
class="removed"><del><strong>you—“We know you want to be spied
on”.</p>
</li>
<li><p>Apple proposes
<a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without having your
fingerprints
- taken. Users would have no way to tell whether</strong></del></span>
<span class="inserted"><ins><em>distracted by</em></ins></span> the <span
class="removed"><del><strong>phone is snooping on
+ — which would mean no way to</strong></del></span> use <span
class="inserted"><ins><em>by companies</a>.</p>
+
+ <p>The FTC criticized this app because</em></ins></span> it <span
class="removed"><del><strong>without having your fingerprints
+ taken. Users would have no way to tell whether</strong></del></span>
<span class="inserted"><ins><em>asked</em></ins></span> the <span
class="removed"><del><strong>phone is snooping on
them.</p></li>
<li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots</strong></del></span> <span
class="inserted"><ins><em>question</em></ins></span> of <span
class="removed"><del><strong>personal data to Apple's servers</a>. Big
Brother can</strong></del></span> <span class="inserted"><ins><em>whether the
app developers</em></ins></span>
- get <span class="removed"><del><strong>them from
there.</p></strong></del></span> <span class="inserted"><ins><em>users to
say “I agree”. That is no excuse for
- malware.</p></em></ins></span>
+ lots of</strong></del></span> <span class="inserted"><ins><em>user to
+ approve sending</em></ins></span> personal data to <span
class="removed"><del><strong>Apple's servers</a>. Big Brother can
+ get them from there.</p>
</li>
- <span class="removed"><del><strong><li><p>The iMessage app on
iThings</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201411260">
- <!--#set var="DATE" value='<small
class="date-tag">2014-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Many proprietary apps for mobile devices
- report which other apps the user has installed.</em></ins></span> <a
<span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells</strong></del></span>
- <span
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in</em></ins></span> a <span
class="removed"><del><strong>server every phone number</strong></del></span>
<span class="inserted"><ins><em>way</em></ins></span> that <span
class="removed"><del><strong>the user types into it</a>; the server
records these numbers for</strong></del></span> at least <span
class="removed"><del><strong>30
+ <li><p>The iMessage</strong></del></span> <span
class="inserted"><ins><em>the</em></ins></span> app <span
class="removed"><del><strong>on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that</strong></del></span> <span
class="inserted"><ins><em>developer but did not ask
+ about sending it to other companies. This shows</em></ins></span> the
<span class="removed"><del><strong>user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>weakness
of</em></ins></span>
+ the <span class="removed"><del><strong>server records these numbers for at
least 30
days.</p>
</li>
- <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
- without giving a valid email address</strong></del></span> <span
class="inserted"><ins><em>is visible</em></ins></span> and <span
class="removed"><del><strong>receiving</strong></del></span> <span
class="inserted"><ins><em>optional</a>. Not
- as bad as what</em></ins></span> the <span
class="removed"><del><strong>code Apple
- sends to it.</p></strong></del></span> <span
class="inserted"><ins><em>others do.</p></em></ins></span>
+ <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
<span class="inserted"><ins><em>reject-it-if-you-dislike-snooping
“solution”</em></ins></span> to <span
class="removed"><del><strong>install even gratis apps)</a>
+ without giving</strong></del></span>
+ <span class="inserted"><ins><em>surveillance: why should</em></ins></span>
a <span class="removed"><del><strong>valid email address and receiving the code
Apple
+ sends</strong></del></span> <span class="inserted"><ins><em>flashlight
app send any information</em></ins></span> to <span
class="removed"><del><strong>it.</p></strong></del></span>
+ <span class="inserted"><ins><em>anyone? A free software flashlight app
would not.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Around
47%</strong></del></span>
+ <span class="removed"><del><strong><li><p>Around 47% of
the</strong></del></span>
- <span class="inserted"><ins><em><li id="M201401150.1">
- <!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
+ <span class="inserted"><ins><em><li id="M201212100">
+ <!--#set var="DATE" value='<small
class="date-tag">2012-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Simeji keyboard is a smartphone version</em></ins></span> of
<span class="removed"><del><strong>the most popular iOS
apps</strong></del></span> <span
class="inserted"><ins><em>Baidu's</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+ <p>FTC says</em></ins></span> most <span
class="removed"><del><strong>popular iOS</strong></del></span> <span
class="inserted"><ins><em>mobile</em></ins></span> apps <span
class="inserted"><ins><em>for children don't respect privacy:</em></ins></span>
<a <span class="removed"><del><strong>class="not-a-duplicate"
href="http://jots.pub/a/2015103001/index.php">share personal,
behavioral and location information</a> of their users with third
parties.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
- title="Input Method
Editor">IME</abbr></a>.</p></em></ins></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>iThings automatically
upload</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201312270">
- <!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The nonfree Snapchat app's principal purpose is</em></ins></span>
to <span class="removed"><del><strong>Apple's servers all</strong></del></span>
<span class="inserted"><ins><em>restrict</em></ins></span> the <span
class="removed"><del><strong>photos and
+ <span class="removed"><del><strong><li><p>iThings automatically
upload to Apple's servers all the photos and
videos they make.</p>
<blockquote><p>
iCloud Photo Library stores every photo and video you take,
- and keeps them up to date on all your devices.
- Any edits you make are automatically updated everywhere. [...]
- </p></blockquote>
-
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed</strong></del></span>
- <span class="inserted"><ins><em>use of data</em></ins></span> on <span
class="removed"><del><strong>24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span> the
- <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
- “please don't ask where.”</p>
-
- <p>There is a way to <a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>,</strong></del></span> <span
class="inserted"><ins><em>user's computer,</em></ins></span> but <span
class="removed"><del><strong>it's active by default so</strong></del></span> it
<span class="removed"><del><strong>still counts as a</strong></del></span>
<span class="inserted"><ins><em>does</em></ins></span> surveillance <span
class="removed"><del><strong>functionality.</p>
-
- <p>Unknown people apparently took advantage of this
to</strong></del></span> <span class="inserted"><ins><em>too:</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries</em></ins></span> to get <span class="removed"><del><strong>at
them, but NSA can access any</strong></del></span> <span
class="inserted"><ins><em>the user's list</em></ins></span> of <span
class="removed"><del><strong>them through</strong></del></span> <span
class="inserted"><ins><em>other people's phone
- numbers</a>.</p>
- </li>
-
- <li id="M201312060">
- <!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The Brightest Flashlight app</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware in iThings:</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies</a>.</p>
-
- <p>The FTC criticized this app because it asked</em></ins></span>
the <span class="removed"><del><strong><a class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly
where</strong></del></span> <span class="inserted"><ins><em>user to
- approve sending personal data to</em></ins></span> the <span
class="removed"><del><strong>iThing is,
- and get</strong></del></span> <span class="inserted"><ins><em>app
developer but did not ask
- about sending it to</em></ins></span> other <span
class="removed"><del><strong>info too.</p>
- </li>
-
- <li><p>There is also</strong></del></span> <span
class="inserted"><ins><em>companies. This shows the weakness of
- the reject-it-if-you-dislike-snooping “solution” to
- surveillance: why should</em></ins></span> a <span
class="removed"><del><strong>feature for web sites</strong></del></span> <span
class="inserted"><ins><em>flashlight app send any information</em></ins></span>
to <span class="removed"><del><strong>track users, which is
- <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6, but it
- is still true in iOS 7.)</p></strong></del></span>
- <span class="inserted"><ins><em>anyone? A free software flashlight app
would not.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>The iThing
also</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201212100">
- <!--#set var="DATE" value='<small
class="date-tag">2012-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>FTC says most mobile apps for children don't respect
privacy:</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though that can be
- turned off.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
+ and keeps them up</strong></del></span>
<span class="inserted"><ins><em></ul>
@@ -2318,197 +2290,235 @@
<li id="M201908151">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Skype refuses to say whether it can</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the
state</a>.</p>
- </li>
+ <p>Skype refuses</em></ins></span> to <span
class="removed"><del><strong>date on all your devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop</strong></del></span>
+ <p>(From</strong></del></span> <span class="inserted"><ins><em>say
whether it can</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
+ information</a> as accessed</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop</em></ins></span>
- on <span class="removed"><del><strong>all the data in an iThing,
- or</strong></del></span> <span
class="inserted"><ins><em>calls</a>.</p>
+ on <span class="removed"><del><strong>24 Sep 2015.) The iCloud feature is
+ <a href="https://support.apple.com/en-us/HT202033">activated by the
+ startup of iOS</a>. The term
“cloud”</strong></del></span> <span
class="inserted"><ins><em>calls</a>.</p>
- <p>That almost certainly means</em></ins></span> it <span
class="removed"><del><strong>is totally
incompetent.</a></p></strong></del></span> <span
class="inserted"><ins><em>can do so.</p></em></ins></span>
- </li>
+ <p>That almost certainly</em></ins></span> means
+ <span class="removed"><del><strong>“please don't ask
where.”</p>
- <span class="removed"><del><strong><li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist for no
- possible purpose other than surveillance</a>. Here is
the</strong></del></span>
+ <p>There is a way to <a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default
so</strong></del></span> it <span class="removed"><del><strong>still counts as
a</strong></del></span> <span class="inserted"><ins><em>can do so.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201307110">
+ <li id="M201307110">
<!--#set var="DATE" value='<small
class="date-tag">2013-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Skype contains</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
+ <p>Skype contains <a
+
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
Microsoft changed Skype <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></em></ins></span>
+ specifically for spying</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware in
Telephones</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInGames">Games</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInGames">#SpywareInGames</a>)</span></em></ins></span>
+ <h4 id="SpywareInGames">Games</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Tracking software in popular Android
apps</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202010221">
<!--#set var="DATE" value='<small
class="date-tag">2020-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft</em></ins></span> is <span
class="removed"><del><strong>pervasive</strong></del></span> <span
class="inserted"><ins><em>imposing its
- surveillance on the game of Minecraft by <a
-
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
- every player to open an account on Microsoft's network</a>. Microsoft
- has bought the game</em></ins></span> and
- <span class="removed"><del><strong>sometimes very clever. Some trackers
can</strong></del></span> <span class="inserted"><ins><em>will merge all
accounts into its network,
- which will give them access to people's data.</p>
+ <p>Microsoft is imposing its</em></ins></span>
+ surveillance <span class="removed"><del><strong>functionality.</p>
- <p>Minecraft players</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
- networks</a>.</p></strong></del></span>
+ <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>on the game</em></ins></span> of <span
class="removed"><del><strong>this to</strong></del></span> <span
class="inserted"><ins><em>Minecraft by</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
+ every player</em></ins></span> to <span class="removed"><del><strong>get
at them, but NSA can access any of</strong></del></span> <span
class="inserted"><ins><em>open an account on Microsoft's network</a>.
Microsoft
+ has bought the game and will merge all accounts into its network,
+ which will give</em></ins></span> them <span
class="removed"><del><strong>through</strong></del></span> <span
class="inserted"><ins><em>access to people's data.</p>
+
+ <p>Minecraft players</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p>Spyware in iThings:</strong></del></span>
<span
class="inserted"><ins><em>href="https://directory.fsf.org/wiki/Minetest">can
play Minetest</a>
instead. The essential advantage of Minetest is that it is free
- software, meaning it respects the user's computer freedom. As a bonus,
- it offers more options.</p></em></ins></span>
+ software, meaning it respects</em></ins></span> the <span
class="removed"><del><strong><a class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly
where</strong></del></span> <span class="inserted"><ins><em>user's computer
freedom. As a bonus,
+ it offers more options.</p>
</li>
- <span class="removed"><del><strong><li><p>Android tracks
location for Google</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201908210">
+ <li id="M201908210">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft recorded users of Xboxes and had</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even
- when</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
- human workers listen to</em></ins></span> the <span
class="removed"><del><strong>phone has</strong></del></span> <span
class="inserted"><ins><em>recordings</a>.</p>
-
- <p>Morally, we see</em></ins></span> no <span
class="removed"><del><strong>SIM card</a>.</p></li>
+ <p>Microsoft recorded users of Xboxes and had <a
+
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
+ human workers listen to</em></ins></span> the <span
class="removed"><del><strong>iThing is,</strong></del></span> <span
class="inserted"><ins><em>recordings</a>.</p>
- <li><p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with</strong></del></span> <span
class="inserted"><ins><em>difference between having human workers listen and
- having speech-recognition systems listen. Both intrude on
privacy.</p>
+ <p>Morally, we see no difference between having human workers
listen</em></ins></span> and <span class="removed"><del><strong>get other info
too.</p></strong></del></span>
+ <span class="inserted"><ins><em>having speech-recognition systems listen.
Both intrude on privacy.</p></em></ins></span>
</li>
- <li id="M201806240">
+ <span
class="removed"><del><strong><li><p>There</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201806240">
<!--#set var="DATE" value='<small
class="date-tag">2018-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Red Shell is a</em></ins></span> spyware <span
class="removed"><del><strong>sending lots of</strong></del></span> <span
class="inserted"><ins><em>that
- is found in many proprietary games. It <a
-
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks</em></ins></span> data <span class="inserted"><ins><em>on users'
computers and sends it</em></ins></span> to <span
class="removed"><del><strong>China</a>.</p></li>
+ <p>Red Shell</em></ins></span> is <span
class="removed"><del><strong>also</strong></del></span> a <span
class="removed"><del><strong>feature for web sites to track users, which is
+ <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks about iOS 6, but
it</strong></del></span> <span class="inserted"><ins><em>spyware
that</em></ins></span>
+ is <span class="removed"><del><strong>still true</strong></del></span>
<span class="inserted"><ins><em>found</em></ins></span> in <span
class="removed"><del><strong>iOS 7.)</p>
+ </li>
+
+ <li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default, though that can be
+ turned off.</p>
+ </li>
- <li><p>According</strong></del></span> <span
class="inserted"><ins><em>third parties</a>.</p>
+ <li><p>Apple can, and regularly does,</strong></del></span>
<span class="inserted"><ins><em>many proprietary games. It</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
+ tracks</em></ins></span> data <span class="removed"><del><strong>from
iPhones for the state</a>.</p></strong></del></span> <span
class="inserted"><ins><em>on users' computers and sends it to third
parties</a>.</p></em></ins></span>
</li>
- <li id="M201804144">
+ <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804144">
<!--#set var="DATE" value='<small
class="date-tag">2018-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>ArenaNet surreptitiously installed a spyware
- program along with an update</em></ins></span> to <span
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>the massive
- multiplayer game Guild Wars 2. The spyware allowed
ArenaNet</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages which enable them</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"></em></ins></span>
- to <span class="removed"><del><strong>turn the
phones</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>and off, listen</strong></del></span> <span
class="inserted"><ins><em>all open processes running on its user's
computer</a>.</p>
+ program along with an update to</em></ins></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>massive
+ multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
+
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
+ to</em></ins></span> snoop on all <span class="removed"><del><strong>the
data in an iThing,
+ or it is totally incompetent.</a></p></strong></del></span>
<span class="inserted"><ins><em>open processes running on its user's
computer</a>.</p></em></ins></span>
</li>
- <li id="M201711070">
+ <span class="removed"><del><strong><li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem to exist</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711070">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The driver for a certain gaming keyboard <a
-
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
- information</em></ins></span> to <span class="removed"><del><strong>the
microphone, retrieve geo-location data from the
- GPS, take photographs, read text messages, read call, location and web
- browsing history,</strong></del></span> <span
class="inserted"><ins><em>China</a>.</p>
+ <p>The driver</em></ins></span> for <span
class="removed"><del><strong>no
+ possible purpose other than surveillance</a>. Here is
the</strong></del></span> <span class="inserted"><ins><em>a certain gaming
keyboard</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
+ information to China</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
- <li id="M201512290">
+<div class="big-subsection">
+ <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+</div>
+
+<ul>
+ <li><p>Tracking software in popular Android
apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201512290">
<!--#set var="DATE" value='<small
class="date-tag">2015-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>report to</em></ins></span> the <span
class="removed"><del><strong>contact list. This malware</strong></del></span>
- <span class="inserted"><ins><em>internet</a>—even what their
users weigh.</p>
+ video game consoles snoop on their users and report to the
+ internet</a>—even what their users weigh.</p>
- <p>A game console</em></ins></span> is <span
class="removed"><del><strong>designed to
- disguise itself from investigation.</p>
+ <p>A game console</em></ins></span> is <span
class="removed"><del><strong>pervasive</strong></del></span> <span
class="inserted"><ins><em>a computer,</em></ins></span> and
+ <span class="removed"><del><strong>sometimes very clever. Some trackers
can <a
+href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow</strong></del></span> <span class="inserted"><ins><em>you can't
trust</em></ins></span> a <span class="removed"><del><strong>user's movements
around</strong></del></span> <span class="inserted"><ins><em>computer
with</em></ins></span>
+ a <span class="removed"><del><strong>physical store by noticing WiFi
+ networks</a>.</p></strong></del></span> <span
class="inserted"><ins><em>nonfree operating system.</p></em></ins></span>
</li>
- <li><p>Samsung phones come</strong></del></span> <span
class="inserted"><ins><em>a computer, and you can't trust a
computer</em></ins></span> with
- <span class="inserted"><ins><em>a nonfree operating system.</p>
- </li>
+ <span class="removed"><del><strong><li><p>Android tracks
location for Google <a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off, even
+ when the phone has no SIM card</a>.</p></li>
+
+ <li><p>Some portable phones</strong></del></span>
- <li id="M201509160">
+ <span class="inserted"><ins><em><li id="M201509160">
<!--#set var="DATE" value='<small
class="date-tag">2015-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that</strong></del></span>
+ <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots</strong></del></span>
<span
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data about their</em></ins></span> users <span
class="removed"><del><strong>can't delete</a>,</strong></del></span> and
<span class="inserted"><ins><em>their users'
+ collect a wide range</em></ins></span> of data <span
class="inserted"><ins><em>about their users and their users'
friends and associates</a>.</p>
- <p>Even nastier,</em></ins></span> they <span
class="removed"><del><strong>send so much data</strong></del></span> <span
class="inserted"><ins><em>do it through ad networks</em></ins></span> that
<span class="removed"><del><strong>their transmission is</strong></del></span>
<span class="inserted"><ins><em>merge the data
+ <p>Even nastier, they do it through ad networks that merge the data
collected by various cr…apps and sites made by different
companies.</p>
- <p>They use this data to manipulate people to buy things, and hunt
for
- “whales” who can be led to spend</em></ins></span> a
- <span class="removed"><del><strong>substantial
expense</strong></del></span> <span class="inserted"><ins><em>lot of money.
They also
- use a back door to manipulate the game play</em></ins></span> for <span
class="removed"><del><strong>users. Said transmission, not wanted or
- requested by</strong></del></span> <span
class="inserted"><ins><em>specific players.</p>
-
- <p>While</em></ins></span> the <span
class="removed"><del><strong>user, clearly must constitute spying of some
- kind.</p></li>
+ <p>They use this data</em></ins></span> to <span
class="removed"><del><strong>China</a>.</p></li>
- <li><p>A Motorola phone</strong></del></span> <span
class="inserted"><ins><em>article describes gratis games, games that cost money
+ <li><p>According</strong></del></span> <span
class="inserted"><ins><em>manipulate people</em></ins></span> to <span
class="removed"><del><strong>Edward Snowden,
+ <a
href="http://www.bbc.com/news/uk-34444233">agencies</strong></del></span>
<span class="inserted"><ins><em>buy things, and hunt for
+ “whales” who</em></ins></span> can <span
class="removed"><del><strong>take over smartphones</a>
+ by sending hidden text messages which enable them</strong></del></span>
<span class="inserted"><ins><em>be led</em></ins></span> to <span
class="removed"><del><strong>turn the phones
+ on and off, listen</strong></del></span> <span
class="inserted"><ins><em>spend a lot of money. They also
+ use a back door</em></ins></span> to <span
class="inserted"><ins><em>manipulate</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location data
from</strong></del></span> <span class="inserted"><ins><em>game play for
specific players.</p>
+
+ <p>While</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
+ browsing history,</strong></del></span> <span
class="inserted"><ins><em>article describes gratis games, games that cost money
can use the same tactics.</p>
</li>
<li id="M201401280">
<!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Angry Birds</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies</em></ins></span> for <span class="removed"><del><strong>voice
all</strong></del></span> <span class="inserted"><ins><em>companies,
and</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>NSA takes advantage
- to spy through it too</a>. Here's information on <a
-
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ <p>Angry Birds <a
+
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies,</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> the <span
class="removed"><del><strong>contact list. This malware is
designed</strong></del></span> <span class="inserted"><ins><em>NSA takes
advantage</em></ins></span>
+ to
+ <span class="removed"><del><strong>disguise itself from
investigation.</p>
+ </li>
+
+ <li><p>Samsung phones come with</strong></del></span> <span
class="inserted"><ins><em>spy through it too</a>. Here's information
on</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="https://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p></em></ins></span>
+ More about NSA app spying</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware in Android
phones (and Windows? laptops): The Wall
- Street Journal (in an article blocked from us by</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M200510200">
+ <li id="M200510200">
<!--#set var="DATE" value='<small
class="date-tag">2005-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Blizzard Warden is</em></ins></span> a <span
class="removed"><del><strong>paywall)
- reports</strong></del></span> <span class="inserted"><ins><em>hidden
- “cheating-prevention” program</em></ins></span> that <a
<span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate the GPS</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies on every process running on a gamer's computer</em></ins></span> and
<span class="removed"><del><strong>microphone</strong></del></span> <span
class="inserted"><ins><em>sniffs a
- good deal of personal data</a>, including lots of activities which
- have nothing to do with cheating.</p>
+ <p>Blizzard Warden is a hidden
+ “cheating-prevention” program</em></ins></span> that <span
class="removed"><del><strong>users can't
delete</a>,</strong></del></span> <span class="inserted"><ins><em><a
+ href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
+ spies on every process running on a gamer's computer</em></ins></span> and
<span class="removed"><del><strong>they send so much data that their
transmission is</strong></del></span> <span
class="inserted"><ins><em>sniffs</em></ins></span> a
+ <span class="removed"><del><strong>substantial expense for users. Said
transmission, not wanted or
+ requested by the user, clearly must constitute
spying</strong></del></span>
+ <span class="inserted"><ins><em>good deal</em></ins></span> of <span
class="removed"><del><strong>some
+ kind.</p></li>
+
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>personal data</a>, including lots of activities
which
+ have nothing to do with cheating.</p></em></ins></span>
</li>
-</ul>
+
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-section">
- <h3 id="SpywareInEquipment">Spyware</em></ins></span> in <span
class="removed"><del><strong>Android
- phones and laptops</a>.
- (I suspect this means Windows laptops.) Here is</strong></del></span>
<span class="inserted"><ins><em>Connected Equipment</h3>
+ <h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
<span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -2517,34 +2527,41 @@
<li id="M202101050">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Most Internet connected devices in Mozilla's</em></ins></span>
<a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
- </li>
-
- <li><p>Portable phones with GPS will send their GPS
location</strong></del></span>
+ <p>Most Internet connected devices</em></ins></span> in <span
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us by a paywall)
+ reports that</strong></del></span> <span
class="inserted"><ins><em>Mozilla's</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
<span
class="inserted"><ins><em>href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
Not Included”</a> list <a
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
- designed to snoop</em></ins></span> on
- <span class="removed"><del><strong>remote command and users cannot stop
them:</strong></del></span> <span class="inserted"><ins><em>users</a>
even if they meet
+ designed to snoop on users</a> even if they meet
Mozilla's “Minimum Security Standards.” Insecure
- design of the program running on some of these devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable
phones</strong></del></span>
- <span
class="inserted"><ins><em>href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes
- the user susceptible</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>be snooped and exploited by crackers as
- well</a>.</p></em></ins></span>
+ design of</em></ins></span> the <span class="removed"><del><strong>FBI can
remotely activate</strong></del></span> <span class="inserted"><ins><em>program
running on some of these devices <a
+
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes</em></ins></span>
+ the <span class="removed"><del><strong>GPS</strong></del></span> <span
class="inserted"><ins><em>user susceptible to be snooped</em></ins></span> and
<span class="removed"><del><strong>microphone</strong></del></span> <span
class="inserted"><ins><em>exploited by crackers as
+ well</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201708280">
+ <li id="M201708280">
<!--#set var="DATE" value='<small
class="date-tag">2017-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The bad security in many Internet of Stings devices allows <a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on the people that use them</a>.</p>
+ <p>The bad security</em></ins></span> in <span
class="removed"><del><strong>Android
+ phones and laptops</a>.
+ (I suspect this means Windows laptops.) Here is</strong></del></span>
<span class="inserted"><ins><em>many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ </li>
- <p>Don't be a sucker—reject all the stings.</p>
+ <li><p>Portable phones with GPS will send their GPS
location</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop</em></ins></span> on
+ <span class="removed"><del><strong>remote command and users cannot stop
them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require</strong></del></span> <span
class="inserted"><ins><em>the people that use them</a>.</p>
+
+ <p>Don't be a sucker—reject</em></ins></span> all <span
class="removed"><del><strong>new portable phones
+ to have GPS.)</p>
+ </li>
+
+ <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span> <span class="inserted"><ins><em>the
stings.</p>
<p><small>(It</em></ins></span> is <span
class="removed"><del><strong>to restrict</strong></del></span> <span
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span
class="removed"><del><strong>use of data on</strong></del></span> <span
class="inserted"><ins><em>article uses</em></ins></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
too:</strong></del></span> <span
class="inserted"><ins><em>term</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
@@ -2569,7 +2586,7 @@
expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
where they travel</strong></del></span> <span
class="inserted"><ins><em>television?” I said, “I
don't know. You can't see out the other way.” Evidently that
was</em></ins></span>
-before <span class="removed"><del><strong>and after
going</strong></del></span> <span class="inserted"><ins><em>Amazon
“smart” TVs.</p>
+before <span class="inserted"><ins><em>Amazon “smart”
TVs.</p>
<ul class="blurbs">
<li id="M202010282">
@@ -2578,14 +2595,14 @@
<p>TV manufacturers are turning to produce only
“Smart” TV sets (which include spyware) that <a
href="https://frame.work/blog/in-defense-of-dumb-tvs">it's now very
- hard</em></ins></span> to <span
class="inserted"><ins><em>find</em></ins></span> a <span
class="removed"><del><strong>movie</a>.
- </p>
-
- <p>Don't be tracked — pay
cash!</p></strong></del></span> <span class="inserted"><ins><em>TV that
doesn't spy on you</a>.</p>
+ hard to find a TV that doesn't spy on you</a>.</p>
<p>It appears that those manufacturers business model is not to
produce
- TV and sell them for money, but to collect your personal data and
- (possibly) hand over them to others for
benefit.</p></em></ins></span>
+ TV</em></ins></span> and <span class="removed"><del><strong>after
going</strong></del></span> <span class="inserted"><ins><em>sell them for
money, but to collect your personal data and
+ (possibly) hand over them</em></ins></span> to <span
class="removed"><del><strong>a movie</a>.
+ </p>
+
+ <p>Don't be tracked — pay
cash!</p></strong></del></span> <span class="inserted"><ins><em>others
for benefit.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>AI-powered driving
apps can</strong></del></span>
@@ -2615,52 +2632,58 @@
“better service” (meaning more intrusive ads?) and slightly
lower retail prices.</p>
- <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>developer's server. Note</strong></del></span>
<span class="inserted"><ins><em>make this spying acceptable, according to him,
+ <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>developer's server. Note
that</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> this <span
class="removed"><del><strong>article misuses the words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring</strong></del></span> <span class="inserted"><ins><em>spying
acceptable, according</em></ins></span> to <span
class="removed"><del><strong>zero price.</p>
+ </li>
+
+ <li>
+ <p>Facebook's app listens</strong></del></span> <span
class="inserted"><ins><em>him,
is that it is opt-in in newer models. But since the Vizio software is
nonfree, we don't know what is actually happening behind the scenes,
- and there is no guarantee that all future updates will leave the
- settings unchanged.</p>
+ and there is no guarantee that</em></ins></span> all <span
class="inserted"><ins><em>future updates will leave</em></ins></span> the <span
class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span>
+ <span class="inserted"><ins><em>settings unchanged.</p>
- <p>If you already own a Vizio “smart” TV (or any
“smart” TV, for</em></ins></span> that <span
class="removed"><del><strong>this article misuses</strong></del></span>
- <span class="inserted"><ins><em>matter),</em></ins></span> the <span
class="removed"><del><strong>words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring</strong></del></span> <span class="inserted"><ins><em>easiest
way</em></ins></span> to <span class="removed"><del><strong>zero
price.</p>
+ <p>If you already own a Vizio “smart” TV (or any
“smart” TV, for that
+ matter), the easiest way to make sure it isn't spying</em></ins></span> on
<span class="removed"><del><strong>what people are
listening</strong></del></span> <span class="inserted"><ins><em>you
is</em></ins></span>
+ to <span class="removed"><del><strong>or watching</a>. In
addition,</strong></del></span> <span
class="inserted"><ins><em>disconnect</em></ins></span> it <span
class="removed"><del><strong>may
+ be analyzing people's conversations</strong></del></span> <span
class="inserted"><ins><em>from the Internet, and use a terrestrial antenna
+ instead. Unfortunately, this is not always possible. Another option,
+ if you are technically oriented, is</em></ins></span> to <span
class="removed"><del><strong>serve them with targeted
+ advertisements.</p>
</li>
<li>
- <p>Facebook's app listens all the time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span> <span class="inserted"><ins><em>make sure it isn't
spying</em></ins></span> on <span class="removed"><del><strong>what people are
listening</strong></del></span> <span class="inserted"><ins><em>you
is</em></ins></span>
- to <span class="removed"><del><strong>or watching</a>. In
addition,</strong></del></span> <span
class="inserted"><ins><em>disconnect</em></ins></span> it <span
class="removed"><del><strong>may</strong></del></span> <span
class="inserted"><ins><em>from the Internet, and use a terrestrial antenna
- instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is to get your own router (which
can</em></ins></span>
- be <span class="removed"><del><strong>analyzing people's
conversations</strong></del></span> <span class="inserted"><ins><em>an old
computer running completely free software), and set up a
- firewall</em></ins></span> to <span class="removed"><del><strong>serve
them</strong></del></span> <span class="inserted"><ins><em>block connections to
Vizio's servers. Or, as a last resort,
- you can replace your TV</em></ins></span> with <span
class="removed"><del><strong>targeted
- advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>another model.</p></em></ins></span>
+ <p>Faceapp appears</strong></del></span> <span
class="inserted"><ins><em>get your own router (which can
+ be an old computer running completely free software), and set up a
+ firewall</em></ins></span> to <span class="removed"><del><strong>do lots
of surveillance, judging by
+ <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands</strong></del></span> <span
class="inserted"><ins><em>block connections</em></ins></span> to <span
class="removed"><del><strong>personal data in the device</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>Vizio's servers. Or, as a last resort,
+ you can replace your TV with another model.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
- <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
+ <p>Verizon</strong></del></span>
<span class="inserted"><ins><em><li id="M201804010">
<!--#set var="DATE" value='<small
class="date-tag">2018-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands</strong></del></span>
+ <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades that install a surveillance app</a>.</p>
+ load downgrades</em></ins></span> that <span
class="removed"><del><strong>it will</a>
+ pre-install on some of its phones. The app will give
Verizon</strong></del></span> <span class="inserted"><ins><em>install a
surveillance app</a>.</p>
- <p>We link</em></ins></span> to <span
class="removed"><del><strong>personal data in</strong></del></span> the <span
class="removed"><del><strong>device</a>.
- </p>
- </li>
+ <p>We link to</em></ins></span> the <span
class="removed"><del><strong>same
+ information about</strong></del></span> <span
class="inserted"><ins><em>article for</em></ins></span> the <span
class="removed"><del><strong>users' searches</strong></del></span> <span
class="inserted"><ins><em>facts it presents. It
+ is too bad</em></ins></span> that <span
class="removed"><del><strong>Google normally gets when
+ they use its search engine.</p>
- <li>
- <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that</strong></del></span>
<span class="inserted"><ins><em>article for the facts</em></ins></span> it
<span class="removed"><del><strong>will</a>
- pre-install on some</strong></del></span> <span
class="inserted"><ins><em>presents. It
- is too bad that the article finishes by advocating the
- moral weakness</em></ins></span> of <span class="removed"><del><strong>its
phones.</strong></del></span> <span class="inserted"><ins><em>surrendering to
Netflix.</em></ins></span> The <span
class="inserted"><ins><em>Netflix</em></ins></span> app <span
class="removed"><del><strong>will give Verizon the same
- information about the users' searches</strong></del></span> <span
class="inserted"><ins><em><a
- href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ <p>Currently,</strong></del></span> the <span
class="inserted"><ins><em>article finishes by advocating the
+ moral weakness of surrendering to Netflix. The Netflix</em></ins></span>
app <span class="removed"><del><strong>is</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
@@ -2669,11 +2692,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything</em></ins></span> that <span
class="removed"><del><strong>Google normally gets when
- they use its search engine.</p>
-
- <p>Currently, the app</strong></del></span> is <span
class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</strong></del></span> <span
class="inserted"><ins><em>viewed</em></ins></span> on <span
class="removed"><del><strong>only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>them, and not just broadcasts</em></ins></span>
and
+ report everything that is viewed</em></ins></span> on <span
class="removed"><del><strong>only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>them, and not just broadcasts</em></ins></span>
and
<span class="inserted"><ins><em>cable</a>. Even if</em></ins></span>
the
<span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>image is coming
from</em></ins></span> the <span class="removed"><del><strong>app takes effect.
However,</strong></del></span> <span class="inserted"><ins><em>user's own
computer,</em></ins></span>
the
@@ -2736,40 +2755,40 @@
information with online social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing all
- users to new combined</em></ins></span> surveillance <span
class="removed"><del><strong>is inadequate as</strong></del></span> <span
class="inserted"><ins><em>by default.</p>
+ users to new combined</em></ins></span> surveillance <span
class="removed"><del><strong>is inadequate as a protection against massive
+ surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>by default.</p></em></ins></span>
</li>
- <li id="M201507240">
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201507240">
<!--#set var="DATE" value='<small
class="date-tag">2015-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio “smart” TVs recognize and <a
- href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are watching</a>, even if it isn't</em></ins></span> a
<span class="removed"><del><strong>protection against massive
- surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>TV channel.</p></em></ins></span>
+ <p>Vizio “smart” TVs recognize and</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
+ what people are watching</a>, even if it isn't a TV
channel.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Google's new voice
messaging app</strong></del></span>
+ <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
<span class="inserted"><ins><em><li id="M201505290">
<!--#set var="DATE" value='<small
class="date-tag">2015-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></strong></del></span>
+ <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop</strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch, and even what they wanted to
- record</a>.</p></em></ins></span>
+ snoops</em></ins></span> on what <span class="removed"><del><strong>radio
and TV</strong></del></span> programs
+ <span class="removed"><del><strong>are playing nearby</a>.
Also</strong></del></span> <span class="inserted"><ins><em>people watch, and
even what they wanted to
+ record</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201504300">
+ <li id="M201504300">
<!--#set var="DATE" value='<small
class="date-tag">2015-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade” to make its TVs</em></ins></span>
snoop on what <span class="removed"><del><strong>radio and TV programs
- are playing nearby</a>. Also on what</strong></del></span>
+ <p>Vizio <a
+
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ used a firmware “upgrade” to make its TVs
snoop</em></ins></span> on what
users <span class="removed"><del><strong>post on various sites
such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>watch</a>. The TVs did not do that when
first sold.</p></em></ins></span>
</li>
@@ -2793,15 +2812,12 @@
other government.</p>
<p>Speech recognition is not</em></ins></span> to be
- <span class="removed"><del><strong>sent across the
wire</strong></del></span> <span class="inserted"><ins><em>trusted unless it is
done by free
+ <span class="removed"><del><strong>sent across</strong></del></span>
<span class="inserted"><ins><em>trusted unless it is done by free
software in your own computer.</p>
<p>In its privacy policy, Samsung explicitly confirms that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be
transmitted</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers and face-recognition
- algorithms.</p>
-
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>third
+ data containing sensitive information will be transmitted to third
parties</a>.</p>
</li>
@@ -2810,7 +2826,10 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Amazon “Smart” TV is <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all the time</a>.</p>
+ snooping all</em></ins></span> the <span class="removed"><del><strong>wire
to Facebook's servers and face-recognition
+ algorithms.</p>
+
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
</li>
<li id="M201409290">
@@ -2826,47 +2845,48 @@
<p>This shows that laws requiring products to get</em></ins></span>
users' <span class="removed"><del><strong>pictures</strong></del></span> <span
class="inserted"><ins><em>formal
consent before collecting personal data</em></ins></span> are <span
class="removed"><del><strong>private
anymore, even</strong></del></span> <span
class="inserted"><ins><em>totally inadequate.
- And what happens</em></ins></span> if <span
class="removed"><del><strong>the</strong></del></span> <span
class="inserted"><ins><em>a</em></ins></span> user <span
class="removed"><del><strong>didn't “upload” them
to</strong></del></span> <span class="inserted"><ins><em>declines consent?
Probably</em></ins></span> the <span
class="removed"><del><strong>service.</p>
+ And what happens</em></ins></span> if <span
class="removed"><del><strong>the</strong></del></span> <span
class="inserted"><ins><em>a</em></ins></span> user <span
class="removed"><del><strong>didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>declines consent?
Probably the TV will
+ say, “Without your consent</em></ins></span> to <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>service.</p></strong></del></span> <span
class="inserted"><ins><em>TV will not
+ work.”</p>
+
+ <p>Proper laws would say that TVs are not allowed to report what the
+ user watches—no exceptions!</p></em></ins></span>
</li>
- <li><p>Like most “music screaming” disservices,
Spotify
+ <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
is based on proprietary malware (DRM and snooping). In August
- 2015 it <a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some
- are starting</strong></del></span> <span class="inserted"><ins><em>TV
will
- say, “Without your consent</em></ins></span> to <span
class="removed"><del><strong>realize that it is nasty.</p>
+ 2015 it</strong></del></span>
- <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong><a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways</strong></del></span> <span class="inserted"><ins><em>TV
will not
- work.”</p>
+ <span class="inserted"><ins><em><li id="M201405200">
+ <!--#set var="DATE" value='<small
class="date-tag">2014-05</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Spyware in LG “smart” TVs</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased
snooping</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what the user watches,</em></ins></span> and <span
class="removed"><del><strong>some
+ are starting</strong></del></span> <span class="inserted"><ins><em>the
switch</em></ins></span> to <span
class="removed"><del><strong>realize</strong></del></span> <span
class="inserted"><ins><em>turn this off has
+ no effect</a>. (The fact</em></ins></span> that <span
class="removed"><del><strong>it is nasty.</p>
- <p>Proper laws would say</em></ins></span> that <span
class="removed"><del><strong>they present snooping as a
way</strong></del></span> <span class="inserted"><ins><em>TVs are not
allowed</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
- whether they want that. This is a typical example of
- the attitude of</strong></del></span> <span
class="inserted"><ins><em>report what</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
+ <p>This article shows</strong></del></span> the <span
class="removed"><del><strong><a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as a way
+ to “serve” users better</a>—never mind
+ whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>transmission reports</em></ins></span> a <span
class="removed"><del><strong>typical example of
+ the attitude of</strong></del></span> <span
class="inserted"><ins><em>404 error
+ really means nothing;</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
those they have subjugated.</p>
- <p>Out, out, damned Spotify!</p></strong></del></span>
- <span class="inserted"><ins><em>user watches—no
exceptions!</p></em></ins></span>
+ <p>Out, out, damned Spotify!</p>
</li>
- <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other
- apps</strong></del></span>
+ <li><p>Many proprietary apps for mobile devices report
which</strong></del></span> <span class="inserted"><ins><em>server could save
that data anyway.)</p>
- <span class="inserted"><ins><em><li id="M201405200">
- <!--#set var="DATE" value='<small
class="date-tag">2014-05</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Spyware in LG “smart” TVs <a
-
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what</em></ins></span> the user <span
class="inserted"><ins><em>watches, and the switch to turn this
off</em></ins></span> has
- <span class="removed"><del><strong>installed.</strong></del></span>
- <span class="inserted"><ins><em>no effect</a>. (The fact that the
transmission reports a 404 error
- really means nothing; the server could save that data anyway.)</p>
-
- <p>Even worse, it</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing</strong></del></span>
- <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network</a>.</p>
+ <p>Even worse, it <a
+
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on</em></ins></span> other
+ <span class="removed"><del><strong>apps</strong></del></span> <span
class="inserted"><ins><em>devices on</em></ins></span> the <span
class="removed"><del><strong>user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing</strong></del></span> <span class="inserted"><ins><em>user's
local network</a>.</p>
<p>LG later said it had installed a patch to stop this, but any
product could spy</em></ins></span> this <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>way.</p>
@@ -2949,11 +2969,9 @@
<li id="M201603220">
<!--#set var="DATE" value='<small
class="date-tag">2016-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Over 70 brands</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
- “solution”</strong></del></span> <span
class="inserted"><ins><em>network-connected surveillance cameras have <a
+ <p>Over 70 brands</em></ins></span> of <span
class="inserted"><ins><em>network-connected surveillance cameras have <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone</em></ins></span> to <span
class="removed"><del><strong>surveillance: why should a flashlight
- app send any information</strong></del></span> <span
class="inserted"><ins><em>watch through them</a>.</p>
+ security bugs that allow anyone to watch through them</a>.</p>
</li>
<li id="M201511250">
@@ -2963,7 +2981,9 @@
href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
even when the “owner” switches it “off.”</p>
- <p>A “smart” device means the manufacturer is using
it</em></ins></span>
+ <p>A “smart” device means</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should a flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>manufacturer is using it</em></ins></span>
to <span class="removed"><del><strong>anyone? A free software flashlight
app would not.</p></strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p></em></ins></span>
</li>
@@ -2977,38 +2997,39 @@
<span class="removed"><del><strong><ul>
- <li>
- <p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
- of the conversation between two users</a>.</p>
- </li>
-
<li></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711244">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla and i-Que transmit
- <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,</strong></del></span> <span
class="inserted"><ins><em>Furby Connect has</em></ins></span> a <span
class="removed"><del><strong>speech recognition company based in the
U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</strong></del></span> <span
class="inserted"><ins><em><a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The Furby Connect has a <a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>toys with a mobile phone. This would
- enable crackers to listen in on</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as</em></ins></span> a
<span class="removed"><del><strong>child's speech, and even
speak</strong></del></span>
- <span class="inserted"><ins><em>listening device, remote changes to the
code could surely convert it</em></ins></span>
- into <span class="inserted"><ins><em>one.</p>
+ universal back door</a>. If the product as shipped doesn't act as a
+ listening device, remote changes to the code could surely convert it
+ into one.</p>
</li>
<li id="M201711100">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
+ --><!--#echo encoding="none" var="DATE" --></em></ins></span>
<p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of</em></ins></span> the <span
class="removed"><del><strong>toys themselves.</p></strong></del></span>
<span class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
+ recordings of the conversation between two users</a>.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
+ a speech recognition company based in the U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control the toys with a mobile phone. This would
+ enable crackers to listen in on a child's speech, and even speak
+ into the toys themselves.</p>
+ </li>
+
+ <li></strong></del></span>
<span class="inserted"><ins><em><li id="M201703140">
<!--#set var="DATE" value='<small
class="date-tag">2017-03</small>'
@@ -3032,17 +3053,17 @@
used it</a>.</p>
<p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really <span class="removed"><del><strong>matter. If
it had sold the data to a
- data broker, the data broker would have been able to figure out
- who the user was.</p>
+ true, but it doesn't really matter. If it had sold the data to a data
+ broker, the data broker would have been able to figure out who the
+ user was.</p>
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of C$4m</a>
- to its customers.</p>
+ <p>Following this lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of C$4m</a> to its
+ customers.</p>
</li>
- <li><p> “CloudPets” toys with microphones
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
<a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
manufacturer</a>. Guess what?
<a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way to access the data</a>
@@ -3084,8 +3105,15 @@
</li>
</ul>
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+<!-- #SpywareAtLowLevel</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702280">
+ <!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>“CloudPets” toys with
microphones <a
+
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
@@ -3100,21 +3128,30 @@
</div>
<ul>
-<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note that</strong></del></span> <span class="inserted"><ins><em>matter. If it
had sold</em></ins></span> the <span class="removed"><del><strong>specific
sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>data
to</em></ins></span> a <span class="removed"><del><strong>“clean”
Windows install is not really
+<li><p></strong></del></span> <span class="inserted"><ins><em>the
manufacturer</a>. Guess what?</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found a way to access the data</a> collected by the
+ manufacturer's snooping.</p>
+
+ <p>That the manufacturer</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows installs.
+Note that</strong></del></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a “clean” Windows install is not really
clean since <a href="/proprietary/malware-microsoft.html">Microsoft
puts in its own malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>data
- broker, the data broker would have been able</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each
subsection</strong></del></span> <span class="inserted"><ins><em>these
+ conversations was unacceptable by itself.</p>
+ </li>
-<div class="big-section">
+ <li id="M201612060">
+ <!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+
+<span class="removed"><del><strong><div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
<span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
</div>
@@ -3122,22 +3159,25 @@
<ul>
<li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Shows</strong></del></span>
+ <span class="inserted"><ins><em><p>The “smart” toys My
Friend Cayla and i-Que transmit</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically, it can collect</strong></del></span> <span
class="inserted"><ins><em>figure out who</em></ins></span> the <span
class="removed"><del><strong>emails of members of
Parliament</strong></del></span>
- <span class="inserted"><ins><em>user was.</p>
-
- <p>Following</em></ins></span> this <span
class="removed"><del><strong>way, because they pass it through
Microsoft.</p></li>
+ <p>Specifically, it</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations to Nuance Communications</a>, a speech recognition
+ company based in the U.S.</p>
- <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of C$4m</a> to its
- customers.</p></em></ins></span>
+ <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
+ can <span class="removed"><del><strong>collect</strong></del></span> <span
class="inserted"><ins><em>remotely control</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ this way, because they pass it through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<div class="big-subsection">
@@ -3146,23 +3186,14 @@
</div>
<ul>
- <li><p>Spyware in Skype:</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702280">
- <!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
+ crackers to listen</em></ins></span> in <span
class="removed"><del><strong>Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess
what?</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a> collected by the
- manufacturer's snooping.</p>
-
- <p>That the manufacturer and the FBI could listen to these
- conversations was unacceptable by itself.</p></em></ins></span>
+ Microsoft changed Skype
+ <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p></strong></del></span> <span
class="inserted"><ins><em>on a child's speech, and even speak into the
+ toys themselves.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -3170,35 +3201,19 @@
<!-- #SpywareOnTheRoad</strong></del></span>
- <span class="inserted"><ins><em><li id="M201612060">
- <!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>The “smart” toys My
Friend Cayla and i-Que transmit <a
-
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>Nuance Communications</a>, a speech recognition
- company based in the U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would enable
- crackers to listen in</em></ins></span> on <span
class="removed"><del><strong>top under each subsection</strong></del></span>
<span class="inserted"><ins><em>a child's speech, and even speak into the
- toys themselves.</p>
- </li>
-
- <li id="M201502180">
+ <span class="inserted"><ins><em><li id="M201502180">
<!--#set var="DATE" value='<small
class="date-tag">2015-02</small>'
--><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware</strong></del></span>
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
<span class="inserted"><ins><em><p>Barbie <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going to spy</em></ins></span> on <span class="removed"><del><strong>The
Road</h3></strong></del></span> <span class="inserted"><ins><em>children
and adults</a>.</p>
+ going</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>children and
adults</a>.</p>
</li>
-</ul>
+</ul></em></ins></span>
-<div class="big-subsection">
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware on The
Road</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
<h4 id="SpywareInDrones">Drones</h4></em></ins></span>
<span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
@@ -3371,9 +3386,9 @@
<p>Data collected by devices such as the Nest thermostat, the Philips
Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
- speakers are likewise stored longer than necessary on</em></ins></span>
the <span class="removed"><del><strong>modem. However, even if it asked for
- authentication, you couldn't be confident that
Nissan</strong></del></span> <span class="inserted"><ins><em>servers
- the devices are tethered to. Moreover, they are made available to
+ speakers are likewise stored longer than necessary on the
servers</em></ins></span>
+ the <span class="removed"><del><strong>modem. However, even if it asked
for
+ authentication, you couldn't be confident that
Nissan</strong></del></span> <span class="inserted"><ins><em>devices are
tethered to. Moreover, they are made available to
Alexa. As a result, Amazon</em></ins></span> has <span
class="removed"><del><strong>no
access. The software</strong></del></span> <span
class="inserted"><ins><em>a very precise picture of users' life
at home, not only</em></ins></span> in the <span
class="removed"><del><strong>car is
@@ -3696,11 +3711,12 @@
snooping all</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying">
manufacturers collect this data</a> as part of their own spying, then
- forward it to</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>government-run
platform.</p></em></ins></span>
+ forward it to</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+ </li>
+ <li><p>The Samsung “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>government-run platform.</p>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
- <span class="inserted"><ins><em><li id="M201810230">
+ <li id="M201810230">
<!--#set var="DATE" value='<small
class="date-tag">2018-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
@@ -3770,16 +3786,16 @@
<ul>
<li>
- <p>The driver for a certain gaming keyboard</strong></del></span>
- <span class="inserted"><ins><em><p id="car-spying">Computerized cars
with nonfree software are</em></ins></span> <a <span
class="removed"><del><strong>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ <p>The driver for</strong></del></span>
+ <span class="inserted"><ins><em><p id="car-spying">Computerized cars
with nonfree software are <a
+
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
snooping devices</a>.</p>
</li>
<li id="M201602240">
<!--#set var="DATE" value='<small
class="date-tag">2016-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p id="nissan-modem">The Nissan Leaf has a built-in
+ <p id="nissan-modem">The Nissan Leaf has</em></ins></span> a <span
class="removed"><del><strong>certain gaming keyboard <a
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information</strong></del></span> <span class="inserted"><ins><em>built-in
cell phone modem which allows effectively anyone</em></ins></span> to
<span class="removed"><del><strong>China</a>.</p>
</li>
@@ -3828,20 +3844,16 @@
<!--#set var="DATE" value='<small
class="date-tag">2013-06</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Tesla cars allow the company to extract</em></ins></span>
- data <span class="removed"><del><strong>about their users and their users'
- friends</strong></del></span> <span
class="inserted"><ins><em>remotely</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
+ data <span class="removed"><del><strong>about their
users</strong></del></span> <span
class="inserted"><ins><em>remotely</em></ins></span> and <span
class="removed"><del><strong>their users'
+ friends</strong></del></span> <span class="inserted"><ins><em>determine
the car's location
+ at any time. (See Section 2, paragraphs b</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
- <p>Even nastier, they do it through ad networks that
merge</strong></del></span> <span
class="inserted"><ins><em>determine</em></ins></span> the <span
class="removed"><del><strong>data
- collected by various cr…apps</strong></del></span> <span
class="inserted"><ins><em>car's location
- at any time. (See Section 2, paragraphs b</em></ins></span> and <span
class="removed"><del><strong>sites made by different
- companies.</p>
-
- <p>They use</strong></del></span> <span
class="inserted"><ins><em>c of the <a
+ <p>Even nastier, they do</strong></del></span> <span
class="inserted"><ins><em>c of the <a
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- privacy statement</a>.) The company says it doesn't
store</em></ins></span> this <span class="removed"><del><strong>data to
manipulate people</strong></del></span>
- <span class="inserted"><ins><em>information, but if the state orders
it</em></ins></span> to <span class="removed"><del><strong>buy
things,</strong></del></span> <span class="inserted"><ins><em>get the
data</em></ins></span> and <span class="removed"><del><strong>hunt
- for “whales” who</strong></del></span> <span
class="inserted"><ins><em>hand it
- over, the state</em></ins></span> can <span
class="removed"><del><strong>be led</strong></del></span> <span
class="inserted"><ins><em>store it.</p>
+ privacy statement</a>.) The company says</em></ins></span> it <span
class="removed"><del><strong>through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
+ information, but if the state orders it to get</em></ins></span> the data
+ <span class="removed"><del><strong>collected by various
cr…apps</strong></del></span> and <span
class="removed"><del><strong>sites</strong></del></span> <span
class="inserted"><ins><em>hand it
+ over, the state can store it.</p>
</li>
<li id="M201303250">
@@ -3849,8 +3861,12 @@
--><!--#echo encoding="none" var="DATE" -->
<p id="records-drivers">Proprietary software in cars <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
- records information about drivers' movements</a>, which is made
- available</em></ins></span> to <span class="removed"><del><strong>spend a
lot</strong></del></span> <span class="inserted"><ins><em>car manufacturers,
insurance companies, and others.</p>
+ records information about drivers' movements</a>, which
is</em></ins></span> made <span class="removed"><del><strong>by different
+ companies.</p>
+
+ <p>They use this data to manipulate people</strong></del></span>
+ <span class="inserted"><ins><em>available</em></ins></span> to <span
class="removed"><del><strong>buy things,</strong></del></span> <span
class="inserted"><ins><em>car manufacturers, insurance
companies,</em></ins></span> and <span class="removed"><del><strong>hunt
+ for “whales” who can be led to spend a
lot</strong></del></span> <span class="inserted"><ins><em>others.</p>
<p>The case</em></ins></span> of <span
class="removed"><del><strong>money. They
also use</strong></del></span> <span
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
@@ -4278,7 +4294,7 @@
<p>Google <a
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16">handed
over personal data of Indian protesters and activists</em></ins></span> to
<span class="removed"><del><strong>snoop on other people,
DJI</strong></del></span> <span class="inserted"><ins><em>Indian
- police</a> which leaded to their arrest. The cops requested the IP
+ police</a> which led to their arrest. The cops requested the IP
address and the location where a document was created and with that
information, they identified protesters and activists.</p>
</li>
@@ -4470,7 +4486,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/15 14:32:18 $
+$Date: 2021/04/15 19:01:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.389
retrieving revision 1.390
diff -u -b -r1.389 -r1.390
--- proprietary-surveillance.de.po 15 Apr 2021 14:32:20 -0000 1.389
+++ proprietary-surveillance.de.po 15 Apr 2021 19:01:22 -0000 1.390
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-04-15 14:25+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -5822,7 +5822,7 @@
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.181
retrieving revision 1.182
diff -u -b -r1.181 -r1.182
--- proprietary-surveillance.es.po 15 Apr 2021 14:32:22 -0000 1.181
+++ proprietary-surveillance.es.po 15 Apr 2021 19:01:22 -0000 1.182
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-15 14:25+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
"PO-Revision-Date: 2021-04-12 12:06+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -5294,11 +5294,25 @@
"\">#SpywareInNetworks</a>)</span>"
#. type: Content of: <div><div><ul><li><p>
+# | Google <a
+# |
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\">handed
+# | over personal data of Indian protesters and activists to Indian police</a>
+# | which [-leaded-] {+led+} to their arrest. The cops requested the IP
+# | address and the location where a document was created and with that
+# | information, they identified protesters and activists.
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
msgid ""
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.625
retrieving revision 1.626
diff -u -b -r1.625 -r1.626
--- proprietary-surveillance.fr.po 15 Apr 2021 18:11:10 -0000 1.625
+++ proprietary-surveillance.fr.po 15 Apr 2021 19:01:22 -0000 1.626
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-15 14:25+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
"PO-Revision-Date: 2021-04-15 20:10+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 18:55+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -5313,11 +5314,25 @@
"\">#SpywareInNetworks</a>)</span>"
#. type: Content of: <div><div><ul><li><p>
+# | Google <a
+# |
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\">handed
+# | over personal data of Indian protesters and activists to Indian police</a>
+# | which [-leaded-] {+led+} to their arrest. The cops requested the IP
+# | address and the location where a document was created and with that
+# | information, they identified protesters and activists.
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
msgid ""
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.245
retrieving revision 1.246
diff -u -b -r1.245 -r1.246
--- proprietary-surveillance.it-diff.html 15 Apr 2021 14:32:25 -0000
1.245
+++ proprietary-surveillance.it-diff.html 15 Apr 2021 19:01:22 -0000
1.246
@@ -632,22 +632,10 @@
<p><a <span
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware and spyware via
- BIOS</a> on Windows installs. Note</em></ins></span> that <span
class="removed"><del><strong>90% of the top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span> the <span class="removed"><del><strong>paid
proprietary apps, it was only 60%.</p>
-
- <p>The article confusingly describes gratis apps as “free”,
- but most of them are</strong></del></span> <span
class="inserted"><ins><em>specific
- sabotage method Lenovo used did</em></ins></span> not <span
class="removed"><del><strong>in fact
- <a href="/philosophy/free-sw.html">free software</a>.
- It also uses the ugly word “monetize”. A good replacement
- for that word</strong></del></span> <span class="inserted"><ins><em>affect
GNU/Linux; also, a
- “clean” Windows install</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always that will fit
- perfectly.</p>
-</li>
-
-<li>
- <p>Apps for BART</strong></del></span> <span
class="inserted"><ins><em>not really clean since</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft
puts in its
+ BIOS</a> on Windows installs. Note that the specific
+ sabotage method Lenovo used did not affect GNU/Linux; also, a
+ “clean” Windows install is not really clean since <a
+ href="/proprietary/malware-microsoft.html">Microsoft puts in its
own malware</a>.</p>
</li>
</ul>
@@ -655,9 +643,7 @@
<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware</em></ins></span> on <span
class="removed"><del><strong>users</a>.</p>
- <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With</strong></del></span> <span
class="inserted"><ins><em>Mobiles</h3>
+ <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -671,205 +657,96 @@
<li id="M202102200">
<!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The</em></ins></span> proprietary <span
class="removed"><del><strong>apps, one can only hope that they don't.</p>
-</li>
-
-<li>
- <p>A study found 234 Android apps that track users
by</strong></del></span> <span class="inserted"><ins><em>program Clubhouse
- is malware and a privacy disaster. Clubhouse</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
programs</a>.
- </p>
-
-</li>
-
-<li>
- <p>Pairs of Android apps can collude to transmit
users'</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/commentisfree/2021/feb/20/why-hot-new-social-app-clubhouse-spells-nothing-but-trouble">collects
- people's</em></ins></span> personal data <span
class="removed"><del><strong>to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens</strong></del></span> <span class="inserted"><ins><em>such as
recordings</em></ins></span> of <span
class="removed"><del><strong>thousands</strong></del></span> <span
class="inserted"><ins><em>people's
+ <p>The proprietary program Clubhouse
+ is malware and a privacy disaster. Clubhouse <a
+
href="https://www.theguardian.com/commentisfree/2021/feb/20/why-hot-new-social-app-clubhouse-spells-nothing-but-trouble">collects
+ people's personal data such as recordings of people's
conversations</a>, and, as a secondary problem, does not encrypt
them,
- which shows a bad security part</em></ins></span> of <span
class="removed"><del><strong>pairs that collude</a>.</p>
-</li>
-
-<li>
-<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>issue.</p>
+ which shows a bad security part of the issue.</p>
<p>A user's unique Clubhouse ID number and chatroom ID are
transmitted
- in plaintext, and Agora (the company behind</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
+ in plaintext, and Agora (the company behind the app) would likely
+ have access to users' raw audio, potentially providing access to
+ the Chinese government.</p>
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>app) would likely
- have access to users' raw audio, potentially providing access
to</em></ins></span>
- the <span
class="removed"><del><strong>“consent”</strong></del></span> <span
class="inserted"><ins><em>Chinese government.</p>
-
- <p>Even with good security</em></ins></span> of <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>data transmission, collecting personal
- data of people</em></ins></span> is <span class="removed"><del><strong>not
enough
-to legitimize actions like this. At this point, most users have
-stopped reading the “Terms and Conditions” that spell out
-what they are “consenting” to. Google should
clearly</strong></del></span> <span
class="inserted"><ins><em>wrong</em></ins></span> and <span
class="removed"><del><strong>honestly identify the information it collects on
users, instead</strong></del></span> <span class="inserted"><ins><em>a
violation</em></ins></span> of <span class="removed"><del><strong>hiding it in
an obscurely worded EULA.</p>
-
-<p>However, to truly protect</strong></del></span> people's <span
class="removed"><del><strong>privacy, we must prevent Google
-and other companies from getting this personal information in the first
-place!</p></strong></del></span> <span class="inserted"><ins><em>privacy
rights.</p></em></ins></span>
+ <p>Even with good security of data transmission, collecting personal
+ data of people is wrong and a violation of people's privacy
rights.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Google Play (a component</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M202101080">
+ <li id="M202101080">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>As</em></ins></span> of <span
class="removed"><del><strong>Android)</strong></del></span> <span
class="inserted"><ins><em>2021, WhatsApp (one of Facebook's subsidiaries)
is</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without their permission</a>.</p>
-
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/">forcing
- its users</em></ins></span> to <span
class="removed"><del><strong>completely stop the
tracking.</strong></del></span> <span class="inserted"><ins><em>hand over
sensitive personal data</a> to its parent
- company.</em></ins></span> This <span class="removed"><del><strong>is
- yet another example</strong></del></span> <span
class="inserted"><ins><em>increases Facebook's power over users, and further
+ <p>As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a
+
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/">forcing
+ its users to hand over sensitive personal data</a> to its parent
+ company. This increases Facebook's power over users, and further
jeopardizes people's privacy and security.</p>
- <p>Instead</em></ins></span> of <span
class="removed"><del><strong>nonfree software pretending to obey the user,
- when it's actually doing something else. Such a thing would be almost
- unthinkable with</strong></del></span> <span
class="inserted"><ins><em>WhatsApp you can use <a
- href="https://directory.fsf.org/wiki/Jami">GNU Jami</a>, which
is</em></ins></span>
- free <span
class="removed"><del><strong>software.</p></strong></del></span> <span
class="inserted"><ins><em>software and will not collect your
data.</p></em></ins></span>
+ <p>Instead of WhatsApp you can use <a
+ href="https://directory.fsf.org/wiki/Jami">GNU Jami</a>, which is
+ free software and will not collect your data.</p>
</li>
- <span class="removed"><del><strong><li><p>More than 73% of the
most popular Android</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M202006260">
+ <li id="M202006260">
<!--#set var="DATE" value='<small
class="date-tag">2020-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Most</em></ins></span> apps <span class="inserted"><ins><em>are
malware, but
- Trump's campaign app, like Modi's campaign app, is</em></ins></span> <a
<span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral and location information</a> of their</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
- especially nasty malware, helping companies snoop on</em></ins></span>
users <span class="removed"><del><strong>with third parties.</p>
- </li>
-
- <li><p>“Cryptic communication,” unrelated to the
app's functionality,
- was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis Android
apps</a>.</p></strong></del></span> <span
class="inserted"><ins><em>as well
- as snooping on them itself</a>.</p></em></ins></span>
-
- <p>The article <span
class="removed"><del><strong>should</strong></del></span> <span
class="inserted"><ins><em>says that Biden's app has a less manipulative overall
- approach, but that does</em></ins></span> not <span
class="removed"><del><strong>have described these apps</strong></del></span>
<span class="inserted"><ins><em>tell us whether it has functionalities we
- consider malicious, such</em></ins></span> as
- <span class="removed"><del><strong>“free”—they
are</strong></del></span> <span class="inserted"><ins><em>sending data the user
has</em></ins></span> not <span class="removed"><del><strong>free software.
The clear way to say
- “zero price” is “gratis.”</p>
-
- <p>The article takes for granted that the usual analytics tools are
- legitimate, but is that valid? Software developers have no
right</strong></del></span> <span class="inserted"><ins><em>explicitly
- asked</em></ins></span> to
- <span class="removed"><del><strong>analyze what users are doing or how.
“Analytics” tools that snoop are
- just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>send.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li><p>Gratis Android apps
(but not <a href="/philosophy/free-sw.html">free software</a>)
- connect to 100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
+ <p>Most apps are malware, but
+ Trump's campaign app, like Modi's campaign app, is <a
+
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
+ especially nasty malware, helping companies snoop on users as well
+ as snooping on them itself</a>.</p>
+
+ <p>The article says that Biden's app has a less manipulative overall
+ approach, but that does not tell us whether it has functionalities we
+ consider malicious, such as sending data the user has not explicitly
+ asked to send.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201809121">
+ <li id="M201809121">
<!--#set var="DATE" value='<small
class="date-tag">2018-09</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Tiny Lab Productions, along with online ad businesses run
- by Google, Twitter</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
- on the average.</p>
- </li>
- <li><p>Spyware is present in some Android devices when
they</strong></del></span> <span class="inserted"><ins><em>three other
companies</em></ins></span> are <span class="removed"><del><strong>sold.
- Some Motorola phones modify Android to</strong></del></span> <span
class="inserted"><ins><em>facing a lawsuit</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html">for
+ by Google, Twitter and three other companies are facing a lawsuit <a
+
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html">for
violating people's privacy by collecting their data from mobile games
- and handing over these</em></ins></span> data to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
<span class="inserted"><ins><em>other
companies/advertisers</a>.</p></em></ins></span>
+ and handing over these data to other
companies/advertisers</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201601110">
+ <li id="M201601110">
<!--#set var="DATE" value='<small
class="date-tag">2016-01</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The natural extension of monitoring
- people through “their” phones is</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p>
- </li>
-
- <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software</em></ins></span> to <span
class="removed"><del><strong>any file on</strong></del></span> <span
class="inserted"><ins><em>make sure they can't
“fool”</em></ins></span>
- the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p></em></ins></span>
+ people through “their” phones is <a
+
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary software to make sure they can't “fool”
+ the monitoring</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareOnMobiles</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201510050">
+ <li id="M201510050">
<!--#set var="DATE" value='<small
class="date-tag">2015-10</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>According</em></ins></span> to
<span class="removed"><del><strong>place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareIniThings">Spyware in iThings</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
-</div>
-
-<ul>
- <li><p>Apple proposes</strong></del></span> <span
class="inserted"><ins><em>Edward Snowden,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- —</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233">agencies
can take over
- smartphones</a> by sending hidden text messages</em></ins></span>
which <span class="removed"><del><strong>would mean no way to use it without
having your fingerprints
- taken. Users would have no way</strong></del></span> <span
class="inserted"><ins><em>enable
- them</em></ins></span> to <span class="removed"><del><strong>tell
whether</strong></del></span> <span
class="inserted"><ins><em>turn</em></ins></span> the <span
class="removed"><del><strong>phone is snooping</strong></del></span> <span
class="inserted"><ins><em>phones</em></ins></span> on
- <span class="removed"><del><strong>them.</p></li>
-
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots of personal data</strong></del></span> <span
class="inserted"><ins><em>and off, listen</em></ins></span> to <span
class="removed"><del><strong>Apple's servers</a>. Big Brother can
- get them</strong></del></span> <span class="inserted"><ins><em>the
microphone,
- retrieve geo-location data</em></ins></span> from <span
class="removed"><del><strong>there.</p>
- </li>
-
- <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that the user types into
it</a>;</strong></del></span> the <span
class="removed"><del><strong>server records these numbers for at least 30
- days.</p>
- </li>
-
- <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
- without giving a valid email address</strong></del></span> <span
class="inserted"><ins><em>GPS, take photographs, read
- text messages, read call, location</em></ins></span> and <span
class="removed"><del><strong>receiving</strong></del></span> <span
class="inserted"><ins><em>web browsing history, and
- read</em></ins></span> the <span class="removed"><del><strong>code Apple
- sends</strong></del></span> <span class="inserted"><ins><em>contact
list. This malware is designed</em></ins></span> to <span
class="removed"><del><strong>it.</p></strong></del></span> <span
class="inserted"><ins><em>disguise itself
- from investigation.</p></em></ins></span>
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>According to Edward Snowden, <a
+ href="http://www.bbc.com/news/uk-34444233">agencies can take over
+ smartphones</a> by sending hidden text messages which enable
+ them to turn the phones on and off, listen to the microphone,
+ retrieve geo-location data from the GPS, take photographs, read
+ text messages, read call, location and web browsing history, and
+ read the contact list. This malware is designed to disguise itself
+ from investigation.</p>
</li>
- <span class="removed"><del><strong><li><p>Around 47%
of</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201311120">
+ <li id="M201311120">
<!--#set var="DATE" value='<small
class="date-tag">2013-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones,
Android, and BlackBerry</a>. While there is not much
- detail here, it seems that this does not operate via</em></ins></span>
- the <span class="removed"><del><strong>most popular iOS
apps</strong></del></span> <span class="inserted"><ins><em>universal back door
that we know nearly all portable
- phones have. It may involve exploiting various bugs. There
are</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots</em></ins></span> of <span class="inserted"><ins><em>bugs in the
phones' radio software</a>.</p>
+ detail here, it seems that this does not operate via
+ the universal back door that we know nearly all portable
+ phones have. It may involve exploiting various bugs. There are <a
+
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ lots of bugs in the phones' radio software</a>.</p>
</li>
<li id="M201307000">
@@ -877,21 +754,9 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Portable phones with GPS <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send</em></ins></span> their <span class="inserted"><ins><em>GPS
location on remote command, and</em></ins></span> users <span
class="removed"><del><strong>with third parties.</p>
- </li>
-
- <li><p>iThings automatically upload to Apple's
servers</strong></del></span> <span class="inserted"><ins><em>cannot stop
- them</a>. (The US says it will eventually require</em></ins></span>
all <span class="removed"><del><strong>the photos and
- videos they make.</p>
-
- <blockquote><p>
- iCloud Photo Library stores every photo and video you take,
- and keeps them up</strong></del></span> <span
class="inserted"><ins><em>new portable phones</em></ins></span>
- to <span class="removed"><del><strong>date on all your devices.
- Any edits you make are automatically updated everywhere. [...]
- </p></blockquote>
-
- <p>(From</strong></del></span> <span class="inserted"><ins><em>have
GPS.)</p>
+ will send their GPS location on remote command, and users cannot stop
+ them</a>. (The US says it will eventually require all new portable
phones
+ to have GPS.)</p>
</li>
</ul>
@@ -905,15 +770,9 @@
<li id="M202009183">
<!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Facebook</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
- information</a> as accessed</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops</em></ins></span>
- on <span class="removed"><del><strong>24 Sep 2015.) The iCloud feature is
- <a
href="https://support.apple.com/en-us/HT202033">activated</strong></del></span>
<span class="inserted"><ins><em>Instagram</a> users</em></ins></span> by
<span class="inserted"><ins><em>surreptitously turning on</em></ins></span> the
- <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
- “please don't ask where.”</p>
-
- <p>There is</strong></del></span> <span
class="inserted"><ins><em>device's
+ <p>Facebook <a
+
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops
+ on Instagram</a> users by surreptitously turning on the device's
camera.</p>
</li>
@@ -921,25 +780,18 @@
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Apple whistleblower Thomas Le Bonniec reports that Apple
- made</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>practice of surreptitiously activating the Siri
software</em></ins></span> to <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by default so it still
counts as a
- surveillance functionality.</p>
-
- <p>Unknown people apparently took advantage</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf">
+ made a practice of surreptitiously activating the Siri software to <a
+
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf">
record users' conversations when they had not activated Siri</a>.
This was not just occasional, it was systematic practice.</p>
<p>His job was to listen to these recordings, in a group that made
- transcripts</em></ins></span> of <span class="inserted"><ins><em>them. He
does not believes that Apple has ceased</em></ins></span> this
- <span class="inserted"><ins><em>practice.</p>
+ transcripts of them. He does not believes that Apple has ceased this
+ practice.</p>
- <p>The only reliable way</em></ins></span> to
- <span class="removed"><del><strong><a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They
needed</strong></del></span> <span class="inserted"><ins><em>prevent this is,
for the program that
- controls access</em></ins></span> to <span
class="removed"><del><strong>break Apple's
- security</strong></del></span> <span class="inserted"><ins><em>the
microphone</em></ins></span> to <span class="removed"><del><strong>get at them,
but NSA can access</strong></del></span> <span class="inserted"><ins><em>decide
when the user has
- “activated”</em></ins></span> any <span
class="removed"><del><strong>of them through</strong></del></span> <span
class="inserted"><ins><em>service, to be free software, and the
+ <p>The only reliable way to prevent this is, for the program that
+ controls access to the microphone to decide when the user has
+ “activated” any service, to be free software, and the
operating system under it free as well. This way, users could make
sure Apple can't listen to them.</p>
</li>
@@ -947,108 +799,64 @@
<li id="M201910131">
<!--#set var="DATE" value='<small
class="date-tag">2019-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Safari occasionally</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
- sends browsing data from Apple devices</em></ins></span> in <span
class="removed"><del><strong>iThings:</strong></del></span> <span
class="inserted"><ins><em>China to</em></ins></span> the <span
class="removed"><del><strong><a class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly
where</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
+ <p>Safari occasionally <a
+
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing data from Apple devices in China to the Tencent Safe
Browsing service</a>, to check URLs that possibly correspond to
“fraudulent” websites. Since Tencent collaborates
- with</em></ins></span> the <span class="removed"><del><strong>iThing
is,</strong></del></span> <span class="inserted"><ins><em>Chinese government,
its Safe Browsing black list most certainly
+ with the Chinese government, its Safe Browsing black list most certainly
contains the websites of political opponents. By linking the requests
originating from single IP addresses, the government can identify
- dissenters in China</em></ins></span> and <span
class="removed"><del><strong>get other info
too.</p></strong></del></span> <span class="inserted"><ins><em>Hong Kong,
thus endangering their lives.</p></em></ins></span>
+ dissenters in China and Hong Kong, thus endangering their lives.</p>
</li>
- <span class="removed"><del><strong><li><p>There is also a
feature for web sites</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905280">
+ <li id="M201905280">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>In spite of Apple's supposed commitment</em></ins></span> to
<span class="removed"><del><strong>track users, which is</strong></del></span>
- <span class="inserted"><ins><em>privacy, iPhone apps contain trackers that
are busy at night</em></ins></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers that are busy at night <a
+
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
sending users' personal information to third parties</a>.</p>
- <p>The</em></ins></span> article <span
class="removed"><del><strong>talks about iOS 6, but</strong></del></span> <span
class="inserted"><ins><em>mentions specific examples: Microsoft OneDrive,
+ <p>The article mentions specific examples: Microsoft OneDrive,
Intuit's Mint, Nike, Spotify, The Washington Post, The Weather
Channel (owned by IBM), the crime-alert service Citizen, Yelp
- and DoorDash. But</em></ins></span> it is <span
class="removed"><del><strong>still true in iOS 7.)</p>
- </li>
-
- <li><p>The iThing also
- <a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default,
though</strong></del></span> <span
class="inserted"><ins><em>likely</em></ins></span> that <span
class="removed"><del><strong>can</strong></del></span> <span
class="inserted"><ins><em>most nonfree apps contain
+ and DoorDash. But it is likely that most nonfree apps contain
trackers. Some of these send personally identifying data such as phone
fingerprint, exact location, email address, phone number or even
delivery address (in the case of DoorDash). Once this information
- is collected by the company, there is no telling what it
will</em></ins></span> be
- <span class="removed"><del><strong>turned
off.</p></strong></del></span>
- <span class="inserted"><ins><em>used for.</p></em></ins></span>
+ is collected by the company, there is no telling what it will be
+ used for.</p>
</li>
- <span class="removed"><del><strong><li><p>Apple
can,</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711250">
+ <li id="M201711250">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The DMCA</em></ins></span> and <span
class="removed"><del><strong>regularly does,</strong></del></span> <span
class="inserted"><ins><em>the EU Copyright Directive make it</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the
state</a>.</p>
- </li>
-
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr…apps spy</em></ins></span> on <span
class="removed"><del><strong>all</strong></del></span> <span
class="inserted"><ins><em>users</a>, because
- this would require circumventing</em></ins></span> the <span
class="removed"><del><strong>data in an iThing,
- or it is totally incompetent.</a></p>
- </li>
-
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of</strong></del></span> iOS <span
class="removed"><del><strong>seem to exist for no
- possible purpose other than surveillance</a>. Here
is</strong></del></span> <span class="inserted"><ins><em>DRM.</p>
+ <p>The DMCA and the EU Copyright Directive make it <a
+ href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal to study how iOS cr…apps spy on users</a>, because
+ this would require circumventing the iOS DRM.</p>
</li>
<li id="M201709210">
<!--#set var="DATE" value='<small
class="date-tag">2017-09</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>In the latest iThings system,
- “turning off” WiFi and Bluetooth</em></ins></span> the <span
class="inserted"><ins><em>obvious way</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
-</div>
-
-<ul>
- <li><p>According</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ “turning off” WiFi and Bluetooth the obvious way <a
+
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
them off—only until 5am. That's Apple for you—“We
- know you want</em></ins></span> to <span
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>be spied on”.</p>
+ know you want to be spied on”.</p>
</li>
<li id="M201702150">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apple proposes</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages which enable them</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
- fingerprint-scanning touch screen</a>—which would mean no
way</em></ins></span>
- to <span class="removed"><del><strong>turn the phones
- on and off, listen</strong></del></span> <span
class="inserted"><ins><em>use it without having your fingerprints taken. Users
would have
- no way</em></ins></span> to <span class="inserted"><ins><em>tell
whether</em></ins></span> the <span class="removed"><del><strong>microphone,
retrieve geo-location data from the
- GPS, take photographs, read text messages, read call, location and web
- browsing history, and read the contact list. This
malware</strong></del></span> <span
class="inserted"><ins><em>phone</em></ins></span> is <span
class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>snooping on them.</p>
+ <p>Apple proposes <a
+
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
+ fingerprint-scanning touch screen</a>—which would mean no way
+ to use it without having your fingerprints taken. Users would have
+ no way to tell whether the phone is snooping on them.</p>
</li>
<li id="M201611170">
@@ -1056,103 +864,53 @@
--><!--#echo encoding="none" var="DATE" -->
<p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots of personal data</em></ins></span> to
- <span class="removed"><del><strong>disguise itself</strong></del></span>
<span class="inserted"><ins><em>Apple's servers</a>. Big Brother can get
- them</em></ins></span> from <span
class="removed"><del><strong>investigation.</p></strong></del></span>
<span class="inserted"><ins><em>there.</p></em></ins></span>
+ lots of personal data to Apple's servers</a>. Big Brother can get
+ them from there.</p>
</li>
- <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201609280">
+ <li id="M201609280">
<!--#set var="DATE" value='<small
class="date-tag">2016-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The iMessage app on iThings</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
- and they send so much data that their transmission
is</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells</em></ins></span>
- a
- <span class="removed"><del><strong>substantial expense for users. Said
transmission, not wanted or
- requested by the user, clearly must constitute spying of some
- kind.</p></li>
-
- <li><p>A Motorola</strong></del></span> <span
class="inserted"><ins><em>server every</em></ins></span> phone
- <span class="removed"><del><strong><a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</strong></del></span> <span
class="inserted"><ins><em>number that</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
- </li>
-
- <li><p>Spyware in Android phones (and Windows? laptops): The Wall
- Street Journal (in an article blocked from us by a paywall)
- reports that
- <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
<span class="inserted"><ins><em>user types into
it</a>;</em></ins></span> the <span class="removed"><del><strong>FBI can
remotely activate</strong></del></span>
- <span class="inserted"><ins><em>server records these numbers for at least
30 days.</p>
+ <p>The iMessage app on iThings <a
+
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that the user types into it</a>; the
+ server records these numbers for at least 30 days.</p>
</li>
<li id="M201509240">
<!--#set var="DATE" value='<small
class="date-tag">2015-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>iThings automatically upload to Apple's servers
all</em></ins></span> the <span
class="removed"><del><strong>GPS</strong></del></span> <span
class="inserted"><ins><em>photos</em></ins></span>
- and <span class="removed"><del><strong>microphone in Android
- phones</strong></del></span> <span class="inserted"><ins><em>videos they
make.</p>
-
- <blockquote><p> iCloud Photo Library stores every
photo</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
- (I suspect this means Windows laptops.) Here is
- <a href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
- </li>
-
- <li><p>Portable phones with GPS will send their GPS location on
- remote command</strong></del></span> <span
class="inserted"><ins><em>video you
- take,</em></ins></span> and <span class="removed"><del><strong>users
cannot stop them:
- <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable
phones</strong></del></span> <span class="inserted"><ins><em>keeps them
up</em></ins></span> to <span class="removed"><del><strong>have GPS.)</p>
- </li>
+ <p>iThings automatically upload to Apple's servers all the photos
+ and videos they make.</p>
- <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span> <span class="inserted"><ins><em>date on all your
devices. Any edits you
+ <blockquote><p> iCloud Photo Library stores every photo and
video you
+ take, and keeps them up to date on all your devices. Any edits you
make are automatically updated everywhere. […]
</p></blockquote>
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud
feature</em></ins></span> is <span class="removed"><del><strong>to
restrict</strong></del></span>
- <span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT202033">activated
by</em></ins></span> the <span
class="removed"><del><strong>use</strong></del></span>
- <span class="inserted"><ins><em>startup</em></ins></span> of <span
class="removed"><del><strong>data on the user's computer,</strong></del></span>
<span class="inserted"><ins><em>iOS</a>. The term “cloud”
means “please
+ information</a> as accessed on 24 Sep 2015.) The iCloud feature is
+ <a href="https://support.apple.com/en-us/HT202033">activated by the
+ startup of iOS</a>. The term “cloud” means “please
don't ask where.”</p>
<p>There is a way to
<a href="https://support.apple.com/en-us/HT201104"> deactivate
- iCloud</a>,</em></ins></span> but <span
class="inserted"><ins><em>it's active by default so</em></ins></span> it <span
class="removed"><del><strong>does</strong></del></span> <span
class="inserted"><ins><em>still counts as a</em></ins></span>
- surveillance
- <span class="removed"><del><strong>too:</strong></del></span> <span
class="inserted"><ins><em>functionality.</p>
-
- <p>Unknown people apparently took advantage of this
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ iCloud</a>, but it's active by default so it still counts as a
+ surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage of this to <a
+
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
nude photos of many celebrities</a>. They needed to break Apple's
- security</em></ins></span> to get <span class="removed"><del><strong>the
user's list</strong></del></span> <span class="inserted"><ins><em>at them, but
NSA can access any</em></ins></span> of <span
class="removed"><del><strong>other people's phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>them through <a
-
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
+ security to get at them, but NSA can access any of them through <a
+
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
- <span class="inserted"><ins><em><li id="M201409220">
+ <li id="M201409220">
<!--#set var="DATE" value='<small
class="date-tag">2014-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apple can, and regularly does,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some</em></ins></span> data <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>from iPhones for</em></ins></span> the <span
class="removed"><del><strong>device</a>.
- </p>
- </li>
-
- <li>
- <p>Verizon</strong></del></span> <span
class="inserted"><ins><em>state</a>.</p>
+ <p>Apple can, and regularly does, <a
+
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for the state</a>.</p>
<p>This may have improved with <a
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">
@@ -1989,7 +1747,7 @@
<li id="M201705040">
<!--#set var="DATE" value='<small
class="date-tag">2017-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A study found 234 Android apps that track users by <a
+ <p>A study found 234 Android apps</em></ins></span> that <span
class="removed"><del><strong>90%</strong></del></span> <span
class="inserted"><ins><em>track users by <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
to ultrasound from beacons placed in stores or played by TV
programs</a>.</p>
@@ -1998,9 +1756,10 @@
<li id="M201704260">
<!--#set var="DATE" value='<small
class="date-tag">2017-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Faceapp appears to do lots of surveillance, judging by <a
+ <p>Faceapp appears to do lots</em></ins></span> of <span
class="inserted"><ins><em>surveillance, judging by <a
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data in the
device</a>.</p>
+ how much access it demands to personal data in</em></ins></span> the <span
class="removed"><del><strong>top-ranked gratis
+ proprietary</strong></del></span> <span
class="inserted"><ins><em>device</a>.</p>
</li>
<li id="M201704190">
@@ -2022,7 +1781,8 @@
<li id="M201704074">
<!--#set var="DATE" value='<small
class="date-tag">2017-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Pairs of Android apps can collude
+ <p>Pairs of</em></ins></span> Android apps <span
class="removed"><del><strong>contained recognizable tracking libraries. For
+ the paid</strong></del></span> <span class="inserted"><ins><em>can collude
to transmit users' personal data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found tens of thousands of pairs that collude</a>.</p>
@@ -2033,14 +1793,14 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
pre-install
+ announced an opt-in</em></ins></span> proprietary <span
class="removed"><del><strong>apps,</strong></del></span> <span
class="inserted"><ins><em>search app that</em></ins></span> it <span
class="removed"><del><strong>was</strong></del></span> <span
class="inserted"><ins><em>will</a> pre-install
on some of its phones. The app will give Verizon the same information
about the users' searches that Google normally gets when they use
its search engine.</p>
<p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and the user must
+ being pre-installed on</em></ins></span> only <span
class="removed"><del><strong>60%.</p></strong></del></span> <span
class="inserted"><ins><em>one phone</a>, and the user must
explicitly opt-in before the app takes effect. However, the app
remains spyware—an “optional” piece of spyware is
still spyware.</p>
@@ -2056,29 +1816,48 @@
<li id="M201611280">
<!--#set var="DATE" value='<small
class="date-tag">2016-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The Uber app tracks <a
-
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
+ --><!--#echo encoding="none" var="DATE" --></em></ins></span>
+ <p>The <span class="removed"><del><strong>article confusingly
describes gratis apps as “free”,
+ but most of them are not in fact</strong></del></span> <span
class="inserted"><ins><em>Uber app tracks</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>.
+ It also uses</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after</em></ins></span> the <span
class="removed"><del><strong>ugly word “monetize”. A good
replacement</strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
<p>This example illustrates how “getting the user's
- consent” for surveillance is inadequate as a protection against
- massive surveillance.</p>
+ consent”</em></ins></span> for <span
class="removed"><del><strong>that word</strong></del></span> <span
class="inserted"><ins><em>surveillance</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always that will fit
+ perfectly.</p></strong></del></span> <span
class="inserted"><ins><em>inadequate as a protection against
+ massive surveillance.</p></em></ins></span>
</li>
- <li id="M201611160">
+<span class="removed"><del><strong><li>
+ <p>Apps for BART</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201611160">
<!--#set var="DATE" value='<small
class="date-tag">2016-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A <a
-
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated the privacy and security of
- 283 Android VPN apps concluded that “in spite of the promises
- for privacy, security, and anonymity given by the majority of VPN
- apps—millions of users may be unawarely subject to poor security
- guarantees and abusive practices inflicted by VPN apps.”</p>
+ <p>A</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With proprietary apps, one can only hope</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a></em></ins></span> that <span
class="removed"><del><strong>they don't.</p>
+</li>
- <p>Following is a non-exhaustive list, taken from the research paper,
- of some proprietary VPN apps that track users and infringe their
+<li>
+ <p>A study found 234</strong></del></span> <span
class="inserted"><ins><em>investigated the privacy and security of
+ 283</em></ins></span> Android <span
class="inserted"><ins><em>VPN</em></ins></span> apps <span
class="inserted"><ins><em>concluded</em></ins></span> that <span
class="removed"><del><strong>track users</strong></del></span> <span
class="inserted"><ins><em>“in spite of the promises
+ for privacy, security, and anonymity given</em></ins></span> by
+ <span class="removed"><del><strong><a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
<span class="inserted"><ins><em>the majority of VPN
+ apps—millions of users may be unawarely subject</em></ins></span> to
<span class="removed"><del><strong>ultrasound from beacons placed in stores or
played</strong></del></span> <span class="inserted"><ins><em>poor security
+ guarantees and abusive practices inflicted</em></ins></span> by <span
class="removed"><del><strong>TV programs</a>.
+ </p>
+
+</li>
+
+<li>
+ <p>Pairs</strong></del></span> <span class="inserted"><ins><em>VPN
apps.”</p>
+
+ <p>Following is a non-exhaustive list, taken from the research
paper,</em></ins></span>
+ of <span class="removed"><del><strong>Android</strong></del></span> <span
class="inserted"><ins><em>some proprietary VPN</em></ins></span> apps <span
class="removed"><del><strong>can collude</strong></del></span> <span
class="inserted"><ins><em>that track users and infringe their
privacy:</p>
<dl class="compact">
@@ -2088,11 +1867,13 @@
<dt>sFly Network Booster</dt>
<dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning it has full access to users'
- text messages.</dd>
+ permissions upon installation, meaning it has full
access</em></ins></span> to <span
class="removed"><del><strong>transmit</strong></del></span> users' <span
class="removed"><del><strong>personal
+ data</strong></del></span>
+ <span class="inserted"><ins><em>text messages.</dd>
<dt>DroidVPN and TigerVPN</dt>
- <dd>Requests the <code>READ_LOGS</code> permission to
read logs
+ <dd>Requests the <code>READ_LOGS</code>
permission</em></ins></span> to <span class="removed"><del><strong>servers.
<a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens</strong></del></span> <span class="inserted"><ins><em>read logs
for other apps and also core system logs. TigerVPN developers have
confirmed this.</dd>
@@ -2102,19 +1883,22 @@
<dt>VPN Services HotspotShield</dt>
<dd>Injects JavaScript code into the HTML pages returned to the
- users. The stated purpose of the JS injection is to display ads. Uses
+ users. The stated purpose</em></ins></span> of <span
class="removed"><del><strong>thousands</strong></del></span> <span
class="inserted"><ins><em>the JS injection is to display ads. Uses
roughly five tracking libraries. Also, it redirects the user's
traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
<dd>Injects JavaScript code into HTML pages, and also uses roughly
- five tracking libraries. Developers of this app have confirmed that
- the non-premium version of the app does JavaScript injection for
+ five tracking libraries. Developers</em></ins></span> of <span
class="removed"><del><strong>pairs</strong></del></span> <span
class="inserted"><ins><em>this app have confirmed</em></ins></span> that <span
class="removed"><del><strong>collude</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>the non-premium version of the app does
JavaScript injection for
tracking the user and displaying ads.</dd>
- </dl>
+ </dl></em></ins></span>
</li>
- <li id="M201609210">
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609210">
<!--#set var="DATE" value='<small
class="date-tag">2016-09</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Google's new voice messaging app <a
@@ -2125,19 +1909,41 @@
<li id="M201606050">
<!--#set var="DATE" value='<small
class="date-tag">2016-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Facebook's new Magic Photo app <a
-
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+ <p>Facebook's new Magic Photo</em></ins></span> app <span
class="removed"><del><strong>developers</strong></del></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+the personal details of users that install the app</a>.</p>
+
+<p>Merely asking</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections for known faces</a>,
- and suggests you circulate the picture you take according to who is
- in the frame.</p>
+ and suggests you circulate</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>picture you take
according to who</em></ins></span> is <span class="removed"><del><strong>not
enough</strong></del></span>
+ <span class="inserted"><ins><em>in the frame.</p>
- <p>This spyware feature seems to require online access to some
- known-faces database, which means the pictures are likely to be
- sent across the wire to Facebook's servers and face-recognition
+ <p>This spyware feature seems</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>require
online access to some
+ known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>“Terms and Conditions” that spell out
+what they</strong></del></span> <span
class="inserted"><ins><em>pictures</em></ins></span> are <span
class="removed"><del><strong>“consenting” to. Google should clearly
+and honestly identify</strong></del></span> <span
class="inserted"><ins><em>likely to be
+ sent across</em></ins></span> the <span
class="removed"><del><strong>information it collects on users, instead
+of hiding it in an obscurely worded EULA.</p>
+
+<p>However,</strong></del></span> <span
class="inserted"><ins><em>wire</em></ins></span> to <span
class="removed"><del><strong>truly protect people's privacy, we must prevent
Google</strong></del></span> <span class="inserted"><ins><em>Facebook's
servers</em></ins></span> and <span class="removed"><del><strong>other
companies from getting this personal information in the first
+place!</p>
+</li>
+
+ <li>
+ <p>Google Play (a component</strong></del></span> <span
class="inserted"><ins><em>face-recognition
algorithms.</p>
- <p>If so, none of Facebook users' pictures are private anymore,
- even if the user didn't “upload” them to the service.</p>
+ <p>If so, none</em></ins></span> of <span
class="removed"><del><strong>Android) <a
+
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks the</strong></del></span> <span
class="inserted"><ins><em>Facebook</em></ins></span> users' <span
class="removed"><del><strong>movements without their
permission</a>.</p>
+
+ <p>Even</strong></del></span> <span
class="inserted"><ins><em>pictures are private anymore,
+ even</em></ins></span> if <span class="removed"><del><strong>you disable
Google Maps and location tracking, you must
+ disable Google Play itself to completely stop</strong></del></span> the
<span class="removed"><del><strong>tracking. This is
+ yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>user didn't “upload”
them</em></ins></span> to <span
class="removed"><del><strong>obey</strong></del></span> the <span
class="removed"><del><strong>user,
+ when it's actually doing something else. Such a thing
would</strong></del></span> <span class="inserted"><ins><em>service.</p>
</li>
<li id="M201605310">
@@ -2146,33 +1952,39 @@
<p>Facebook's app listens all the time, <a
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html">to
snoop on what people are listening to or watching</a>. In addition,
- it may be analyzing people's conversations to serve them with targeted
- advertisements.</p>
+ it may</em></ins></span> be <span class="removed"><del><strong>almost
+ unthinkable</strong></del></span> <span
class="inserted"><ins><em>analyzing people's conversations to serve
them</em></ins></span> with <span class="removed"><del><strong>free
software.</p></strong></del></span> <span
class="inserted"><ins><em>targeted
+ advertisements.</p></em></ins></span>
</li>
- <li id="M201604250">
+ <span class="removed"><del><strong><li><p>More than
73%</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201604250">
<!--#set var="DATE" value='<small
class="date-tag">2016-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>A pregnancy test controller application not only can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts of data in the phone, and in server accounts,
+ spy on many sorts</em></ins></span> of <span
class="inserted"><ins><em>data in</em></ins></span> the <span
class="removed"><del><strong>most popular Android apps</strong></del></span>
<span class="inserted"><ins><em>phone, and in server accounts,
it can alter them too</a>.</p>
</li>
<li id="M201601130">
<!--#set var="DATE" value='<small
class="date-tag">2016-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apps that include <a
-
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also on what users post on various sites
- such as Facebook, Google+ and Twitter.</p>
+ <p>Apps that include</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio</em></ins></span> and
<span class="removed"><del><strong>location information</a> of
their</strong></del></span> <span class="inserted"><ins><em>TV programs
+ are playing nearby</a>. Also on what</em></ins></span> users <span
class="removed"><del><strong>with third
parties.</p></strong></del></span> <span class="inserted"><ins><em>post
on various sites
+ such as Facebook, Google+ and Twitter.</p></em></ins></span>
</li>
- <li id="M201511190">
+ <span
class="removed"><del><strong><li><p>“Cryptic</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511190">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>“Cryptic communication,”
+ <p>“Cryptic</em></ins></span> communication,”
unrelated to the app's functionality, was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
found in the 500 most popular gratis Android apps</a>.</p>
@@ -2186,41 +1998,55 @@
analyze what users are doing or how. “Analytics” tools
that snoop are just as wrong as any other snooping.</p>
</li>
+ <span
class="removed"><del><strong><li><p>Gratis</strong></del></span>
- <li id="M201510300">
+ <span class="inserted"><ins><em><li id="M201510300">
<!--#set var="DATE" value='<small
class="date-tag">2015-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>More than 73% and 47% of mobile applications, for Android and iOS
- respectively <a href="https://techscience.org/a/2015103001/">hand
over
- personal, behavioral and location information</a> of their users to
- third parties.</p>
+ <p>More than 73% and 47% of mobile applications,
for</em></ins></span> Android <span class="removed"><del><strong>apps (but not
<a href="/philosophy/free-sw.html">free software</a>)
+ connect to 100</strong></del></span> <span class="inserted"><ins><em>and
iOS
+ respectively</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">hand
over
+ personal, behavioral</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
+ on the average.</p></strong></del></span> <span
class="inserted"><ins><em>location information</a> of their users to
+ third parties.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
- <li id="M201508210">
+ <span class="inserted"><ins><em><li id="M201508210">
<!--#set var="DATE" value='<small
class="date-tag">2015-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Like most “music screaming” disservices, Spotify is
- based on proprietary malware (DRM and snooping). In August 2015 it <a
+ <p>Like most “music screaming” disservices,
Spotify</em></ins></span> is <span class="removed"><del><strong>present
in</strong></del></span>
+ <span class="inserted"><ins><em>based on proprietary malware (DRM and
snooping). In August 2015 it <a
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some are
starting
- to realize that it is nasty.</p>
+ demanded users submit to increased snooping</a>,
and</em></ins></span> some <span class="removed"><del><strong>Android devices
when they</strong></del></span> are <span class="removed"><del><strong>sold.
+ Some Motorola phones modify Android</strong></del></span> <span
class="inserted"><ins><em>starting</em></ins></span>
+ to <span class="inserted"><ins><em>realize that it is nasty.</p>
+
+ <p>This article shows the</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as a way</em></ins></span> to
<span class="removed"><del><strong>Motorola</a>.</p>
+ </li>
- <p>This article shows the <a
-
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way to “serve”
- users better</a>—never mind whether they want that. This is a
- typical example of the attitude of the proprietary software industry
+ <li><p>Some manufacturers add</strong></del></span> <span
class="inserted"><ins><em>“serve”
+ users better</a>—never mind whether they want that. This
is</em></ins></span> a
+ <span class="removed"><del><strong><a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p></strong></del></span>
+ <span class="inserted"><ins><em>typical example of the attitude of the
proprietary software industry
towards those they have subjugated.</p>
- <p>Out, out, damned Spotify!</p>
+ <p>Out, out, damned Spotify!</p></em></ins></span>
</li>
- <li id="M201506264">
+ <span class="removed"><del><strong><li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access to any file
on</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201506264">
<!--#set var="DATE" value='<small
class="date-tag">2015-06</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf">
- A study in 2015</a> found that 90% of the top-ranked gratis
proprietary
+ A study in 2015</a> found that 90% of</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>top-ranked gratis proprietary
Android apps contained recognizable tracking libraries. For the paid
proprietary apps, it was only 60%.</p>
@@ -2228,29 +2054,88 @@
“free”, but most of them are not in fact <a
href="/philosophy/free-sw.html">free software</a>. It also uses
the
ugly word “monetize”. A good replacement for that word
- is “exploit”; nearly always that will fit perfectly.</p>
+ is “exploit”; nearly always that will fit
perfectly.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
- <li id="M201505060">
+<!-- #SpywareOnMobiles</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505060">
<!--#set var="DATE" value='<small
class="date-tag">2015-05</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Gratis Android apps (but not <a
- href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>Gratis Android apps (but not <a
+ href="/philosophy/free-sw.html">free software</a>)
connect</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>100 <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
- and advertising</a> URLs, on the average.</p>
+ and advertising</a> URLs,</em></ins></span> on <span
class="removed"><del><strong>top under each subsection</strong></del></span>
<span class="inserted"><ins><em>the average.</p>
</li>
<li id="M201504060">
<!--#set var="DATE" value='<small
class="date-tag">2015-04</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Widely used <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware</strong></del></span>
+ <span class="inserted"><ins><em><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This is in addition to
- the snooping done by the phone company, and perhaps by the OS in
- the phone.</p>
+ QR-code scanner apps snoop</em></ins></span> on <span
class="removed"><del><strong>Mobiles</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareIniThings">Spyware</strong></del></span> <span
class="inserted"><ins><em>the user</a>. This is</em></ins></span> in
<span class="removed"><del><strong>iThings</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+</div>
+
+<ul>
+ <li><p>Apple proposes
+ <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way to use it without having your
fingerprints
+ taken. Users would have no way</strong></del></span> <span
class="inserted"><ins><em>addition</em></ins></span> to <span
class="removed"><del><strong>tell whether</strong></del></span>
+ the <span class="removed"><del><strong>phone is</strong></del></span>
snooping <span class="removed"><del><strong>on
+ them.</p></li>
+
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots of personal data to Apple's servers</a>. Big Brother can
+ get them from there.</p>
+ </li>
+
+ <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every</strong></del></span> <span
class="inserted"><ins><em>done by the</em></ins></span> phone <span
class="removed"><del><strong>number that</strong></del></span> <span
class="inserted"><ins><em>company, and perhaps by</em></ins></span> the <span
class="removed"><del><strong>user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>OS
in</em></ins></span>
+ the <span class="removed"><del><strong>server records these numbers for at
least 30
+ days.</p>
+ </li>
+
+ <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
+ without giving a valid email address and receiving</strong></del></span>
<span class="inserted"><ins><em>phone.</p>
+
+ <p>Don't be distracted by</em></ins></span> the <span
class="removed"><del><strong>code Apple
+ sends to it.</p>
+ </li>
+
+ <li><p>Around 47%</strong></del></span> <span
class="inserted"><ins><em>question</em></ins></span> of <span
class="inserted"><ins><em>whether</em></ins></span> the <span
class="removed"><del><strong>most popular iOS apps
+ <a class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a> of
their</strong></del></span> <span class="inserted"><ins><em>app developers
+ get</em></ins></span> users <span class="removed"><del><strong>with third
parties.</p>
+ </li>
+
+ <li><p>iThings automatically upload to Apple's servers all the
photos and
+ videos they make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you take,
+ and keeps them up</strong></del></span> to <span
class="removed"><del><strong>date on all your devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
- <p>Don't be distracted by the question of whether the app developers
- get users to say “I agree”. That is no excuse for
+ <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ information</a> as accessed on 24 Sep 2015.) The iCloud
feature</strong></del></span> <span class="inserted"><ins><em>say “I
agree”. That</em></ins></span> is
+ <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span> <span class="inserted"><ins><em>no excuse for
malware.</p>
</li>
@@ -2258,70 +2143,116 @@
<!--#set var="DATE" value='<small
class="date-tag">2014-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many proprietary apps for mobile devices
- report which other apps the user has installed. <a
- href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible and optional</a>. Not
- as bad as what the others do.</p>
+ report which other apps</em></ins></span> the
+ <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
+ “please don't ask where.”</p>
+
+ <p>There</strong></del></span> <span class="inserted"><ins><em>user
has installed. <a
+
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</em></ins></span>
+ is <span class="inserted"><ins><em>doing this in</em></ins></span> a way
<span class="removed"><del><strong>to <a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default so it still
counts</strong></del></span> <span class="inserted"><ins><em>that at least is
visible and optional</a>. Not
+ as bad</em></ins></span> as <span class="inserted"><ins><em>what the
others do.</p>
</li>
<li id="M201401150.1">
<!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Simeji keyboard is a smartphone version of Baidu's <a
- href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
+ <p>The Simeji keyboard is</em></ins></span> a
+ <span class="removed"><del><strong>surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>smartphone version</em></ins></span> of <span
class="removed"><del><strong>this to</strong></del></span> <span
class="inserted"><ins><em>Baidu's</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
title="Input Method Editor">IME</abbr></a>.</p>
</li>
<li id="M201312270">
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The nonfree Snapchat app's principal purpose is to restrict the
- use of data on the user's computer, but it does surveillance too: <a
-
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the user's list of other people's phone
- numbers</a>.</p>
+ <p>The nonfree Snapchat app's principal purpose is</em></ins></span>
to <span class="removed"><del><strong>get at them, but NSA can access
any</strong></del></span> <span class="inserted"><ins><em>restrict the
+ use</em></ins></span> of <span class="removed"><del><strong>them through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p>Spyware in iThings:</strong></del></span> <span
class="inserted"><ins><em>data on</em></ins></span> the <span
class="inserted"><ins><em>user's computer, but it does surveillance
too:</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly where the iThing is,
+ and</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to</em></ins></span> get <span class="inserted"><ins><em>the
user's list of</em></ins></span> other <span class="removed"><del><strong>info
too.</p></strong></del></span> <span class="inserted"><ins><em>people's
phone
+ numbers</a>.</p></em></ins></span>
</li>
- <li id="M201312060">
+ <span class="removed"><del><strong><li><p>There is also a
feature for web sites to track users, which is</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312060">
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Brightest Flashlight app</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search</strong></del></span>
+ <p>The Brightest Flashlight app</em></ins></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies</a>.</p>
+ sends user data, including geolocation, for use</em></ins></span> by <span
class="removed"><del><strong>default</a>. (That article talks about iOS
6, but</strong></del></span> <span
class="inserted"><ins><em>companies</a>.</p>
+
+ <p>The FTC criticized this app because</em></ins></span> it
+ <span class="removed"><del><strong>is still true in iOS 7.)</p>
+ </li>
+
+ <li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default, though that can be
+ turned off.</p>
+ </li>
+
+ <li><p>Apple can, and regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for the
state</a>.</p>
+ </li>
+
+ <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps the NSA snoop on all</strong></del></span> <span
class="inserted"><ins><em>asked</em></ins></span> the <span
class="inserted"><ins><em>user to
+ approve sending personal</em></ins></span> data <span
class="removed"><del><strong>in an iThing,
+ or</strong></del></span> <span class="inserted"><ins><em>to the app
developer but did not ask
+ about sending</em></ins></span> it <span class="removed"><del><strong>is
totally incompetent.</a></p>
+ </li>
- <p>The FTC criticized this app because it asked the user to
- approve sending personal data to the app developer but did not ask
- about sending it to other companies. This shows the weakness of
- the reject-it-if-you-dislike-snooping “solution” to
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem</strong></del></span> to
<span class="removed"><del><strong>exist for no
+ possible purpose</strong></del></span> other <span
class="removed"><del><strong>than surveillance</a>. Here
is</strong></del></span> <span class="inserted"><ins><em>companies. This shows
the weakness of</em></ins></span>
+ the <span class="inserted"><ins><em>reject-it-if-you-dislike-snooping
“solution” to
surveillance: why should a flashlight app send any information to
- anyone? A free software flashlight</em></ins></span> app <span
class="inserted"><ins><em>would not.</p>
+ anyone? A free software flashlight app would not.</p>
</li>
<li id="M201212100">
<!--#set var="DATE" value='<small
class="date-tag">2012-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>FTC says most mobile apps for children don't respect privacy:
<a
-
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ <p>FTC says most mobile apps for children don't respect
privacy:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInSkype">Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware in
Telephones</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInSkype">Skype</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInSkype">#SpywareInSkype</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>According</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201908151">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Skype refuses to say whether it can <a
-
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
+ <p>Skype refuses</em></ins></span> to <span
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>say whether it can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
on calls</a>.</p>
- <p>That almost certainly means it can do so.</p>
+ <p>That almost certainly means it</em></ins></span> can <span
class="removed"><del><strong>take over
smartphones</a></strong></del></span> <span class="inserted"><ins><em>do
so.</p>
</li>
<li id="M201307110">
@@ -2346,26 +2277,26 @@
<!--#set var="DATE" value='<small
class="date-tag">2020-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Microsoft is imposing its
- surveillance on the game of Minecraft by <a
+ surveillance on the game of Minecraft</em></ins></span> by <span
class="removed"><del><strong>sending hidden text messages</strong></del></span>
<span class="inserted"><ins><em><a
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
every player to open an account on Microsoft's network</a>. Microsoft
- has bought the game and will merge all accounts into its network,
- which will give them access to people's data.</p>
+ has bought the game and will merge all accounts into its
network,</em></ins></span>
+ which <span class="removed"><del><strong>enable</strong></del></span>
<span class="inserted"><ins><em>will give</em></ins></span> them <span
class="inserted"><ins><em>access</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>people's data.</p>
<p>Minecraft players <a
href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
- instead. The essential advantage of Minetest is</em></ins></span> that it
<span class="removed"><del><strong>will</a>
- pre-install</strong></del></span> <span class="inserted"><ins><em>is
free
- software, meaning it respects the user's computer freedom. As a bonus,
+ instead. The essential advantage of Minetest is that it is free
+ software, meaning it respects</em></ins></span> the <span
class="removed"><del><strong>phones
+ on</strong></del></span> <span class="inserted"><ins><em>user's computer
freedom. As a bonus,
it offers more options.</p>
</li>
<li id="M201908210">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft recorded users of Xboxes and had <a
+ <p>Microsoft recorded users of Xboxes</em></ins></span> and <span
class="removed"><del><strong>off,</strong></del></span> <span
class="inserted"><ins><em>had <a
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
- human workers listen to the recordings</a>.</p>
+ human workers</em></ins></span> listen to the <span
class="removed"><del><strong>microphone, retrieve
geo-location</strong></del></span> <span
class="inserted"><ins><em>recordings</a>.</p>
<p>Morally, we see no difference between having human workers listen
and
having speech-recognition systems listen. Both intrude on
privacy.</p>
@@ -2377,7 +2308,9 @@
<p>Red Shell is a spyware that
is found in many proprietary games. It <a
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data on users' computers and sends it to third
parties</a>.</p>
+ tracks</em></ins></span> data <span class="removed"><del><strong>from the
+ GPS, take photographs, read text messages, read call,
location</strong></del></span> <span class="inserted"><ins><em>on users'
computers</em></ins></span> and <span class="removed"><del><strong>web
+ browsing history,</strong></del></span> <span
class="inserted"><ins><em>sends it to third parties</a>.</p>
</li>
<li id="M201804144">
@@ -2387,15 +2320,15 @@
program along with an update to the massive
multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
- to snoop on all open processes running</em></ins></span> on <span
class="removed"><del><strong>some of</strong></del></span> its <span
class="removed"><del><strong>phones. The app will give Verizon the
same</strong></del></span> <span class="inserted"><ins><em>user's
computer</a>.</p>
+ to snoop on all open processes running on its user's
computer</a>.</p>
</li>
<li id="M201711070">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The driver for a certain gaming keyboard <a
-
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends</em></ins></span>
- information <span class="removed"><del><strong>about</strong></del></span>
<span class="inserted"><ins><em>to China</a>.</p>
+
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
+ information to China</a>.</p>
</li>
<li id="M201512290">
@@ -2403,68 +2336,73 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Many <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and report to</em></ins></span>
the
+ video game consoles snoop on their users</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>report to</em></ins></span> the <span
class="removed"><del><strong>contact list. This malware</strong></del></span>
<span class="inserted"><ins><em>internet</a>—even what their
users weigh.</p>
- <p>A game console is a computer, and you can't trust a computer with
- a nonfree operating system.</p>
+ <p>A game console</em></ins></span> is <span
class="removed"><del><strong>designed to
+ disguise itself from investigation.</p>
+ </li>
+
+ <li><p>Samsung phones come</strong></del></span> <span
class="inserted"><ins><em>a computer, and you can't trust a
computer</em></ins></span> with
+ <span class="inserted"><ins><em>a nonfree operating system.</p>
</li>
<li id="M201509160">
<!--#set var="DATE" value='<small
class="date-tag">2015-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Modern gratis game cr…apps <a
-
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data about their users and their</em></ins></span>
users' <span class="removed"><del><strong>searches that Google normally gets
when</strong></del></span>
- <span class="inserted"><ins><em>friends and associates</a>.</p>
+ <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of data about their</em></ins></span> users <span
class="removed"><del><strong>can't delete</a>,</strong></del></span> and
<span class="inserted"><ins><em>their users'
+ friends and associates</a>.</p>
- <p>Even nastier,</em></ins></span> they <span
class="inserted"><ins><em>do it through ad networks that merge the data
+ <p>Even nastier,</em></ins></span> they <span
class="removed"><del><strong>send so much data</strong></del></span> <span
class="inserted"><ins><em>do it through ad networks</em></ins></span> that
<span class="removed"><del><strong>their transmission is</strong></del></span>
<span class="inserted"><ins><em>merge the data
collected by various cr…apps and sites made by different
companies.</p>
- <p>They</em></ins></span> use <span class="removed"><del><strong>its
search engine.</p>
+ <p>They use this data to manipulate people to buy things, and hunt
for
+ “whales” who can be led to spend</em></ins></span> a
+ <span class="removed"><del><strong>substantial
expense</strong></del></span> <span class="inserted"><ins><em>lot of money.
They also
+ use a back door to manipulate the game play</em></ins></span> for <span
class="removed"><del><strong>users. Said transmission, not wanted or
+ requested by</strong></del></span> <span
class="inserted"><ins><em>specific players.</p>
- <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>this data to manipulate people to buy things, and
hunt for
- “whales” who can be led to spend a lot of money. They also
- use a back door to manipulate</em></ins></span> the <span
class="removed"><del><strong>app is</strong></del></span> <span
class="inserted"><ins><em>game play for specific players.</p>
+ <p>While</em></ins></span> the <span
class="removed"><del><strong>user, clearly must constitute spying of some
+ kind.</p></li>
- <p>While the article describes gratis games, games that cost money
+ <li><p>A Motorola phone</strong></del></span> <span
class="inserted"><ins><em>article describes gratis games, games that cost money
can use the same tactics.</p>
</li>
<li id="M201401280">
<!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Angry Birds</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>,</strong></del></span>
+ <p>Angry Birds</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</em></ins></span> and the
- <span class="removed"><del><strong>user must explicitly opt-in before the
app</strong></del></span> <span class="inserted"><ins><em>NSA</em></ins></span>
takes <span class="removed"><del><strong>effect. However, the
- app remains spyware—an “optional” piece
of</strong></del></span> <span class="inserted"><ins><em>advantage
+ spies</em></ins></span> for <span class="removed"><del><strong>voice
all</strong></del></span> <span class="inserted"><ins><em>companies,
and</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>NSA takes advantage
to spy through it too</a>. Here's information on <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more</em></ins></span> spyware <span
class="inserted"><ins><em>apps</a>.</p>
+ more spyware apps</a>.</p>
<p><a
href="https://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
+ More about NSA app spying</a>.</p></em></ins></span>
</li>
- <li id="M200510200">
+ <span class="removed"><del><strong><li><p>Spyware in Android
phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us by</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M200510200">
<!--#set var="DATE" value='<small
class="date-tag">2005-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Blizzard Warden</em></ins></span> is
- <span class="removed"><del><strong>still
spyware.</p></strong></del></span> <span class="inserted"><ins><em>a
hidden
- “cheating-prevention” program that <a
- href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
+ <p>Blizzard Warden is</em></ins></span> a <span
class="removed"><del><strong>paywall)
+ reports</strong></del></span> <span class="inserted"><ins><em>hidden
+ “cheating-prevention” program</em></ins></span> that <a
<span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
spies on every process running on a gamer's computer and sniffs a
good deal of personal data</a>, including lots of activities which
- have nothing to do with cheating.</p></em></ins></span>
+ have nothing to do with cheating.</p>
</li>
-
- <span class="removed"><del><strong><li><p>The Meitu photo-editing
- app</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
@@ -2478,60 +2416,61 @@
<li id="M202101050">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Most Internet connected devices in Mozilla's</em></ins></span>
<a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to a Chinese company</a>.</p></li>
-
- <li><p>A pregnancy test controller application not only
- can</strong></del></span>
- <span
class="inserted"><ins><em>href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
- Not Included”</a> list</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
- <span
class="inserted"><ins><em>href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
- designed to snoop</em></ins></span> on <span
class="removed"><del><strong>many sorts</strong></del></span> <span
class="inserted"><ins><em>users</a> even if they meet
+ <p>Most Internet connected devices in Mozilla's <a
+
href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
+ Not Included”</a> list <a
+
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
+ designed to snoop on users</a> even if they meet
Mozilla's “Minimum Security Standards.” Insecure
- design</em></ins></span> of <span class="removed"><del><strong>data
in</strong></del></span> the <span
class="removed"><del><strong>phone,</strong></del></span> <span
class="inserted"><ins><em>program running on some of these devices <a
-
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes
- the user susceptible to be snooped</em></ins></span> and <span
class="inserted"><ins><em>exploited by crackers as
+ design of</em></ins></span> the <span class="removed"><del><strong>FBI can
remotely activate</strong></del></span> <span class="inserted"><ins><em>program
running on some of these devices <a
+
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes</em></ins></span>
+ the <span class="removed"><del><strong>GPS</strong></del></span> <span
class="inserted"><ins><em>user susceptible to be snooped</em></ins></span> and
<span class="removed"><del><strong>microphone</strong></del></span> <span
class="inserted"><ins><em>exploited by crackers as
well</a>.</p>
</li>
<li id="M201708280">
<!--#set var="DATE" value='<small
class="date-tag">2017-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The bad security</em></ins></span> in <span
class="removed"><del><strong>server accounts, it can
- alter them too</a>.
- </p></li>
+ <p>The bad security</em></ins></span> in <span
class="removed"><del><strong>Android
+ phones and laptops</a>.
+ (I suspect this means Windows laptops.) Here is</strong></del></span>
<span class="inserted"><ins><em>many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ </li>
- <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after</strong></del></span>
+ <li><p>Portable phones with GPS will send their GPS
location</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
-
- <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>people
that use them</a>.</p>
-
- <p>Don't be a sucker—reject all</em></ins></span> the <span
class="removed"><del><strong>user's consent”
- for surveillance</strong></del></span> <span
class="inserted"><ins><em>stings.</p>
+ to snoop</em></ins></span> on
+ <span class="removed"><del><strong>remote command and users cannot stop
them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require</strong></del></span> <span
class="inserted"><ins><em>the people that use them</a>.</p>
- <p><small>(It</em></ins></span> is <span
class="removed"><del><strong>inadequate as a protection against massive
- surveillance.</p>
+ <p>Don't be a sucker—reject</em></ins></span> all <span
class="removed"><del><strong>new portable phones
+ to have GPS.)</p>
</li>
- <li><p>Google's new voice messaging app</strong></del></span>
<span class="inserted"><ins><em>unfortunate that the article uses the
term</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></strong></del></span>
+ <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span> <span class="inserted"><ins><em>the
stings.</p>
+
+ <p><small>(It</em></ins></span> is <span
class="removed"><del><strong>to restrict</strong></del></span> <span
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span
class="removed"><del><strong>use of data on</strong></del></span> <span
class="inserted"><ins><em>article uses</em></ins></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
+ too:</strong></del></span> <span
class="inserted"><ins><em>term</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get the user's list of other people's phone
+ numbers.</a></p></strong></del></span>
<span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p></em></ins></span>
</li>
-
- <span
class="removed"><del><strong><li><p>Apps</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInTVSets">TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInTVSets">TV
Sets</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></em></ins></span>
</div>
-<p>Emo Phillips made a joke: The other day a woman came up to me and
+<span class="removed"><del><strong><ul>
+ <li>
+ <p>Faceapp</strong></del></span>
+
+<span class="inserted"><ins><em><p>Emo Phillips made a joke: The other
day a woman came up to me and
said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.”
Evidently</em></ins></span> that <span class="inserted"><ins><em>was
+don't know. You can't see out the other way.” Evidently that was
before Amazon “smart” TVs.</p>
<ul class="blurbs">
@@ -2539,83 +2478,90 @@
<!--#set var="DATE" value='<small
class="date-tag">2020-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>TV manufacturers are turning to produce only
- “Smart” TV sets (which</em></ins></span> include <span
class="inserted"><ins><em>spyware) that</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="https://frame.work/blog/in-defense-of-dumb-tvs">it's
now very
- hard to find a TV that doesn't spy</em></ins></span> on <span
class="removed"><del><strong>what radio and</strong></del></span> <span
class="inserted"><ins><em>you</a>.</p>
+ “Smart” TV sets (which include spyware) that <a
+ href="https://frame.work/blog/in-defense-of-dumb-tvs">it's now very
+ hard to find a TV that doesn't spy on you</a>.</p>
- <p>It appears that those manufacturers business model is not to
produce</em></ins></span>
- TV <span class="removed"><del><strong>programs</strong></del></span> <span
class="inserted"><ins><em>and sell them for money, but to collect your personal
data and
+ <p>It</em></ins></span> appears <span class="inserted"><ins><em>that
those manufacturers business model is not to produce
+ TV and sell them for money, but to collect your personal data and
(possibly) hand over them to others for benefit.</p>
</li>
<li id="M202006250">
<!--#set var="DATE" value='<small
class="date-tag">2020-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>TV manufacturers</em></ins></span> are <span
class="removed"><del><strong>playing nearby</a>. Also
on</strong></del></span> <span class="inserted"><ins><em>able to <a
-
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
- every second of</em></ins></span> what <span
class="removed"><del><strong>users post on various sites
- such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>the user is watching</a>. This is illegal
due to
- the Video Privacy Protection Act of 1988, but they're circumventing
+ <p>TV manufacturers are able</em></ins></span> to <span
class="removed"><del><strong>do lots of surveillance, judging
by</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
+ every second of what the user is watching</a>. This is illegal
due</em></ins></span> to <span class="removed"><del><strong>personal data
in</strong></del></span>
+ the <span class="removed"><del><strong>device</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>Video Privacy Protection Act of 1988, but they're
circumventing
it through EULAs.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>Verizon</strong></del></span>
<span class="inserted"><ins><em><li id="M201901070">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio TVs</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections</strong></del></span>
+ <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that it will</a>
+ pre-install on some of its phones. The app will give
Verizon</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever the TV sees,”</a> in the own words of
the company's
- CTO, and this data is sold to third parties. This is in
return</em></ins></span> for <span class="removed"><del><strong>known
faces</a>,</strong></del></span>
- <span class="inserted"><ins><em>“better service” (meaning more
intrusive ads?)</em></ins></span> and <span
class="removed"><del><strong>suggests you</strong></del></span> <span
class="inserted"><ins><em>slightly
+ collect “whatever</em></ins></span> the <span
class="removed"><del><strong>same
+ information about</strong></del></span> <span class="inserted"><ins><em>TV
sees,”</a> in</em></ins></span> the <span
class="removed"><del><strong>users' searches that Google normally gets when
+ they use its search engine.</p>
+
+ <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>own words of</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>company's
+ CTO, and this data</em></ins></span> is <span
class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>sold to third parties. This is in return for
+ “better service” (meaning more intrusive
ads?)</em></ins></span> and <span class="removed"><del><strong>the
+ user must explicitly</strong></del></span> <span
class="inserted"><ins><em>slightly
lower retail prices.</p>
- <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>share the picture you take</strong></del></span>
<span class="inserted"><ins><em>make this spying acceptable,</em></ins></span>
according to <span class="removed"><del><strong>who</strong></del></span> <span
class="inserted"><ins><em>him,</em></ins></span>
- is <span class="inserted"><ins><em>that it is opt-in</em></ins></span> in
<span class="inserted"><ins><em>newer models. But since</em></ins></span> the
<span class="removed"><del><strong>frame.</p>
-
- <p>This spyware feature seems</strong></del></span> <span
class="inserted"><ins><em>Vizio software is
- nonfree, we don't know what is actually happening behind the scenes,
+ <p>What is supposed to make this spying acceptable, according to him,
+ is that it is</em></ins></span> opt-in <span
class="removed"><del><strong>before</strong></del></span> <span
class="inserted"><ins><em>in newer models. But since</em></ins></span> the
<span class="removed"><del><strong>app takes effect.
However,</strong></del></span> <span class="inserted"><ins><em>Vizio software is
+ nonfree, we don't know what is actually happening behind</em></ins></span>
the
+ <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware</strong></del></span> <span
class="inserted"><ins><em>scenes,
and there is no guarantee that all future updates will leave the
settings unchanged.</p>
<p>If you already own a Vizio “smart” TV (or any
“smart” TV, for that
- matter), the easiest way</em></ins></span> to <span
class="removed"><del><strong>require online access</strong></del></span> <span
class="inserted"><ins><em>make sure it isn't spying on you is</em></ins></span>
- to <span class="removed"><del><strong>some
- known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>disconnect it from</em></ins></span> the <span
class="removed"><del><strong>pictures</strong></del></span> <span
class="inserted"><ins><em>Internet, and use a terrestrial antenna
- instead. Unfortunately, this is not always possible. Another option,
- if you</em></ins></span> are <span
class="removed"><del><strong>likely</strong></del></span> <span
class="inserted"><ins><em>technically oriented, is</em></ins></span> to <span
class="inserted"><ins><em>get your own router (which can</em></ins></span>
- be
- <span class="removed"><del><strong>sent across the wire to Facebook's
servers</strong></del></span> <span class="inserted"><ins><em>an old computer
running completely free software),</em></ins></span> and <span
class="removed"><del><strong>face-recognition
- algorithms.</p>
-
- <p>If so, none of Facebook users' pictures are private
- anymore, even if the user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>set up a
- firewall</em></ins></span> to <span class="removed"><del><strong>the
service.</p></strong></del></span> <span class="inserted"><ins><em>block
connections to Vizio's servers. Or, as a last resort,
- you can replace your TV with another model.</p></em></ins></span>
+ matter), the easiest way to make sure it isn't spying on
you</em></ins></span> is
+ <span class="removed"><del><strong>still spyware.</p>
</li>
- <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
- is based on proprietary malware (DRM and snooping). In August
- 2015 it</strong></del></span>
+ <li><p>The Meitu photo-editing
+ app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data</strong></del></span>
+ to <span class="inserted"><ins><em>disconnect it from the Internet, and
use</em></ins></span> a <span class="removed"><del><strong>Chinese
company</a>.</p></li>
- <span class="inserted"><ins><em><li id="M201804010">
+ <li><p>A pregnancy test controller
application</strong></del></span> <span class="inserted"><ins><em>terrestrial
antenna
+ instead. Unfortunately, this is</em></ins></span> not <span
class="removed"><del><strong>only</strong></del></span> <span
class="inserted"><ins><em>always possible. Another option,
+ if you are technically oriented, is to get your own router (which can
+ be an old computer running completely free software), and set up a
+ firewall to block connections to Vizio's servers. Or, as a last resort,
+ you</em></ins></span> can <span class="inserted"><ins><em>replace your TV
with another model.</p>
+ </li>
+
+ <li id="M201804010">
<!--#set var="DATE" value='<small
class="date-tag">2018-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some “Smart” TVs automatically</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</strong></del></span>
+ <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts of data in</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
- <p>We link</em></ins></span> to <span
class="removed"><del><strong>increased snooping</a>, and some
- are starting</strong></del></span> <span class="inserted"><ins><em>the
article for the facts it presents. It
+ <p>We link to</em></ins></span> the <span
class="removed"><del><strong>phone, and in server
accounts,</strong></del></span> <span class="inserted"><ins><em>article for the
facts</em></ins></span> it <span class="removed"><del><strong>can
+ alter them too</a>.
+ </p></li>
+
+ <li><p>The Uber</strong></del></span> <span
class="inserted"><ins><em>presents. It
is too bad that the article finishes by advocating the
- moral weakness of surrendering</em></ins></span> to <span
class="removed"><del><strong>realize</strong></del></span> <span
class="inserted"><ins><em>Netflix. The Netflix app <a
- href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ moral weakness of surrendering to Netflix. The Netflix</em></ins></span>
app <span class="removed"><del><strong>tracks</strong></del></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
@@ -2624,94 +2570,129 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything</em></ins></span> that <span
class="removed"><del><strong>it</strong></del></span> is <span
class="removed"><del><strong>nasty.</p>
+ report everything that is viewed on them,</em></ins></span> and <span
class="removed"><del><strong>after</strong></del></span> <span
class="inserted"><ins><em>not just broadcasts and
+ cable</a>. Even if</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
- <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>viewed on them, and not just broadcasts and
- cable</a>. Even if the image is coming from</em></ins></span> the
<span class="removed"><del><strong><a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as</strong></del></span> <span
class="inserted"><ins><em>user's own computer,
- the TV reports what it is. The existence of</em></ins></span> a way to
<span class="removed"><del><strong>“serve” users
better</a>—never mind
- whether they want that. This is a typical example
of</strong></del></span> <span
class="inserted"><ins><em>disable</em></ins></span> the <span
class="removed"><del><strong>attitude of</strong></del></span>
- <span class="inserted"><ins><em>surveillance, even if it were not hidden
as it was in these TVs,
- does not legitimize</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
- those they have subjugated.</p>
+ <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>image is
coming from</em></ins></span> the user's <span
class="removed"><del><strong>consent”
+ for surveillance is inadequate as</strong></del></span> <span
class="inserted"><ins><em>own computer,
+ the TV reports what it is. The existence of</em></ins></span> a <span
class="removed"><del><strong>protection against massive</strong></del></span>
<span class="inserted"><ins><em>way to disable the
+ surveillance, even if it were not hidden as it was in these TVs,
+ does not legitimize the</em></ins></span> surveillance.</p>
+ </li>
- <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>surveillance.</p></em></ins></span>
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
+
+ <li><p>Apps that include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio</strong></del></span>
<span class="inserted"><ins><em><li id="M201511130">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some web and TV advertisements play inaudible
- sounds to be picked up by</em></ins></span> proprietary <span
class="removed"><del><strong>apps for mobile</strong></del></span> <span
class="inserted"><ins><em>malware running
- on other</em></ins></span> devices <span
class="removed"><del><strong>report which</strong></del></span> <span
class="inserted"><ins><em>in range so as to determine that they
+ <p>Some web</em></ins></span> and TV <span
class="removed"><del><strong>programs
+ are playing nearby</a>. Also on what users
post</strong></del></span> <span class="inserted"><ins><em>advertisements play
inaudible
+ sounds to be picked up by proprietary malware running</em></ins></span>
+ on <span class="removed"><del><strong>various sites
+ such</strong></del></span> <span class="inserted"><ins><em>other devices
in range so</em></ins></span> as <span class="removed"><del><strong>Facebook,
Google+</strong></del></span> <span class="inserted"><ins><em>to determine that
they
are nearby. Once your Internet devices are paired with
- your TV, advertisers can correlate ads with Web activity,
and</em></ins></span> other
- <span class="removed"><del><strong>apps the user has
- installed.</strong></del></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
- cross-device tracking</a>.</p>
+ your TV, advertisers can correlate ads with Web
activity,</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>other <a
+
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
+ cross-device tracking</a>.</p></em></ins></span>
</li>
- <li id="M201511060">
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511060">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio goes</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>step further than other TV
- manufacturers in spying on their users: their <a
-
href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so</em></ins></span> that <span
class="removed"><del><strong>at least</strong></del></span> <span
class="inserted"><ins><em>advertisers can track you
- across devices.</p>
+ <p>Vizio goes a step further than other TV
+ manufacturers in spying on their users: their</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze</em></ins></span> your <span
class="removed"><del><strong>mobile phone's photo collections for known
faces</a>,</strong></del></span> <span class="inserted"><ins><em>viewing
habits in detail</em></ins></span> and <span
class="removed"><del><strong>suggests you to share the
picture</strong></del></span>
+ <span class="inserted"><ins><em>link them your IP address</a> so
that advertisers can track</em></ins></span> you <span
class="removed"><del><strong>take according to who</strong></del></span>
+ <span class="inserted"><ins><em>across devices.</p>
+
+ <p>It</em></ins></span> is <span class="removed"><del><strong>in the
frame.</p>
- <p>It</em></ins></span> is <span
class="removed"><del><strong>visible</strong></del></span> <span
class="inserted"><ins><em>possible to turn this off, but having it enabled by
default
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means the pictures are
likely</strong></del></span> <span
class="inserted"><ins><em>possible</em></ins></span> to <span
class="removed"><del><strong>be
+ sent across the wire</strong></del></span> <span
class="inserted"><ins><em>turn this off, but having it enabled by default
is an injustice already.</p>
</li>
<li id="M201511020">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tivo's alliance with Viacom adds 2.3 million households
- to the 600 millions social media profiles the company
+ <p>Tivo's alliance with Viacom adds 2.3 million
households</em></ins></span>
+ to <span class="removed"><del><strong>Facebook's servers and
face-recognition
+ algorithms.</p>
+
+ <p>If so, none of Facebook users' pictures are private
+ anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload” them
to</strong></del></span> <span class="inserted"><ins><em>600 millions social
media profiles</em></ins></span> the <span
class="removed"><del><strong>service.</p>
+ </li>
+
+ <li><p>Like most “music screaming” disservices,
Spotify
+ is based on proprietary malware (DRM and snooping). In August
+ 2015 it</strong></del></span> <span class="inserted"><ins><em>company
already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can now <a
- href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
- correlate TV advertisement with online purchases</a>, exposing all
- users to new combined surveillance by default.</p>
+ information with online social media participation, Tivo can
now</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ correlate TV advertisement with online purchases</a>, exposing
all</em></ins></span>
+ users <span class="removed"><del><strong>submit</strong></del></span> to
<span class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em>new
combined surveillance by default.</p>
</li>
<li id="M201507240">
<!--#set var="DATE" value='<small
class="date-tag">2015-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio “smart” TVs recognize</em></ins></span> and
- <span class="removed"><del><strong>optional</a>. Not as bad
as</strong></del></span> <span class="inserted"><ins><em><a
-
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track</em></ins></span>
- what <span class="removed"><del><strong>the others
do.</p></strong></del></span> <span class="inserted"><ins><em>people are
watching</a>, even if it isn't a TV channel.</p></em></ins></span>
- </li>
+ <p>Vizio “smart” TVs recognize</em></ins></span> and
<span class="removed"><del><strong>some</strong></del></span> <span
class="inserted"><ins><em><a
+ href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
+ what people</em></ins></span> are <span
class="removed"><del><strong>starting to realize that</strong></del></span>
<span class="inserted"><ins><em>watching</a>, even if</em></ins></span>
it <span class="removed"><del><strong>is nasty.</p>
- <span class="removed"><del><strong><li><p>FTC says most mobile
apps for children don't respect privacy:</strong></del></span>
+ <p>This article shows the <a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as a way
+ to “serve” users better</a>—never mind
+ whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>isn't</em></ins></span> a <span
class="removed"><del><strong>typical example of
+ the attitude of the proprietary software industry towards
+ those they have subjugated.</p>
+
+ <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>TV channel.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other
+ apps the user has
+ installed.</strong></del></span>
<span class="inserted"><ins><em><li id="M201505290">
<!--#set var="DATE" value='<small
class="date-tag">2015-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
+ <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way that at least is visible</strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch, and even what they wanted to
+ snoops on what programs people watch,</em></ins></span> and
+ <span class="removed"><del><strong>optional</a>. Not as bad
as</strong></del></span> <span class="inserted"><ins><em>even</em></ins></span>
what <span class="removed"><del><strong>the others
do.</p></strong></del></span> <span class="inserted"><ins><em>they wanted
to
record</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+ <span class="removed"><del><strong><li><p>FTC says most mobile
apps for children don't respect privacy:</strong></del></span>
<span class="inserted"><ins><em><li id="M201504300">
<!--#set var="DATE" value='<small
class="date-tag">2015-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade” to make its TVs</em></ins></span>
snoop on <span class="inserted"><ins><em>what
+ <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ </li>
+
+ <li><p>Widely</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"></em></ins></span>
+ used <span class="removed"><del><strong><a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps</strong></del></span> <span
class="inserted"><ins><em>a firmware “upgrade” to make its
TVs</em></ins></span> snoop on <span class="inserted"><ins><em>what
users watch</a>. The TVs did not do that when first sold.</p>
</li>
@@ -2720,74 +2701,72 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Samsung “Smart” TV <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span
class="inserted"><ins><em>internet</em></ins></span> to
- <span class="removed"><del><strong>the snooping done by the
phone</strong></del></span> <span
class="inserted"><ins><em>another</em></ins></span> company, <span
class="inserted"><ins><em>Nuance</a>.
- Nuance can save it</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in</strong></del></span> <span
class="inserted"><ins><em>would then have to give it to</em></ins></span> the
- <span class="removed"><del><strong>phone.</p>
-
- <p>Don't</strong></del></span> <span class="inserted"><ins><em>US
or some
+ transmits users' voice on the internet to another company,
Nuance</a>.
+ Nuance can save it and would then have to give it to</em></ins></span> the
<span class="removed"><del><strong>user</a>. This</strong></del></span>
<span class="inserted"><ins><em>US or some
other government.</p>
- <p>Speech recognition is not to</em></ins></span> be <span
class="removed"><del><strong>distracted</strong></del></span> <span
class="inserted"><ins><em>trusted unless it is done</em></ins></span> by <span
class="inserted"><ins><em>free
- software in your own computer.</p>
+ <p>Speech recognition</em></ins></span> is <span
class="removed"><del><strong>in addition</strong></del></span> <span
class="inserted"><ins><em>not</em></ins></span> to
+ <span class="removed"><del><strong>the snooping</strong></del></span>
<span class="inserted"><ins><em>be trusted unless it is</em></ins></span> done
by <span class="removed"><del><strong>the phone company, and perhaps by the
OS</strong></del></span> <span class="inserted"><ins><em>free
+ software</em></ins></span> in <span class="removed"><del><strong>the
+ phone.</p>
+
+ <p>Don't</strong></del></span> <span
class="inserted"><ins><em>your own computer.</p>
<p>In its privacy policy, Samsung explicitly confirms that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be transmitted to third
+ data containing sensitive information will</em></ins></span> be <span
class="removed"><del><strong>distracted by the question of whether the app
developers get
+ users</strong></del></span> <span
class="inserted"><ins><em>transmitted</em></ins></span> to <span
class="removed"><del><strong>say “I agree”.
That</strong></del></span> <span class="inserted"><ins><em>third
parties</a>.</p>
</li>
<li id="M201411090">
<!--#set var="DATE" value='<small
class="date-tag">2014-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Amazon “Smart” TV is <a
+ <p>The Amazon “Smart” TV</em></ins></span> is <span
class="removed"><del><strong>no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em><a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all</em></ins></span> the <span
class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ snooping all the time</a>.</p></em></ins></span>
</li>
- <li id="M201409290">
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201409290">
<!--#set var="DATE" value='<small
class="date-tag">2014-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>More or less all “smart” TVs <a
-
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
+ <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p></em></ins></span>
- <p>The report was as</em></ins></span> of <span
class="removed"><del><strong>whether the app developers</strong></del></span>
<span class="inserted"><ins><em>2014, but we don't expect this has got
+ <p>The <span class="removed"><del><strong>FTC
criticized</strong></del></span> <span class="inserted"><ins><em>report was as
of 2014, but we don't expect</em></ins></span> this <span
class="removed"><del><strong>app because it asked the
user</strong></del></span> <span class="inserted"><ins><em>has got
better.</p>
- <p>This shows that laws requiring products to</em></ins></span> get
- <span class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>users' formal
- consent before collecting personal data are totally inadequate.
+ <p>This shows that laws requiring products</em></ins></span> to
+ <span class="removed"><del><strong>approve sending</strong></del></span>
<span class="inserted"><ins><em>get users' formal
+ consent before collecting</em></ins></span> personal data <span
class="inserted"><ins><em>are totally inadequate.
And what happens if a user declines consent? Probably the TV will
- say, “Without your consent to tracking, the TV will not
- work.”</p>
+ say, “Without your consent</em></ins></span> to <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>app developer but did</strong></del></span> <span
class="inserted"><ins><em>TV will</em></ins></span> not
+ <span class="removed"><del><strong>ask about
sending</strong></del></span>
+ <span class="inserted"><ins><em>work.”</p>
- <p>Proper laws would say that TVs are not allowed</em></ins></span>
to <span class="removed"><del><strong>say “I agree”. That is no
excuse for malware.</p></strong></del></span> <span
class="inserted"><ins><em>report what the
- user watches—no exceptions!</p></em></ins></span>
+ <p>Proper laws would say that TVs are not allowed to report what the
+ user watches—no exceptions!</p>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201405200">
+ <li id="M201405200">
<!--#set var="DATE" value='<small
class="date-tag">2014-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p>
-
- <p>The FTC criticized this app because it
asked</strong></del></span>
- <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what</em></ins></span> the user <span
class="inserted"><ins><em>watches, and the switch</em></ins></span> to
- <span class="removed"><del><strong>approve sending personal data
to</strong></del></span> <span class="inserted"><ins><em>turn this off has
- no effect</a>. (The fact that</em></ins></span> the <span
class="removed"><del><strong>app developer but did not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>transmission reports a 404 error
+ <p>Spyware in LG “smart” TVs <a
+
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what the user watches, and the switch to turn this off has
+ no effect</a>. (The fact that the transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
- <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on</em></ins></span> other <span
class="removed"><del><strong>companies. This shows</strong></del></span> <span
class="inserted"><ins><em>devices on</em></ins></span> the
- <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
+ snoops on other devices on the user's local network</a>.</p>
- <p>LG later said it had installed a patch to stop this, but any
+ <p>LG later said</em></ins></span> it <span
class="inserted"><ins><em>had installed a patch</em></ins></span> to <span
class="removed"><del><strong>other companies. This shows the
+ weakness</strong></del></span> <span class="inserted"><ins><em>stop
this, but any
product could spy this way.</p>
<p>Meanwhile, LG TVs <a
@@ -2824,7 +2803,8 @@
<p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
users identify themselves and then sends personal data about
them</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture to Amazon servers</a>, which save it
+ send the video they capture</em></ins></span> to
+ <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Amazon servers</a>, which save it
long-term.</p>
<p>In many cases, the video shows everyone that comes near, or merely
@@ -2833,45 +2813,44 @@
<p>The article focuses on how Ring used to let individual employees
look
at the videos freely. It appears Amazon has tried to prevent that
secondary abuse, but the primary abuse—that Amazon gets the
- video—Amazon expects society to surrender to.</p>
+ video—Amazon expects society to surrender
to.</p></em></ins></span>
</li>
- <li id="M201810300">
+ <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810300">
<!--#set var="DATE" value='<small
class="date-tag">2018-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Nearly all “home security cameras” <a
-
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy of everything they
+ <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give</em></ins></span> the <span class="removed"><del><strong>NSA takes
advantage</strong></del></span> <span class="inserted"><ins><em>manufacturer an
unencrypted copy of everything they
see</a>. “Home insecurity camera” would be a better
name!</p>
<p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not to look at what's in the videos. That's not
- security for your home. Security means making sure they don't
get</em></ins></span> to
- <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>see through your
camera.</p></em></ins></span>
+ manufacturers promise not</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>look at what's in the videos. That's not
+ security for your home. Security means making sure they don't get to
+ see</em></ins></span> through <span class="removed"><del><strong>it
too</a>.
+ Here's information on</strong></del></span> <span
class="inserted"><ins><em>your camera.</p>
</li>
- <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201603220">
+ <li id="M201603220">
<!--#set var="DATE" value='<small
class="date-tag">2016-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Over 70 brands of network-connected surveillance cameras
have</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and the NSA takes advantage</strong></del></span>
+ <p>Over 70 brands of network-connected surveillance cameras
have</em></ins></span> <a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>watch</em></ins></span> through <span
class="removed"><del><strong>it too</a>.
- Here's information on</strong></del></span> <span
class="inserted"><ins><em>them</a>.</p>
+ security bugs that allow anyone to watch through them</a>.</p>
</li>
<li id="M201511250">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Nest Cam “smart” camera is</em></ins></span>
<a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
+ <p>The Nest Cam “smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
even when the “owner” switches it “off.”</p>
<p>A “smart” device means the manufacturer is using it
@@ -2886,14 +2865,15 @@
</div>
<span class="removed"><del><strong><ul>
- <li></strong></del></span>
+ <li>
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711244">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla and i-Que transmit
- <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,</strong></del></span> <span
class="inserted"><ins><em>Furby Connect has</em></ins></span> a <span
class="removed"><del><strong>speech recognition company based in the
U.S.</p>
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The Furby Connect has</em></ins></span> a <span
class="removed"><del><strong>speech recognition company based in the
U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
can remotely control</strong></del></span> <span
class="inserted"><ins><em><a
@@ -2958,108 +2938,56 @@
Crackers</em></ins></span> found a way to access the data</a>
collected by the
manufacturer's snooping.</p>
- <p>That the manufacturer and the FBI could listen to these
- conversations was unacceptable by <span
class="removed"><del><strong>itself.</p></li>
-
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>itself.</p></em></ins></span>
+ <p>That the manufacturer and <span class="removed"><del><strong>the
FBI could listen to these conversations</strong></del></span> <span
class="inserted"><ins><em>the FBI could listen to these
+ conversations was unacceptable by itself.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareAtLowLevel</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201612060">
+ <li id="M201612060">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>The “smart” toys My
Friend Cayla and i-Que transmit <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>Nuance Communications</a>, a speech recognition
- company based</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
-
-<ul>
-<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note that</strong></del></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
+ conversations to Nuance Communications</a>, a speech recognition
+ company based in the U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span> <span class="inserted"><ins><em>mobile phone. This
would enable
- crackers to listen</em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork</strong></del></span> <span
class="inserted"><ins><em>on a child's speech, and even speak into the
+ can remotely control the toys with a mobile phone. This would enable
+ crackers to listen in on a child's speech, and even speak into the
toys themselves.</p>
</li>
<li id="M201502180">
<!--#set var="DATE" value='<small
class="date-tag">2015-02</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>Barbie <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Barbie <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>children and
adults</a>.</p>
+ going to spy on children and adults</a>.</p>
</li>
-</ul></em></ins></span>
+</ul>
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareAtWork">Spyware at
Work</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtWork">#SpywareAtWork</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 id="SpywareInDrones">Drones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
-<ul>
- <li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it can collect the emails of members of Parliament
- this way, because they pass it through Microsoft.</p></li>
-
- <li><p>Spyware</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201708040">
<!--#set var="DATE" value='<small
class="date-tag">2017-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>While you're using a DJI drone
- to snoop on other people, DJI is</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span
class="inserted"><ins><em>many cases</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p></em></ins></span>
+ to snoop on other people, DJI is in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4>
- <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
+ <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Spyware</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202009270">
<!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -3067,66 +2995,129 @@
software, including videoconference software, to <a
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
surveil and monitor staff working at home</a>. If the program reports
- whether you are “active,” that is</em></ins></span> in <span
class="removed"><del><strong>Skype:</strong></del></span> <span
class="inserted"><ins><em>effect a malicious
+ whether you are “active,” that is in effect a malicious
surveillance feature.</p>
</li>
<li id="M202008030">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google Nest</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
+ <p>Google Nest <a
+
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
is taking over ADT</a>. Google sent out a software
- update to its speaker devices using their back door</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.protocol.com/google-smart-speaker-alarm-adt">
that
+ update to its speaker devices using their back door <a
+ href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that
listens for things like smoke alarms</a> and then notifies your phone
that an alarm is happening. This means the devices now listen for more
than just their wake words. Google says the software update was sent
- out prematurely and on accident and Google was planning on disclosing
- this new feature and offering it to customers who pay for it.</p>
+ out prematurely and on accident and Google</em></ins></span> was <span
class="removed"><del><strong>unacceptable by itself.</p></li>
+
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy</strong></del></span> <span
class="inserted"><ins><em>planning</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>disclosing
+ this new feature</em></ins></span> and <span
class="removed"><del><strong>adults</a>.</p>
+ </li>
+</ul>
+
+
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>offering it</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each
subsection</strong></del></span> <span class="inserted"><ins><em>customers who
pay for it.</p>
</li>
<li id="M202006300">
<!--#set var="DATE" value='<small
class="date-tag">2020-06</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>“Bossware” is malware that bosses <a
-
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p></strong></del></span>
+ <span class="inserted"><ins><em><p>“Bossware” is malware
that bosses</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
coerce workers into installing in their own computers</a>, so the
- bosses can spy on them.</p>
+ bosses can spy</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
+Note that</strong></del></span> <span class="inserted"><ins><em>them.</p>
+
+ <p>This shows why requiring</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a “clean” Windows install</strong></del></span>
<span class="inserted"><ins><em>user's “consent”</em></ins></span>
is not <span class="removed"><del><strong>really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+ <span class="inserted"><ins><em>an adequate basis for protecting digital
privacy. The boss can coerce
+ most workers into consenting</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
- <p>This shows why requiring the user's “consent” is not
- an adequate basis for protecting digital privacy. The boss can coerce
- most workers into consenting to almost anything, even probable exposure
- to contagious disease that can be fatal. Software like this should
- be illegal and bosses that demand it should be
prosecuted</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>it.</p></em></ins></span>
+ <p>Specifically, it</strong></del></span> <span
class="inserted"><ins><em>almost anything, even probable exposure
+ to contagious disease that</em></ins></span> can <span
class="removed"><del><strong>collect the emails of members of
Parliament</strong></del></span> <span class="inserted"><ins><em>be fatal.
Software like</em></ins></span> this <span class="removed"><del><strong>way,
because they pass</strong></del></span> <span class="inserted"><ins><em>should
+ be illegal and bosses that demand</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>should be prosecuted for
it.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
-<!-- #SpywareOnTheRoad</strong></del></span>
+<ul>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
<span class="inserted"><ins><em><li id="M201911190">
<!--#set var="DATE" value='<small
class="date-tag">2019-11</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>Internet-tethered Amazon Ring had
- a security vulnerability that enabled attackers</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
- access the user's wifi password</a>, and snoop</em></ins></span> on
<span class="removed"><del><strong>top under each
subsection</strong></del></span> <span class="inserted"><ins><em>the household
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Internet-tethered Amazon Ring had
+ a security vulnerability that enabled attackers to</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access the user's wifi password</a>, and snoop on the household
through connected surveillance devices.</p>
<p>Knowledge of the wifi password would not be sufficient to carry
out any significant surveillance if the devices implemented proper
security, including encryption. But many devices with proprietary
software lack this. Of course, they are also used by their
- manufacturers for snooping.</p>
+ manufacturers</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>snooping.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
- <li id="M201907210">
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure to place new items on top under each
subsection</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201907210">
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE"</em></ins></span> -->
@@ -3157,11 +3148,9 @@
way to see or control what</em></ins></span> it <span
class="inserted"><ins><em>records or sends.</p>
<p>Rather than trying</em></ins></span> to <span
class="removed"><del><strong>outsmart
- you.</p></strong></del></span> <span
class="inserted"><ins><em>better control the use of recordings, Google
- should not record or listen to the person's voice. It should only
- get commands that the user wants to send to some Google
service.</p></em></ins></span>
+ you.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<div class="big-subsection">
<h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
@@ -3169,142 +3158,185 @@
</div>
<ul>
- <li><p>E-books can contain Javascript code,</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905061">
- <!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Amazon Alexa collects a lot more information from users
- than is necessary for correct functioning (time, location,
- recordings made without a legitimate prompt),</em></ins></span> and <span
class="inserted"><ins><em>sends
- it to Amazon's servers, which store it indefinitely. Even
- worse, Amazon forwards it to third-party companies. Thus,
- even if users request deletion of their data from Amazon's
servers,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
- the data remain on other servers</a>, where they can be accessed by
- advertising companies and government agencies. In other words,
- deleting the collected information doesn't cancel the wrong of
- collecting it.</p>
-
- <p>Data collected by devices such as the Nest thermostat, the Philips
- Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
- speakers are likewise stored longer than necessary</em></ins></span> on
<span class="removed"><del><strong>readers</a>.</p>
+ <li><p>E-books can contain Javascript code,
+ and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
</li>
- <li><p>Spyware in many e-readers—not
only</strong></del></span> the
+ <li><p>Spyware in many e-readers—not
only</strong></del></span> <span class="inserted"><ins><em>better
control</em></ins></span> the
<span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span> <span
class="inserted"><ins><em>servers</em></ins></span>
- the <span class="removed"><del><strong>user reads at what
time</a>.</p>
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>use of recordings, Google
+ should not record or listen to</em></ins></span> the <span
class="removed"><del><strong>user reads at what time</a>.</p>
</li>
- <li><p>Adobe</strong></del></span> <span
class="inserted"><ins><em>devices are tethered to. Moreover, they
are</em></ins></span> made <span class="removed"><del><strong>“Digital
Editions,” the e-reader used
+ <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>person's
voice. It should only
+ get commands that</em></ins></span> the <span
class="removed"><del><strong>e-reader used
by most US libraries,
<a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed</strong></del></span> <span
class="inserted"><ins><em>available</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
+ send lots of data</strong></del></span> <span
class="inserted"><ins><em>user wants</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
+ needed</strong></del></span> <span
class="inserted"><ins><em>send</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware</strong></del></span>
- <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very
precise picture of users' life
- at home, not only</em></ins></span> in <span
class="removed"><del><strong>Vehicles</h4>
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
</div>
<ul>
<li><p>Computerized cars with nonfree software are
<a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>the present, but in the past (and, who knows,
- in the future too?)</p></em></ins></span>
+ snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>some Google service.</p></em></ins></span>
</li>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
- effectively
- anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201904240">
- <!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>id="M201905061">
+ <!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some of users' commands to the Alexa service
are</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in various
+ <p>Amazon Alexa collects</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
+ effectively
+ anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely</strong></del></span> <span
class="inserted"><ins><em>lot more information from users
+ than is necessary for correct functioning (time, location,
+ recordings made without a legitimate prompt),</em></ins></span> and <span
class="removed"><del><strong>make changes in various
settings</a>.</p>
- <p>That's easy</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees</em></ins></span> to <span
class="inserted"><ins><em>listen to</a>. The Google and Apple
- voice assistants</em></ins></span> do <span
class="removed"><del><strong>because the system has no authentication when
- accessed through</strong></del></span> <span
class="inserted"><ins><em>similar things.</p>
-
- <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>modem. However,</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff</em></ins></span> even <span
class="removed"><del><strong>if it asked for
- authentication, you couldn't be confident that
Nissan</strong></del></span> has <span class="removed"><del><strong>no
- access. The software in</strong></del></span> <span
class="inserted"><ins><em>access to <a
-
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
- location and other personal data</a>.</p>
-
- <p>Since</em></ins></span> the <span
class="removed"><del><strong>car</strong></del></span> <span
class="inserted"><ins><em>client program</em></ins></span> is
- <span class="removed"><del><strong>proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>sends
+ it</em></ins></span> to <span class="removed"><del><strong>do because the
system has no authentication when
+ accessed through</strong></del></span> <span
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
+ worse, Amazon forwards it to third-party companies. Thus,
+ even if users request deletion of their data from Amazon's servers, <a
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
+ the <span class="removed"><del><strong>modem. However, even if it asked
for
+ authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>data remain on other servers</a>, where they
can</em></ins></span> be <span class="removed"><del><strong>confident that
Nissan has no
+ access. The software in</strong></del></span> <span
class="inserted"><ins><em>accessed by
+ advertising companies and government agencies. In other words,
+ deleting</em></ins></span> the <span class="removed"><del><strong>car is
+ proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
means it demands blind faith from its users</a>.</p>
- <p>Even if</strong></del></span> <span
class="inserted"><ins><em>nonfree, and data processing is done
+ <p>Even if no one connects to</strong></del></span> <span
class="inserted"><ins><em>collected information doesn't
cancel</em></ins></span> the <span class="removed"><del><strong>car
remotely,</strong></del></span> <span class="inserted"><ins><em>wrong of
+ collecting it.</p>
+
+ <p>Data collected by devices such as</em></ins></span> the <span
class="removed"><del><strong>cell phone
+ modem enables</strong></del></span> <span class="inserted"><ins><em>Nest
thermostat,</em></ins></span> the <span class="removed"><del><strong>phone
company to track</strong></del></span> <span class="inserted"><ins><em>Philips
+ Hue-connected lights,</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>Chamberlain MyQ garage opener and</em></ins></span>
the <span class="removed"><del><strong>time; it is possible to physically
remove</strong></del></span> <span class="inserted"><ins><em>Sonos
+ speakers are likewise stored longer than necessary on</em></ins></span>
the <span class="removed"><del><strong>cell phone modem
+ though.</p>
+ </li>
+
+ <li id="records-drivers"><p>Proprietary software in cars
+ <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is</strong></del></span> <span class="inserted"><ins><em>servers
+ the devices are tethered to. Moreover, they are</em></ins></span> made
available to <span class="removed"><del><strong>car manufacturers, insurance
companies, and
+ others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
is not
+ really</strong></del></span>
+ <span class="inserted"><ins><em>Alexa. As</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
+ intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>result, Amazon has a very precise
picture</em></ins></span> of <span class="removed"><del><strong>privacy, and
should be replaced with anonymous
+ payment systems,</strong></del></span> <span
class="inserted"><ins><em>users' life
+ at home, not only in the present,</em></ins></span> but <span
class="inserted"><ins><em>in</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
+ cases mentioned are done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>past (and, who knows,</em></ins></span>
+ in the <span class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>future too?)</p>
+ </li>
+
+ <li id="M201904240">
+ <!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Some of users' commands to</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>Alexa service are <a
+
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees</em></ins></span> to <span
class="removed"><del><strong>extract data remotely</strong></del></span> <span
class="inserted"><ins><em>listen to</a>. The Google</em></ins></span> and
+ <span class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>Apple
+ voice assistants do similar things.</p>
+
+ <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span class="inserted"><ins><em>Alexa service staff
even has access to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
+ location</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
+ store this information, but if</strong></del></span> <span
class="inserted"><ins><em>other personal data</a>.</p>
+
+ <p>Since</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>client program is nonfree, and data processing is done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
the cloud</a>” (a soothing way of saying “We won't
- tell you how and where it's done”), users have</em></ins></span> no
<span class="removed"><del><strong>one connects</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span>
- to <span class="removed"><del><strong>the car remotely, the cell phone
- modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>know what happens</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>recordings unless human eavesdroppers <a
+ tell you how and where it's done”), users have no way
+ to know what happens</em></ins></span> to <span
class="removed"><del><strong>get the data
+ and hand it over,</strong></del></span> the <span
class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>recordings
unless human eavesdroppers <a
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure agreements</a>.</p>
+ break their non-disclosure
agreements</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201902080">
+
+<!-- #SpywareAtHome</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902080">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The HP <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS:</strong></del></span>
+ <span class="inserted"><ins><em><p>The HP <a
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a> to make sure</em></ins></span> the
<span class="removed"><del><strong>time; it</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> is <span
class="removed"><del><strong>possible to physically
remove</strong></del></span> <span class="inserted"><ins><em>still
- paying for</em></ins></span> the <span class="removed"><del><strong>cell
phone modem
- though.</p>
+ communicates with HP servers</a> to</em></ins></span> make sure
<span class="removed"><del><strong>to place new items on top under each
subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Nest thermometers
+ send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot of data about</strong></del></span> the <span
class="removed"><del><strong>user</a>.</p>
</li>
- <li id="records-drivers"><p>Proprietary
software</strong></del></span> <span class="inserted"><ins><em>subscription,
and hasn't printed more pages than were
- paid for.</p>
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers</strong></del></span> <span
class="inserted"><ins><em>user is still
+ paying for the subscription, and hasn't printed more pages
than</em></ins></span> were <span class="removed"><del><strong>programmed to
spy</strong></del></span>
+ <span class="inserted"><ins><em>paid for.</p>
- <p>Even though the ink subscription program may be
cheaper</em></ins></span> in <span class="removed"><del><strong>cars
- <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available to car manufacturers, insurance
companies,</strong></del></span> <span class="inserted"><ins><em>some
- specific cases, it spies on users,</em></ins></span> and
- <span class="removed"><del><strong>others.</p>
+ <p>Even though the ink subscription program may be cheaper in some
+ specific cases, it spies</em></ins></span> on <span
class="removed"><del><strong>their renters</a>.</p>
+ </li>
+</ul>
- <p>The case</strong></del></span> <span
class="inserted"><ins><em>involves totally unacceptable
- restrictions in the use</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span class="inserted"><ins><em>ink cartridges
that would otherwise be</em></ins></span> in <span
class="removed"><del><strong>this article, is not
- really</strong></del></span>
- <span class="inserted"><ins><em>working order.</p>
+
+<div class="big-subsection">
+ <h4 id="SpywareInTVSets">Spyware</strong></del></span> <span
class="inserted"><ins><em>users, and involves totally unacceptable
+ restrictions</em></ins></span> in <span class="removed"><del><strong>TV
Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+</div>
+
+<p>Emo Phillips made a joke: The other day</strong></del></span> <span
class="inserted"><ins><em>the use of ink cartridges that would otherwise be in
+ working order.</p>
</li>
<li id="M201808120">
<!--#set var="DATE" value='<small
class="date-tag">2018-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>matter</strong></del></span> <span
class="inserted"><ins><em>way to break the security</em></ins></span> of <span
class="removed"><del><strong>proprietary surveillance. These systems
are</strong></del></span> an
- <span class="removed"><del><strong>intolerable invasion of
privacy,</strong></del></span> <span class="inserted"><ins><em>Amazon
device,</em></ins></span>
- and <span class="removed"><del><strong>should</strong></del></span> <span
class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span> to <span
class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>break the security of an Amazon
device,</em></ins></span>
+ and
+<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I
+don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
- <p>It was very difficult for them to do this. The job
would</em></ins></span> be <span class="removed"><del><strong>replaced with
anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>much
- easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>invasion isn't done
by malware. The other
- cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>US
- told Amazon to do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
-
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>product in that country,
- do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>moral fiber</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
- determine the car's location at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The company says it doesn't
- store this information,</strong></del></span> <span
class="inserted"><ins><em>say no?</p>
-
- <p><small>(These crackers are probably hackers
too,</em></ins></span> but <span class="removed"><del><strong>if the state
orders it</strong></del></span> <span class="inserted"><ins><em>please <a
- href="https://stallman.org/articles/on-hacking.html"> don't use
- “hacking”</em></ins></span> to <span
class="removed"><del><strong>get the</strong></del></span> <span
class="inserted"><ins><em>mean “breaking
security”</a>.)</small></p>
+ <p>It was very difficult for them to do this. The job would be much
+ easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>other way.”
Evidently</strong></del></span> <span class="inserted"><ins><em>US
+ told Amazon to do this, or cease to sell the product in</em></ins></span>
that <span class="removed"><del><strong>was
+before</strong></del></span> <span class="inserted"><ins><em>country,
+ do you think</em></ins></span> Amazon <span
class="removed"><del><strong>“smart” TVs.</p>
+
+<ul>
+ <li>
+ <p>Vizio
+ “smart”</strong></del></span> <span
class="inserted"><ins><em>would have the moral fiber to say no?</p>
+
+ <p><small>(These crackers are probably hackers too, but
please</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
+ “hacking” to mean “breaking
security”</a>.)</small></p>
</li>
<li id="M201804140">
@@ -3312,101 +3344,78 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A medical insurance company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops on its user by
- sending usage</em></ins></span> data
- <span class="removed"><del><strong>and hand it
over,</strong></del></span> <span class="inserted"><ins><em>back
over</em></ins></span> the <span class="removed"><del><strong>state can store
it.</p></strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p></em></ins></span>
+ offers a gratis electronic toothbrush</em></ins></span> that <span
class="removed"><del><strong>is viewed</strong></del></span> <span
class="inserted"><ins><em>snoops</em></ins></span> on <span
class="removed"><del><strong>them, and not just broadcasts
+ and cable</a>. Even if</strong></del></span> <span
class="inserted"><ins><em>its user by
+ sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>image is coming from</strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareAtHome</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201706204">
+ <li id="M201706204">
<!--#set var="DATE" value='<small
class="date-tag">2017-06</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>Lots of “smart”
products are designed <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Lots of “smart” products are designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>everyone in the
house, all the time</a>.</p>
-
- <p>Today's technological practice does not include any way of making
- a device that can obey your voice commands without potentially
spying</em></ins></span>
- on <span class="removed"><del><strong>top under each subsection -->
+ listen to everyone in</em></ins></span> the <span
class="removed"><del><strong>user's own
+ computer,</strong></del></span> <span class="inserted"><ins><em>house,
all</em></ins></span> the <span class="removed"><del><strong>TV reports what it
is. The existence</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Nest</strong></del></span> <span
class="inserted"><ins><em>you. Even if it is air-gapped, it could be saving up
records
- about you for later examination.</p>
+ <p>Today's technological practice does not include any
way</em></ins></span> of <span
class="inserted"><ins><em>making</em></ins></span>
+ a <span class="removed"><del><strong>way to
+ disable the surveillance, even</strong></del></span> <span
class="inserted"><ins><em>device that can obey your voice commands without
potentially spying
+ on you. Even</em></ins></span> if it <span
class="removed"><del><strong>were not hidden as</strong></del></span> <span
class="inserted"><ins><em>is air-gapped,</em></ins></span> it <span
class="removed"><del><strong>was in
+ these TVs, does not legitimize the
surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>could be saving up records
+ about you for later examination.</p></em></ins></span>
</li>
- <li id="M201407170">
+ <span class="removed"><del><strong><li><p>More or less all
“smart” TVs</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407170">
<!--#set var="DATE" value='<small
class="date-tag">2014-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p id="nest-thermometers">Nest</em></ins></span> thermometers send
<a
- href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
- data about the user</a>.</p>
- </li>
+ <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
- <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"></strong></del></span>
+ <p>The report was as</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot</em></ins></span> of <span class="removed"><del><strong>2014, but we don't
expect this has got better.</p>
+
+ <p>This shows that laws requiring products to get users' formal
+ consent before collecting personal</strong></del></span>
+ data <span class="removed"><del><strong>are totally inadequate.
+ And what happens if a user declines consent?
Probably</strong></del></span> <span
class="inserted"><ins><em>about</em></ins></span> the <span
class="removed"><del><strong>TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>user</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201310260">
+ <li id="M201310260">
<!--#set var="DATE" value='<small
class="date-tag">2013-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"></em></ins></span>
- Rent-to-own computers were programmed to spy on their
renters</a>.</p>
+
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</em></ins></span> to <span
class="removed"><del><strong>tracking, the TV</strong></del></span> <span
class="inserted"><ins><em>spy on their renters</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareOnWearables">Wearables</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnWearables">#SpywareOnWearables</a>)</span></em></ins></span>
+ <h4 id="SpywareOnWearables">Wearables</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnWearables">#SpywareOnWearables</a>)</span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li>
- <p>Vizio
- “smart”</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201807260">
<!--#set var="DATE" value='<small
class="date-tag">2018-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tommy Hilfiger clothing</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts
- and cable</a>. Even if the image is coming from the user's own
- computer,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
+ <p>Tommy Hilfiger clothing <a
+
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
monitor how often people wear it</a>.</p>
- <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>TV reports what it is. The existence of a
way</strong></del></span> <span
class="inserted"><ins><em>sheeple</em></ins></span> to
- <span class="removed"><del><strong>disable the surveillance, even if it
were not hidden as</strong></del></span> <span
class="inserted"><ins><em>find</em></ins></span> it <span
class="removed"><del><strong>was in
- these TVs, does not legitimize the surveillance.</p>
- </li>
-
- <li><p>More or less all “smart” TVs <a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
-
- <p>The report was as of 2014, but we don't expect this has got
better.</p>
+ <p>This</em></ins></span> will
+ <span class="removed"><del><strong>not work.”</p>
- <p>This shows</strong></del></span> <span
class="inserted"><ins><em>normal</em></ins></span> that <span
class="removed"><del><strong>laws requiring products to get users' formal
- consent before collecting personal data are totally inadequate.
- And</strong></del></span> <span class="inserted"><ins><em>companies
- monitor every aspect of</em></ins></span> what <span
class="removed"><del><strong>happens if</strong></del></span> <span
class="inserted"><ins><em>they do.</p>
+ <p>Proper laws would say that TVs are not
allowed</strong></del></span> <span class="inserted"><ins><em>teach the
sheeple</em></ins></span> to <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>find it normal that companies
+ monitor every aspect of</em></ins></span> what
+ <span class="removed"><del><strong>the user watches — no
exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>they do.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>Vizio
goes</strong></del></span>
+<span class="inserted"><ins><em></ul>
<h5 id="SpywareOnSmartWatches">“Smart” Watches</h5>
@@ -3417,56 +3426,42 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Internet-enabled watches with proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they have</em></ins></span> a <span
class="removed"><del><strong>user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>lot of security
flaws. They <a
-
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
- permit security breakers (and unauthorized people) to
access</a></em></ins></span> the <span class="removed"><del><strong>TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>watch.</p>
+ privacy. In addition, they have</em></ins></span> a <span
class="removed"><del><strong>step further than other TV manufacturers in spying
on
+ their users: their</strong></del></span> <span
class="inserted"><ins><em>lot of security flaws. They</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in
detail</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
+ permit security breakers (and unauthorized people) to access</a> the
watch.</p>
- <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages</em></ins></span> to
<span class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>and from</em></ins></span> the <span
class="removed"><del><strong>TV will
- not work.”</p>
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent</em></ins></span> and
+ <span class="removed"><del><strong>link them your IP address</a>
so</strong></del></span> <span class="inserted"><ins><em>child and spoof
messages to and from the watch, possibly endangering the child.</p>
- <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>watch, possibly endangering the child.</p>
+ <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>advertisers can track you
+ across devices.</p>
- <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>TVs are not allowed to report
what</strong></del></span> <span class="inserted"><ins><em>this article
misuses</em></ins></span> the <span class="removed"><del><strong>user watches
— no exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>word “<a
+ <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>this article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
- to mean “crackers.”)</small></p></em></ins></span>
+ to mean “crackers.”)</small></p>
</li>
- <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying on
- their users: their</strong></del></span>
- <span class="inserted"><ins><em><li id="M201603020">
+ <li id="M201603020">
<!--#set var="DATE" value='<small
class="date-tag">2016-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></em></ins></span>
- that <span class="removed"><del><strong>advertisers can track you
- across devices.</p>
-
- <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>connects</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
+ <p>A very cheap “smart watch” comes with an Android app
<a
+
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
<p>The article says</em></ins></span> this <span
class="removed"><del><strong>off,</strong></del></span> <span
class="inserted"><ins><em>is a back door,</em></ins></span> but <span
class="removed"><del><strong>having</strong></del></span> <span
class="inserted"><ins><em>that could be a
misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>certainly surveillance, at
least.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to
- the 600 millions social media profiles the company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now</strong></del></span>
+ <span class="removed"><del><strong><li><p>Tivo's
alliance</strong></del></span>
<span class="inserted"><ins><em><li id="M201407090">
<!--#set var="DATE" value='<small
class="date-tag">2014-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>An LG “smart” watch is designed</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
- to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>report its location to someone else</em></ins></span>
and <span class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> to <span class="removed"><del><strong>be
- picked up by proprietary malware running on other devices in
- range so as</strong></del></span> <span
class="inserted"><ins><em>transmit conversations
+ <p>An LG “smart” watch is designed <a
+
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+ to report its location to someone else and to transmit conversations
too</a>.</p>
</li>
</ul>
@@ -3483,111 +3478,120 @@
--><!--#echo encoding="none" var="DATE" -->
<p>New Toyotas will <a
href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/">
- upload data</em></ins></span> to <span
class="removed"><del><strong>determine that they are nearby. Once your
- Internet devices are paired with your TV,
advertisers</strong></del></span> <span class="inserted"><ins><em>AWS to help
create custom insurance premiums</a>
+ upload data to AWS to help create custom insurance premiums</a>
based on driver behaviour.</p>
- <p>Before you buy a “connected” car, make sure
you</em></ins></span> can
- <span class="removed"><del><strong>correlate ads with Web
activity,</strong></del></span>
- <span class="inserted"><ins><em>disconnect its cellular
antenna</em></ins></span> and
- <span class="removed"><del><strong>other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
- </li>
- <li><p>Vizio “smart” TVs
recognize</strong></del></span> <span class="inserted"><ins><em>its GPS
antenna. If you want
- GPS navigation, get a separate navigator which runs free
software</em></ins></span>
- and <span class="inserted"><ins><em>works with Open Street Map.</p>
+ <p>Before you buy a “connected” car, make sure you can
+ disconnect its cellular antenna and its GPS antenna. If you want
+ GPS navigation, get a separate navigator which runs free software
+ and works</em></ins></span> with <span class="removed"><del><strong>Viacom
adds 2.3 million households</strong></del></span> <span
class="inserted"><ins><em>Open Street Map.</p>
</li>
<li id="M201912171">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Most modern cars now</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
- even if</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
- record and send various kinds of data to the manufacturer</a>. For
- the user, access to the data is nearly impossible, as</em></ins></span> it
<span class="removed"><del><strong>isn't a TV
channel.</p></strong></del></span> <span
class="inserted"><ins><em>involves
- cracking the car's computer, which is always hidden and running with
- proprietary software.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV
- <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching</strong></del></span>
+ <p>Most modern cars now <a
+
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
+ record and send various kinds of data</em></ins></span> to the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. For</em></ins></span>
+ the <span class="removed"><del><strong>company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>user, access to the data is nearly impossible,
as it involves
+ cracking the car's computer, which is always hidden and
running</em></ins></span> with <span class="removed"><del><strong>online
+ social media participation, Tivo can now</strong></del></span>
+ <span class="inserted"><ins><em>proprietary software.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201903290">
+ <li id="M201903290">
<!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tesla cars collect lots of personal data,</em></ins></span> and
<span class="removed"><del><strong>listening all</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
- when they go to a junkyard</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>driver's personal data goes with
- them</a>.</p></em></ins></span>
+ <p>Tesla cars collect lots of personal data, and</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
+ when they go to a junkyard the driver's personal data
goes</em></ins></span> with <span class="removed"><del><strong>online
purchases</a>, exposing all users</strong></del></span>
+ <span class="inserted"><ins><em>them</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
- <span class="inserted"><ins><em><li id="M201902011">
+ <li id="M201902011">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The FordPass Connect feature of some Ford vehicles
has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access to</em></ins></span> the <span
class="removed"><del><strong>internet</strong></del></span> <span
class="inserted"><ins><em>internal car network</a>. It is constantly
- connected</em></ins></span> to <span class="removed"><del><strong>another
- company, Nuance</a>. Nuance can save it</strong></del></span> <span
class="inserted"><ins><em>the cellular phone network</em></ins></span> and
<span class="removed"><del><strong>would then</strong></del></span> <span
class="inserted"><ins><em>sends Ford a lot of data,
+ <p>The FordPass Connect feature of some Ford vehicles has <a
+
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ near-complete access</em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>the internal car
network</a>. It is constantly
+ connected</em></ins></span> to <span class="removed"><del><strong>be
+ picked up</strong></del></span> <span class="inserted"><ins><em>the
cellular phone network and sends Ford a lot of data,
including car location. This feature operates even when the ignition
key is removed, and users report that they can't disable it.</p>
- <p>If you own one of these cars,</em></ins></span> have <span
class="removed"><del><strong>to
- give it to</strong></del></span> <span class="inserted"><ins><em>you
succeeded in breaking</em></ins></span> the <span
class="removed"><del><strong>US</strong></del></span>
- <span class="inserted"><ins><em>connectivity by disconnecting the cellular
modem,</em></ins></span> or <span class="removed"><del><strong>some other
government.</p>
- <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>wrapping the
- antenna in aluminum foil?</p>
+ <p>If you own one of these cars, have you succeeded in breaking the
+ connectivity</em></ins></span> by <span
class="removed"><del><strong>proprietary malware running on other
devices</strong></del></span> <span class="inserted"><ins><em>disconnecting the
cellular modem, or wrapping the
+ antenna</em></ins></span> in
+ <span class="removed"><del><strong>range so as</strong></del></span>
<span class="inserted"><ins><em>aluminum foil?</p>
</li>
<li id="M201811300">
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>In China, it</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>mandatory for electric
- cars</em></ins></span> to be <span class="removed"><del><strong>trusted
unless it is done
- by free software in your own computer.</p>
-
- <p>In its privacy policy, Samsung explicitly
confirms</strong></del></span> <span class="inserted"><ins><em>equipped with a
terminal</em></ins></span> that <a <span
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be
transmitted</strong></del></span>
+ <p>In China, it is mandatory for electric
+ cars</em></ins></span> to <span class="removed"><del><strong>determine
that they are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads</strong></del></span> <span class="inserted"><ins><em>be
equipped</em></ins></span> with <span class="removed"><del><strong>Web
activity, and
+ other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
+ </li>
+ <li><p>Vizio “smart” TVs recognize
and</strong></del></span> <span class="inserted"><ins><em>a terminal
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if it isn't</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
- transfers technical data, including car location,</em></ins></span>
- to
- <span class="removed"><del><strong>third parties</a>.</p>
+ transfers technical data, including car location,
+ to</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p>
</li>
- <li><p>Spyware in</strong></del></span> <span
class="inserted"><ins><em>a government-run platform</a>. In
practice,</em></ins></span> <a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports what the user watches, and
- the switch to turn</strong></del></span>
+ <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>government-run platform</a>. In
practice,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching and listening all</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying">
- manufacturers collect</em></ins></span> this <span
class="removed"><del><strong>off has no effect. (The fact
that</strong></del></span> <span class="inserted"><ins><em>data</a> as
part of their own spying, then
- forward it to</em></ins></span> the
- <span class="removed"><del><strong>transmission reports a 404 error
really means nothing;</strong></del></span> <span
class="inserted"><ins><em>government-run platform.</p>
+ manufacturers collect this data</a> as part of their own spying, then
+ forward it to</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>government-run
platform.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
- <li id="M201810230">
+ <span class="inserted"><ins><em><li id="M201810230">
<!--#set var="DATE" value='<small
class="date-tag">2018-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>GM <a
- href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked</em></ins></span> the <span
class="removed"><del><strong>server</strong></del></span> <span
class="inserted"><ins><em>choices of radio programs</a> in its
+ <p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
+ tracked</em></ins></span> the <span class="removed"><del><strong>internet
to another
+ company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>choices of radio programs</a> in its
“connected” cars, minute by minute.</p>
- <p>GM did not get users' consent, but it</em></ins></span> could
<span class="removed"><del><strong>save</strong></del></span> <span
class="inserted"><ins><em>have got</em></ins></span> that <span
class="removed"><del><strong>data anyway.)</p>
+ <p>GM did not get users' consent, but</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>could</em></ins></span> have <span
class="removed"><del><strong>to
+ give</strong></del></span> <span class="inserted"><ins><em>got that
easily by
+ sneaking</em></ins></span> it <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>into</em></ins></span> the <span
class="removed"><del><strong>US or</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for</em></ins></span> some
<span class="removed"><del><strong>other government.</p>
+ <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>digital service
+ or other. A requirement for consent</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>effectively no protection.</p>
+
+ <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="removed"><del><strong>be trusted
unless it is done
+ by free software in</strong></del></span> <span
class="inserted"><ins><em>you,
+ watching you, following</em></ins></span> your <span
class="removed"><del><strong>own computer.</p>
+
+ <p>In its privacy policy, Samsung explicitly confirms
+ that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice</strong></del></span>
<span class="inserted"><ins><em>movements, tracking passengers' cell
+ phones. <em>All</em> such</em></ins></span> data <span
class="removed"><del><strong>containing sensitive information
will</strong></del></span> <span class="inserted"><ins><em>collection
should</em></ins></span> be <span
class="removed"><del><strong>transmitted</strong></del></span> <span
class="inserted"><ins><em>forbidden.</p>
- <p>Even worse,</strong></del></span> <span
class="inserted"><ins><em>easily by
- sneaking</em></ins></span> it
- <span class="removed"><del><strong><a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on</strong></del></span> <span class="inserted"><ins><em>into the
contract that users sign for some digital service
- or other. A requirement for consent is effectively no protection.</p>
-
- <p>The cars can also collect lots of</em></ins></span> other <span
class="removed"><del><strong>devices on</strong></del></span> <span
class="inserted"><ins><em>data: listening to you,
- watching you, following your movements, tracking passengers' cell
- phones. <em>All</em> such data collection should be
forbidden.</p>
-
- <p>But if you really want to be safe, we must make sure the car's
- hardware cannot collect any of that data, or that</em></ins></span> the
<span class="removed"><del><strong>user's local network.</a></p>
+ <p>But if you really want</em></ins></span> to
+ <span class="removed"><del><strong>third parties</a>.</p>
+ </li>
+ <li><p>Spyware in
+ <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a> reports what the user watches,
and</strong></del></span> <span class="inserted"><ins><em>be safe, we must make
sure</em></ins></span> the <span class="removed"><del><strong>switch to turn
this off has no effect. (The fact</strong></del></span> <span
class="inserted"><ins><em>car's
+ hardware cannot collect any of</em></ins></span> that <span
class="removed"><del><strong>the
+ transmission reports a 404 error really means nothing; the server
+ could save</strong></del></span> <span class="inserted"><ins><em>data,
or</em></ins></span> that <span class="removed"><del><strong>data
anyway.)</p>
+
+ <p>Even worse, it
+ <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on the user's local network.</a></p>
- <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>software
- is free so we know</em></ins></span> it <span
class="removed"><del><strong>had installed a patch to stop this,
but</strong></del></span> <span class="inserted"><ins><em>won't
collect</em></ins></span> any <span class="removed"><del><strong>product
+ <p>LG later said it had installed a patch to stop this,
but</strong></del></span> <span class="inserted"><ins><em>the software
+ is free so we know it won't collect</em></ins></span> any <span
class="removed"><del><strong>product
could spy this way.</p>
<p>Meanwhile, LG TVs
@@ -3632,78 +3636,73 @@
cell phone modem which allows effectively anyone to <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
access</em></ins></span> its <span
class="removed"><del><strong>headphones</a>.
-Specifically, the app would record the names of the audio files
-users listen</strong></del></span> <span class="inserted"><ins><em>computers
remotely and make changes in various
+Specifically,</strong></del></span> <span class="inserted"><ins><em>computers
remotely and make changes in various
settings</a>.</p>
- <p>That's easy</em></ins></span> to <span
class="removed"><del><strong>along with the headphone's unique serial number.
-</p>
-
-<p>The suit accuses that this was done without the users' consent.
-If</strong></del></span> <span class="inserted"><ins><em>do
because</em></ins></span> the <span class="removed"><del><strong>fine print
of</strong></del></span> <span class="inserted"><ins><em>system has no
authentication
- when accessed through</em></ins></span> the <span
class="removed"><del><strong>app said that users gave consent for this,
-would that make</strong></del></span> <span class="inserted"><ins><em>modem.
However, even if</em></ins></span> it <span
class="removed"><del><strong>acceptable? No way! It
should</strong></del></span> <span class="inserted"><ins><em>asked
- for authentication, you couldn't</em></ins></span> be <span
class="removed"><del><strong>flat out</strong></del></span> <span
class="inserted"><ins><em>confident that Nissan
- has no access. The software in the car is proprietary,</em></ins></span>
<a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">
-illegal</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
means
+ <p>That's easy to do because</em></ins></span> the <span
class="removed"><del><strong>app would record</strong></del></span> <span
class="inserted"><ins><em>system has no authentication
+ when accessed through</em></ins></span> the <span
class="removed"><del><strong>names of</strong></del></span> <span
class="inserted"><ins><em>modem. However, even if it asked
+ for authentication, you couldn't be confident that Nissan
+ has no access. The software in</em></ins></span> the <span
class="removed"><del><strong>audio files
+users listen</strong></del></span> <span class="inserted"><ins><em>car is
proprietary, <a
+ href="/philosophy/free-software-even-more-important.html">which means
it demands blind faith from its users</a>.</p>
- <p>Even if no one connects</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>car remotely, the cell phone modem
- enables the phone company</em></ins></span> to <span
class="removed"><del><strong>snoop at all</a>.
+ <p>Even if no one connects</em></ins></span> to <span
class="removed"><del><strong>along with</strong></del></span> the <span
class="removed"><del><strong>headphone's unique serial number.
</p>
-</li>
- <li><p>Many
- <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and
report</strong></del></span> <span class="inserted"><ins><em>track the car's
movements all the time;
- it is possible</em></ins></span> to <span
class="inserted"><ins><em>physically remove</em></ins></span> the
- <span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
-
- <p>A game console is a computer, and you can't trust a computer
with
- a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>cell phone modem, though.</p></em></ins></span>
+<p>The suit accuses that this was done without</strong></del></span>
<span class="inserted"><ins><em>car remotely,</em></ins></span> the <span
class="removed"><del><strong>users' consent.
+If</strong></del></span> <span class="inserted"><ins><em>cell phone modem
+ enables</em></ins></span> the <span class="removed"><del><strong>fine
print of</strong></del></span> <span class="inserted"><ins><em>phone company to
track</em></ins></span> the <span class="removed"><del><strong>app said that
users gave consent for this,
+would that make</strong></del></span> <span class="inserted"><ins><em>car's
movements all the time;</em></ins></span>
+ it <span class="removed"><del><strong>acceptable? No way! It should be
flat out
+<a href="/philosophy/surveillance-vs-democracy.html">
+illegal</strong></del></span> <span class="inserted"><ins><em>is
possible</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>physically remove</em></ins></span> the <span
class="removed"><del><strong>app to snoop at all</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>cell phone
modem, though.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps
- <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of</strong></del></span>
+ <span class="removed"><del><strong><li><p>Many
+ <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users</strong></del></span>
<span class="inserted"><ins><em><li id="M201306140">
<!--#set var="DATE" value='<small
class="date-tag">2013-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tesla cars allow the company to extract</em></ins></span>
- data <span class="removed"><del><strong>about their
users</strong></del></span> <span
class="inserted"><ins><em>remotely</em></ins></span> and <span
class="removed"><del><strong>their users'
- friends</strong></del></span> <span class="inserted"><ins><em>determine
the car's location
- at any time. (See Section 2, paragraphs b</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
-
- <p>Even nastier, they do</strong></del></span> <span
class="inserted"><ins><em>c of the <a
+ <p>Tesla cars allow the company to extract
+ data remotely and determine the car's location
+ at any time. (See Section 2, paragraphs b</em></ins></span> and <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>c of the <a
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- privacy statement</a>.) The company says</em></ins></span> it <span
class="removed"><del><strong>through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
- information, but if the state orders it to get</em></ins></span> the data
- <span class="removed"><del><strong>collected by various
cr…apps</strong></del></span> and <span
class="removed"><del><strong>sites</strong></del></span> <span
class="inserted"><ins><em>hand it
- over, the state can store it.</p>
+ privacy statement</a>.) The company says it doesn't store this
+ information, but if the state orders it</em></ins></span> to <span
class="inserted"><ins><em>get</em></ins></span> the
+ <span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
+
+ <p>A game console is a computer,</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> and <span
class="removed"><del><strong>you can't trust a computer with
+ a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>hand it
+ over, the state can store it.</p></em></ins></span>
</li>
- <li id="M201303250">
+ <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201303250">
<!--#set var="DATE" value='<small
class="date-tag">2013-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p id="records-drivers">Proprietary software in cars <a
-
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
- records information about drivers' movements</a>, which
is</em></ins></span> made <span class="removed"><del><strong>by different
+ <p id="records-drivers">Proprietary software in
cars</em></ins></span> <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of data</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
+ records information</em></ins></span> about <span
class="removed"><del><strong>their users</strong></del></span> <span
class="inserted"><ins><em>drivers' movements</a>, which is made
+ available to car manufacturers, insurance companies,</em></ins></span> and
<span class="removed"><del><strong>their users'
+ friends</strong></del></span> <span
class="inserted"><ins><em>others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
+ is not really a matter of proprietary surveillance. These systems
+ are an intolerable invasion of privacy,</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
+
+ <p>Even nastier, they do it through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>should be replaced
with
+ anonymous payment systems, but</em></ins></span> the <span
class="removed"><del><strong>data
+ collected</strong></del></span> <span class="inserted"><ins><em>invasion
isn't done</em></ins></span> by <span class="removed"><del><strong>various
cr…apps and sites made</strong></del></span> <span
class="inserted"><ins><em>malware. The
+ other cases mentioned are done</em></ins></span> by <span
class="removed"><del><strong>different
companies.</p>
- <p>They use this data to manipulate people</strong></del></span>
- <span class="inserted"><ins><em>available</em></ins></span> to <span
class="removed"><del><strong>buy things,</strong></del></span> <span
class="inserted"><ins><em>car manufacturers, insurance
companies,</em></ins></span> and <span class="removed"><del><strong>hunt
- for “whales” who can be led to spend a
lot</strong></del></span> <span class="inserted"><ins><em>others.</p>
-
- <p>The case</em></ins></span> of <span
class="removed"><del><strong>money. They
- also use</strong></del></span> <span
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
- is not really</em></ins></span> a <span class="removed"><del><strong>back
door to manipulate</strong></del></span> <span class="inserted"><ins><em>matter
of proprietary surveillance. These systems
- are an intolerable invasion of privacy, and should be replaced with
- anonymous payment systems, but</em></ins></span> the <span
class="removed"><del><strong>game play for specific players.</p>
-
- <p>While</strong></del></span> <span
class="inserted"><ins><em>invasion isn't done by malware. The
- other cases mentioned are done by proprietary malware in</em></ins></span>
the <span class="removed"><del><strong>article describes gratis games, games
that cost money</strong></del></span> <span
class="inserted"><ins><em>car.</p>
+ <p>They use this data to manipulate people</strong></del></span>
<span class="inserted"><ins><em>proprietary malware in the car.</p>
</li>
</ul>
@@ -3719,15 +3718,19 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Oculus headsets <a
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
- users to identify themselves to Facebook</a>. This will give Facebook
- free rein to pervasively snoop on Oculus users.</p>
+ users</em></ins></span> to <span class="removed"><del><strong>buy things,
and hunt
+ for “whales” who can be led</strong></del></span> <span
class="inserted"><ins><em>identify themselves</em></ins></span> to <span
class="removed"><del><strong>spend a lot of money. They
+ also use a back door</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. This will give Facebook
+ free rein</em></ins></span> to <span
class="removed"><del><strong>manipulate</strong></del></span> <span
class="inserted"><ins><em>pervasively snoop on Oculus users.</p>
</li>
<li id="M201612230">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>VR equipment, measuring every slight motion,
- creates the potential for the most intimate
+ creates</em></ins></span> the <span class="removed"><del><strong>game
play</strong></del></span> <span
class="inserted"><ins><em>potential</em></ins></span> for <span
class="removed"><del><strong>specific players.</p>
+
+ <p>While</strong></del></span> the <span
class="removed"><del><strong>article describes gratis games, games that cost
money</strong></del></span> <span class="inserted"><ins><em>most intimate
surveillance ever. All it takes to make this potential real <a
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
software as malicious as many other programs listed in this
@@ -3851,17 +3854,14 @@
<p>Many</em></ins></span> web sites report all their visitors
to Google by using the Google Analytics service, which <a
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
- tells Google the IP address and the page that was <span
class="removed"><del><strong>visited.</a></p></strong></del></span>
<span class="inserted"><ins><em>visited</a>.</p></em></ins></span>
+ tells Google the IP address and the page that was <span
class="removed"><del><strong>visited.</a></p></strong></del></span>
<span class="inserted"><ins><em>visited</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201200000">
+ <li id="M201200000">
<!--#set var="DATE" value='<small
class="date-tag">[2012]</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many</em></ins></span> web sites try to collect users' address
books (the user's list
- of <span class="removed"><del><strong>other people's phone numbers or
email addresses).
- This violates</strong></del></span> <span
class="inserted"><ins><em>other people's phone numbers or email addresses).
This violates
+ <p>Many web sites try to collect users' address books (the user's
list
+ of other people's phone numbers or email addresses). This violates
the privacy of those other people.</p>
</li>
@@ -3892,18 +3892,22 @@
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege">
getting sued</a> for this.</p>
- <p>The chat facilities of some customer services
use</em></ins></span> the <span
class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>same sort</em></ins></span> of <span
class="removed"><del><strong>those</strong></del></span>
- <span class="inserted"><ins><em>malware to <a
+ <p>The chat facilities of some customer services use the same sort of
+ malware to <a
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
- read what the user is typing before it is posted</a>.</p>
+ read what the user is typing before it is
posted</a>.</p></em></ins></span>
</li>
- <li id="M201807190">
+ <span
class="removed"><del><strong><li><p>Many</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201807190">
<!--#set var="DATE" value='<small
class="date-tag">2018-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
- JavaScript on its web site to give</em></ins></span> other <span
class="removed"><del><strong>people.</p></strong></del></span> <span
class="inserted"><ins><em>companies personal data on
+ JavaScript on its</em></ins></span> web <span
class="removed"><del><strong>sites try</strong></del></span> <span
class="inserted"><ins><em>site</em></ins></span> to <span
class="removed"><del><strong>collect users' address books (the
+ user's list of other people's phone numbers or email addresses).
+ This violates the privacy of those</strong></del></span> <span
class="inserted"><ins><em>give</em></ins></span> other <span
class="removed"><del><strong>people.</p></strong></del></span> <span
class="inserted"><ins><em>companies personal data on
its customers</a>.</p></em></ins></span>
</li>
@@ -4069,7 +4073,7 @@
cookie feature helps web sites track
visitors</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16">handed
over personal data of Indian protesters and activists to Indian
- police</a> which leaded to their arrest. The cops requested the IP
+ police</a> which led to their arrest. The cops requested the IP
address and the location where a document was created and with that
information, they identified protesters and
activists.</p></em></ins></span>
</li>
@@ -4266,7 +4270,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/15 14:32:25 $
+$Date: 2021/04/15 19:01:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.401
retrieving revision 1.402
diff -u -b -r1.401 -r1.402
--- proprietary-surveillance.it.po 15 Apr 2021 14:32:26 -0000 1.401
+++ proprietary-surveillance.it.po 15 Apr 2021 19:01:23 -0000 1.402
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-15 14:25+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -5464,7 +5464,7 @@
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.263
retrieving revision 1.264
diff -u -b -r1.263 -r1.264
--- proprietary-surveillance.ja-diff.html 15 Apr 2021 14:32:28 -0000
1.263
+++ proprietary-surveillance.ja-diff.html 15 Apr 2021 19:01:23 -0000
1.264
@@ -1206,7 +1206,7 @@
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
Several “features” of iOS seem to exist
- for no possible purpose other than surveillance</a>. Here
is</em></ins></span> the <span class="removed"><del><strong>totally inadequate
proposed response:</strong></del></span> <span class="inserted"><ins><em><a
+ for no possible purpose other than surveillance</a>. Here is the
<a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
@@ -3103,7 +3103,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Lots of “smart” products are designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen to everyone in the house, all the time</a>.</p>
+ listen to everyone in</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed
response:</strong></del></span> <span class="inserted"><ins><em>house, all the
time</a>.</p>
<p>Today's technological practice does not include any way of
making</em></ins></span>
a <span class="removed"><del><strong>labeling
@@ -3203,9 +3203,7 @@
<p>Thus, ill-intentioned unauthorized people</em></ins></span> can
<span class="removed"><del><strong>collect</strong></del></span> <span
class="inserted"><ins><em>intercept communications between parent and child and
spoof messages to and from</em></ins></span> the <span
class="removed"><del><strong>emails of members of
Parliament</strong></del></span> <span class="inserted"><ins><em>watch,
possibly endangering the child.</p>
- <p><small>(Note that</em></ins></span> this <span
class="removed"><del><strong>way, because they pass it through
Microsoft.</p></li>
-
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>article misuses the word “<a
+ <p><small>(Note that</em></ins></span> this <span
class="removed"><del><strong>way, because they pass</strong></del></span> <span
class="inserted"><ins><em>article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
to mean “crackers.”)</small></p>
</li>
@@ -3215,10 +3213,12 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A very cheap “smart watch” comes with an Android app
<a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects to an unidentified site</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span
class="inserted"><ins><em>China</a>.</p>
+ that connects to an unidentified site in China</a>.</p>
<p>The article says this is a back door, but that could be a
- misunderstanding. However, it is certainly surveillance, at
least.</p>
+ misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>is certainly surveillance, at least.</p>
</li>
<li id="M201407090">
@@ -3339,12 +3339,12 @@
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>In China, it is mandatory for electric
- cars to be equipped with a terminal that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ cars to be equipped with a terminal that <a
+ href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
transfers technical data, including car location,
- to a government-run platform</a>. In practice, <a
- href="/proprietary/proprietary-surveillance.html#car-spying">
+ to a government-run platform</a>. In practice,</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying">
manufacturers collect this data</a> as part of their own spying, then
forward it to</em></ins></span> the <span
class="removed"><del><strong>user reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>government-run platform.</p></em></ins></span>
</li>
@@ -3448,8 +3448,7 @@
<p>The case of toll-collection systems, mentioned in this article,
is not really a matter of proprietary surveillance. These systems
are an intolerable invasion of privacy, and should be replaced with
- anonymous
- <span class="removed"><del><strong>payment systems, but the invasion
isn't done by malware. The other
+ anonymous payment systems, but the <span
class="removed"><del><strong>invasion isn't done by malware. The other
cases mentioned are done by proprietary malware in the
car.</p></li>
<li><p>Tesla cars allow the company to extract data remotely and
@@ -3457,7 +3456,8 @@
<a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
Section 2, paragraphs b and c.</a>). The company says it doesn't
store this information, but if the state orders it to get the data
- and hand it over,</strong></del></span> <span
class="inserted"><ins><em>payment systems, but</em></ins></span> the <span
class="removed"><del><strong>state can store it.</p>
+ and hand it over,</strong></del></span> <span
class="inserted"><ins><em>invasion isn't done by malware. The
+ other cases mentioned are done by proprietary malware in</em></ins></span>
the <span class="removed"><del><strong>state can store it.</p>
</li>
</ul>
@@ -3473,8 +3473,7 @@
<ul>
<li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy on their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>invasion isn't done by malware. The
- other cases mentioned are done by proprietary malware in the
car.</p></em></ins></span>
+ Rent-to-own computers were programmed to spy on their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>car.</p></em></ins></span>
</li>
</ul>
@@ -3653,16 +3652,15 @@
<p>Many web sites report all their visitors
to Google by using</em></ins></span> the <span
class="removed"><del><strong>user watches,</strong></del></span> <span
class="inserted"><ins><em>Google Analytics service, which <a
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
- tells Google the IP address</em></ins></span> and the <span
class="removed"><del><strong>switch to turn this off has no effect. (The
fact</strong></del></span> <span
class="inserted"><ins><em>page</em></ins></span> that <span
class="inserted"><ins><em>was visited</a>.</p>
+ tells Google the IP address</em></ins></span> and the <span
class="removed"><del><strong>switch</strong></del></span> <span
class="inserted"><ins><em>page that was visited</a>.</p>
</li>
<li id="M201200000">
<!--#set var="DATE" value='<small
class="date-tag">[2012]</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many web sites try to collect users' address books (the user's
list
- of other people's phone numbers or email addresses). This
violates</em></ins></span>
- the
- <span class="removed"><del><strong>transmission
reports</strong></del></span> <span class="inserted"><ins><em>privacy of those
other people.</p>
+ <p>Many web sites try</em></ins></span> to <span
class="removed"><del><strong>turn this off has no effect. (The
fact</strong></del></span> <span class="inserted"><ins><em>collect users'
address books (the user's list
+ of other people's phone numbers or email addresses). This violates
+ the privacy of those other people.</p>
</li>
<li id="M201110040">
@@ -3687,18 +3685,19 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Many web sites use JavaScript code <a
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- to snoop on information that users have typed into</em></ins></span> a
<span class="removed"><del><strong>404 error really means
nothing;</strong></del></span>
- <span class="inserted"><ins><em>form but not sent</a>, in order to
learn their identity. Some are <a
+ to snoop on information</em></ins></span> that <span
class="inserted"><ins><em>users have typed into a
+ form but not sent</a>, in order to learn their identity. Some are
<a
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege">
getting sued</a> for this.</p>
- <p>The chat facilities of some customer services
use</em></ins></span> the <span class="removed"><del><strong>server
- could save that data anyway.)</p>
-
- <p>Even worse,</strong></del></span> <span
class="inserted"><ins><em>same sort of
+ <p>The chat facilities of some customer services
use</em></ins></span> the
+ <span class="removed"><del><strong>transmission reports a 404 error
really means nothing;</strong></del></span> <span
class="inserted"><ins><em>same sort of
malware to <a
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
- read what the user is typing before</em></ins></span> it <span
class="inserted"><ins><em>is posted</a>.</p>
+ read what</em></ins></span> the <span class="removed"><del><strong>server
+ could save that data anyway.)</p>
+
+ <p>Even worse,</strong></del></span> <span
class="inserted"><ins><em>user is typing before</em></ins></span> it <span
class="inserted"><ins><em>is posted</a>.</p>
</li>
<li id="M201807190">
@@ -3873,9 +3872,9 @@
nonfree, so they can't verify what it really does. The only remedy is
to persuade school officials</em></ins></span> to <span
class="removed"><del><strong>Google by using
the Google Analytics service, which</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
- tells Google the IP address</strong></del></span> <span
class="inserted"><ins><em>href="/education/edu-schools.html">
+ tells Google</strong></del></span> <span
class="inserted"><ins><em>href="/education/edu-schools.html">
exclusively use free software</a> for both education and school
- administration. If the school is run locally, parents</em></ins></span>
and <span class="inserted"><ins><em>teachers
+ administration. If</em></ins></span> the <span
class="removed"><del><strong>IP address</strong></del></span> <span
class="inserted"><ins><em>school is run locally, parents</em></ins></span> and
<span class="inserted"><ins><em>teachers
can mandate their representatives at</em></ins></span> the <span
class="removed"><del><strong>page that was visited.</a></p>
</li>
@@ -3957,7 +3956,7 @@
cookie feature helps web sites track
visitors</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16">handed
over personal data of Indian protesters and activists to Indian
- police</a> which leaded to their arrest. The cops requested the IP
+ police</a> which led to their arrest. The cops requested the IP
address and the location where a document was created and with that
information, they identified protesters and
activists.</p></em></ins></span>
</li>
@@ -4154,7 +4153,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/15 14:32:28 $
+$Date: 2021/04/15 19:01:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.383
retrieving revision 1.384
diff -u -b -r1.383 -r1.384
--- proprietary-surveillance.ja.po 15 Apr 2021 14:32:28 -0000 1.383
+++ proprietary-surveillance.ja.po 15 Apr 2021 19:01:23 -0000 1.384
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-15 14:25+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -4378,7 +4378,7 @@
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.322
retrieving revision 1.323
diff -u -b -r1.322 -r1.323
--- proprietary-surveillance.pot 15 Apr 2021 14:32:28 -0000 1.322
+++ proprietary-surveillance.pot 15 Apr 2021 19:01:23 -0000 1.323
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-15 14:25+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -3554,7 +3554,7 @@
"Google <a "
"href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\">handed
"
"over personal data of Indian protesters and activists to Indian police</a> "
-"which leaded to their arrest. The cops requested the IP address and the "
+"which led to their arrest. The cops requested the IP address and the "
"location where a document was created and with that information, they "
"identified protesters and activists."
msgstr ""
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.706
retrieving revision 1.707
diff -u -b -r1.706 -r1.707
--- proprietary-surveillance.ru.po 15 Apr 2021 16:29:55 -0000 1.706
+++ proprietary-surveillance.ru.po 15 Apr 2021 19:01:23 -0000 1.707
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-04-15 14:25+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 18:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -5254,11 +5255,25 @@
"\">#SpywareInNetworks</a>)</span>"
#. type: Content of: <div><div><ul><li><p>
+# | Google <a
+# |
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\">handed
+# | over personal data of Indian protesters and activists to Indian police</a>
+# | which [-leaded-] {+led+} to their arrest. The cops requested the IP
+# | address and the location where a document was created and with that
+# | information, they identified protesters and activists.
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
msgid ""
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.245
retrieving revision 1.246
diff -u -b -r1.245 -r1.246
--- proprietary.de-diff.html 11 Apr 2021 15:04:19 -0000 1.245
+++ proprietary.de-diff.html 15 Apr 2021 19:01:23 -0000 1.246
@@ -230,7 +230,7 @@
<p>Google <a
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16">handed
over personal data of Indian protesters and activists to Indian
- police</a> which leaded to their arrest. The cops requested the IP
+ police</a> which led to their arrest. The cops requested the IP
address and the location where a document was created and with that
information, they identified protesters and activists.</p>
</li>
@@ -356,7 +356,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/11 15:04:19 $
+$Date: 2021/04/15 19:01:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.280
retrieving revision 1.281
diff -u -b -r1.280 -r1.281
--- proprietary.de.po 11 Apr 2021 15:04:19 -0000 1.280
+++ proprietary.de.po 15 Apr 2021 19:01:23 -0000 1.281
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -483,7 +483,7 @@
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.428
retrieving revision 1.429
diff -u -b -r1.428 -r1.429
--- proprietary.es.po 12 Apr 2021 10:33:24 -0000 1.428
+++ proprietary.es.po 15 Apr 2021 19:01:23 -0000 1.429
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 18:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -340,11 +341,25 @@
msgstr "Añadidos recientes"
#. type: Content of: <div><ul><li><p>
+# | Google <a
+# |
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\">handed
+# | over personal data of Indian protesters and activists to Indian police</a>
+# | which [-leaded-] {+led+} to their arrest. The cops requested the IP
+# | address and the location where a document was created and with that
+# | information, they identified protesters and activists.
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
msgid ""
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.470
retrieving revision 1.471
diff -u -b -r1.470 -r1.471
--- proprietary.fr.po 12 Apr 2021 09:50:40 -0000 1.470
+++ proprietary.fr.po 15 Apr 2021 19:01:23 -0000 1.471
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
"PO-Revision-Date: 2021-04-12 11:45+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 18:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -337,11 +338,25 @@
msgstr "Ajouts récents"
#. type: Content of: <div><ul><li><p>
+# | Google <a
+# |
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\">handed
+# | over personal data of Indian protesters and activists to Indian police</a>
+# | which [-leaded-] {+led+} to their arrest. The cops requested the IP
+# | address and the location where a document was created and with that
+# | information, they identified protesters and activists.
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
msgid ""
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.257
retrieving revision 1.258
diff -u -b -r1.257 -r1.258
--- proprietary.it-diff.html 11 Apr 2021 15:04:19 -0000 1.257
+++ proprietary.it-diff.html 15 Apr 2021 19:01:23 -0000 1.258
@@ -229,7 +229,7 @@
<p>Google <a
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16">handed
over personal data of Indian protesters and activists to Indian
- police</a> which leaded to their arrest. The cops requested the IP
+ police</a> which led to their arrest. The cops requested the IP
address and the location where a document was created and with that
information, they identified protesters and activists.</p>
</li>
@@ -355,7 +355,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/11 15:04:19 $
+$Date: 2021/04/15 19:01:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.289
retrieving revision 1.290
diff -u -b -r1.289 -r1.290
--- proprietary.it.po 11 Apr 2021 15:04:19 -0000 1.289
+++ proprietary.it.po 15 Apr 2021 19:01:23 -0000 1.290
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -488,7 +488,7 @@
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.262
retrieving revision 1.263
diff -u -b -r1.262 -r1.263
--- proprietary.ja-diff.html 11 Apr 2021 15:04:19 -0000 1.262
+++ proprietary.ja-diff.html 15 Apr 2021 19:01:24 -0000 1.263
@@ -234,7 +234,7 @@
<p>Google <a
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16">handed
over personal data of Indian protesters and activists to Indian
- police</a> which leaded to their arrest. The cops requested the IP
+ police</a> which led to their arrest. The cops requested the IP
address and the location where a document was created and with that
information, they identified protesters and activists.</p>
</li>
@@ -360,7 +360,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/11 15:04:19 $
+$Date: 2021/04/15 19:01:24 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.273
retrieving revision 1.274
diff -u -b -r1.273 -r1.274
--- proprietary.ja.po 11 Apr 2021 15:04:19 -0000 1.273
+++ proprietary.ja.po 15 Apr 2021 19:01:24 -0000 1.274
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -346,7 +346,7 @@
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.258
retrieving revision 1.259
diff -u -b -r1.258 -r1.259
--- proprietary.nl-diff.html 11 Apr 2021 15:04:19 -0000 1.258
+++ proprietary.nl-diff.html 15 Apr 2021 19:01:24 -0000 1.259
@@ -229,7 +229,7 @@
<p>Google <a
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16">handed
over personal data of Indian protesters and activists to Indian
- police</a> which leaded to their arrest. The cops requested the IP
+ police</a> which led to their arrest. The cops requested the IP
address and the location where a document was created and with that
information, they identified protesters and activists.</p>
</li>
@@ -355,7 +355,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/11 15:04:19 $
+$Date: 2021/04/15 19:01:24 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.263
retrieving revision 1.264
diff -u -b -r1.263 -r1.264
--- proprietary.nl.po 11 Apr 2021 15:04:19 -0000 1.263
+++ proprietary.nl.po 15 Apr 2021 19:01:24 -0000 1.264
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -391,7 +391,7 @@
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.275
retrieving revision 1.276
diff -u -b -r1.275 -r1.276
--- proprietary.pl-diff.html 11 Apr 2021 15:04:19 -0000 1.275
+++ proprietary.pl-diff.html 15 Apr 2021 19:01:24 -0000 1.276
@@ -228,7 +228,7 @@
<p>Google <a
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16">handed
over personal data of Indian protesters and activists to Indian
- police</a> which leaded to their arrest. The cops requested the IP
+ police</a> which led to their arrest. The cops requested the IP
address and the location where a document was created and with that
information, they identified protesters and activists.</p>
</li>
@@ -354,7 +354,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/11 15:04:19 $
+$Date: 2021/04/15 19:01:24 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.256
retrieving revision 1.257
diff -u -b -r1.256 -r1.257
--- proprietary.pl.po 11 Apr 2021 15:04:19 -0000 1.256
+++ proprietary.pl.po 15 Apr 2021 19:01:24 -0000 1.257
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -572,7 +572,7 @@
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.253
retrieving revision 1.254
diff -u -b -r1.253 -r1.254
--- proprietary.pot 11 Apr 2021 15:04:19 -0000 1.253
+++ proprietary.pot 15 Apr 2021 19:01:24 -0000 1.254
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -283,7 +283,7 @@
"Google <a "
"href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\">handed
"
"over personal data of Indian protesters and activists to Indian police</a> "
-"which leaded to their arrest. The cops requested the IP address and the "
+"which led to their arrest. The cops requested the IP address and the "
"location where a document was created and with that information, they "
"identified protesters and activists."
msgstr ""
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.405
retrieving revision 1.406
diff -u -b -r1.405 -r1.406
--- proprietary.pt-br.po 11 Apr 2021 15:04:19 -0000 1.405
+++ proprietary.pt-br.po 15 Apr 2021 19:01:24 -0000 1.406
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
"PO-Revision-Date: 2021-02-07 15:33-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -344,7 +344,7 @@
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.492
retrieving revision 1.493
diff -u -b -r1.492 -r1.493
--- proprietary.ru.po 12 Apr 2021 08:04:25 -0000 1.492
+++ proprietary.ru.po 15 Apr 2021 19:01:24 -0000 1.493
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 18:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -339,11 +340,25 @@
msgstr "ÐоÑледние добавлениÑ"
#. type: Content of: <div><ul><li><p>
+# | Google <a
+# |
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\">handed
+# | over personal data of Indian protesters and activists to Indian police</a>
+# | which [-leaded-] {+led+} to their arrest. The cops requested the IP
+# | address and the location where a document was created and with that
+# | information, they identified protesters and activists.
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
msgid ""
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- proprietary.tr.po 14 Apr 2021 18:15:50 -0000 1.146
+++ proprietary.tr.po 15 Apr 2021 19:01:24 -0000 1.147
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
"PO-Revision-Date: 2021-04-14 20:13+0200\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 18:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Poedit 2.4.2\n"
@@ -335,11 +336,19 @@
msgstr "Son eklenenler"
#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
msgid ""
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.185
retrieving revision 1.186
diff -u -b -r1.185 -r1.186
--- proprietary.zh-cn.po 13 Apr 2021 05:59:43 -0000 1.185
+++ proprietary.zh-cn.po 15 Apr 2021 19:01:24 -0000 1.186
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
"PO-Revision-Date: 2021-04-13 13:40+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-15 18:55+0000\n"
"X-Generator: Poedit 2.3\n"
#. type: Content of: <title>
@@ -314,11 +315,19 @@
msgstr "ææ°æ·»å "
#. type: Content of: <div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
msgid ""
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.238
retrieving revision 1.239
diff -u -b -r1.238 -r1.239
--- proprietary.zh-tw-diff.html 11 Apr 2021 15:04:20 -0000 1.238
+++ proprietary.zh-tw-diff.html 15 Apr 2021 19:01:24 -0000 1.239
@@ -230,7 +230,7 @@
<p>Google <a
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16">handed
over personal data of Indian protesters and activists to Indian
- police</a> which leaded to their arrest. The cops requested the IP
+ police</a> which led to their arrest. The cops requested the IP
address and the location where a document was created and with that
information, they identified protesters and activists.</p>
</li>
@@ -356,7 +356,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/11 15:04:20 $
+$Date: 2021/04/15 19:01:24 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.243
retrieving revision 1.244
diff -u -b -r1.243 -r1.244
--- proprietary.zh-tw.po 11 Apr 2021 15:04:20 -0000 1.243
+++ proprietary.zh-tw.po 15 Apr 2021 19:01:24 -0000 1.244
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-11 14:55+0000\n"
+"POT-Creation-Date: 2021-04-15 18:55+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -461,7 +461,7 @@
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.374
retrieving revision 1.375
diff -u -b -r1.374 -r1.375
--- pt-br.po 15 Apr 2021 14:32:30 -0000 1.374
+++ pt-br.po 15 Apr 2021 19:01:24 -0000 1.375
@@ -4448,7 +4448,7 @@
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.632
retrieving revision 1.633
diff -u -b -r1.632 -r1.633
--- ru.po 15 Apr 2021 16:19:06 -0000 1.632
+++ ru.po 15 Apr 2021 19:01:24 -0000 1.633
@@ -5357,11 +5357,25 @@
"оÑнÑÐ´Ñ Ð½Ðµ по ÑмолÑаниÑ.)"
#. type: Content of: <div><div><ul><li><p>
+# | Google <a
+# |
href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\">handed
+# | over personal data of Indian protesters and activists to Indian police</a>
+# | which [-leaded-] {+led+} to their arrest. The cops requested the IP
+# | address and the location where a document was created and with that
+# | information, they identified protesters and activists.
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
msgid ""
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
@@ -11817,9 +11831,9 @@
"be more aware that they are installing spyware."
msgstr ""
"ÐÑÑÑ ÑÑ
однÑй ÑÐ°Ð¹Ñ Ð¿Ð¾Ð´ названием <a
href=\"https://spyware.neocities.org"
-"\">СÑоÑож ÑпионÑкиÑ
пÑогÑамм</a>, на коÑоÑом
клаÑÑиÑиÑиÑÑÑÑÑÑ Ð¿ÑогÑаммÑ-ÑпионÑ, "
-"ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑзоваÑели могли бÑÑÑ Ð±Ð¾Ð»ÐµÐµ
оÑÐ²ÐµÐ´Ð¾Ð¼Ð»ÐµÐ½Ñ Ð¾ Ñом, ÑÑо они ÑÑÑанавливаÑÑ "
-"пÑогÑаммÑ-ÑпионÑ."
+"\">СÑоÑож ÑпионÑкиÑ
пÑогÑамм</a>, на коÑоÑом
клаÑÑиÑиÑиÑÑÑÑÑÑ Ð¿ÑогÑаммÑ-"
+"ÑпионÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑзоваÑели могли бÑÑÑ
более оÑÐ²ÐµÐ´Ð¾Ð¼Ð»ÐµÐ½Ñ Ð¾ Ñом, ÑÑо они "
+"ÑÑÑанавливаÑÑ Ð¿ÑогÑаммÑ-ÑпионÑ."
#. type: Content of: <div><div><div><h3>
msgid "Table of Contents"
@@ -13091,6 +13105,21 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
#~ msgid ""
+#~ "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#~ "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#~ "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#~ "and activists to Indian police</a> which leaded to their arrest. The cops "
+#~ "requested the IP address and the location where a document was created "
+#~ "and with that information, they identified protesters and activists."
+#~ msgstr ""
+#~ "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#~ "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#~ "doubt-1769772-2021-02-16\">пеÑедала индийÑкой
полиÑии пеÑÑоналÑнÑе даннÑе "
+#~ "ÑÑаÑÑников пÑоÑеÑÑов и акÑивиÑÑов
Ðндии</a>, ÑÑо пÑивело к иÑ
аÑеÑÑÑ. "
+#~ "ÐолиÑейÑкие заÑÑебовали адÑеÑа IP и
меÑÑо ÑÐ¾Ð·Ð´Ð°Ð½Ð¸Ñ Ð´Ð¾ÐºÑменÑа, а Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ "
+#~ "ÑÑой инÑоÑмаÑии они иденÑиÑиÑиÑовали
ÑÑаÑÑников пÑоÑеÑÑов и акÑивиÑÑов."
+
+#~ msgid ""
#~ "Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/"
#~ "technology/2021/03/10/amazon-library-ebook-monopoly\">stopping public "
#~ "libraries from lending e-books and audiobooks</a>. Amazon became powerful "
Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- tr.po 15 Apr 2021 14:32:30 -0000 1.167
+++ tr.po 15 Apr 2021 19:01:24 -0000 1.168
@@ -3947,11 +3947,19 @@
msgstr ""
#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
msgid ""
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
@@ -10045,6 +10053,22 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
#~ msgid ""
+#~ "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#~ "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#~ "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#~ "and activists to Indian police</a> which leaded to their arrest. The cops "
+#~ "requested the IP address and the location where a document was created "
+#~ "and with that information, they identified protesters and activists."
+#~ msgstr ""
+#~ "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#~ "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#~ "doubt-1769772-2021-02-16\">Hindistan'daki protestocuların kiÅisel "
+#~ "verilerini Hindistan polisine teslim etti</a>, bu da tutuklanmalarına yol
"
+#~ "açtı. Polisler bir belgenin oluÅturulduÄu konumu ve IP adresini talep "
+#~ "ettiler ve bu bilgiyi kullanarak protestocuları ve aktivistleri "
+#~ "belirlediler."
+
+#~ msgid ""
#~ "Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/"
#~ "technology/2021/03/10/amazon-library-ebook-monopoly\">stopping public "
#~ "libraries from lending e-books and audiobooks</a>. Amazon became powerful "
Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- zh-cn.po 15 Apr 2021 14:32:30 -0000 1.168
+++ zh-cn.po 15 Apr 2021 19:01:25 -0000 1.169
@@ -3891,11 +3891,19 @@
msgstr ""
#. type: Content of: <div><div><ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#| "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#| "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#| "and activists to Indian police</a> which leaded to their arrest. The cops "
+#| "requested the IP address and the location where a document was created "
+#| "and with that information, they identified protesters and activists."
msgid ""
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""
@@ -9771,6 +9779,20 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html\">微软</a>"
#~ msgid ""
+#~ "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#~ "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#~ "doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
+#~ "and activists to Indian police</a> which leaded to their arrest. The cops "
+#~ "requested the IP address and the location where a document was created "
+#~ "and with that information, they identified protesters and activists."
+#~ msgstr ""
+#~ "Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-"
+#~ "ravi-arrest-puts-privacy-of-all-google-india-users-in-"
+#~ "doubt-1769772-2021-02-16\">æå°åº¦æè®®è
åæ´»å¨å®¶ç个人信æ¯æ±æ交ç»å°åº¦è¦æ¹"
+#~ "</a>ï¼å¯¼è´è¿äºäººå£«è¢«æãè¦å¯è¦æ±æä¾ææ¡£å建æ¶ç IP
å°ååä½ç½®ä¿¡æ¯ï¼å¹¶æ®æ¤"
+#~ "确认æè®®è
åæ´»å¨å®¶ã"
+
+#~ msgid ""
#~ "Amazon's monopoly and DRM is <a href=\"https://www.washingtonpost.com/"
#~ "technology/2021/03/10/amazon-library-ebook-monopoly\">stopping public "
#~ "libraries from lending e-books and audiobooks</a>. Amazon became powerful "
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.303
retrieving revision 1.304
diff -u -b -r1.303 -r1.304
--- zh-tw.po 15 Apr 2021 14:32:30 -0000 1.303
+++ zh-tw.po 15 Apr 2021 19:01:25 -0000 1.304
@@ -3823,7 +3823,7 @@
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
-"and activists to Indian police</a> which leaded to their arrest. The cops "
+"and activists to Indian police</a> which led to their arrest. The cops "
"requested the IP address and the location where a document was created and "
"with that information, they identified protesters and activists."
msgstr ""