[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www philosophy/words-to-avoid.es.html philosoph...
From: |
GNUN |
Subject: |
www philosophy/words-to-avoid.es.html philosoph... |
Date: |
Mon, 26 Apr 2021 08:04:41 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 21/04/26 08:04:40
Modified files:
philosophy : words-to-avoid.es.html
philosophy/po : open-source-misses-the-point.ar-diff.html
open-source-misses-the-point.ar.po
open-source-misses-the-point.bg.po
open-source-misses-the-point.de-diff.html
open-source-misses-the-point.de.po
open-source-misses-the-point.el.po
open-source-misses-the-point.es.po
open-source-misses-the-point.fa.po
open-source-misses-the-point.fr.po
open-source-misses-the-point.hr-diff.html
open-source-misses-the-point.hr.po
open-source-misses-the-point.it-diff.html
open-source-misses-the-point.it.po
open-source-misses-the-point.ja.po
open-source-misses-the-point.lt-diff.html
open-source-misses-the-point.lt.po
open-source-misses-the-point.ml.po
open-source-misses-the-point.nl-diff.html
open-source-misses-the-point.nl.po
open-source-misses-the-point.pl.po
open-source-misses-the-point.pot
open-source-misses-the-point.pt-br.po
open-source-misses-the-point.ro-diff.html
open-source-misses-the-point.ro.po
open-source-misses-the-point.ru.po
open-source-misses-the-point.sq.po
open-source-misses-the-point.ta.po
open-source-misses-the-point.tr.po
open-source-misses-the-point.uk-diff.html
open-source-misses-the-point.uk.po
open-source-misses-the-point.zh-cn.po
words-to-avoid.es-en.html words-to-avoid.es.po
proprietary : proprietary.pt-br.html
proprietary/po : de.po es.po fr.po it.po ja.po nl.po pl.po pot
proprietary-manipulation.es.po
proprietary-manipulation.fr.po
proprietary-manipulation.pot
proprietary-manipulation.ru.po
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br-diff.html
proprietary.pt-br.po proprietary.ru.po
proprietary.tr.po proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/words-to-avoid.es.html?cvsroot=www&r1=1.156&r2=1.157
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ar-diff.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ar.po?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.bg.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.de-diff.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.de.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.el.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.es.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.fa.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.fr.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.hr-diff.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.hr.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.it-diff.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.it.po?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ja.po?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.lt-diff.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.lt.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ml.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.nl-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.nl.po?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.pl.po?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.pot?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.pt-br.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ro-diff.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ro.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ru.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.sq.po?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ta.po?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.tr.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.uk-diff.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.uk.po?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.zh-cn.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/words-to-avoid.es-en.html?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/words-to-avoid.es.po?cvsroot=www&r1=1.270&r2=1.271
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.pt-br.html?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.306&r2=1.307
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.434&r2=1.435
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.536&r2=1.537
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.306&r2=1.307
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.314&r2=1.315
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.307&r2=1.308
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.306&r2=1.307
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.305&r2=1.306
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.es.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.fr.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.pot?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.ru.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.180&r2=1.181
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.390&r2=1.391
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.184&r2=1.185
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.627&r2=1.628
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.246&r2=1.247
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.402&r2=1.403
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.264&r2=1.265
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.384&r2=1.385
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.323&r2=1.324
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.708&r2=1.709
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.248&r2=1.249
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.283&r2=1.284
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.435&r2=1.436
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.476&r2=1.477
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.260&r2=1.261
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.292&r2=1.293
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.265&r2=1.266
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.276&r2=1.277
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.261&r2=1.262
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.266&r2=1.267
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.278&r2=1.279
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.259&r2=1.260
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.256&r2=1.257
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br-diff.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.408&r2=1.409
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.498&r2=1.499
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.152&r2=1.153
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.190&r2=1.191
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.241&r2=1.242
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.246&r2=1.247
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.377&r2=1.378
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.640&r2=1.641
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.306&r2=1.307
Patches:
Index: philosophy/words-to-avoid.es.html
===================================================================
RCS file: /web/www/www/philosophy/words-to-avoid.es.html,v
retrieving revision 1.156
retrieving revision 1.157
diff -u -b -r1.156 -r1.157
--- philosophy/words-to-avoid.es.html 3 Mar 2021 10:29:21 -0000 1.156
+++ philosophy/words-to-avoid.es.html 26 Apr 2021 12:04:22 -0000 1.157
@@ -594,7 +594,7 @@
alimentación» de internet.
</p>
-<p>Véase también la <a href="http://www.salon.com/2000/06/14/love_7/">carta
+<p>Véase también la <a href="https://www.salon.com/2000/06/14/love_7/">carta
abierta de Courtney Love a Steve Case</a> y buscar por «<cite>content
provider</cite>» en esa página. Lamentablemente, la señorita Love no se ha
dado cuenta de que la expresión «propiedad intelectual» también es <a
@@ -1457,7 +1457,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2021/03/03 10:29:21 $
+$Date: 2021/04/26 12:04:22 $
<!-- timestamp end -->
</p>
Index: philosophy/po/open-source-misses-the-point.ar-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ar-diff.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- philosophy/po/open-source-misses-the-point.ar-diff.html 6 Oct 2020
08:42:14 -0000 1.29
+++ philosophy/po/open-source-misses-the-point.ar-diff.html 26 Apr 2021
12:04:24 -0000 1.30
@@ -140,7 +140,7 @@
(including many Android devices) come</strong></del></span> <span
class="inserted"><ins><em>when a program's source code carries a weak license,
one
without copyleft, its executables can carry additional nonfree
conditions. <a href="https://code.visualstudio.com/License/">Microsoft
-does this</em></ins></span> with <span class="removed"><del><strong>executable
programs that</strong></del></span> <span class="inserted"><ins><em>Visual
Studio,</a> for example.</p>
+does this</em></ins></span> with <span class="removed"><del><strong>executable
programs that</strong></del></span> <span class="inserted"><ins><em>Visual
Studio Code,</a> for example.</p>
<p>If these executables fully</em></ins></span> correspond to <span
class="removed"><del><strong>free software</strong></del></span> <span
class="inserted"><ins><em>the released sources, they
qualify as open</em></ins></span> source <span
class="removed"><del><strong>code,</strong></del></span> but <span
class="removed"><del><strong>the devices do</strong></del></span> not <span
class="removed"><del><strong>allow</strong></del></span> <span
class="inserted"><ins><em>as free software. However, in that
@@ -508,7 +508,7 @@
of this article.</p>
<span class="inserted"><ins><em></div></em></ins></span>
-<p>Copyright © 2007, 2010, <span
class="removed"><del><strong>2012</strong></del></span> <span
class="inserted"><ins><em>2012, 2015, 2016, 2019, 2020</em></ins></span>
Richard Stallman</p>
+<p>Copyright © 2007, 2010, <span
class="removed"><del><strong>2012</strong></del></span> <span
class="inserted"><ins><em>2012, 2015, 2016, 2019, 2020, 2021</em></ins></span>
Richard Stallman</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative</strong></del></span>
@@ -521,7 +521,7 @@
<span class="inserted"><ins><em><p
class="unprintable">Updated:</em></ins></span>
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:14 $
+$Date: 2021/04/26 12:04:24 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/open-source-misses-the-point.ar.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ar.po,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- philosophy/po/open-source-misses-the-point.ar.po 6 Oct 2020 08:42:14
-0000 1.78
+++ philosophy/po/open-source-misses-the-point.ar.po 26 Apr 2021 12:04:25
-0000 1.79
@@ -10,7 +10,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2014-09-27 17:26+0100\n"
"Last-Translator: Rafik E. Younan <rafik.younan@phoenixegypt.com>\n"
"Language-Team: Arabic <www-ar-translators@gnu.org>\n"
@@ -323,7 +323,7 @@
"Second, when a program's source code carries a weak license, one without "
"copyleft, its executables can carry additional nonfree conditions. <a href="
"\"https://code.visualstudio.com/License/\">Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
msgstr ""
#. type: Content of: <div><p>
@@ -1029,12 +1029,13 @@
"href=\"/server/standards/README.translations.html\">دÙÙ٠اÙترجÙ
Ø©</a>."
#. type: Content of: <div><p>
-# | Copyright © 2007, 2010, [-2012-] {+2012, 2015, 2016, 2019, 2020+}
-# | Richard Stallman
+# | Copyright © 2007, 2010, [-2012-] {+2012, 2015, 2016, 2019, 2020,
+# | 2021+} Richard Stallman
#, fuzzy
#| msgid "Copyright © 2007, 2010, 2012 Richard Stallman"
msgid ""
-"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
msgstr "Copyright © 2007, 2010, 2012 Ù
رÙتشارد ستÙÙÙ
Ù"
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.bg.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.bg.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- philosophy/po/open-source-misses-the-point.bg.po 6 Oct 2020 08:42:14
-0000 1.54
+++ philosophy/po/open-source-misses-the-point.bg.po 26 Apr 2021 12:04:26
-0000 1.55
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2009-10-28 14:55+0200\n"
"Last-Translator: Yavor Doganov <yavor@gnu.org>\n"
"Language-Team: Bulgarian <dict@fsa-bg.org>\n"
@@ -347,7 +347,7 @@
"Second, when a program's source code carries a weak license, one without "
"copyleft, its executables can carry additional nonfree conditions. <a href="
"\"https://code.visualstudio.com/License/\">Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
msgstr ""
#. type: Content of: <div><p>
@@ -1107,12 +1107,13 @@
"подаванеÑо на пÑеводи на Ñази ÑÑаÑиÑ."
#. type: Content of: <div><p>
-# | Copyright © [-2007-] {+2007, 2010, 2012, 2015, 2016, 2019, 2020+}
-# | Richard Stallman
+# | Copyright © [-2007-] {+2007, 2010, 2012, 2015, 2016, 2019, 2020,
+# | 2021+} Richard Stallman
#, fuzzy
#| msgid "Copyright © 2007 Richard Stallman"
msgid ""
-"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
msgstr "Copyright © 2007 РиÑаÑд СÑолман"
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.de-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.de-diff.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- philosophy/po/open-source-misses-the-point.de-diff.html 6 Oct 2020
08:42:14 -0000 1.5
+++ philosophy/po/open-source-misses-the-point.de-diff.html 26 Apr 2021
12:04:26 -0000 1.6
@@ -137,7 +137,7 @@
<p>Second, when a program's source code carries a weak license, one
without copyleft, its executables can carry additional nonfree
conditions. <a href="https://code.visualstudio.com/License/">Microsoft
-does this with Visual Studio,</a> for example.</p>
+does this with Visual <span
class="removed"><del><strong>Studio,</a></strong></del></span> <span
class="inserted"><ins><em>Studio Code,</a></em></ins></span> for
example.</p>
<p>If these executables fully correspond to the released sources, they
qualify as open source but not as free software. However, in that
@@ -495,7 +495,7 @@
of this article.</p>
</div>
-<p>Copyright © 2007, 2010, 2012, 2015, 2016, <span
class="removed"><del><strong>2019</strong></del></span> <span
class="inserted"><ins><em>2019, 2020</em></ins></span> Richard
Stallman</p>
+<p>Copyright © 2007, 2010, 2012, 2015, 2016, <span
class="removed"><del><strong>2019</strong></del></span> <span
class="inserted"><ins><em>2019, 2020, 2021</em></ins></span> Richard
Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -505,7 +505,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:14 $
+$Date: 2021/04/26 12:04:26 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/open-source-misses-the-point.de.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.de.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- philosophy/po/open-source-misses-the-point.de.po 6 Oct 2020 08:42:14
-0000 1.108
+++ philosophy/po/open-source-misses-the-point.de.po 26 Apr 2021 12:04:26
-0000 1.109
@@ -9,7 +9,7 @@
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
"Report-Msgid-Bugs-To: webmasters@gnu.org\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2019-11-20 22:00+0100\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -285,11 +285,21 @@
"nur wenige Programme diese Lizenzen."
#. type: Content of: <div><p>
+# | Second, when a program's source code carries a weak license, one without
+# | copyleft, its executables can carry additional nonfree conditions. <a
+# | href=\"https://code.visualstudio.com/License/\">Microsoft does this with
+# | Visual [-Studio,</a>-] {+Studio Code,</a>+} for example.
+#, fuzzy
+#| msgid ""
+#| "Second, when a program's source code carries a weak license, one without "
+#| "copyleft, its executables can carry additional nonfree conditions. <a "
+#| "href=\"https://code.visualstudio.com/License/\">Microsoft does this with "
+#| "Visual Studio,</a> for example."
msgid ""
"Second, when a program's source code carries a weak license, one without "
"copyleft, its executables can carry additional nonfree conditions. <a href="
"\"https://code.visualstudio.com/License/\">Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
msgstr ""
"Zweitens, wenn der Quellcode eines Programms eine schwache Lizenz aufweist, "
"eine ohne Copyleft, können seine ausführbaren Dateien zusätzliche unfreie "
@@ -1061,12 +1071,13 @@
"standards/README.translations\">LIESMICH für Ãbersetzungen</a>."
#. type: Content of: <div><p>
-# | Copyright © 2007, 2010, 2012, 2015, 2016, [-2019-] {+2019, 2020+}
-# | Richard Stallman
+# | Copyright © 2007, 2010, 2012, 2015, 2016, [-2019-] {+2019, 2020,
+# | 2021+} Richard Stallman
#, fuzzy
#| msgid "Copyright © 2007, 2010, 2012, 2015, 2016, 2019 Richard Stallman"
msgid ""
-"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
msgstr ""
"Copyright © 2007, 2010, 2012<ins>, 2014</ins>, 2015, 2016, 2019 Richard "
"Stallman."
Index: philosophy/po/open-source-misses-the-point.el.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.el.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- philosophy/po/open-source-misses-the-point.el.po 6 Oct 2020 08:42:15
-0000 1.21
+++ philosophy/po/open-source-misses-the-point.el.po 26 Apr 2021 12:04:26
-0000 1.22
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: web-translators <web-translators@gnu.org>\n"
@@ -409,7 +409,7 @@
"Second, when a program's source code carries a weak license, one without "
"copyleft, its executables can carry additional nonfree conditions. <a href="
"\"https://code.visualstudio.com/License/\">Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
msgstr ""
#. type: Content of: <div><p>
@@ -1380,12 +1380,13 @@
"\"/server/standards/README.translations.html\">ÎεÏαÏÏάÏειÏ
ÎÎÎÎÎΣÎÎÎ</a>."
#. type: Content of: <div><p>
-# | Copyright © {+2007,+} 2010, [-2012-] {+2012, 2015, 2016, 2019, 2020+}
-# | Richard Stallman
+# | Copyright © {+2007,+} 2010, [-2012-] {+2012, 2015, 2016, 2019, 2020,
+# | 2021+} Richard Stallman
#, fuzzy
#| msgid "Copyright © 2010, 2012 Richard Stallman"
msgid ""
-"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
msgstr "Copyright © 2007 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.es.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.es.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- philosophy/po/open-source-misses-the-point.es.po 10 Mar 2021 12:01:36
-0000 1.119
+++ philosophy/po/open-source-misses-the-point.es.po 26 Apr 2021 12:04:26
-0000 1.120
@@ -10,7 +10,7 @@
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -18,6 +18,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=utf-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -288,11 +289,21 @@
"son muy pocos los programas que llevan tales licencias."
#. type: Content of: <div><p>
+# | Second, when a program's source code carries a weak license, one without
+# | copyleft, its executables can carry additional nonfree conditions. <a
+# | href=\"https://code.visualstudio.com/License/\">Microsoft does this with
+# | Visual [-Studio,</a>-] {+Studio Code,</a>+} for example.
+#, fuzzy
+#| msgid ""
+#| "Second, when a program's source code carries a weak license, one without "
+#| "copyleft, its executables can carry additional nonfree conditions. <a "
+#| "href=\"https://code.visualstudio.com/License/\">Microsoft does this with "
+#| "Visual Studio,</a> for example."
msgid ""
"Second, when a program's source code carries a weak license, one without "
"copyleft, its executables can carry additional nonfree conditions. <a href="
"\"https://code.visualstudio.com/License/\">Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
msgstr ""
"En segundo lugar, cuando el código fuente de un programa tiene una licencia "
"débil, una licencia sin copyleft, sus ejecutables pueden tener condiciones "
@@ -1078,8 +1089,14 @@
"coordinación y el envÃo de traducciones de las páginas de este sitio web."
#. type: Content of: <div><p>
+# | Copyright © 2007, 2010, 2012, 2015, 2016, 2019, [-2020-] {+2020,
+# | 2021+} Richard Stallman
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
msgid ""
-"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
msgstr ""
"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
Index: philosophy/po/open-source-misses-the-point.fa.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.fa.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- philosophy/po/open-source-misses-the-point.fa.po 6 Oct 2020 08:42:15
-0000 1.63
+++ philosophy/po/open-source-misses-the-point.fa.po 26 Apr 2021 12:04:26
-0000 1.64
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2011-01-16 23:22+0330\n"
"Last-Translator: Mahyar Moghimi <mahyar.moqimi@gmail.com>\n"
"Language-Team: Persian <www-fa-general@list.gnu.org>\n"
@@ -288,7 +288,7 @@
"Second, when a program's source code carries a weak license, one without "
"copyleft, its executables can carry additional nonfree conditions. <a href="
"\"https://code.visualstudio.com/License/\">Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
msgstr ""
#. type: Content of: <div><p>
@@ -977,7 +977,8 @@
#, fuzzy
#| msgid "Copyright © 2007, 2010, 2012 Richard Stallman"
msgid ""
-"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
msgstr "<span dir=\"ltr\">Copyright © 2007, 2010 Richard Stallman</span>"
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.fr.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- philosophy/po/open-source-misses-the-point.fr.po 7 Dec 2020 14:04:43
-0000 1.110
+++ philosophy/po/open-source-misses-the-point.fr.po 26 Apr 2021 12:04:26
-0000 1.111
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2020-12-07 12:06+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -17,6 +17,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -280,11 +281,21 @@
"programmes utilisant ces licences sont rares."
#. type: Content of: <div><p>
+# | Second, when a program's source code carries a weak license, one without
+# | copyleft, its executables can carry additional nonfree conditions. <a
+# | href=\"https://code.visualstudio.com/License/\">Microsoft does this with
+# | Visual [-Studio,</a>-] {+Studio Code,</a>+} for example.
+#, fuzzy
+#| msgid ""
+#| "Second, when a program's source code carries a weak license, one without "
+#| "copyleft, its executables can carry additional nonfree conditions. <a "
+#| "href=\"https://code.visualstudio.com/License/\">Microsoft does this with "
+#| "Visual Studio,</a> for example."
msgid ""
"Second, when a program's source code carries a weak license, one without "
"copyleft, its executables can carry additional nonfree conditions. <a href="
"\"https://code.visualstudio.com/License/\">Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
msgstr ""
"De plus, lorsque le code source d'un programme a une licence faible, sans "
"copyleft, des conditions supplémentaires non libres peuvent être ajoutées
à "
@@ -1052,8 +1063,14 @@
"README.translations.html\">guide de traduction</a>."
#. type: Content of: <div><p>
+# | Copyright © 2007, 2010, 2012, 2015, 2016, 2019, [-2020-] {+2020,
+# | 2021+} Richard Stallman
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
msgid ""
-"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
msgstr ""
"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
Index: philosophy/po/open-source-misses-the-point.hr-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.hr-diff.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- philosophy/po/open-source-misses-the-point.hr-diff.html 6 Oct 2020
08:42:15 -0000 1.20
+++ philosophy/po/open-source-misses-the-point.hr-diff.html 26 Apr 2021
12:04:27 -0000 1.21
@@ -143,7 +143,7 @@
(including many Android devices) come</strong></del></span> <span
class="inserted"><ins><em>when a program's source code carries a weak license,
one
without copyleft, its executables can carry additional nonfree
conditions. <a href="https://code.visualstudio.com/License/">Microsoft
-does this</em></ins></span> with <span class="removed"><del><strong>executable
programs that</strong></del></span> <span class="inserted"><ins><em>Visual
Studio,</a> for example.</p>
+does this</em></ins></span> with <span class="removed"><del><strong>executable
programs that</strong></del></span> <span class="inserted"><ins><em>Visual
Studio Code,</a> for example.</p>
<p>If these executables fully</em></ins></span> correspond to <span
class="removed"><del><strong>free software</strong></del></span> <span
class="inserted"><ins><em>the released sources, they
qualify as open</em></ins></span> source <span
class="removed"><del><strong>code,</strong></del></span> but <span
class="removed"><del><strong>the devices do</strong></del></span> not <span
class="removed"><del><strong>allow</strong></del></span> <span
class="inserted"><ins><em>as free software. However, in that
@@ -511,7 +511,7 @@
of this article.</p>
</div>
-<p>Copyright © 2007, 2010, <span
class="removed"><del><strong>2012</strong></del></span> <span
class="inserted"><ins><em>2012, 2015, 2016, 2019, 2020</em></ins></span>
Richard Stallman</p>
+<p>Copyright © 2007, 2010, <span
class="removed"><del><strong>2012</strong></del></span> <span
class="inserted"><ins><em>2012, 2015, 2016, 2019, 2020, 2021</em></ins></span>
Richard Stallman</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative</strong></del></span>
@@ -522,7 +522,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:15 $
+$Date: 2021/04/26 12:04:27 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/open-source-misses-the-point.hr.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.hr.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- philosophy/po/open-source-misses-the-point.hr.po 6 Oct 2020 08:42:15
-0000 1.38
+++ philosophy/po/open-source-misses-the-point.hr.po 26 Apr 2021 12:04:27
-0000 1.39
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2014-02-06 22:11+0100\n"
"Last-Translator: Martina Bebek <martinaporec@gmail.com>\n"
"Language-Team: GNU Croatian Translation Team <www-hr-lista@gnu.org>\n"
@@ -344,7 +344,7 @@
"Second, when a program's source code carries a weak license, one without "
"copyleft, its executables can carry additional nonfree conditions. <a href="
"\"https://code.visualstudio.com/License/\">Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
msgstr ""
#. type: Content of: <div><p>
@@ -1107,12 +1107,13 @@
"prijevode</a>."
#. type: Content of: <div><p>
-# | Copyright © 2007, 2010, [-2012-] {+2012, 2015, 2016, 2019, 2020+}
-# | Richard Stallman
+# | Copyright © 2007, 2010, [-2012-] {+2012, 2015, 2016, 2019, 2020,
+# | 2021+} Richard Stallman
#, fuzzy
#| msgid "Copyright © 2007, 2010, 2012 Richard Stallman"
msgid ""
-"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
msgstr "Copyright © 2007, 2010, 2012 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.it-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.it-diff.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- philosophy/po/open-source-misses-the-point.it-diff.html 6 Oct 2020
08:42:15 -0000 1.5
+++ philosophy/po/open-source-misses-the-point.it-diff.html 26 Apr 2021
12:04:27 -0000 1.6
@@ -142,7 +142,7 @@
<p>Second, <span class="inserted"><ins><em>when a program's source code
carries a weak license, one
without copyleft, its executables can carry additional nonfree
conditions. <a href="https://code.visualstudio.com/License/">Microsoft
-does this with Visual Studio,</a> for example.</p>
+does this with Visual Studio Code,</a> for example.</p>
<p>If these executables fully correspond to the released sources, they
qualify as open source but not as free software. However, in that
@@ -504,7 +504,7 @@
of this article.</p>
</div>
-<p>Copyright © 2007, 2010, 2012, 2015, <span
class="removed"><del><strong>2016</strong></del></span> <span
class="inserted"><ins><em>2016, 2019, 2020</em></ins></span> Richard
Stallman</p>
+<p>Copyright © 2007, 2010, 2012, 2015, <span
class="removed"><del><strong>2016</strong></del></span> <span
class="inserted"><ins><em>2016, 2019, 2020, 2021</em></ins></span> Richard
Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -514,7 +514,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:15 $
+$Date: 2021/04/26 12:04:27 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/open-source-misses-the-point.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.it.po,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- philosophy/po/open-source-misses-the-point.it.po 6 Oct 2020 08:42:15
-0000 1.80
+++ philosophy/po/open-source-misses-the-point.it.po 26 Apr 2021 12:04:27
-0000 1.81
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2016-07-30 17:23+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian\n"
@@ -336,7 +336,7 @@
"Second, when a program's source code carries a weak license, one without "
"copyleft, its executables can carry additional nonfree conditions. <a href="
"\"https://code.visualstudio.com/License/\">Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
msgstr ""
#. type: Content of: <div><p>
@@ -1125,12 +1125,13 @@
"traduzioni</a>."
#. type: Content of: <div><p>
-# | Copyright © 2007, 2010, 2012, 2015, [-2016-] {+2016, 2019, 2020+}
-# | Richard Stallman
+# | Copyright © 2007, 2010, 2012, 2015, [-2016-] {+2016, 2019, 2020,
+# | 2021+} Richard Stallman
#, fuzzy
#| msgid "Copyright © 2007, 2010, 2012, 2015, 2016 Richard Stallman"
msgid ""
-"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
msgstr "Copyright © 2007, 2010, 2012, 2015, 2016 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.ja.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ja.po,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- philosophy/po/open-source-misses-the-point.ja.po 6 Oct 2020 08:42:15
-0000 1.80
+++ philosophy/po/open-source-misses-the-point.ja.po 26 Apr 2021 12:04:27
-0000 1.81
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2020-01-18 12:56+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
#. type: Content of: <title>
msgid ""
@@ -255,11 +256,17 @@
"ãªã©ã¤ã»ã³ã¹ã¯ãã»ãã®å°æ°ã®ããã°ã©ã
ã«ãã使ããã¦ãã¾ããã"
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Second, when a program's source code carries a weak license, one without "
+#| "copyleft, its executables can carry additional nonfree conditions. <a "
+#| "href=\"https://code.visualstudio.com/License/\">Microsoft does this with "
+#| "Visual Studio,</a> for example."
msgid ""
"Second, when a program's source code carries a weak license, one without "
"copyleft, its executables can carry additional nonfree conditions. <a href="
"\"https://code.visualstudio.com/License/\">Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
msgstr ""
"第äºã«ãããããã°ã©ã
ã®ã½ã¼ã¹ã³ã¼ããå¼±ãã©ã¤ã»ã³ã¹ã§ã³ãã¼ã¬ããã§ã¯ãªãã"
"ã®ããã£ã¦ãæããã®å®è¡å½¢å¼ã¯è¿½å
ã®ä¸èªç±ãªæ¡ä»¶ããã¤ãã¨ãããã¾ãããã¨ã"
@@ -965,8 +972,12 @@
"README.translations.html\">翻訳 README</a>ãã覧ãã ããã"
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
msgid ""
-"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
msgstr ""
"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
Index: philosophy/po/open-source-misses-the-point.lt-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.lt-diff.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- philosophy/po/open-source-misses-the-point.lt-diff.html 6 Oct 2020
08:42:15 -0000 1.11
+++ philosophy/po/open-source-misses-the-point.lt-diff.html 26 Apr 2021
12:04:27 -0000 1.12
@@ -142,7 +142,7 @@
<p>Second, <span class="inserted"><ins><em>when a program's source code
carries a weak license, one
without copyleft, its executables can carry additional nonfree
conditions. <a href="https://code.visualstudio.com/License/">Microsoft
-does this with Visual Studio,</a> for example.</p>
+does this with Visual Studio Code,</a> for example.</p>
<p>If these executables fully correspond to the released sources, they
qualify as open source but not as free software. However, in that
@@ -504,7 +504,7 @@
of this article.</p>
</div>
-<p>Copyright © 2007, 2010, 2012, 2015, <span
class="removed"><del><strong>2016</strong></del></span> <span
class="inserted"><ins><em>2016, 2019, 2020</em></ins></span> Richard
Stallman</p>
+<p>Copyright © 2007, 2010, 2012, 2015, <span
class="removed"><del><strong>2016</strong></del></span> <span
class="inserted"><ins><em>2016, 2019, 2020, 2021</em></ins></span> Richard
Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -514,7 +514,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:15 $
+$Date: 2021/04/26 12:04:27 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/open-source-misses-the-point.lt.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.lt.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- philosophy/po/open-source-misses-the-point.lt.po 6 Oct 2020 08:42:15
-0000 1.21
+++ philosophy/po/open-source-misses-the-point.lt.po 26 Apr 2021 12:04:27
-0000 1.22
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2016-01-15 02:06+0200\n"
"Last-Translator: Donatas Klimašauskas <klimasauskas.d@gmail.com>\n"
"Language-Team: Lithuanian <web-translators@gnu.org>\n"
@@ -341,7 +341,7 @@
"Second, when a program's source code carries a weak license, one without "
"copyleft, its executables can carry additional nonfree conditions. <a href="
"\"https://code.visualstudio.com/License/\">Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
msgstr ""
#. type: Content of: <div><p>
@@ -1131,12 +1131,13 @@
"PERSKAITYKITEMANE</a>."
#. type: Content of: <div><p>
-# | Copyright © 2007, 2010, 2012, 2015, [-2016-] {+2016, 2019, 2020+}
-# | Richard Stallman
+# | Copyright © 2007, 2010, 2012, 2015, [-2016-] {+2016, 2019, 2020,
+# | 2021+} Richard Stallman
#, fuzzy
#| msgid "Copyright © 2007, 2010, 2012, 2015, 2016 Richard Stallman"
msgid ""
-"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
msgstr "Copyright © 2007, 2010, 2012, 2015, 2016 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.ml.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ml.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- philosophy/po/open-source-misses-the-point.ml.po 2 Feb 2021 16:32:06
-0000 1.69
+++ philosophy/po/open-source-misses-the-point.ml.po 26 Apr 2021 12:04:27
-0000 1.70
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html 1\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2020-09-05 17:42+0200\n"
"Last-Translator: Aiswarya Kaitheri Kandoth <aiswaryakk29@gmail.com>\n"
"Language-Team: Malayalam <www-ml-gnu-malayalam-project-public@gnu.org>\n"
@@ -17,6 +17,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8-bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
"Plural-Forms: nplurals=2; plural=n != 1;\n"
"X-Generator: Lokalize 19.04.0\n"
@@ -263,11 +264,21 @@
"മാതàµà´°à´®àµ à´
à´¤àµà´¤à´°à´
സമàµà´®à´¤à´ªà´¤àµà´°à´àµà´àµ¾
à´à´ªà´¯àµà´à´¿à´àµà´àµà´¨àµà´¨àµà´³àµà´³àµ."
#. type: Content of: <div><p>
+# | Second, when a program's source code carries a weak license, one without
+# | copyleft, its executables can carry additional nonfree conditions. <a
+# | href=\"https://code.visualstudio.com/License/\">Microsoft does this with
+# | Visual [-Studio,</a>-] {+Studio Code,</a>+} for example.
+#, fuzzy
+#| msgid ""
+#| "Second, when a program's source code carries a weak license, one without "
+#| "copyleft, its executables can carry additional nonfree conditions. <a "
+#| "href=\"https://code.visualstudio.com/License/\">Microsoft does this with "
+#| "Visual Studio,</a> for example."
msgid ""
"Second, when a program's source code carries a weak license, one without "
"copyleft, its executables can carry additional nonfree conditions. <a href="
"\"https://code.visualstudio.com/License/\">Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
msgstr ""
"à´°à´£àµà´à´¾à´®à´¤à´¾à´¯à´¿, à´à´°àµ
à´ªàµà´°àµà´àµà´°à´¾à´®à´¿àµ»àµà´±àµ à´¸àµà´´àµà´¸àµ à´àµà´¡àµ
à´¦àµàµ¼à´¬à´²à´®à´¾à´¯ à´à´°àµ സമàµà´®à´¤à´ªà´¤àµà´°à´
à´à´³àµà´³à´¤à´¾à´£àµà´àµà´à´¿àµ½, "
"à´àµà´ªàµà´ªà´¿à´²àµà´«àµà´±àµà´±àµ à´à´²àµà´²à´¾à´¤àµà´¤
à´à´¨àµà´¨àµàµ, à´
തിൻàµà´±àµ
à´à´àµà´¸à´¿à´àµà´¯àµà´àµà´à´¬à´¿à´³àµà´àµ¾
à´¸àµà´µà´¤à´¨àµà´¤àµà´°à´®à´²àµà´²à´¾à´¤àµà´¤ നിബനàµà´§à´¨à´àµ¾
à´àµà´à´¿ "
@@ -983,8 +994,14 @@
"README.translations.html\">Translations README</a> à´¨àµà´àµà´àµà´."
#. type: Content of: <div><p>
+# | Copyright © 2007, 2010, 2012, 2015, 2016, 2019, [-2020-] {+2020,
+# | 2021+} Richard Stallman
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
msgid ""
-"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
msgstr ""
"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020
റിà´àµà´à´¾à´°àµâഡൠസàµà´±àµà´±à´¾à´³àµâമാനàµâ"
Index: philosophy/po/open-source-misses-the-point.nl-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.nl-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- philosophy/po/open-source-misses-the-point.nl-diff.html 6 Oct 2020
08:42:15 -0000 1.33
+++ philosophy/po/open-source-misses-the-point.nl-diff.html 26 Apr 2021
12:04:27 -0000 1.34
@@ -142,7 +142,7 @@
<p>Second, <span class="inserted"><ins><em>when a program's source code
carries a weak license, one
without copyleft, its executables can carry additional nonfree
conditions. <a href="https://code.visualstudio.com/License/">Microsoft
-does this with Visual Studio,</a> for example.</p>
+does this with Visual Studio Code,</a> for example.</p>
<p>If these executables fully correspond to the released sources, they
qualify as open source but not as free software. However, in that
@@ -504,7 +504,7 @@
of this article.</p>
</div>
-<p>Copyright © 2007, 2010, 2012, 2015, <span
class="removed"><del><strong>2016</strong></del></span> <span
class="inserted"><ins><em>2016, 2019, 2020</em></ins></span> Richard
Stallman</p>
+<p>Copyright © 2007, 2010, 2012, 2015, <span
class="removed"><del><strong>2016</strong></del></span> <span
class="inserted"><ins><em>2016, 2019, 2020, 2021</em></ins></span> Richard
Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -514,7 +514,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:15 $
+$Date: 2021/04/26 12:04:27 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/open-source-misses-the-point.nl.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.nl.po,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- philosophy/po/open-source-misses-the-point.nl.po 6 Oct 2020 08:42:15
-0000 1.51
+++ philosophy/po/open-source-misses-the-point.nl.po 26 Apr 2021 12:04:28
-0000 1.52
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Justin van Steijn <justin50@live.nl>\n"
"Language-Team: Dutch\n"
@@ -324,7 +324,7 @@
"Second, when a program's source code carries a weak license, one without "
"copyleft, its executables can carry additional nonfree conditions. <a href="
"\"https://code.visualstudio.com/License/\">Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
msgstr ""
#. type: Content of: <div><p>
@@ -1074,12 +1074,13 @@
"voor informatie over het onderhoud van vertalingen op deze website."
#. type: Content of: <div><p>
-# | Copyright © 2007, 2010, 2012, 2015, [-2016-] {+2016, 2019, 2020+}
-# | Richard Stallman
+# | Copyright © 2007, 2010, 2012, 2015, [-2016-] {+2016, 2019, 2020,
+# | 2021+} Richard Stallman
#, fuzzy
#| msgid "Copyright © 2007, 2010, 2012, 2015, 2016 Richard Stallman"
msgid ""
-"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
msgstr "Copyright © 2007, 2010, 2012, 2015, 2016 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.pl.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.pl.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- philosophy/po/open-source-misses-the-point.pl.po 1 Dec 2020 21:31:02
-0000 1.79
+++ philosophy/po/open-source-misses-the-point.pl.po 26 Apr 2021 12:04:28
-0000 1.80
@@ -8,7 +8,7 @@
msgstr ""
"Project-Id-Version: Why Open Source misses the point of Free Software\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2020-12-01 14:01-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=utf-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
"Plural-Forms: nplurals=3; plural=(n==1 ? 0 : n%10>=2 && n%10<=4 && (n%100<10 "
"|| n%100>=20) ? 1 : 2);\n"
"X-Generator: Virtaal 0.7.1\n"
@@ -287,11 +288,21 @@
"programów wykorzystuje takie licencje."
#. type: Content of: <div><p>
+# | Second, when a program's source code carries a weak license, one without
+# | copyleft, its executables can carry additional nonfree conditions. <a
+# | href=\"https://code.visualstudio.com/License/\">Microsoft does this with
+# | Visual [-Studio,</a>-] {+Studio Code,</a>+} for example.
+#, fuzzy
+#| msgid ""
+#| "Second, when a program's source code carries a weak license, one without "
+#| "copyleft, its executables can carry additional nonfree conditions. <a "
+#| "href=\"https://code.visualstudio.com/License/\">Microsoft does this with "
+#| "Visual Studio,</a> for example."
msgid ""
"Second, when a program's source code carries a weak license, one without "
"copyleft, its executables can carry additional nonfree conditions. <a href="
"\"https://code.visualstudio.com/License/\">Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
msgstr ""
"Po drugie, gdy kod źródÅowy danego programu ma sÅabÄ
licencjÄ,
takÄ
"
"bez copyleft, pliki wykonywalne mogÄ
zawieraÄ dodatkowe niewolne "
@@ -1060,8 +1071,14 @@
"tÅumaczeÅ</a>."
#. type: Content of: <div><p>
+# | Copyright © 2007, 2010, 2012, 2015, 2016, 2019, [-2020-] {+2020,
+# | 2021+} Richard Stallman
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
msgid ""
-"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
msgstr ""
"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
Index: philosophy/po/open-source-misses-the-point.pot
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.pot,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- philosophy/po/open-source-misses-the-point.pot 6 Oct 2020 08:42:15
-0000 1.49
+++ philosophy/po/open-source-misses-the-point.pot 26 Apr 2021 12:04:28
-0000 1.50
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -173,7 +173,7 @@
"Second, when a program's source code carries a weak license, one without "
"copyleft, its executables can carry additional nonfree conditions. <a "
"href=\"https://code.visualstudio.com/License/\">Microsoft does this with "
-"Visual Studio,</a> for example."
+"Visual Studio Code,</a> for example."
msgstr ""
#. type: Content of: <div><p>
@@ -637,7 +637,9 @@
msgstr ""
#. type: Content of: <div><p>
-msgid "Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard
Stallman"
+msgid ""
+"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
msgstr ""
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.pt-br.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.pt-br.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- philosophy/po/open-source-misses-the-point.pt-br.po 20 Apr 2021 07:13:31
-0000 1.53
+++ philosophy/po/open-source-misses-the-point.pt-br.po 26 Apr 2021 12:04:28
-0000 1.54
@@ -10,7 +10,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2020-01-07 14:59-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -18,6 +18,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -268,11 +269,17 @@
"privativamente. Por sorte, poucos programas usam tais licenças."
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Second, when a program's source code carries a weak license, one without "
+#| "copyleft, its executables can carry additional nonfree conditions. <a "
+#| "href=\"https://code.visualstudio.com/License/\">Microsoft does this with "
+#| "Visual Studio,</a> for example."
msgid ""
"Second, when a program's source code carries a weak license, one without "
"copyleft, its executables can carry additional nonfree conditions. <a href="
"\"https://code.visualstudio.com/License/\">Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
msgstr ""
"Em segundo lugar, quando o código-fonte de um programa carrega uma licença "
"fraca, uma sem copyleft, seus executáveis podem conter condições
adicionais "
@@ -999,8 +1006,12 @@
"envio de traduções das páginas deste site."
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
msgid ""
-"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
msgstr ""
"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
Index: philosophy/po/open-source-misses-the-point.ro-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ro-diff.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- philosophy/po/open-source-misses-the-point.ro-diff.html 6 Oct 2020
08:42:15 -0000 1.2
+++ philosophy/po/open-source-misses-the-point.ro-diff.html 26 Apr 2021
12:04:28 -0000 1.3
@@ -137,7 +137,7 @@
<p>Second, when a program's source code carries a weak license, one
without copyleft, its executables can carry additional nonfree
conditions. <a href="https://code.visualstudio.com/License/">Microsoft
-does this with Visual Studio,</a> for example.</p>
+does this with Visual <span
class="removed"><del><strong>Studio,</a></strong></del></span> <span
class="inserted"><ins><em>Studio Code,</a></em></ins></span> for
example.</p>
<p>If these executables fully correspond to the released sources, they
qualify as open source but not as free software. However, in that
@@ -495,7 +495,7 @@
of this article.</p>
</div>
-<p>Copyright © 2007, 2010, 2012, 2015, 2016, <span
class="removed"><del><strong>2019</strong></del></span> <span
class="inserted"><ins><em>2019, 2020</em></ins></span> Richard
Stallman</p>
+<p>Copyright © 2007, 2010, 2012, 2015, 2016, <span
class="removed"><del><strong>2019</strong></del></span> <span
class="inserted"><ins><em>2019, 2020, 2021</em></ins></span> Richard
Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -505,7 +505,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:15 $
+$Date: 2021/04/26 12:04:28 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/open-source-misses-the-point.ro.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ro.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- philosophy/po/open-source-misses-the-point.ro.po 6 Oct 2020 08:42:15
-0000 1.48
+++ philosophy/po/open-source-misses-the-point.ro.po 26 Apr 2021 12:04:28
-0000 1.49
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2019-06-04 20:13+0200\n"
"Last-Translator: Denis Cherean <denis.cherean@gmail.com>\n"
"Language-Team: Romanian <web-translators-ro@gnu.org>\n"
@@ -281,11 +281,21 @@
"de licenÈe."
#. type: Content of: <div><p>
+# | Second, when a program's source code carries a weak license, one without
+# | copyleft, its executables can carry additional nonfree conditions. <a
+# | href=\"https://code.visualstudio.com/License/\">Microsoft does this with
+# | Visual [-Studio,</a>-] {+Studio Code,</a>+} for example.
+#, fuzzy
+#| msgid ""
+#| "Second, when a program's source code carries a weak license, one without "
+#| "copyleft, its executables can carry additional nonfree conditions. <a "
+#| "href=\"https://code.visualstudio.com/License/\">Microsoft does this with "
+#| "Visual Studio,</a> for example."
msgid ""
"Second, when a program's source code carries a weak license, one without "
"copyleft, its executables can carry additional nonfree conditions. <a href="
"\"https://code.visualstudio.com/License/\">Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
msgstr ""
"Ãn al doilea rând, când codul sursÄ al unui program poartÄ o licenÈÄ
slabÄ, "
"fÄrÄ copyleft (metodÄ prin care un program sau o lucrare devine liber/"
@@ -1016,12 +1026,13 @@
"html\">ghidul de traduceri</a>."
#. type: Content of: <div><p>
-# | Copyright © 2007, 2010, 2012, 2015, 2016, [-2019-] {+2019, 2020+}
-# | Richard Stallman
+# | Copyright © 2007, 2010, 2012, 2015, 2016, [-2019-] {+2019, 2020,
+# | 2021+} Richard Stallman
#, fuzzy
#| msgid "Copyright © 2007, 2010, 2012, 2015, 2016, 2019 Richard Stallman"
msgid ""
-"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
msgstr "Copyright © 2007, 2010, 2012, 2015, 2016, 2019 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ru.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- philosophy/po/open-source-misses-the-point.ru.po 6 Oct 2020 08:42:15
-0000 1.108
+++ philosophy/po/open-source-misses-the-point.ru.po 26 Apr 2021 12:04:28
-0000 1.109
@@ -10,7 +10,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2020-01-07 17:17+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -18,6 +18,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
# type: Content of: <title>
#. type: Content of: <title>
@@ -288,11 +289,21 @@
"мало."
#. type: Content of: <div><p>
+# | Second, when a program's source code carries a weak license, one without
+# | copyleft, its executables can carry additional nonfree conditions. <a
+# | href=\"https://code.visualstudio.com/License/\">Microsoft does this with
+# | Visual [-Studio,</a>-] {+Studio Code,</a>+} for example.
+#, fuzzy
+#| msgid ""
+#| "Second, when a program's source code carries a weak license, one without "
+#| "copyleft, its executables can carry additional nonfree conditions. <a "
+#| "href=\"https://code.visualstudio.com/License/\">Microsoft does this with "
+#| "Visual Studio,</a> for example."
msgid ""
"Second, when a program's source code carries a weak license, one without "
"copyleft, its executables can carry additional nonfree conditions. <a href="
"\"https://code.visualstudio.com/License/\">Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
msgstr ""
"Ðо-вÑоÑÑÑ
, когда иÑÑ
однÑй ÑекÑÑ Ð¿ÑогÑаммÑ
неÑÐµÑ ÑлабÑÑ Ð»Ð¸ÑензиÑ, Ñ.е. "
"лиÑÐµÐ½Ð·Ð¸Ñ Ð±ÐµÐ· авÑоÑÑкого лева, ее
иÑполнÑемÑе ÑÐ°Ð¹Ð»Ñ Ð¼Ð¾Ð³ÑÑ Ð½ÐµÑÑи "
@@ -1087,8 +1098,14 @@
"translations.html\">“Ð ÑководÑÑве по
пеÑеводам”</a>."
#. type: Content of: <div><p>
+# | Copyright © 2007, 2010, 2012, 2015, 2016, 2019, [-2020-] {+2020,
+# | 2021+} Richard Stallman
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
msgid ""
-"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
msgstr ""
"Copyright © 2007, 2010, 2012, 2013, 2015, 2016, 2019, 2020 Richard "
"Stallman <br /> Copyright © 2008 jeder (translation) <br /> Copyright "
Index: philosophy/po/open-source-misses-the-point.sq.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.sq.po,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- philosophy/po/open-source-misses-the-point.sq.po 6 Oct 2020 08:42:15
-0000 1.81
+++ philosophy/po/open-source-misses-the-point.sq.po 26 Apr 2021 12:04:28
-0000 1.82
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2020-02-01 10:59+0200\n"
"Last-Translator: Besnik Bleta <besnik@programeshqip.org>\n"
"Language-Team: \n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
"X-Generator: Poedit 2.2\n"
#. type: Content of: <title>
@@ -269,11 +270,17 @@
"tilla përdoren nga pak programe."
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Second, when a program's source code carries a weak license, one without "
+#| "copyleft, its executables can carry additional nonfree conditions. <a "
+#| "href=\"https://code.visualstudio.com/License/\">Microsoft does this with "
+#| "Visual Studio,</a> for example."
msgid ""
"Second, when a program's source code carries a weak license, one without "
"copyleft, its executables can carry additional nonfree conditions. <a href="
"\"https://code.visualstudio.com/License/\">Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
msgstr ""
"Së dyti, kur kodi burim i një programi ka një licencë të dobët, një pa
"
"<em>copyleft</em>, të ekzekutueshmit e tij mund të bartin kushte jo të
lira "
@@ -1022,8 +1029,12 @@
"standards/README.translations.html\">README për përkthimet</a>."
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
msgid ""
-"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
msgstr ""
"Të drejta kopjimi © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard "
"Stallman"
Index: philosophy/po/open-source-misses-the-point.ta.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ta.po,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- philosophy/po/open-source-misses-the-point.ta.po 6 Oct 2020 08:42:15
-0000 1.8
+++ philosophy/po/open-source-misses-the-point.ta.po 26 Apr 2021 12:04:28
-0000 1.9
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: web-translators <web-translators@gnu.org>\n"
@@ -392,7 +392,7 @@
"Second, when a program's source code carries a weak license, one without "
"copyleft, its executables can carry additional nonfree conditions. <a href="
"\"https://code.visualstudio.com/License/\">Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
msgstr ""
#. type: Content of: <div><p>
@@ -1364,12 +1364,13 @@
"à®à¯à®ªà¯à®ªà¯à®à¯</a> à®à®¾à®£à®µà¯à®®à¯."
#. type: Content of: <div><p>
-# | Copyright © [-2007-] {+2007, 2010, 2012, 2015, 2016, 2019, 2020+}
-# | Richard Stallman
+# | Copyright © [-2007-] {+2007, 2010, 2012, 2015, 2016, 2019, 2020,
+# | 2021+} Richard Stallman
#, fuzzy
#| msgid "Copyright © 2007 Richard Stallman"
msgid ""
-"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
msgstr "Copyright © 2007 Richard Stallman (ரிà®à¯à®à®°à¯à®à¯
ஸà¯à®à®¾à®²à¯à®®à¯à®©à¯)"
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.tr.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.tr.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- philosophy/po/open-source-misses-the-point.tr.po 6 Oct 2020 08:42:15
-0000 1.55
+++ philosophy/po/open-source-misses-the-point.tr.po 26 Apr 2021 12:04:28
-0000 1.56
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2020-08-22 07:58+0200\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
"Plural-Forms: nplurals=1; plural=0;\n"
"X-Generator: Poedit 2.3\n"
@@ -263,11 +264,17 @@
"vermez. Neyse ki birkaç program bu tür lisansları kullanmaktadır."
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Second, when a program's source code carries a weak license, one without "
+#| "copyleft, its executables can carry additional nonfree conditions. <a "
+#| "href=\"https://code.visualstudio.com/License/\">Microsoft does this with "
+#| "Visual Studio,</a> for example."
msgid ""
"Second, when a program's source code carries a weak license, one without "
"copyleft, its executables can carry additional nonfree conditions. <a href="
"\"https://code.visualstudio.com/License/\">Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
msgstr ""
"İkincisi bir programın kaynak kodu copyleft olmadan zayıf bir lisans "
"taÅıdıÄında çalıÅtırılabilir dosyaları ek özgür olmayan
koÅullar "
@@ -991,8 +998,12 @@
"\">çalıÅma sayfamızı</a> ziyaret edebilirsiniz."
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
msgid ""
-"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
msgstr ""
"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
Index: philosophy/po/open-source-misses-the-point.uk-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.uk-diff.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- philosophy/po/open-source-misses-the-point.uk-diff.html 6 Oct 2020
08:42:15 -0000 1.6
+++ philosophy/po/open-source-misses-the-point.uk-diff.html 26 Apr 2021
12:04:29 -0000 1.7
@@ -142,7 +142,7 @@
<p>Second, <span class="inserted"><ins><em>when a program's source code
carries a weak license, one
without copyleft, its executables can carry additional nonfree
conditions. <a href="https://code.visualstudio.com/License/">Microsoft
-does this with Visual Studio,</a> for example.</p>
+does this with Visual Studio Code,</a> for example.</p>
<p>If these executables fully correspond to the released sources, they
qualify as open source but not as free software. However, in that
@@ -504,7 +504,7 @@
of this article.</p>
</div>
-<p>Copyright © 2007, 2010, 2012, 2015, <span
class="removed"><del><strong>2016</strong></del></span> <span
class="inserted"><ins><em>2016, 2019, 2020</em></ins></span> Richard
Stallman</p>
+<p>Copyright © 2007, 2010, 2012, 2015, <span
class="removed"><del><strong>2016</strong></del></span> <span
class="inserted"><ins><em>2016, 2019, 2020, 2021</em></ins></span> Richard
Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -514,7 +514,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/10/06 08:42:15 $
+$Date: 2021/04/26 12:04:29 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/open-source-misses-the-point.uk.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.uk.po,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- philosophy/po/open-source-misses-the-point.uk.po 6 Oct 2020 08:42:15
-0000 1.46
+++ philosophy/po/open-source-misses-the-point.uk.po 26 Apr 2021 12:04:29
-0000 1.47
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2016-08-04 07:30+0200\n"
"Last-Translator: Andriy Bandura <andriykopanytsia@gmail.com>\n"
"Language-Team: Ukrainian <>\n"
@@ -299,7 +299,7 @@
"Second, when a program's source code carries a weak license, one without "
"copyleft, its executables can carry additional nonfree conditions. <a href="
"\"https://code.visualstudio.com/License/\">Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
msgstr ""
#. type: Content of: <div><p>
@@ -1060,7 +1060,8 @@
#, fuzzy
#| msgid "Copyright © 2007, 2010, 2012, 2015, 2016 Richard Stallman"
msgid ""
-"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
msgstr "Copyright © 2007, 2010, 2012, 2015, 2016 Ð ÑÑаÑд
СÑолмен"
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.zh-cn.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.zh-cn.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- philosophy/po/open-source-misses-the-point.zh-cn.po 6 Oct 2020 08:42:15
-0000 1.65
+++ philosophy/po/open-source-misses-the-point.zh-cn.po 26 Apr 2021 12:04:29
-0000 1.66
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: 1.0\n"
-"POT-Creation-Date: 2020-10-06 08:28+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2020-01-23 17:17+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: Chinese <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
#. type: Content of: <title>
msgid ""
@@ -231,11 +232,17 @@
"æ¯ï¼å¾å°è½¯ä»¶ä¼ä½¿ç¨è¿äºè®¸å¯è¯ã"
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Second, when a program's source code carries a weak license, one without "
+#| "copyleft, its executables can carry additional nonfree conditions. <a "
+#| "href=\"https://code.visualstudio.com/License/\">Microsoft does this with "
+#| "Visual Studio,</a> for example."
msgid ""
"Second, when a program's source code carries a weak license, one without "
"copyleft, its executables can carry additional nonfree conditions. <a href="
"\"https://code.visualstudio.com/License/\">Microsoft does this with Visual "
-"Studio,</a> for example."
+"Studio Code,</a> for example."
msgstr ""
"å
¶æ¬¡ï¼å½ä¸ä¸ªç¨åºçæºä»£ç 使ç¨çæ¯å¼±è®¸å¯è¯ï¼èé
copyleftï¼é£ä¹å
¶å¯æ§è¡æ件就è½"
"å¤éå é¢å¤çéèªç±æ¡æ¬¾ãä¾å¦ï¼<a
href=\"https://code.visualstudio.com/"
@@ -874,8 +881,12 @@
"ç¿»è¯é¡»ç¥</a>ã"
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
msgid ""
-"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
+"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020, 2021 Richard "
+"Stallman"
msgstr ""
"Copyright © 2007, 2010, 2012, 2015, 2016, 2019, 2020 Richard Stallman"
Index: philosophy/po/words-to-avoid.es-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/words-to-avoid.es-en.html,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- philosophy/po/words-to-avoid.es-en.html 3 Mar 2021 10:29:21 -0000
1.100
+++ philosophy/po/words-to-avoid.es-en.html 26 Apr 2021 12:04:29 -0000
1.101
@@ -529,7 +529,7 @@
“tubes” of the internet.
</p>
-<p>See also <a href="http://www.salon.com/2000/06/14/love_7/">Courtney
+<p>See also <a href="https://www.salon.com/2000/06/14/love_7/">Courtney
Love's open letter to Steve Case</a> and search for “content
provider” in that page. Alas, Ms. Love is unaware that the term
“intellectual property” is
@@ -1430,7 +1430,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/03/03 10:29:21 $
+$Date: 2021/04/26 12:04:29 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/words-to-avoid.es.po
===================================================================
RCS file: /web/www/www/philosophy/po/words-to-avoid.es.po,v
retrieving revision 1.270
retrieving revision 1.271
diff -u -b -r1.270 -r1.271
--- philosophy/po/words-to-avoid.es.po 26 Apr 2021 11:46:22 -0000 1.270
+++ philosophy/po/words-to-avoid.es.po 26 Apr 2021 12:04:29 -0000 1.271
@@ -1151,11 +1151,6 @@
"alimentación» de internet."
# type: Content of: <p>
-# | See also <a href=\"http{+s+}://www.salon.com/2000/06/14/love_7/\">Courtney
-# | Love's open letter to Steve Case</a> and search for “content
-# | provider” in that page. Alas, Ms. Love is unaware that the term
-# | “intellectual property” is also <a
-# | href=\"#IntellectualProperty\"> biased and confusing</a>.
#. type: Content of: <p>
msgid ""
"See also <a href=\"https://www.salon.com/2000/06/14/love_7/\">Courtney "
Index: proprietary/proprietary.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.pt-br.html,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary/proprietary.pt-br.html 23 Apr 2021 10:29:19 -0000 1.96
+++ proprietary/proprietary.pt-br.html 26 Apr 2021 12:04:30 -0000 1.97
@@ -3,7 +3,7 @@
https://www.gnu.org/proprietary/po/proprietary.pt-br.po</a>'
--><!--#set var="ORIGINAL_FILE" value="/proprietary/proprietary.html"
--><!--#set var="DIFF_FILE"
value="/proprietary/po/proprietary.pt-br-diff.html"
- --><!--#set var="OUTDATED_SINCE" value="2021-02-22" --><!--#set
var="ENGLISH_PAGE" value="/proprietary/proprietary.en.html" -->
+ --><!--#set var="OUTDATED_SINCE" value="2021-02-22" -->
<!--#include virtual="/server/html5-header.pt-br.html" -->
<!-- Parent-Version: 1.95 -->
@@ -360,7 +360,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima atualização:
-$Date: 2021/04/23 10:29:19 $
+$Date: 2021/04/26 12:04:30 $
<!-- timestamp end -->
</p>
Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.306
retrieving revision 1.307
diff -u -b -r1.306 -r1.307
--- proprietary/po/de.po 18 Apr 2021 08:31:18 -0000 1.306
+++ proprietary/po/de.po 26 Apr 2021 12:04:30 -0000 1.307
@@ -12438,6 +12438,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Prodigy maths game played in schools at no cost entices students to play "
"it at home, where <a href=\"https://www.theguardian.com/technology/2021/"
"feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "
Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.434
retrieving revision 1.435
diff -u -b -r1.434 -r1.435
--- proprietary/po/es.po 18 Apr 2021 08:31:18 -0000 1.434
+++ proprietary/po/es.po 26 Apr 2021 12:04:30 -0000 1.435
@@ -13200,6 +13200,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Prodigy maths game played in schools at no cost entices students to play "
"it at home, where <a href=\"https://www.theguardian.com/technology/2021/"
"feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "
Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.536
retrieving revision 1.537
diff -u -b -r1.536 -r1.537
--- proprietary/po/fr.po 18 Apr 2021 09:16:44 -0000 1.536
+++ proprietary/po/fr.po 26 Apr 2021 12:04:31 -0000 1.537
@@ -11166,6 +11166,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Prodigy maths game played in schools at no cost entices students to play "
"it at home, where <a href=\"https://www.theguardian.com/technology/2021/"
"feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "
Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.306
retrieving revision 1.307
diff -u -b -r1.306 -r1.307
--- proprietary/po/it.po 18 Apr 2021 08:31:18 -0000 1.306
+++ proprietary/po/it.po 26 Apr 2021 12:04:31 -0000 1.307
@@ -11552,6 +11552,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Prodigy maths game played in schools at no cost entices students to play "
"it at home, where <a href=\"https://www.theguardian.com/technology/2021/"
"feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "
Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.314
retrieving revision 1.315
diff -u -b -r1.314 -r1.315
--- proprietary/po/ja.po 18 Apr 2021 08:31:18 -0000 1.314
+++ proprietary/po/ja.po 26 Apr 2021 12:04:31 -0000 1.315
@@ -9171,6 +9171,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Prodigy maths game played in schools at no cost entices students to play "
"it at home, where <a href=\"https://www.theguardian.com/technology/2021/"
"feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "
Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.307
retrieving revision 1.308
diff -u -b -r1.307 -r1.308
--- proprietary/po/nl.po 18 Apr 2021 08:31:18 -0000 1.307
+++ proprietary/po/nl.po 26 Apr 2021 12:04:31 -0000 1.308
@@ -8354,6 +8354,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Prodigy maths game played in schools at no cost entices students to play "
"it at home, where <a href=\"https://www.theguardian.com/technology/2021/"
"feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "
Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.306
retrieving revision 1.307
diff -u -b -r1.306 -r1.307
--- proprietary/po/pl.po 18 Apr 2021 08:31:18 -0000 1.306
+++ proprietary/po/pl.po 26 Apr 2021 12:04:31 -0000 1.307
@@ -7774,6 +7774,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Prodigy maths game played in schools at no cost entices students to play "
"it at home, where <a href=\"https://www.theguardian.com/technology/2021/"
"feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "
Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.305
retrieving revision 1.306
diff -u -b -r1.305 -r1.306
--- proprietary/po/pot 18 Apr 2021 08:31:19 -0000 1.305
+++ proprietary/po/pot 26 Apr 2021 12:04:33 -0000 1.306
@@ -7374,6 +7374,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Prodigy maths game played in schools at no cost entices students to play "
"it at home, where <a href=\"https://www.theguardian.com/technology/2021/"
"feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "
Index: proprietary/po/proprietary-manipulation.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.es.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/po/proprietary-manipulation.es.po 12 Apr 2021 10:33:22
-0000 1.23
+++ proprietary/po/proprietary-manipulation.es.po 26 Apr 2021 12:04:33
-0000 1.24
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2021-04-11 12:56+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2021-04-12 12:06+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -118,6 +119,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Prodigy maths game played in schools at no cost entices students to play "
"it at home, where <a href=\"https://www.theguardian.com/technology/2021/"
"feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "
Index: proprietary/po/proprietary-manipulation.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.fr.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/po/proprietary-manipulation.fr.po 12 Apr 2021 09:50:40
-0000 1.21
+++ proprietary/po/proprietary-manipulation.fr.po 26 Apr 2021 12:04:34
-0000 1.22
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2021-04-11 12:56+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2021-04-12 11:45+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Manipulation - GNU Project - Free Software Foundation"
@@ -112,6 +113,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Prodigy maths game played in schools at no cost entices students to play "
"it at home, where <a href=\"https://www.theguardian.com/technology/2021/"
"feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "
Index: proprietary/po/proprietary-manipulation.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.pot,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary/po/proprietary-manipulation.pot 11 Apr 2021 13:04:32 -0000
1.13
+++ proprietary/po/proprietary-manipulation.pot 26 Apr 2021 12:04:34 -0000
1.14
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-manipulation.html\n"
-"POT-Creation-Date: 2021-04-11 12:56+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -94,6 +94,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a "
+"href=\"https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/\">WeddingWire
"
+"app saves people's wedding photos forever and hands over data to others</a>, "
+"and gives people no control over their personal information/data. The app "
+"also sometimes shows old photos and memories to the user without user having "
+"control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Prodigy maths game played in schools at no cost entices students to play "
"it at home, where <a "
"href=\"https://www.theguardian.com/technology/2021/feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\">
"
Index: proprietary/po/proprietary-manipulation.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.ru.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/proprietary-manipulation.ru.po 12 Apr 2021 08:04:25
-0000 1.18
+++ proprietary/po/proprietary-manipulation.ru.po 26 Apr 2021 12:04:34
-0000 1.19
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-04-11 12:56+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Manipulation - GNU Project - Free Software Foundation"
@@ -113,6 +114,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Prodigy maths game played in schools at no cost entices students to play "
"it at home, where <a href=\"https://www.theguardian.com/technology/2021/"
"feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "
Index: proprietary/po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.180
retrieving revision 1.181
diff -u -b -r1.180 -r1.181
--- proprietary/po/proprietary-surveillance.de-diff.html 15 Apr 2021
19:01:22 -0000 1.180
+++ proprietary/po/proprietary-surveillance.de-diff.html 26 Apr 2021
12:04:34 -0000 1.181
@@ -1251,7 +1251,8 @@
honestly identify the information it collects on users, instead of
hiding it in an obscurely</em></ins></span> worded EULA.</p>
- <p>However, to <span class="removed"><del><strong>truly
protect</strong></del></span> <span class="inserted"><ins><em>truly protect
people's privacy, we must prevent Google
+ <p>However, to <span class="removed"><del><strong>truly protect
people's privacy, we must prevent Google
+and other companies from getting this personal information
in</strong></del></span> <span class="inserted"><ins><em>truly protect people's
privacy, we must prevent Google
and other companies from getting this personal information in the
first place!</p>
</li>
@@ -2020,7 +2021,7 @@
<p>Facebook's app listens all the time, <a
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html">to
snoop on what people are listening to or watching</a>. In addition,
- it may be analyzing</em></ins></span> people's <span
class="removed"><del><strong>privacy, we must prevent
Google</strong></del></span> <span class="inserted"><ins><em>conversations to
serve them with targeted
+ it may be analyzing people's conversations to serve them with targeted
advertisements.</p>
</li>
@@ -2040,147 +2041,133 @@
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
Symphony surveillance software snoop on what radio and TV programs
are playing nearby</a>. Also on what users post on various sites
- such as Facebook, Google+</em></ins></span> and <span
class="removed"><del><strong>other companies from getting this personal
information in the first
-place!</p></strong></del></span> <span
class="inserted"><ins><em>Twitter.</p></em></ins></span>
+ such as Facebook, Google+ and Twitter.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Google Play (a component of Android)</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511190">
+ <li id="M201511190">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>“Cryptic communication,”
- unrelated to the app's functionality, was</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</strong></del></span>
- <span
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in</em></ins></span> the <span class="removed"><del><strong>users'
movements without their permission</a>.</p>
-
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>500 most popular gratis Android
apps</a>.</p>
+ unrelated to the app's functionality, was <a
+
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in the 500 most popular gratis Android apps</a>.</p>
<p>The article should not have described these apps as
- “free”—they are not free software. The clear
way</em></ins></span>
- to <span class="removed"><del><strong>completely
stop</strong></del></span> <span class="inserted"><ins><em>say “zero
price” is “gratis.”</p>
+ “free”—they are not free software. The clear way
+ to say “zero price” is “gratis.”</p>
- <p>The article takes for granted that</em></ins></span> the <span
class="removed"><del><strong>tracking. This</strong></del></span> <span
class="inserted"><ins><em>usual analytics tools are
- legitimate, but</em></ins></span> is
- <span class="removed"><del><strong>yet another example of nonfree software
pretending</strong></del></span> <span class="inserted"><ins><em>that valid?
Software developers have no right</em></ins></span> to <span
class="removed"><del><strong>obey the user,
- when it's actually</strong></del></span>
- <span class="inserted"><ins><em>analyze what users are</em></ins></span>
doing <span class="removed"><del><strong>something else. Such a thing would be
almost
- unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>or how. “Analytics” tools
+ <p>The article takes for granted that</em></ins></span> the <span
class="removed"><del><strong>first
+place!</p></strong></del></span> <span class="inserted"><ins><em>usual
analytics tools are
+ legitimate, but is that valid? Software developers have no right to
+ analyze what users are doing or how. “Analytics” tools
that snoop are just as wrong as any other
snooping.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>More</strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>Google Play (a component</strong></del></span>
<span class="inserted"><ins><em><li id="M201510300">
<!--#set var="DATE" value='<small
class="date-tag">2015-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>More</em></ins></span> than 73% <span
class="inserted"><ins><em>and 47%</em></ins></span> of <span
class="removed"><del><strong>the most popular</strong></del></span> <span
class="inserted"><ins><em>mobile applications, for</em></ins></span> Android
<span class="removed"><del><strong>apps</strong></del></span> <span
class="inserted"><ins><em>and iOS
- respectively</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share</strong></del></span>
<span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">hand
over</em></ins></span>
- personal, behavioral and location information</a> of their users
<span class="removed"><del><strong>with</strong></del></span> <span
class="inserted"><ins><em>to</em></ins></span>
- third parties.</p>
- </li>
+ <p>More than 73% and 47%</em></ins></span> of <span
class="removed"><del><strong>Android)</strong></del></span> <span
class="inserted"><ins><em>mobile applications, for Android and iOS
+ respectively</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks the users' movements without their permission</a>.</p>
- <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated</strong></del></span>
+ <p>Even if you disable Google Maps</strong></del></span> <span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">hand
over
+ personal, behavioral</em></ins></span> and location <span
class="removed"><del><strong>tracking, you must
+ disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>information</a> of their
users</em></ins></span> to <span class="removed"><del><strong>completely
stop</strong></del></span>
+ <span class="inserted"><ins><em>third parties.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201508210">
+ <li id="M201508210">
<!--#set var="DATE" value='<small
class="date-tag">2015-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Like most “music screaming” disservices, Spotify is
based on proprietary malware (DRM and snooping). In August 2015 it <a
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some are
starting</em></ins></span>
- to <span class="inserted"><ins><em>realize that it is nasty.</p>
+ demanded users submit to increased snooping</a>, and some are
starting
+ to realize that it is nasty.</p>
- <p>This article shows</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
- was</strong></del></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ <p>This article shows</em></ins></span> the <span
class="removed"><del><strong>tracking.</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
twisted ways that they present snooping as a way to “serve”
- users better</a>—never mind whether they want that. This is a
- typical example of the attitude of the proprietary software industry
+ users better</a>—never mind whether they want
that.</em></ins></span> This is
+ <span class="removed"><del><strong>yet another</strong></del></span> <span
class="inserted"><ins><em>a
+ typical</em></ins></span> example of <span
class="removed"><del><strong>nonfree software pretending to
obey</strong></del></span> the <span class="removed"><del><strong>user,
+ when it's actually doing something else. Such a thing would be almost
+ unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>attitude of the proprietary software industry
towards those they have subjugated.</p>
- <p>Out, out, damned Spotify!</p>
+ <p>Out, out, damned Spotify!</p></em></ins></span>
</li>
- <li id="M201506264">
+ <span class="removed"><del><strong><li><p>More than
73%</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201506264">
<!--#set var="DATE" value='<small
class="date-tag">2015-06</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf">
- A study</em></ins></span> in <span
class="inserted"><ins><em>2015</a> found that 90% of</em></ins></span>
the <span class="removed"><del><strong>500 most popular</strong></del></span>
<span class="inserted"><ins><em>top-ranked</em></ins></span> gratis <span
class="inserted"><ins><em>proprietary</em></ins></span>
- Android <span
class="removed"><del><strong>apps</a>.</p></strong></del></span>
<span class="inserted"><ins><em>apps contained recognizable tracking libraries.
For the paid
- proprietary apps, it was only 60%.</p></em></ins></span>
-
- <p>The article <span class="removed"><del><strong>should not have
described these</strong></del></span> <span
class="inserted"><ins><em>confusingly describes gratis</em></ins></span> apps as
- <span
class="removed"><del><strong>“free”—they</strong></del></span>
- <span class="inserted"><ins><em>“free”, but most of
them</em></ins></span> are not <span class="removed"><del><strong>free
software. The clear way to say
- “zero price” is “gratis.”</p>
-
- <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>in fact <a
- href="/philosophy/free-sw.html">free software</a>. It also uses
the
- ugly word “monetize”. A good replacement</em></ins></span> for
<span class="removed"><del><strong>granted</strong></del></span> that <span
class="removed"><del><strong>the usual analytics tools are
- legitimate, but</strong></del></span> <span
class="inserted"><ins><em>word</em></ins></span>
- is <span class="inserted"><ins><em>“exploit”; nearly
always</em></ins></span> that <span class="removed"><del><strong>valid?
Software developers have no right to
- analyze what users are doing or how. “Analytics” tools that
snoop are
- just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>will fit perfectly.</p></em></ins></span>
+ A study in 2015</a> found that 90% of the top-ranked gratis
proprietary
+ Android apps contained recognizable tracking libraries. For the paid
+ proprietary apps, it was only 60%.</p>
+
+ <p>The article confusingly describes gratis apps as
+ “free”, but most</em></ins></span> of <span
class="inserted"><ins><em>them are not in fact <a
+ href="/philosophy/free-sw.html">free software</a>. It also
uses</em></ins></span> the <span class="removed"><del><strong>most
popular</strong></del></span>
+ <span class="inserted"><ins><em>ugly word “monetize”. A good
replacement for that word
+ is “exploit”; nearly always that will fit perfectly.</p>
</li>
- <span
class="removed"><del><strong><li><p>Gratis</strong></del></span>
- <span class="inserted"><ins><em><li id="M201505060">
+ <li id="M201505060">
<!--#set var="DATE" value='<small
class="date-tag">2015-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Gratis</em></ins></span> Android apps (but not <a
- href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
-
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
- and advertising</a> URLs, on the average.</p>
+ <p>Gratis</em></ins></span> Android apps <span
class="inserted"><ins><em>(but not</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral</strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>) connect to 100 <a
+
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</em></ins></span>
+ and <span class="removed"><del><strong>location information</a> of
their users with third parties.</p></strong></del></span> <span
class="inserted"><ins><em>advertising</a> URLs, on the
average.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+
+ <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated</strong></del></span>
<span class="inserted"><ins><em><li id="M201504060">
<!--#set var="DATE" value='<small
class="date-tag">2015-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This</em></ins></span>
is <span class="removed"><del><strong>present</strong></del></span> in <span
class="removed"><del><strong>some Android devices when they are sold.
- Some Motorola phones modify Android</strong></del></span> <span
class="inserted"><ins><em>addition</em></ins></span> to
- <span class="removed"><del><strong><a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data</strong></del></span>
- <span class="inserted"><ins><em>the snooping done by the phone company,
and perhaps by the OS in
- the phone.</p>
+ QR-code scanner apps snoop on the user</a>. This is in
addition</em></ins></span> to
+ the <span class="removed"><del><strong>app's functionality,
+ was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found</strong></del></span> <span class="inserted"><ins><em>snooping done by
the phone company, and perhaps by the OS</em></ins></span> in
+ the <span class="removed"><del><strong>500 most popular gratis Android
apps</a>.</p>
+
+ <p>The article should not have described these apps as
+ “free”—they are not free software. The clear
way</strong></del></span> <span class="inserted"><ins><em>phone.</p>
<p>Don't be distracted by the question of whether the app developers
- get users</em></ins></span> to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
<span class="inserted"><ins><em>say “I agree”. That is no excuse
for
- malware.</p></em></ins></span>
- </li>
+ get users</em></ins></span> to say
+ <span class="removed"><del><strong>“zero
price”</strong></del></span> <span class="inserted"><ins><em>“I
agree”. That</em></ins></span> is <span
class="removed"><del><strong>“gratis.”</p>
- <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
+ <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>no excuse</em></ins></span> for <span
class="removed"><del><strong>granted that</strong></del></span>
+ <span class="inserted"><ins><em>malware.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201411260">
+ <li id="M201411260">
<!--#set var="DATE" value='<small
class="date-tag">2014-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many proprietary apps for mobile devices
- report which other apps the user has installed.</em></ins></span> <a
<span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such</strong></del></span>
- <span
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible and optional</a>.
Not</em></ins></span>
- as <span class="removed"><del><strong>Carrier IQ.</a></p>
- </li>
-
- <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file
on</strong></del></span> <span class="inserted"><ins><em>bad as
what</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>others do.</p></em></ins></span>
+ report which other apps</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
+ legitimate, but</strong></del></span> <span class="inserted"><ins><em>user
has installed. <a
+
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</em></ins></span>
+ is <span class="removed"><del><strong>that valid? Software developers
have no right to
+ analyze what users are</strong></del></span> doing <span
class="removed"><del><strong>or how. “Analytics”
tools</strong></del></span> <span class="inserted"><ins><em>this in a
way</em></ins></span> that <span class="removed"><del><strong>snoop are
+ just</strong></del></span> <span class="inserted"><ins><em>at least is
visible and optional</a>. Not</em></ins></span>
+ as <span class="removed"><del><strong>wrong</strong></del></span> <span
class="inserted"><ins><em>bad</em></ins></span> as <span
class="removed"><del><strong>any</strong></del></span> <span
class="inserted"><ins><em>what the others do.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-
-<!-- #SpywareOnMobiles</strong></del></span>
- <span class="inserted"><ins><em><li id="M201401150.1">
+ <li id="M201401150.1">
<!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The Simeji keyboard is a smartphone version of Baidu's <a
@@ -2190,122 +2177,79 @@
<li id="M201312270">
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>The nonfree Snapchat app's
principal purpose is</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware</strong></del></span> <span
class="inserted"><ins><em>restrict the
- use of data</em></ins></span> on <span
class="removed"><del><strong>Mobiles</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareIniThings">Spyware in iThings</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
-</div>
-
-<ul>
- <li><p>The DMCA and</strong></del></span> the <span
class="removed"><del><strong>EU Copyright Directive make</strong></del></span>
<span class="inserted"><ins><em>user's computer, but</em></ins></span> it <span
class="inserted"><ins><em>does surveillance too:</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries</em></ins></span> to <span class="removed"><del><strong>study how
iOS cr...apps spy on users</a>, because this
- would require circumventing</strong></del></span> <span
class="inserted"><ins><em>get</em></ins></span> the <span
class="removed"><del><strong>iOS DRM.</p></strong></del></span> <span
class="inserted"><ins><em>user's list of other people's phone
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The nonfree Snapchat app's principal purpose is to restrict the
+ use of data on the user's computer, but it does surveillance too: <a
+
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get the user's list of</em></ins></span> other <span
class="removed"><del><strong>snooping.</p></strong></del></span> <span
class="inserted"><ins><em>people's phone
numbers</a>.</p></em></ins></span>
</li>
-
- <span class="removed"><del><strong><li><p>In the latest iThings
system, “turning off” WiFi and Bluetooth the
- obvious way</strong></del></span>
+ <span class="removed"><del><strong><li><p>Gratis Android apps
(but not <a href="/philosophy/free-sw.html">free software</a>)
+ connect to 100</strong></del></span>
<span class="inserted"><ins><em><li id="M201312060">
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Brightest Flashlight app</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>.
- A more advanced way really does turn them off—only until 5am.
- That's Apple</strong></del></span>
+ <p>The Brightest Flashlight app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
+ on</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation,</em></ins></span> for <span
class="removed"><del><strong>you—“We know you want to be spied
on”.</p>
- </li>
-
- <li><p>Apple proposes
- <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to</strong></del></span> use <span
class="inserted"><ins><em>by companies</a>.</p>
-
- <p>The FTC criticized this app because</em></ins></span> it <span
class="removed"><del><strong>without having your fingerprints
- taken. Users would have no way to tell whether</strong></del></span>
<span class="inserted"><ins><em>asked</em></ins></span> the <span
class="removed"><del><strong>phone is snooping on
- them.</p></li>
+ sends user data, including geolocation, for use by
companies</a>.</p>
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots of</strong></del></span> <span class="inserted"><ins><em>user to
- approve sending</em></ins></span> personal data to <span
class="removed"><del><strong>Apple's servers</a>. Big Brother can
- get them from there.</p>
+ <p>The FTC criticized this app because it asked</em></ins></span>
the <span class="removed"><del><strong>average.</p>
+ </li>
+ <li><p>Spyware is present in some Android devices when they are
sold.
+ Some Motorola phones modify Android</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> to
+ <span class="removed"><del><strong><a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send</strong></del></span>
+ <span class="inserted"><ins><em>approve sending</em></ins></span> personal
data to <span class="removed"><del><strong>Motorola</a>.</p>
</li>
- <li><p>The iMessage</strong></del></span> <span
class="inserted"><ins><em>the</em></ins></span> app <span
class="removed"><del><strong>on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that</strong></del></span> <span
class="inserted"><ins><em>developer but did not ask
- about sending it to other companies. This shows</em></ins></span> the
<span class="removed"><del><strong>user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>weakness
of</em></ins></span>
- the <span class="removed"><del><strong>server records these numbers for at
least 30
- days.</p>
+ <li><p>Some manufacturers add a
+ <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p>
</li>
- <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
<span class="inserted"><ins><em>reject-it-if-you-dislike-snooping
“solution”</em></ins></span> to <span
class="removed"><del><strong>install even gratis apps)</a>
- without giving</strong></del></span>
- <span class="inserted"><ins><em>surveillance: why should</em></ins></span>
a <span class="removed"><del><strong>valid email address and receiving the code
Apple
- sends</strong></del></span> <span class="inserted"><ins><em>flashlight
app send any information</em></ins></span> to <span
class="removed"><del><strong>it.</p></strong></del></span>
- <span class="inserted"><ins><em>anyone? A free software flashlight app
would not.</p></em></ins></span>
+ <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access</strong></del></span>
<span class="inserted"><ins><em>the app developer but did not ask
+ about sending it</em></ins></span> to <span
class="removed"><del><strong>any file on</strong></del></span> <span
class="inserted"><ins><em>other companies. This shows</em></ins></span> the
<span class="removed"><del><strong>system.</p>
</li>
+</ul>
- <span class="removed"><del><strong><li><p>Around 47% of
the</strong></del></span>
- <span class="inserted"><ins><em><li id="M201212100">
- <!--#set var="DATE" value='<small
class="date-tag">2012-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>FTC says</em></ins></span> most <span
class="removed"><del><strong>popular iOS</strong></del></span> <span
class="inserted"><ins><em>mobile</em></ins></span> apps <span
class="inserted"><ins><em>for children don't respect privacy:</em></ins></span>
<a <span class="removed"><del><strong>class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a> of their users with third
parties.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li><p>iThings automatically
upload to Apple's servers all the photos and
- videos they make.</p>
+<!-- #SpywareOnMobiles -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>weakness of
+ the reject-it-if-you-dislike-snooping
“solution”</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each
subsection</strong></del></span>
+ <span class="inserted"><ins><em>surveillance: why should a flashlight app
send any information to
+ anyone? A free software flashlight app would not.</p>
+ </li>
- <blockquote><p>
- iCloud Photo Library stores every photo and video you take,
- and keeps them up</strong></del></span>
-<span class="inserted"><ins><em></ul>
+ <li id="M201212100">
+ <!--#set var="DATE" value='<small
class="date-tag">2012-12</small>'
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+ <span class="inserted"><ins><em><p>FTC says most mobile apps for
children don't respect privacy: <a
+
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ </li>
+</ul></em></ins></span>
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware on
Mobiles</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInSkype">Skype</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInSkype">#SpywareInSkype</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear:
left;"></div></strong></del></span>
-<ul class="blurbs">
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201908151">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Skype refuses</em></ins></span> to <span
class="removed"><del><strong>date on all your devices.
- Any edits you make are automatically updated everywhere. [...]
- </p></blockquote>
-
- <p>(From</strong></del></span> <span class="inserted"><ins><em>say
whether it can</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
- information</a> as accessed</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop</em></ins></span>
- on <span class="removed"><del><strong>24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated by the
- startup of iOS</a>. The term
“cloud”</strong></del></span> <span
class="inserted"><ins><em>calls</a>.</p>
-
- <p>That almost certainly</em></ins></span> means
- <span class="removed"><del><strong>“please don't ask
where.”</p>
+ <p>Skype refuses to say whether it can <a
+
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
+ on calls</a>.</p>
- <p>There is a way to <a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by default
so</strong></del></span> it <span class="removed"><del><strong>still counts as
a</strong></del></span> <span class="inserted"><ins><em>can do so.</p>
+ <p>That almost certainly means it can do so.</p>
</li>
<li id="M201307110">
@@ -2317,175 +2261,160 @@
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
specifically for spying</a>.</p>
</li>
-</ul>
+</ul></em></ins></span>
<div class="big-subsection">
- <h4 id="SpywareInGames">Games</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareIniThings">Spyware
in iThings</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInGames">Games</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareIniThings">#SpywareIniThings</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInGames">#SpywareInGames</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>The DMCA and</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202010221">
<!--#set var="DATE" value='<small
class="date-tag">2020-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft is imposing its</em></ins></span>
- surveillance <span class="removed"><del><strong>functionality.</p>
-
- <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>on the game</em></ins></span> of <span
class="removed"><del><strong>this to</strong></del></span> <span
class="inserted"><ins><em>Minecraft by</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security</strong></del></span>
+ <p>Microsoft is imposing its
+ surveillance on</em></ins></span> the <span
class="removed"><del><strong>EU Copyright Directive make
it</strong></del></span> <span class="inserted"><ins><em>game of Minecraft
by</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
- every player</em></ins></span> to <span class="removed"><del><strong>get
at them, but NSA can access any of</strong></del></span> <span
class="inserted"><ins><em>open an account on Microsoft's network</a>.
Microsoft
+ every player</em></ins></span> to <span class="removed"><del><strong>study
how iOS cr...apps spy</strong></del></span> <span
class="inserted"><ins><em>open an account</em></ins></span> on <span
class="removed"><del><strong>users</a>, because this
+ would require circumventing</strong></del></span> <span
class="inserted"><ins><em>Microsoft's network</a>. Microsoft
has bought the game and will merge all accounts into its network,
- which will give</em></ins></span> them <span
class="removed"><del><strong>through</strong></del></span> <span
class="inserted"><ins><em>access to people's data.</p>
+ which will give them access to people's data.</p>
- <p>Minecraft players</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware in iThings:</strong></del></span>
- <span
class="inserted"><ins><em>href="https://directory.fsf.org/wiki/Minetest">can
play Minetest</a>
+ <p>Minecraft players <a
+ href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
instead. The essential advantage of Minetest is that it is free
- software, meaning it respects</em></ins></span> the <span
class="removed"><del><strong><a class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly
where</strong></del></span> <span class="inserted"><ins><em>user's computer
freedom. As a bonus,
- it offers more options.</p>
+ software, meaning it respects</em></ins></span> the <span
class="removed"><del><strong>iOS DRM.</p></strong></del></span> <span
class="inserted"><ins><em>user's computer freedom. As a bonus,
+ it offers more options.</p></em></ins></span>
</li>
- <li id="M201908210">
+ <span class="removed"><del><strong><li><p>In the latest iThings
system, “turning off” WiFi</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201908210">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft recorded users of Xboxes and had <a
-
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
- human workers listen to</em></ins></span> the <span
class="removed"><del><strong>iThing is,</strong></del></span> <span
class="inserted"><ins><em>recordings</a>.</p>
-
- <p>Morally, we see no difference between having human workers
listen</em></ins></span> and <span class="removed"><del><strong>get other info
too.</p></strong></del></span>
- <span class="inserted"><ins><em>having speech-recognition systems listen.
Both intrude on privacy.</p></em></ins></span>
+ <p>Microsoft recorded users of Xboxes</em></ins></span> and <span
class="removed"><del><strong>Bluetooth the
+ obvious way</strong></del></span> <span
class="inserted"><ins><em>had</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>.
+ A more advanced way really does turn them off—only until 5am.
+ That's Apple for you—“We know you want</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
+ human workers listen</em></ins></span> to <span
class="removed"><del><strong>be spied on”.</p>
</li>
- <span
class="removed"><del><strong><li><p>There</strong></del></span>
+ <li><p>Apple proposes
+ <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean</strong></del></span> <span
class="inserted"><ins><em>the recordings</a>.</p>
- <span class="inserted"><ins><em><li id="M201806240">
- <!--#set var="DATE" value='<small
class="date-tag">2018-06</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Red Shell</em></ins></span> is <span
class="removed"><del><strong>also</strong></del></span> a <span
class="removed"><del><strong>feature for web sites to track users, which is
- <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6, but
it</strong></del></span> <span class="inserted"><ins><em>spyware
that</em></ins></span>
- is <span class="removed"><del><strong>still true</strong></del></span>
<span class="inserted"><ins><em>found</em></ins></span> in <span
class="removed"><del><strong>iOS 7.)</p>
- </li>
+ <p>Morally, we see</em></ins></span> no <span
class="removed"><del><strong>way to use it without</strong></del></span> <span
class="inserted"><ins><em>difference between</em></ins></span> having <span
class="removed"><del><strong>your fingerprints
+ taken. Users would have no way to tell whether the phone is
snooping</strong></del></span> <span class="inserted"><ins><em>human workers
listen and
+ having speech-recognition systems listen. Both intrude</em></ins></span>
on
+ <span class="removed"><del><strong>them.</p></li>
- <li><p>The iThing also
- <a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though that can be
- turned off.</p>
+ <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>privacy.</p>
</li>
- <li><p>Apple can, and regularly does,</strong></del></span>
<span class="inserted"><ins><em>many proprietary games. It</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some</strong></del></span>
+ <li id="M201806240">
+ <!--#set var="DATE" value='<small
class="date-tag">2018-06</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Red Shell is a spyware that
+ is found in many proprietary games. It</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots of personal</strong></del></span>
<span
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks</em></ins></span> data <span class="removed"><del><strong>from
iPhones for the state</a>.</p></strong></del></span> <span
class="inserted"><ins><em>on users' computers and sends it to third
parties</a>.</p></em></ins></span>
+ tracks</em></ins></span> data <span class="inserted"><ins><em>on users'
computers and sends it</em></ins></span> to <span
class="removed"><del><strong>Apple's servers</a>. Big Brother can
+ get them from there.</p></strong></del></span> <span
class="inserted"><ins><em>third parties</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</strong></del></span>
+ <span class="removed"><del><strong><li><p>The iMessage app on
iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells</strong></del></span>
<span class="inserted"><ins><em><li id="M201804144">
<!--#set var="DATE" value='<small
class="date-tag">2018-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>ArenaNet surreptitiously installed a spyware
- program along with an update to</em></ins></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>massive
+ <p>ArenaNet surreptitiously installed</em></ins></span> a <span
class="removed"><del><strong>server every phone number that the user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>spyware
+ program along with an update to</em></ins></span> the <span
class="removed"><del><strong>server records these numbers</strong></del></span>
<span class="inserted"><ins><em>massive
multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
- to</em></ins></span> snoop on all <span class="removed"><del><strong>the
data in an iThing,
- or it is totally incompetent.</a></p></strong></del></span>
<span class="inserted"><ins><em>open processes running on its user's
computer</a>.</p></em></ins></span>
+ to snoop on all open processes running on its user's
computer</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711070">
+ <li id="M201711070">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The driver</em></ins></span> for <span
class="removed"><del><strong>no
- possible purpose other than surveillance</a>. Here is
the</strong></del></span> <span class="inserted"><ins><em>a certain gaming
keyboard</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
+ <p>The driver</em></ins></span> for <span
class="removed"><del><strong>at least 30
+ days.</p></strong></del></span> <span
class="inserted"><ins><em>a certain gaming keyboard <a
+
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information to China</a>.</p></em></ins></span>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
-</div>
-<ul>
- <li><p>Tracking software in popular Android
apps</strong></del></span>
+ <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID</strong></del></span>
<span class="inserted"><ins><em><li id="M201512290">
<!--#set var="DATE" value='<small
class="date-tag">2015-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many <a
-
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and report to the
+ <p>Many</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users and report</em></ins></span> to
<span class="removed"><del><strong>install even gratis apps)</a>
+ without giving</strong></del></span> <span class="inserted"><ins><em>the
internet</a>—even what their users weigh.</p>
- <p>A game console</em></ins></span> is <span
class="removed"><del><strong>pervasive</strong></del></span> <span
class="inserted"><ins><em>a computer,</em></ins></span> and
- <span class="removed"><del><strong>sometimes very clever. Some trackers
can <a
-href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow</strong></del></span> <span class="inserted"><ins><em>you can't
trust</em></ins></span> a <span class="removed"><del><strong>user's movements
around</strong></del></span> <span class="inserted"><ins><em>computer
with</em></ins></span>
- a <span class="removed"><del><strong>physical store by noticing WiFi
- networks</a>.</p></strong></del></span> <span
class="inserted"><ins><em>nonfree operating system.</p></em></ins></span>
+ <p>A game console is</em></ins></span> a <span
class="removed"><del><strong>valid email address</strong></del></span> <span
class="inserted"><ins><em>computer,</em></ins></span> and <span
class="removed"><del><strong>receiving the code Apple
+ sends to it.</p></strong></del></span> <span
class="inserted"><ins><em>you can't trust a computer with
+ a nonfree operating system.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Android tracks
location for Google <a
-href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even
- when the phone has no SIM card</a>.</p></li>
-
- <li><p>Some portable phones</strong></del></span>
+ <span class="removed"><del><strong><li><p>Around 47% of the most
popular iOS apps</strong></del></span>
<span class="inserted"><ins><em><li id="M201509160">
<!--#set var="DATE" value='<small
class="date-tag">2015-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots</strong></del></span>
+ <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a></strong></del></span>
<span
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range</em></ins></span> of data <span
class="inserted"><ins><em>about their users and their users'
+ collect a wide range</em></ins></span> of <span
class="inserted"><ins><em>data about</em></ins></span> their users <span
class="removed"><del><strong>with third parties.</p>
+ </li>
+
+ <li><p>iThings automatically upload to Apple's servers all the
photos</strong></del></span> and
+ <span class="removed"><del><strong>videos</strong></del></span> <span
class="inserted"><ins><em>their users'
friends and associates</a>.</p>
- <p>Even nastier, they do it through ad networks that merge the data
- collected by various cr…apps and sites made by different
+ <p>Even nastier,</em></ins></span> they <span
class="removed"><del><strong>make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores every photo</strong></del></span> <span
class="inserted"><ins><em>do it through ad networks that merge the data
+ collected by various cr…apps</em></ins></span> and <span
class="removed"><del><strong>video you take,</strong></del></span> <span
class="inserted"><ins><em>sites made by different
companies.</p>
- <p>They use this data</em></ins></span> to <span
class="removed"><del><strong>China</a>.</p></li>
+ <p>They use this data to manipulate people to buy
things,</em></ins></span> and <span class="removed"><del><strong>keeps them
up</strong></del></span> <span class="inserted"><ins><em>hunt for
+ “whales” who can be led</em></ins></span> to <span
class="removed"><del><strong>date on all your devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
+
+ <p>(From</strong></del></span> <span class="inserted"><ins><em>spend
a lot of money. They also
+ use a back door to manipulate the game play for specific players.</p>
- <li><p>According</strong></del></span> <span
class="inserted"><ins><em>manipulate people</em></ins></span> to <span
class="removed"><del><strong>Edward Snowden,
- <a
href="http://www.bbc.com/news/uk-34444233">agencies</strong></del></span>
<span class="inserted"><ins><em>buy things, and hunt for
- “whales” who</em></ins></span> can <span
class="removed"><del><strong>take over smartphones</a>
- by sending hidden text messages which enable them</strong></del></span>
<span class="inserted"><ins><em>be led</em></ins></span> to <span
class="removed"><del><strong>turn the phones
- on and off, listen</strong></del></span> <span
class="inserted"><ins><em>spend a lot of money. They also
- use a back door</em></ins></span> to <span
class="inserted"><ins><em>manipulate</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location data
from</strong></del></span> <span class="inserted"><ins><em>game play for
specific players.</p>
-
- <p>While</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
- browsing history,</strong></del></span> <span
class="inserted"><ins><em>article describes gratis games, games that cost money
+ <p>While the article describes gratis games, games that cost money
can use the same tactics.</p>
</li>
<li id="M201401280">
<!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Angry Birds <a
-
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> the <span
class="removed"><del><strong>contact list. This malware is
designed</strong></del></span> <span class="inserted"><ins><em>NSA takes
advantage</em></ins></span>
- to
- <span class="removed"><del><strong>disguise itself from
investigation.</p>
- </li>
+ <p>Angry Birds</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
+ information</a> as accessed</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and the NSA takes advantage
+ to spy through it too</a>. Here's information</em></ins></span> on
<span class="removed"><del><strong>24 Sep 2015.) The iCloud feature
is</strong></del></span> <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033">activated
by the
+ startup of iOS</a>. The term “cloud” means
+ “please don't ask where.”</p>
- <li><p>Samsung phones come with</strong></del></span> <span
class="inserted"><ins><em>spy through it too</a>. Here's information
on</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps</strong></del></span>
+ <p>There</strong></del></span>
<span
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
@@ -2497,23 +2426,21 @@
<li id="M200510200">
<!--#set var="DATE" value='<small
class="date-tag">2005-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Blizzard Warden is a hidden
- “cheating-prevention” program</em></ins></span> that <span
class="removed"><del><strong>users can't
delete</a>,</strong></del></span> <span class="inserted"><ins><em><a
- href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies on every process running on a gamer's computer</em></ins></span> and
<span class="removed"><del><strong>they send so much data that their
transmission is</strong></del></span> <span
class="inserted"><ins><em>sniffs</em></ins></span> a
- <span class="removed"><del><strong>substantial expense for users. Said
transmission, not wanted or
- requested by the user, clearly must constitute
spying</strong></del></span>
- <span class="inserted"><ins><em>good deal</em></ins></span> of <span
class="removed"><del><strong>some
- kind.</p></li>
-
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>personal data</a>, including lots of activities
which
- have nothing to do with cheating.</p></em></ins></span>
+ <p>Blizzard Warden</em></ins></span> is a <span
class="removed"><del><strong>way to</strong></del></span> <span
class="inserted"><ins><em>hidden
+ “cheating-prevention” program that</em></ins></span> <a
<span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default so it still
counts as</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
+ spies on every process running on</em></ins></span> a
+ <span class="removed"><del><strong>surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>gamer's computer and sniffs a
+ good deal</em></ins></span> of <span class="removed"><del><strong>this to
+ <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos</strong></del></span> <span
class="inserted"><ins><em>personal data</a>, including
lots</em></ins></span> of <span class="removed"><del><strong>many
celebrities</a>. They needed</strong></del></span> <span
class="inserted"><ins><em>activities which
+ have nothing</em></ins></span> to <span class="removed"><del><strong>break
Apple's
+ security</strong></del></span> <span class="inserted"><ins><em>do with
cheating.</p>
</li>
-
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
@@ -2527,204 +2454,208 @@
<li id="M202101050">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Most Internet connected devices</em></ins></span> in <span
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
- Street Journal (in an article blocked from us by a paywall)
- reports that</strong></del></span> <span
class="inserted"><ins><em>Mozilla's</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
+ <p>Most Internet connected devices in Mozilla's <a
+
href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
Not Included”</a> list <a
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
- designed to snoop on users</a> even if they meet
+ designed</em></ins></span> to <span class="removed"><del><strong>get at
them, but NSA can access any</strong></del></span> <span
class="inserted"><ins><em>snoop on users</a> even if they meet
Mozilla's “Minimum Security Standards.” Insecure
- design of</em></ins></span> the <span class="removed"><del><strong>FBI can
remotely activate</strong></del></span> <span class="inserted"><ins><em>program
running on some of these devices <a
-
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes</em></ins></span>
- the <span class="removed"><del><strong>GPS</strong></del></span> <span
class="inserted"><ins><em>user susceptible to be snooped</em></ins></span> and
<span class="removed"><del><strong>microphone</strong></del></span> <span
class="inserted"><ins><em>exploited by crackers as
- well</a>.</p>
+ design</em></ins></span> of <span class="removed"><del><strong>them through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p>Spyware in iThings:</strong></del></span> the <span
class="inserted"><ins><em>program running on some of these
devices</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly
where</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes</em></ins></span>
+ the <span class="removed"><del><strong>iThing is,
+ and get other info too.</p>
</li>
- <li id="M201708280">
- <!--#set var="DATE" value='<small
class="date-tag">2017-08</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The bad security</em></ins></span> in <span
class="removed"><del><strong>Android
- phones and laptops</a>.
- (I suspect this means Windows laptops.) Here is</strong></del></span>
<span class="inserted"><ins><em>many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ <li><p>There is also a feature for web
sites</strong></del></span> <span class="inserted"><ins><em>user
susceptible</em></ins></span> to <span class="removed"><del><strong>track
users, which is
+ <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled</strong></del></span> <span class="inserted"><ins><em>be snooped
and exploited</em></ins></span> by <span
class="removed"><del><strong>default</a>. (That article talks about iOS
6, but it
+ is still true in iOS 7.)</p></strong></del></span> <span
class="inserted"><ins><em>crackers as
+ well</a>.</p></em></ins></span>
</li>
- <li><p>Portable phones with GPS will send their GPS
location</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop</em></ins></span> on
- <span class="removed"><del><strong>remote command and users cannot stop
them:
- <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require</strong></del></span> <span
class="inserted"><ins><em>the people that use them</a>.</p>
+ <span class="removed"><del><strong><li><p>The iThing
also</strong></del></span>
- <p>Don't be a sucker—reject</em></ins></span> all <span
class="removed"><del><strong>new portable phones
- to have GPS.)</p>
- </li>
+ <span class="inserted"><ins><em><li id="M201708280">
+ <!--#set var="DATE" value='<small
class="date-tag">2017-08</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The bad security in many Internet of Stings devices
allows</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default,
though</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on the people</em></ins></span> that <span
class="removed"><del><strong>can</strong></del></span> <span
class="inserted"><ins><em>use them</a>.</p>
- <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span> <span class="inserted"><ins><em>the
stings.</p>
+ <p>Don't</em></ins></span> be
+ <span class="removed"><del><strong>turned
off.</p></strong></del></span> <span class="inserted"><ins><em>a
sucker—reject all the stings.</p>
- <p><small>(It</em></ins></span> is <span
class="removed"><del><strong>to restrict</strong></del></span> <span
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span
class="removed"><del><strong>use of data on</strong></del></span> <span
class="inserted"><ins><em>article uses</em></ins></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
- too:</strong></del></span> <span
class="inserted"><ins><em>term</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the user's list of other people's phone
- numbers.</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p></em></ins></span>
+ <p><small>(It is unfortunate that the article uses the term
<a
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>Apple
can,</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInTVSets">TV
Sets</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></em></ins></span>
+ <h4 id="SpywareInTVSets">TV Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li>
- <p>The moviepass app</strong></del></span>
-
-<span class="inserted"><ins><em><p>Emo Phillips made a joke: The other
day a woman came up to me</em></ins></span> and <span
class="removed"><del><strong>dis-service spy</strong></del></span>
-<span class="inserted"><ins><em>said, “Didn't I see
you</em></ins></span> on <span class="removed"><del><strong>users even more
than users
- expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel</strong></del></span> <span
class="inserted"><ins><em>television?” I said, “I
-don't know. You can't see out the other way.” Evidently that
was</em></ins></span>
-before <span class="inserted"><ins><em>Amazon “smart”
TVs.</p>
+<p>Emo Phillips made a joke: The other day a woman came up to
me</em></ins></span> and <span class="removed"><del><strong>regularly
does,</strong></del></span>
+<span class="inserted"><ins><em>said, “Didn't I see you on
television?” I said, “I
+don't know. You can't see out the other way.” Evidently that was
+before Amazon “smart” TVs.</p>
<ul class="blurbs">
<li id="M202010282">
<!--#set var="DATE" value='<small
class="date-tag">2020-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>TV manufacturers are turning to produce only
- “Smart” TV sets (which include spyware) that <a
- href="https://frame.work/blog/in-defense-of-dumb-tvs">it's now very
+ “Smart” TV sets (which include spyware) that</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://frame.work/blog/in-defense-of-dumb-tvs">it's
now very
hard to find a TV that doesn't spy on you</a>.</p>
<p>It appears that those manufacturers business model is not to
produce
- TV</em></ins></span> and <span class="removed"><del><strong>after
going</strong></del></span> <span class="inserted"><ins><em>sell them for
money, but to collect your personal data and
- (possibly) hand over them</em></ins></span> to <span
class="removed"><del><strong>a movie</a>.
- </p>
-
- <p>Don't be tracked — pay
cash!</p></strong></del></span> <span class="inserted"><ins><em>others
for benefit.</p></em></ins></span>
+ TV and sell them for money, but to collect your personal</em></ins></span>
data <span class="removed"><del><strong>from iPhones</strong></del></span>
<span class="inserted"><ins><em>and
+ (possibly) hand over them to others</em></ins></span> for <span
class="inserted"><ins><em>benefit.</p>
</li>
- <span class="removed"><del><strong><li><p>AI-powered driving
apps can</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M202006250">
+ <li id="M202006250">
<!--#set var="DATE" value='<small
class="date-tag">2020-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>TV manufacturers are able to</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop</em></ins></span>
- every <span
class="removed"><del><strong>move</a>.</p></strong></del></span>
<span class="inserted"><ins><em>second of what the user is watching</a>.
This is illegal due to
+ <p>TV manufacturers are able to <a
+
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
+ every second of what</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>user is watching</a>. This is illegal due
to
the Video Privacy Protection Act of 1988, but they're circumventing
it through EULAs.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Sarahah
app</strong></del></span>
+ <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps</strong></del></span>
<span class="inserted"><ins><em><li id="M201901070">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever the TV sees,”</a> in the own words of
the company's
- CTO,</em></ins></span> and <span class="removed"><del><strong>email
addresses</a></strong></del></span> <span class="inserted"><ins><em>this
data is sold to third parties. This is</em></ins></span> in <span
class="removed"><del><strong>user's address
- book</strong></del></span> <span class="inserted"><ins><em>return for
- “better service” (meaning more intrusive ads?) and slightly
+ <p>Vizio TVs <a
+
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever</em></ins></span> the <span
class="removed"><del><strong>NSA snoop on all</strong></del></span> <span
class="inserted"><ins><em>TV sees,”</a> in the own words
of</em></ins></span> the <span class="inserted"><ins><em>company's
+ CTO, and this</em></ins></span> data <span class="removed"><del><strong>in
an iThing,
+ or it</strong></del></span> is <span
class="removed"><del><strong>totally incompetent.</a></p>
+ </li>
+
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em>sold</em></ins></span> to <span
class="removed"><del><strong>exist</strong></del></span> <span
class="inserted"><ins><em>third parties. This is in return</em></ins></span>
for <span class="removed"><del><strong>no
+ possible purpose other than surveillance</a>.
Here</strong></del></span>
+ <span class="inserted"><ins><em>“better service” (meaning more
intrusive ads?) and slightly
lower retail prices.</p>
- <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>developer's server. Note
that</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> this <span
class="removed"><del><strong>article misuses the words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring</strong></del></span> <span class="inserted"><ins><em>spying
acceptable, according</em></ins></span> to <span
class="removed"><del><strong>zero price.</p>
+ <p>What</em></ins></span> is <span class="removed"><del><strong>the
+ <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
</li>
+</ul>
- <li>
- <p>Facebook's app listens</strong></del></span> <span
class="inserted"><ins><em>him,
- is that it is opt-in in newer models. But since the Vizio software is
- nonfree, we don't know what is actually happening behind the scenes,
- and there is no guarantee that</em></ins></span> all <span
class="inserted"><ins><em>future updates will leave</em></ins></span> the <span
class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span>
- <span class="inserted"><ins><em>settings unchanged.</p>
-
- <p>If you already own a Vizio “smart” TV (or any
“smart” TV, for that
- matter), the easiest way to make sure it isn't spying</em></ins></span> on
<span class="removed"><del><strong>what people are
listening</strong></del></span> <span class="inserted"><ins><em>you
is</em></ins></span>
- to <span class="removed"><del><strong>or watching</a>. In
addition,</strong></del></span> <span
class="inserted"><ins><em>disconnect</em></ins></span> it <span
class="removed"><del><strong>may
- be analyzing people's conversations</strong></del></span> <span
class="inserted"><ins><em>from the Internet, and use a terrestrial antenna
- instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is</em></ins></span> to <span
class="removed"><del><strong>serve them with targeted
- advertisements.</p>
- </li>
- <li>
- <p>Faceapp appears</strong></del></span> <span
class="inserted"><ins><em>get your own router (which can
- be an old computer running completely free software), and set up a
- firewall</em></ins></span> to <span class="removed"><del><strong>do lots
of surveillance, judging by
- <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands</strong></del></span> <span
class="inserted"><ins><em>block connections</em></ins></span> to <span
class="removed"><del><strong>personal data in the device</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>Vizio's servers. Or, as a last resort,
- you can replace your TV with another model.</p></em></ins></span>
- </li>
+<div class="big-subsection">
+ <h4 id="SpywareInTelephones">Spyware</strong></del></span> <span
class="inserted"><ins><em>supposed to make this spying acceptable, according to
him,
+ is that it is opt-in</em></ins></span> in <span
class="removed"><del><strong>Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+</div>
- <span class="removed"><del><strong><li>
- <p>Verizon</strong></del></span>
+<ul>
+ <li><p>Tracking</strong></del></span> <span
class="inserted"><ins><em>newer models. But since the Vizio</em></ins></span>
software <span class="removed"><del><strong>in popular Android
apps</strong></del></span> is <span
class="removed"><del><strong>pervasive</strong></del></span>
+ <span class="inserted"><ins><em>nonfree, we don't know what is actually
happening behind the scenes,</em></ins></span>
+ and
+ <span class="removed"><del><strong>sometimes very clever. Some trackers
can <a
+href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around</strong></del></span> <span
class="inserted"><ins><em>there is no guarantee that all future updates will
leave the
+ settings unchanged.</p>
+
+ <p>If you already own</em></ins></span> a <span
class="removed"><del><strong>physical store by noticing WiFi
+ networks</a>.</p>
+</li>
+
+ <li><p>Android tracks location</strong></del></span> <span
class="inserted"><ins><em>Vizio “smart” TV (or any
“smart” TV,</em></ins></span> for <span
class="removed"><del><strong>Google <a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off, even
+ when</strong></del></span> <span class="inserted"><ins><em>that
+ matter),</em></ins></span> the <span class="removed"><del><strong>phone
has no SIM card</a>.</p></li>
+
+ <li><p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots of data to
China</a>.</p></li>
+
+ <li><p>According to Edward Snowden,
+ <a href="http://www.bbc.com/news/uk-34444233">agencies can take
over smartphones</a>
+ by sending hidden text messages which enable them</strong></del></span>
<span class="inserted"><ins><em>easiest way</em></ins></span> to <span
class="removed"><del><strong>turn the phones</strong></del></span> <span
class="inserted"><ins><em>make sure it isn't spying</em></ins></span> on <span
class="removed"><del><strong>and off, listen</strong></del></span> <span
class="inserted"><ins><em>you is</em></ins></span>
+ to <span class="removed"><del><strong>the microphone, retrieve
geo-location data</strong></del></span> <span
class="inserted"><ins><em>disconnect it</em></ins></span> from the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location</strong></del></span> <span
class="inserted"><ins><em>Internet,</em></ins></span> and <span
class="removed"><del><strong>web
+ browsing history,</strong></del></span> <span
class="inserted"><ins><em>use a terrestrial antenna
+ instead. Unfortunately, this is not always possible. Another option,
+ if you are technically oriented, is to get your own router (which can
+ be an old computer running completely free software),</em></ins></span>
and <span class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>set up a
+ firewall to block connections to Vizio's servers. Or, as a last resort,
+ you can replace your TV with another model.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201804010">
+ <li id="M201804010">
<!--#set var="DATE" value='<small
class="date-tag">2018-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades</em></ins></span> that <span
class="removed"><del><strong>it will</a>
- pre-install on some of its phones. The app will give
Verizon</strong></del></span> <span class="inserted"><ins><em>install a
surveillance app</a>.</p>
-
- <p>We link to</em></ins></span> the <span
class="removed"><del><strong>same
- information about</strong></del></span> <span
class="inserted"><ins><em>article for</em></ins></span> the <span
class="removed"><del><strong>users' searches</strong></del></span> <span
class="inserted"><ins><em>facts it presents. It
- is too bad</em></ins></span> that <span
class="removed"><del><strong>Google normally gets when
- they use its search engine.</p>
+ <p>Some “Smart” TVs automatically <a
+
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ load downgrades that install a surveillance app</a>.</p>
- <p>Currently,</strong></del></span> the <span
class="inserted"><ins><em>article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix</em></ins></span>
app <span class="removed"><del><strong>is</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
- malware too</a>.</p>
+ <p>We link to</em></ins></span> the <span
class="removed"><del><strong>contact list. This malware</strong></del></span>
<span class="inserted"><ins><em>article for the facts it presents.
It</em></ins></span>
+ is <span class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>too bad that the article finishes by advocating the
+ moral weakness of surrendering</em></ins></span> to
+ <span class="removed"><del><strong>disguise itself from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>Netflix. The Netflix app <a
+ href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ malware too</a>.</p></em></ins></span>
</li>
- <li id="M201702060">
+ <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702060">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio “smart” <a
-
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed</em></ins></span> on <span
class="removed"><del><strong>only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>them, and not just broadcasts</em></ins></span>
and
- <span class="inserted"><ins><em>cable</a>. Even if</em></ins></span>
the
- <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>image is coming
from</em></ins></span> the <span class="removed"><del><strong>app takes effect.
However,</strong></del></span> <span class="inserted"><ins><em>user's own
computer,</em></ins></span>
- the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece</strong></del></span> <span
class="inserted"><ins><em>TV reports what it is. The
existence</em></ins></span> of <span class="removed"><del><strong>spyware is
- still spyware.</p>
- </li>
+ <p>Vizio “smart”</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
+ and they send so much data</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything</em></ins></span> that <span
class="removed"><del><strong>their transmission</strong></del></span> is <span
class="removed"><del><strong>a
+ substantial expense for users. Said transmission,</strong></del></span>
<span class="inserted"><ins><em>viewed on them, and</em></ins></span> not <span
class="removed"><del><strong>wanted or
+ requested by</strong></del></span> <span class="inserted"><ins><em>just
broadcasts and
+ cable</a>. Even if</em></ins></span> the <span
class="removed"><del><strong>user, clearly must constitute
spying</strong></del></span> <span class="inserted"><ins><em>image is coming
from the user's own computer,
+ the TV reports what it is. The existence</em></ins></span> of <span
class="removed"><del><strong>some
+ kind.</p></li>
- <li><p>The Meitu photo-editing
- app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to</strong></del></span> a <span
class="removed"><del><strong>Chinese company</a>.</p></li>
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</strong></del></span> <span
class="inserted"><ins><em>a way to disable</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+ </li>
- <li><p>A pregnancy test controller
application</strong></del></span> <span class="inserted"><ins><em>way to
disable the
- surveillance, even if it were</em></ins></span> not <span
class="removed"><del><strong>only
- can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts of data</strong></del></span> <span
class="inserted"><ins><em>hidden as it was</em></ins></span> in <span
class="inserted"><ins><em>these TVs,
- does not legitimize</em></ins></span> the <span
class="removed"><del><strong>phone,</strong></del></span> <span
class="inserted"><ins><em>surveillance.</p>
+ <li><p>Spyware</strong></del></span>
+ <span class="inserted"><ins><em>surveillance, even if it were not hidden
as it was</em></ins></span> in <span class="removed"><del><strong>Android
phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us</strong></del></span>
<span class="inserted"><ins><em>these TVs,
+ does not legitimize the surveillance.</p>
</li>
<li id="M201511130">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some web</em></ins></span> and <span class="inserted"><ins><em>TV
advertisements play inaudible
- sounds to be picked up by proprietary malware running
- on other devices</em></ins></span> in <span
class="removed"><del><strong>server accounts, it</strong></del></span> <span
class="inserted"><ins><em>range so as to determine that they
+ <p>Some web and TV advertisements play inaudible
+ sounds to be picked up</em></ins></span> by <span
class="removed"><del><strong>a paywall)
+ reports</strong></del></span> <span
class="inserted"><ins><em>proprietary malware running
+ on other devices in range so as to determine</em></ins></span> that
+ <span class="removed"><del><strong><a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI</strong></del></span> <span class="inserted"><ins><em>they
are nearby. Once your Internet devices are paired with
- your TV, advertisers</em></ins></span> can
- <span class="removed"><del><strong>alter them too</a>.
- </p></li>
-
- <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>correlate ads with Web activity, and
other</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
+ your TV, advertisers</em></ins></span> can <span
class="removed"><del><strong>remotely activate the GPS</strong></del></span>
<span class="inserted"><ins><em>correlate ads with Web
activity,</em></ins></span> and <span
class="removed"><del><strong>microphone</strong></del></span> <span
class="inserted"><ins><em>other <a
+
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
cross-device tracking</a>.</p>
</li>
@@ -2732,92 +2663,123 @@
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio goes a step further than other TV
- manufacturers in spying on their users: their <a
+ manufacturers</em></ins></span> in <span
class="removed"><del><strong>Android
+ phones</strong></del></span> <span class="inserted"><ins><em>spying on
their users: their <a
href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in
detail</em></ins></span> and <span
class="removed"><del><strong>after</strong></del></span>
+ “smart” TVs analyze your viewing habits in
detail</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
+ (I suspect this means Windows laptops.) Here</strong></del></span>
<span class="inserted"><ins><em>link them your IP address</a> so
that advertisers can track you
across devices.</p>
- <p>It is possible to turn this off, but having it enabled by default
- is an injustice already.</p>
+ <p>It is possible to turn this off, but having it enabled by
default</em></ins></span>
+ is
+ <span class="removed"><del><strong><a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span> <span
class="inserted"><ins><em>an injustice already.</p></em></ins></span>
</li>
- <li id="M201511020">
+ <span class="removed"><del><strong><li><p>Portable
phones</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511020">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tivo's alliance with Viacom adds 2.3 million households
- to</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
+ <p>Tivo's alliance</em></ins></span> with <span
class="removed"><del><strong>GPS will send their GPS location on
+ remote command and users cannot stop them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable phones
+ to have GPS.)</p>
+ </li>
- <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>600
millions social media profiles</em></ins></span> the <span
class="removed"><del><strong>user's consent”
- for</strong></del></span> <span class="inserted"><ins><em>company
+ <li><p>The nonfree Snapchat app's principal purpose
is</strong></del></span> <span class="inserted"><ins><em>Viacom adds 2.3
million households</em></ins></span>
+ to <span class="removed"><del><strong>restrict</strong></del></span> the
<span class="removed"><del><strong>use of data on</strong></del></span> <span
class="inserted"><ins><em>600 millions social media profiles</em></ins></span>
the <span class="removed"><del><strong>user's computer, but it does surveillance
+ too:</strong></del></span> <span class="inserted"><ins><em>company
already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can now <a
- href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ information with online social media participation, Tivo can
now</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing all
- users to new combined</em></ins></span> surveillance <span
class="removed"><del><strong>is inadequate as a protection against massive
- surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>by default.</p></em></ins></span>
+ users</em></ins></span> to <span class="removed"><del><strong>get the
user's list of other people's phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>new combined surveillance by
default.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
- <span class="removed"><del><strong><li><p>Google's new voice
messaging app</strong></del></span>
+<ul>
+ <li>
+ <p>The moviepass app</strong></del></span>
<span class="inserted"><ins><em><li id="M201507240">
<!--#set var="DATE" value='<small
class="date-tag">2015-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio “smart” TVs recognize and</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></strong></del></span>
+ <p>Vizio “smart” TVs recognize</em></ins></span> and
<span class="removed"><del><strong>dis-service spy on users even more than users
+ expected. It</strong></del></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going to</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are watching</a>, even if it isn't a TV
channel.</p></em></ins></span>
+ what people are watching</a>, even if it isn't</em></ins></span> a
<span class="removed"><del><strong>movie</a>.
+ </p>
+
+ <p>Don't be tracked — pay cash!</p>
+ </li>
+
+ <li><p>AI-powered driving apps can
+ <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your every move</a>.</p></strong></del></span> <span
class="inserted"><ins><em>TV channel.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Sarahah
app</strong></del></span>
<span class="inserted"><ins><em><li id="M201505290">
<!--#set var="DATE" value='<small
class="date-tag">2015-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop</strong></del></span>
+ <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers</strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops</em></ins></span> on what <span class="removed"><del><strong>radio
and TV</strong></del></span> programs
- <span class="removed"><del><strong>are playing nearby</a>.
Also</strong></del></span> <span class="inserted"><ins><em>people watch, and
even what they wanted to
- record</a>.</p>
+ snoops on what programs people watch,</em></ins></span> and <span
class="removed"><del><strong>email addresses</a> in user's address
+ book to developer's server. Note that this article misuses the words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring</strong></del></span> <span class="inserted"><ins><em>even
what they wanted</em></ins></span> to <span class="removed"><del><strong>zero
price.</p></strong></del></span>
+ <span
class="inserted"><ins><em>record</a>.</p></em></ins></span>
</li>
- <li id="M201504300">
+ <span class="removed"><del><strong><li>
+ <p>Facebook's app listens all the time,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201504300">
<!--#set var="DATE" value='<small
class="date-tag">2015-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio <a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade” to make its TVs
snoop</em></ins></span> on what
- users <span class="removed"><del><strong>post on various sites
- such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>watch</a>. The TVs did not do that when
first sold.</p></em></ins></span>
+ used a firmware “upgrade” to make its TVs snoop on what
+ users watch</a>. The TVs did not do that when first sold.</p>
</li>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201502090">
+ <li id="M201502090">
<!--#set var="DATE" value='<small
class="date-tag">2015-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Samsung “Smart” TV</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known faces</a>,
- and suggests you to share</strong></del></span>
+ <p>The Samsung “Smart” TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>picture you take according</strong></del></span>
<span class="inserted"><ins><em>internet</em></ins></span> to <span
class="removed"><del><strong>who
- is in the frame.</p>
+ transmits users' voice</em></ins></span> on <span
class="removed"><del><strong>what people are listening</strong></del></span>
<span class="inserted"><ins><em>the internet</em></ins></span> to <span
class="removed"><del><strong>or watching</a>. In
addition,</strong></del></span> <span class="inserted"><ins><em>another
company, Nuance</a>.
+ Nuance can save</em></ins></span> it <span class="removed"><del><strong>may
+ be analyzing people's conversations</strong></del></span> <span
class="inserted"><ins><em>and would then have</em></ins></span> to <span
class="removed"><del><strong>serve them with targeted
+ advertisements.</p>
+ </li>
- <p>This spyware feature seems</strong></del></span> <span
class="inserted"><ins><em>another company, Nuance</a>.
- Nuance can save it and would then have</em></ins></span> to <span
class="removed"><del><strong>require online access</strong></del></span> <span
class="inserted"><ins><em>give it</em></ins></span> to <span
class="removed"><del><strong>some
- known-faces database, which means</strong></del></span> the <span
class="removed"><del><strong>pictures are likely</strong></del></span> <span
class="inserted"><ins><em>US or some
+ <li>
+ <p>Faceapp appears</strong></del></span> <span
class="inserted"><ins><em>give it</em></ins></span> to <span
class="removed"><del><strong>do lots of surveillance,
judging</strong></del></span> <span class="inserted"><ins><em>the US or some
other government.</p>
- <p>Speech recognition is not</em></ins></span> to be
- <span class="removed"><del><strong>sent across</strong></del></span>
<span class="inserted"><ins><em>trusted unless it is done by free
+ <p>Speech recognition is not to be trusted unless it is
done</em></ins></span> by <span class="inserted"><ins><em>free
software in your own computer.</p>
- <p>In its privacy policy, Samsung explicitly confirms that <a
-
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be transmitted to third
+ <p>In its privacy policy, Samsung explicitly confirms
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands to personal</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice</em></ins></span>
+ data <span class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>containing sensitive information will be transmitted
to third
parties</a>.</p>
</li>
@@ -2826,93 +2788,114 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Amazon “Smart” TV is <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all</em></ins></span> the <span class="removed"><del><strong>wire
to Facebook's servers and face-recognition
- algorithms.</p>
-
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ snooping all</em></ins></span> the <span
class="removed"><del><strong>device</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>time</a>.</p></em></ins></span>
</li>
- <li id="M201409290">
+ <span class="removed"><del><strong><li>
+ <p>Verizon</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201409290">
<!--#set var="DATE" value='<small
class="date-tag">2014-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>More or less all “smart” TVs <a
-
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
+ <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that it will</a>
+ pre-install</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</em></ins></span>
+ on <span class="removed"><del><strong>some</strong></del></span> <span
class="inserted"><ins><em>their users</a>.</p>
- <p>The report was as</em></ins></span> of <span
class="removed"><del><strong>Facebook</strong></del></span> <span
class="inserted"><ins><em>2014, but we don't expect this has got
+ <p>The report was as</em></ins></span> of <span
class="removed"><del><strong>its phones. The app will give Verizon the same
+ information about the users' searches</strong></del></span> <span
class="inserted"><ins><em>2014, but we don't expect this has got
better.</p>
- <p>This shows that laws requiring products to get</em></ins></span>
users' <span class="removed"><del><strong>pictures</strong></del></span> <span
class="inserted"><ins><em>formal
- consent before collecting personal data</em></ins></span> are <span
class="removed"><del><strong>private
- anymore, even</strong></del></span> <span
class="inserted"><ins><em>totally inadequate.
- And what happens</em></ins></span> if <span
class="removed"><del><strong>the</strong></del></span> <span
class="inserted"><ins><em>a</em></ins></span> user <span
class="removed"><del><strong>didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>declines consent?
Probably the TV will
- say, “Without your consent</em></ins></span> to <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>service.</p></strong></del></span> <span
class="inserted"><ins><em>TV will not
+ <p>This shows</em></ins></span> that <span
class="removed"><del><strong>Google normally gets when
+ they use its search engine.</p>
+
+ <p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and the
+ user must explicitly opt-in</strong></del></span> <span
class="inserted"><ins><em>laws requiring products to get users' formal
+ consent</em></ins></span> before <span
class="inserted"><ins><em>collecting personal data are totally inadequate.
+ And what happens if a user declines consent? Probably</em></ins></span>
the <span class="removed"><del><strong>app takes effect.
However,</strong></del></span> <span class="inserted"><ins><em>TV will
+ say, “Without your consent to tracking,</em></ins></span> the
+ <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware is
+ still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>TV will not
work.”</p>
<p>Proper laws would say that TVs are not allowed to report what the
user watches—no exceptions!</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
- is based on proprietary malware (DRM and snooping). In August
- 2015 it</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Meitu photo-editing
+ app</strong></del></span>
<span class="inserted"><ins><em><li id="M201405200">
<!--#set var="DATE" value='<small
class="date-tag">2014-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Spyware in LG “smart” TVs</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased
snooping</a>,</strong></del></span>
+ <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends</strong></del></span>
<span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches,</em></ins></span> and <span
class="removed"><del><strong>some
- are starting</strong></del></span> <span class="inserted"><ins><em>the
switch</em></ins></span> to <span
class="removed"><del><strong>realize</strong></del></span> <span
class="inserted"><ins><em>turn this off has
- no effect</a>. (The fact</em></ins></span> that <span
class="removed"><del><strong>it is nasty.</p>
-
- <p>This article shows</strong></del></span> the <span
class="removed"><del><strong><a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way
- to “serve” users better</a>—never mind
- whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>transmission reports</em></ins></span> a <span
class="removed"><del><strong>typical example of
- the attitude of</strong></del></span> <span
class="inserted"><ins><em>404 error
- really means nothing;</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
- those they have subjugated.</p>
-
- <p>Out, out, damned Spotify!</p>
- </li>
- <li><p>Many proprietary apps for mobile devices report
which</strong></del></span> <span class="inserted"><ins><em>server could save
that data anyway.)</p>
-
- <p>Even worse, it <a
-
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on</em></ins></span> other
- <span class="removed"><del><strong>apps</strong></del></span> <span
class="inserted"><ins><em>devices on</em></ins></span> the <span
class="removed"><del><strong>user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing</strong></del></span> <span class="inserted"><ins><em>user's
local network</a>.</p>
-
- <p>LG later said it had installed a patch to stop this, but any
- product could spy</em></ins></span> this <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>way.</p>
-
- <p>Meanwhile, LG TVs <a
-
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots of spying anyway</a>.</p>
+ reports what the</em></ins></span> user <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>watches, and the switch</em></ins></span> to <span
class="inserted"><ins><em>turn this off has
+ no effect</a>. (The fact that the transmission
reports</em></ins></span> a <span class="removed"><del><strong>Chinese
company</a>.</p></li>
+
+ <li><p>A pregnancy test controller application not only
+ can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts of data in</strong></del></span> <span
class="inserted"><ins><em>404 error
+ really means nothing;</em></ins></span> the <span
class="removed"><del><strong>phone, and in</strong></del></span> server <span
class="removed"><del><strong>accounts,</strong></del></span> <span
class="inserted"><ins><em>could save that data anyway.)</p>
+
+ <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>can
+ alter them too</a>.
+ </p></li>
+
+ <li><p>The Uber app tracks</strong></del></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after the ride</a>.</p>
+
+ <p>This example illustrates how
“getting</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on</em></ins></span> the user's <span
class="removed"><del><strong>consent”
+ for surveillance is inadequate as</strong></del></span> <span
class="inserted"><ins><em>local network</a>.</p>
+
+ <p>LG later said it had installed</em></ins></span> a <span
class="removed"><del><strong>protection against massive
+ surveillance.</p>
</li>
- <li id="M201212170">
+ <li><p>Google's new voice messaging app</strong></del></span>
<span class="inserted"><ins><em>patch to stop this, but any
+ product could spy this way.</p>
+
+ <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ do lots of spying anyway</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Apps that include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users
post</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201212170">
<!--#set var="DATE" value='<small
class="date-tag">2012-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found</em></ins></span> a way <span
class="removed"><del><strong>that at least is visible</strong></del></span>
<span class="inserted"><ins><em>to break security on a “smart”
TV</a></em></ins></span>
- and
- <span class="removed"><del><strong>optional</a>. Not as bad as
what</strong></del></span> <span class="inserted"><ins><em>use its camera to
watch</em></ins></span> the <span class="removed"><del><strong>others
do.</p>
+ Crackers found a way to break security</em></ins></span> on <span
class="removed"><del><strong>various sites
+ such as Facebook, Google+ and Twitter.</p>
</li>
- <li><p>FTC says most mobile apps for children don't respect
privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>people who are watching
TV.</p></em></ins></span>
- </li>
+ <li><p>Facebook's new Magic Photo app
+ <a
+href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known
faces</a>,</strong></del></span> <span class="inserted"><ins><em>a
“smart” TV</a></em></ins></span>
+ and <span class="removed"><del><strong>suggests you</strong></del></span>
<span class="inserted"><ins><em>use its camera</em></ins></span> to <span
class="removed"><del><strong>share</strong></del></span> <span
class="inserted"><ins><em>watch</em></ins></span> the <span
class="removed"><del><strong>picture you take according
to</strong></del></span> <span
class="inserted"><ins><em>people</em></ins></span> who
+ <span class="removed"><del><strong>is in the frame.</p>
- <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
-<span class="inserted"><ins><em></ul>
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means the pictures are likely to be
+ sent across the wire to Facebook's servers and face-recognition
+ algorithms.</p>
+
+ <p>If so, none of Facebook users' pictures</strong></del></span>
are <span class="removed"><del><strong>private
+ anymore, even if</strong></del></span> <span
class="inserted"><ins><em>watching TV.</p>
+ </li>
+</ul>
<div class="big-subsection">
@@ -2924,302 +2907,217 @@
<li id="M201901100">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>video they
capture</em></ins></span> to <span class="inserted"><ins><em>Amazon
servers</a>, which save it
+ <p>Amazon Ring “security” devices <a
+
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send</em></ins></span> the <span class="removed"><del><strong>user didn't
“upload” them</strong></del></span> <span
class="inserted"><ins><em>video they capture</em></ins></span> to <span
class="inserted"><ins><em>Amazon servers</a>, which save it
long-term.</p>
- <p>In many cases,</em></ins></span> the <span
class="removed"><del><strong>snooping done by the phone company, and perhaps
by</strong></del></span> <span class="inserted"><ins><em>video shows everyone
that comes near, or merely
- passes by,</em></ins></span> the <span class="removed"><del><strong>OS
in</strong></del></span> <span class="inserted"><ins><em>user's front
door.</p>
+ <p>In many cases,</em></ins></span> the <span
class="removed"><del><strong>service.</p>
+ </li>
- <p>The article focuses on how Ring used to let individual employees
look
- at</em></ins></span> the
- <span class="removed"><del><strong>phone.</p>
+ <li><p>Like most “music screaming” disservices,
Spotify
+ is based</strong></del></span> <span class="inserted"><ins><em>video
shows everyone that comes near, or merely
+ passes by, the user's front door.</p>
- <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>videos freely. It appears Amazon has tried to
prevent that
- secondary abuse, but</em></ins></span> the <span
class="removed"><del><strong>question of whether</strong></del></span> <span
class="inserted"><ins><em>primary abuse—that Amazon
gets</em></ins></span> the <span class="removed"><del><strong>app developers get
- users</strong></del></span>
- <span class="inserted"><ins><em>video—Amazon expects
society</em></ins></span> to <span class="removed"><del><strong>say “I
agree”. That is no excuse for malware.</p></strong></del></span>
<span class="inserted"><ins><em>surrender to.</p></em></ins></span>
- </li>
+ <p>The article focuses</em></ins></span> on <span
class="removed"><del><strong>proprietary malware (DRM and snooping). In August
+ 2015 it <a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit</strong></del></span> <span
class="inserted"><ins><em>how Ring used</em></ins></span> to <span
class="removed"><del><strong>increased snooping</a>, and some
+ are starting</strong></del></span> <span class="inserted"><ins><em>let
individual employees look
+ at the videos freely. It appears Amazon has tried</em></ins></span> to
<span class="removed"><del><strong>realize</strong></del></span> <span
class="inserted"><ins><em>prevent</em></ins></span> that <span
class="removed"><del><strong>it is nasty.</p>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
+ <p>This article shows</strong></del></span>
+ <span class="inserted"><ins><em>secondary abuse, but the primary
abuse—that Amazon gets</em></ins></span> the
+ <span class="inserted"><ins><em>video—Amazon expects society to
surrender to.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201810300">
+ <li id="M201810300">
<!--#set var="DATE" value='<small
class="date-tag">2018-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p>
-
- <p>The FTC criticized this app because it
asked</strong></del></span>
+ <p>Nearly all “home security cameras”</em></ins></span>
<a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give</em></ins></span> the <span class="removed"><del><strong>user to
- approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>manufacturer an unencrypted copy of everything they
- see</a>. “Home insecurity camera” would be a better
+ give the manufacturer an unencrypted copy of everything</em></ins></span>
they <span class="removed"><del><strong>present snooping
as</strong></del></span>
+ <span class="inserted"><ins><em>see</a>. “Home insecurity
camera” would be</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>better
name!</p>
<p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not</em></ins></span> to <span
class="inserted"><ins><em>look at what's in</em></ins></span> the <span
class="removed"><del><strong>app developer but did</strong></del></span> <span
class="inserted"><ins><em>videos. That's</em></ins></span> not
- <span class="removed"><del><strong>ask about sending
it</strong></del></span>
- <span class="inserted"><ins><em>security for your home. Security means
making sure they don't get</em></ins></span> to <span
class="removed"><del><strong>other companies. This shows the
- weakness</strong></del></span>
- <span class="inserted"><ins><em>see through your camera.</p>
+ manufacturers promise not</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
+ whether they want that. This is a typical example of
+ the attitude of</strong></del></span> <span
class="inserted"><ins><em>look at what's in</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
+ those</strong></del></span> <span class="inserted"><ins><em>videos.
That's not
+ security for your home. Security means making sure</em></ins></span> they
<span class="inserted"><ins><em>don't get to
+ see through your camera.</p>
</li>
<li id="M201603220">
<!--#set var="DATE" value='<small
class="date-tag">2016-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Over 70 brands</em></ins></span> of <span
class="inserted"><ins><em>network-connected surveillance cameras have <a
+ <p>Over 70 brands of network-connected surveillance
cameras</em></ins></span> have <span
class="removed"><del><strong>subjugated.</p>
+
+ <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em><a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone to watch through them</a>.</p>
+ security bugs that allow anyone to watch through
them</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other
+ apps the user has
+ installed.</strong></del></span>
- <li id="M201511250">
+ <span class="inserted"><ins><em><li id="M201511250">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Nest Cam “smart” camera is <a
- href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
+ <p>The Nest Cam “smart” camera is</em></ins></span>
<a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
even when the “owner” switches it “off.”</p>
- <p>A “smart” device means</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should a flashlight
- app send any information</strong></del></span> <span
class="inserted"><ins><em>manufacturer is using it</em></ins></span>
- to <span class="removed"><del><strong>anyone? A free software flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p></em></ins></span>
+ <p>A “smart” device means the
manufacturer</em></ins></span> is <span class="removed"><del><strong>doing this
in</strong></del></span> <span class="inserted"><ins><em>using it
+ to outsmart you.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInToys">Spyware in
Toys</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <h4 id="SpywareInToys">Toys</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
-
- <li></strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201711244">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Furby Connect has a <a
+ <p>The Furby Connect has</em></ins></span> a <span
class="removed"><del><strong>way that at least is visible and
+ optional</a>. Not</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If the product as shipped doesn't act as a
+ universal back door</a>. If the product</em></ins></span> as <span
class="removed"><del><strong>bad</strong></del></span> <span
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span
class="removed"><del><strong>what the others do.</p>
+ </li>
+
+ <li><p>FTC says most mobile apps for children don't respect
privacy:</strong></del></span> <span class="inserted"><ins><em>a
listening device, remote changes to the code could surely convert it
into one.</p>
</li>
<li id="M201711100">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p>A remote-control sex toy was found to make <a
-
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of the conversation between two users</a>.</p>
- </li>
-
- <span class="removed"><del><strong><li>
- <p>The “smart” toys My Friend Cayla and i-Que transmit
- <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
- a speech recognition company based in the U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would
- enable crackers to listen in on a child's speech, and even speak
- into the toys themselves.</p>
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings of the conversation between two
users</a>.</p></em></ins></span>
</li>
- <li></strong></del></span>
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
<span class="inserted"><ins><em><li id="M201703140">
<!--#set var="DATE" value='<small
class="date-tag">2017-03</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p>A computerized vibrator <a
-
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
-
- <p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether it was surrounded by a person's
- body), as well as the vibration frequency.</p>
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping</em></ins></span> on <span class="inserted"><ins><em>its
users through</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is in addition
to</strong></del></span> <span class="inserted"><ins><em>proprietary control
app</a>.</p>
+
+ <p>The app was reporting</em></ins></span> the <span
class="removed"><del><strong>snooping done by</strong></del></span> <span
class="inserted"><ins><em>temperature of</em></ins></span> the <span
class="removed"><del><strong>phone company, and perhaps</strong></del></span>
<span class="inserted"><ins><em>vibrator minute</em></ins></span> by <span
class="removed"><del><strong>the OS in the
+ phone.</p>
+
+ <p>Don't be distracted</strong></del></span>
+ <span class="inserted"><ins><em>minute (thus, indirectly, whether it was
surrounded</em></ins></span> by <span class="inserted"><ins><em>a person's
+ body), as well as</em></ins></span> the <span
class="removed"><del><strong>question of whether</strong></del></span> <span
class="inserted"><ins><em>vibration frequency.</p>
- <p>Note the totally inadequate proposed response: a labeling
+ <p>Note</em></ins></span> the <span class="removed"><del><strong>app
developers get</strong></del></span> <span class="inserted"><ins><em>totally
inadequate proposed response: a labeling
standard with which manufacturers would make statements about their
- products, rather than free software which users could have checked
+ products, rather than free software which</em></ins></span> users <span
class="removed"><del><strong>to say “I agree”. That is no excuse
for malware.</p>
+ </li>
+
+ <li><p>The Brightest Flashlight app</strong></del></span> <span
class="inserted"><ins><em>could have checked
and changed.</p>
- <p>The company that made the vibrator <a
-
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how people
- used it</a>.</p>
-
- <p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the data to a data
- broker, the data broker would have been able to figure out who the
- user was.</p>
+ <p>The company that made the vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued</em></ins></span> for <span class="removed"><del><strong>use by
companies.</a></p></strong></del></span> <span
class="inserted"><ins><em>collecting lots of personal information about how
people
+ used it</a>.</p></em></ins></span>
+
+ <p>The <span class="removed"><del><strong>FTC criticized this app
because</strong></del></span> <span class="inserted"><ins><em>company's
statement that</em></ins></span> it <span
class="removed"><del><strong>asked</strong></del></span> <span
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span
class="removed"><del><strong>user to
+ approve sending personal</strong></del></span> data <span
class="removed"><del><strong>to the app developer</strong></del></span> <span
class="inserted"><ins><em>may be
+ true,</em></ins></span> but <span class="removed"><del><strong>did not
+ ask about sending</strong></del></span> it <span
class="inserted"><ins><em>doesn't really matter. If it had sold the
data</em></ins></span> to <span class="removed"><del><strong>other companies.
This shows</strong></del></span> <span class="inserted"><ins><em>a data
+ broker,</em></ins></span> the
+ <span class="removed"><del><strong>weakness of</strong></del></span>
<span class="inserted"><ins><em>data broker would have been able to figure out
who</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution”</strong></del></span>
+ <span class="inserted"><ins><em>user was.</p>
<p>Following this lawsuit, <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of C$4m</a> to its
- customers.</p>
+ the company has been ordered</em></ins></span> to <span
class="removed"><del><strong>surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>pay</em></ins></span> a <span
class="removed"><del><strong>flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>total of C$4m</a></em></ins></span> to <span
class="removed"><del><strong>anyone? A free software flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>its
+ customers.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
- manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way to access the data</a>
- collected by the manufacturer's snooping.</p>
-
- <p>That the manufacturer and the FBI could listen to these
conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
- </li>
-</ul>
-
-
-<!-- #SpywareOnSmartWatches -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareOnSmartWatches">Spyware on “Smart”
Watches</h3>
- <span class="anchor-reference-id">
- (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span>
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
-<div style="clear: left;"></div>
<ul>
- <li>
- <p>An LG “smart” watch is designed
- <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else and to transmit
- conversations too</a>.</p>
- </li>
- <li>
- <p>A very cheap “smart watch” comes with an Android app
- <a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects to an unidentified site in China</a>.</p>
- <p>The article says this is a back door, but that could be a
- misunderstanding. However, it is certainly surveillance, at
- least.</p>
- </li>
-</ul>
-<!-- #SpywareAtLowLevel</strong></del></span>
+ <li>
+ <p>A remote-control sex toy was found</strong></del></span>
<span class="inserted"><ins><em><li id="M201702280">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>“CloudPets” toys with
microphones <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>“CloudPets” toys with microphones <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
-
-<ul>
-<li><p></strong></del></span> <span class="inserted"><ins><em>the
manufacturer</a>. Guess what?</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
+ leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>make</strong></del></span> <span
class="inserted"><ins><em>the manufacturer</a>. Guess
what?</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
+ of</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a> collected by the
+ Crackers found a way to access</em></ins></span> the <span
class="removed"><del><strong>conversation between two
users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>data</a> collected by the
manufacturer's snooping.</p>
- <p>That the manufacturer</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows installs.
-Note that</strong></del></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a “clean” Windows install is not really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each
subsection</strong></del></span> <span class="inserted"><ins><em>these
- conversations was unacceptable by itself.</p>
+ <p>That the manufacturer and the FBI could listen to these
+ conversations was unacceptable by itself.</p></em></ins></span>
</li>
- <li id="M201612060">
- <!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows</strong></del></span>
- <span class="inserted"><ins><em><p>The “smart” toys My
Friend Cayla and i-Que transmit</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
+ <span class="removed"><del><strong><li></strong></del></span>
- <p>Specifically, it</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ <span class="inserted"><ins><em><li id="M201612060">
+ <!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
+ --><!--#echo encoding="none" var="DATE" --></em></ins></span>
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
+
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>, a speech recognition
company based in the U.S.</p>
- <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
- can <span class="removed"><del><strong>collect</strong></del></span> <span
class="inserted"><ins><em>remotely control</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
- this way, because they pass it through Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
- crackers to listen</em></ins></span> in <span
class="removed"><del><strong>Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype
- <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></strong></del></span> <span
class="inserted"><ins><em>on a child's speech, and even speak into the
- toys themselves.</p></em></ins></span>
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control the toys with a mobile phone. This would enable
+ crackers to listen in on a child's speech, and even speak into the
+ toys themselves.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareOnTheRoad</strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>A computerized vibrator</strong></del></span>
<span class="inserted"><ins><em><li id="M201502180">
<!--#set var="DATE" value='<small
class="date-tag">2015-02</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>Barbie <a
-
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>children and
adults</a>.</p>
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going to spy</em></ins></span> on <span class="removed"><del><strong>its
users through the proprietary control app</a>.</p>
+
+ <p>The app was reporting the temperature of</strong></del></span>
<span class="inserted"><ins><em>children and adults</a>.</p>
</li>
-</ul></em></ins></span>
+</ul>
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The
Road</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 id="SpywareInDrones">Drones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear:
left;"></div></strong></del></span>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201708040">
<!--#set var="DATE" value='<small
class="date-tag">2017-08</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -3228,312 +3126,366 @@
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p>
</li>
-</ul></em></ins></span>
+</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInCameras">Spyware
in Cameras</h4>
- <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInCameras">#SpywareInCameras</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
+ <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li>
- <p>Every “home security” camera, if its manufacturer can
communicate with it,</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202009270">
<!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many employers are using nonfree
software, including videoconference software, to <a
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
- surveil and monitor staff working at home</a>. If the program reports
- whether you are “active,” that</em></ins></span> is <span
class="inserted"><ins><em>in effect</em></ins></span> a <span
class="inserted"><ins><em>malicious</em></ins></span>
- surveillance <span
class="removed"><del><strong>device.</strong></del></span> <span
class="inserted"><ins><em>feature.</p>
+ surveil and monitor staff working at home</a>. If</em></ins></span>
the <span class="removed"><del><strong>vibrator minute by
+ minute (thus, indirectly,</strong></del></span> <span
class="inserted"><ins><em>program reports</em></ins></span>
+ whether <span class="removed"><del><strong>it was surrounded
by</strong></del></span> <span class="inserted"><ins><em>you are
“active,” that is in effect</em></ins></span> a <span
class="removed"><del><strong>person's
+ body), as well as the vibration frequency.</p>
+
+ <p>Note the totally inadequate proposed
response:</strong></del></span> <span class="inserted"><ins><em>malicious
+ surveillance feature.</p>
</li>
<li id="M202008030">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google Nest</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"></em></ins></span>
- is <span class="inserted"><ins><em>taking over ADT</a>. Google sent
out a software
- update to its speaker devices using their back door <a
+ <p>Google Nest <a
+
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
+ is taking over ADT</a>. Google sent out</em></ins></span> a <span
class="removed"><del><strong>labeling
+ standard with which manufacturers would make statements about
+ their products, rather than free</strong></del></span> software <span
class="removed"><del><strong>which users could have
+ checked</strong></del></span>
+ <span class="inserted"><ins><em>update to its speaker devices using their
back door <a
href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that
- listens for things like smoke alarms</a> and then notifies your phone
- that</em></ins></span> an <span
class="removed"><del><strong>example</a>.</p>
- <p>The article describes wrongdoing by</strong></del></span> <span
class="inserted"><ins><em>alarm is happening. This means</em></ins></span> the
<span class="removed"><del><strong>manufacturer, based on</strong></del></span>
<span class="inserted"><ins><em>devices now listen for more
- than just their wake words. Google says</em></ins></span> the <span
class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>software update was sent
- out prematurely and on accident and Google was planning on disclosing
- this new feature and offering it to customers who pay for it.</p>
+ listens for things like smoke alarms</a></em></ins></span> and <span
class="removed"><del><strong>changed.</p>
+
+ <p>The company</strong></del></span> <span
class="inserted"><ins><em>then notifies your phone</em></ins></span>
+ that <span class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em>an alarm is happening. This means</em></ins></span>
the <span class="removed"><del><strong>vibrator
+ <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"></strong></del></span>
<span class="inserted"><ins><em>devices now listen for more
+ than just their wake words. Google says the software update was sent
+ out prematurely and on accident and Google</em></ins></span> was <span
class="removed"><del><strong>sued</strong></del></span> <span
class="inserted"><ins><em>planning on disclosing
+ this new feature and offering it to customers who pay</em></ins></span>
for <span class="removed"><del><strong>collecting lots of personal information
about how
+ people used it</a>.</p>
+
+ <p>The company's statement</strong></del></span> <span
class="inserted"><ins><em>it.</p>
</li>
<li id="M202006300">
<!--#set var="DATE" value='<small
class="date-tag">2020-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>“Bossware” is malware</em></ins></span> that <span
class="inserted"><ins><em>bosses <a
+ <p>“Bossware” is malware</em></ins></span> that <span
class="removed"><del><strong>it was anonymizing</strong></del></span> <span
class="inserted"><ins><em>bosses <a
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
- coerce workers into installing in their own computers</a>,
so</em></ins></span> the <span
class="removed"><del><strong>device</strong></del></span>
+ coerce workers into installing in their own computers</a>,
so</em></ins></span> the <span class="removed"><del><strong>data
may</strong></del></span>
<span class="inserted"><ins><em>bosses can spy on them.</p>
- <p>This shows why requiring the user's
“consent”</em></ins></span> is <span
class="removed"><del><strong>tethered</strong></del></span> <span
class="inserted"><ins><em>not
+ <p>This shows why requiring the user's “consent” is not
an adequate basis for protecting digital privacy. The boss can coerce
- most workers into consenting</em></ins></span> to <span
class="removed"><del><strong>a server.</p>
- <p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But</strong></del></span> <span class="inserted"><ins><em>almost
anything, even probable exposure
- to contagious disease that can be fatal. Software like this should
- be illegal and bosses that demand</em></ins></span> it <span
class="removed"><del><strong>also demonstrates</strong></del></span> <span
class="inserted"><ins><em>should be prosecuted for it.</p>
+ most workers into consenting to almost anything, even probable exposure
+ to contagious disease that can</em></ins></span> be
+ <span class="removed"><del><strong>true, but it doesn't really matter.
If</strong></del></span> <span class="inserted"><ins><em>fatal. Software like
this should
+ be illegal and bosses that demand</em></ins></span> it <span
class="inserted"><ins><em>should be prosecuted for it.</p>
</li>
<li id="M201911190">
<!--#set var="DATE" value='<small
class="date-tag">2019-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Internet-tethered Amazon Ring had
- a security vulnerability</em></ins></span> that <span
class="inserted"><ins><em>enabled attackers to <a
+ <p>Internet-tethered Amazon Ring</em></ins></span> had <span
class="removed"><del><strong>sold the data to</strong></del></span>
+ a
+ <span class="removed"><del><strong>data broker,</strong></del></span>
<span class="inserted"><ins><em>security vulnerability that enabled attackers
to <a
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
- access</em></ins></span> the <span class="removed"><del><strong>device
gives</strong></del></span> <span class="inserted"><ins><em>user's wifi
password</a>, and snoop on</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>household
+ access</em></ins></span> the <span class="removed"><del><strong>data
broker</strong></del></span> <span class="inserted"><ins><em>user's wifi
password</a>, and snoop on the household
through connected surveillance devices.</p>
- <p>Knowledge of the wifi password would not be sufficient to carry
- out any significant</em></ins></span> surveillance <span
class="removed"><del><strong>capability.</p></strong></del></span> <span
class="inserted"><ins><em>if the devices implemented proper
+ <p>Knowledge of the wifi password</em></ins></span> would <span
class="removed"><del><strong>have been able</strong></del></span> <span
class="inserted"><ins><em>not be sufficient</em></ins></span> to <span
class="removed"><del><strong>figure</strong></del></span> <span
class="inserted"><ins><em>carry</em></ins></span>
+ out
+ <span class="removed"><del><strong>who</strong></del></span> <span
class="inserted"><ins><em>any significant surveillance if</em></ins></span> the
<span class="removed"><del><strong>user was.</p>
+
+ <p>Following this lawsuit,</strong></del></span> <span
class="inserted"><ins><em>devices implemented proper
security, including encryption. But many devices with proprietary
software lack this. Of course, they are also used by their
- manufacturers for snooping.</p></em></ins></span>
+ manufacturers for snooping.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>The Nest Cam “smart” camera is</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201907210">
+ <li id="M201907210">
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google “Assistant” records users'
conversations</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even</em></ins></span>
- when <span class="removed"><del><strong>the “owner”
switches</strong></del></span> it <span
class="removed"><del><strong>“off.”</p>
- <p>A “smart” device means the
manufacturer</strong></del></span> is <span
class="removed"><del><strong>using</strong></del></span> <span
class="inserted"><ins><em>not supposed to listen</a>. Thus, when one of
Google's
- subcontractors discloses a thousand confidential voice recordings,
+ <p>Google “Assistant” records users'
conversations</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
+ when it is not supposed</em></ins></span> to <span
class="removed"><del><strong>pay</strong></del></span> <span
class="inserted"><ins><em>listen</a>. Thus, when one of Google's
+ subcontractors discloses</em></ins></span> a <span
class="removed"><del><strong>total</strong></del></span> <span
class="inserted"><ins><em>thousand confidential voice recordings,
users were easily identified from these recordings.</p>
<p>Since Google “Assistant” uses proprietary software,
there is no
- way to see or control what</em></ins></span> it <span
class="inserted"><ins><em>records or sends.</p>
+ way to see or control what it records or sends.</p>
- <p>Rather than trying</em></ins></span> to <span
class="removed"><del><strong>outsmart
- you.</p>
+ <p>Rather than trying to better control the use</em></ins></span> of
<span class="removed"><del><strong>C$4m</a></strong></del></span> <span
class="inserted"><ins><em>recordings, Google
+ should not record or listen</em></ins></span> to <span
class="removed"><del><strong>its customers.</p></strong></del></span>
<span class="inserted"><ins><em>the person's voice. It should only
+ get commands that the user wants to send to some Google
service.</p></em></ins></span>
</li>
-</ul>
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
+ <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span>
-<ul>
- <li><p>E-books can contain JavaScript code,
- and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
- </li>
+ <span class="inserted"><ins><em><li id="M201905061">
+ <!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Amazon Alexa collects a lot more information from users
+ than is necessary for correct functioning (time, location,
+ recordings made without a legitimate prompt), and sends
+ it to Amazon's servers, which store it indefinitely. Even
+ worse, Amazon forwards it</em></ins></span> to <span
class="removed"><del><strong>the
+ manufacturer</a>. Guess what?</strong></del></span> <span
class="inserted"><ins><em>third-party companies. Thus,
+ even if users request deletion of their data from Amazon's
servers,</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way to access</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
+ the <span
class="removed"><del><strong>data</a></strong></del></span> <span
class="inserted"><ins><em>data remain on other servers</a>, where they
can be accessed by
+ advertising companies and government agencies. In other words,
+ deleting the collected information doesn't cancel the wrong of
+ collecting it.</p>
- <li><p>Spyware in many e-readers—not
only</strong></del></span> <span class="inserted"><ins><em>better
control</em></ins></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span> <span
class="inserted"><ins><em>use of recordings, Google
- should not record or listen to</em></ins></span> the <span
class="removed"><del><strong>user reads at what time</a>.</p>
- </li>
+ <p>Data</em></ins></span> collected by <span
class="inserted"><ins><em>devices such as</em></ins></span> the <span
class="removed"><del><strong>manufacturer's snooping.</p>
+
+ <p>That</strong></del></span> <span class="inserted"><ins><em>Nest
thermostat,</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>Philips
+ Hue-connected lights, the Chamberlain MyQ garage opener</em></ins></span>
and the <span class="removed"><del><strong>FBI could listen to these
conversations
+ was unacceptable by itself.</p></li>
- <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>person's
voice. It should only
- get commands that</em></ins></span> the <span
class="removed"><del><strong>e-reader used
- by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data</strong></del></span> <span
class="inserted"><ins><em>user wants</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
- needed</strong></del></span> <span
class="inserted"><ins><em>send</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy</strong></del></span> <span class="inserted"><ins><em>Sonos
+ speakers are likewise stored longer than necessary</em></ins></span> on
<span class="removed"><del><strong>children and
adults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>the servers
+ the devices are tethered to. Moreover, they are made available to
+ Alexa. As a result, Amazon has a very precise picture of users' life
+ at home, not only in the present, but in the past (and, who knows,
+ in the future too?)</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+
+<!-- #SpywareOnSmartWatches</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201904240">
+ <!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>Some of users'
commands</em></ins></span> to <span class="removed"><del><strong>place new
items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnSmartWatches">Spyware on “Smart”
Watches</h3>
+ <span class="anchor-reference-id">
+ (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span>
</div>
+<div style="clear: left;"></div>
<ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
- snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>some Google service.</p></em></ins></span>
+ <li>
+ <p>An LG “smart” watch is designed</strong></del></span>
<span class="inserted"><ins><em>the Alexa service are</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+ to report its location</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees</em></ins></span> to <span
class="removed"><del><strong>someone else</strong></del></span> <span
class="inserted"><ins><em>listen to</a>. The Google</em></ins></span> and
<span class="removed"><del><strong>to transmit
+ conversations too</a>.</p>
</li>
+ <li></strong></del></span> <span class="inserted"><ins><em>Apple
+ voice assistants do similar things.</p></em></ins></span>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>id="M201905061">
- <!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Amazon Alexa collects</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
- effectively
- anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely</strong></del></span> <span
class="inserted"><ins><em>lot more information from users
- than is necessary for correct functioning (time, location,
- recordings made without a legitimate prompt),</em></ins></span> and <span
class="removed"><del><strong>make changes in various
- settings</a>.</p>
+ <p>A <span class="removed"><del><strong>very cheap “smart
watch” comes with an Android app
+ <a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects to an unidentified site in China</a>.</p>
+ <p>The article says this is a back door, but that could be a
+ misunderstanding. However, it is certainly surveillance, at
+ least.</p>
+ </li>
+</ul>
- <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>sends
- it</em></ins></span> to <span class="removed"><del><strong>do
because</strong></del></span> <span class="inserted"><ins><em>Amazon's servers,
which store it indefinitely. Even
- worse, Amazon forwards it to third-party companies. Thus,
- even if users request deletion of their data from Amazon's servers, <a
-
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
- the <span class="removed"><del><strong>system has no authentication
when</strong></del></span> <span class="inserted"><ins><em>data remain on other
servers</a>, where they can be</em></ins></span> accessed <span
class="removed"><del><strong>through</strong></del></span> <span
class="inserted"><ins><em>by
- advertising companies and government agencies. In other words,
- deleting the collected information doesn't cancel the wrong of
- collecting it.</p>
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>fraction of the Alexa service staff even has
access</em></ins></span> to <span class="removed"><del><strong>place new items
on top under each subsection -->
- <p>Data collected by devices such as the Nest thermostat, the Philips
- Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
- speakers are likewise stored longer than necessary on the
servers</em></ins></span>
- the <span class="removed"><del><strong>modem. However, even if it asked
for
- authentication, you couldn't be confident that
Nissan</strong></del></span> <span class="inserted"><ins><em>devices are
tethered to. Moreover, they are made available to
- Alexa. As a result, Amazon</em></ins></span> has <span
class="removed"><del><strong>no
- access. The software</strong></del></span> <span
class="inserted"><ins><em>a very precise picture of users' life
- at home, not only</em></ins></span> in the <span
class="removed"><del><strong>car is
- proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from its users</a>.</p>
-
- <p>Even if no one connects to</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>past (and, who knows,
- in</em></ins></span> the <span class="removed"><del><strong>cell phone
- modem enables</strong></del></span> <span class="inserted"><ins><em>future
too?)</p>
- </li>
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
- <li id="M201904240">
- <!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Some of users' commands to</em></ins></span> the <span
class="removed"><del><strong>phone company</strong></del></span> <span
class="inserted"><ins><em>Alexa service are <a
-
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>listen to</a>. The Google and Apple
- voice assistants do similar things.</p>
-
- <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even has access to <a
-
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
- location and other personal data</a>.</p>
- <p>Since</em></ins></span> the <span
class="removed"><del><strong>time; it</strong></del></span> <span
class="inserted"><ins><em>client program</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>nonfree, and data processing is done
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p></strong></del></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
+ location</em></ins></span> and <span class="removed"><del><strong>spyware
via BIOS</a> on Windows installs.
+Note that</strong></del></span> <span class="inserted"><ins><em>other personal
data</a>.</p>
+
+ <p>Since</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a “clean” Windows install</strong></del></span>
<span class="inserted"><ins><em>client program</em></ins></span> is <span
class="removed"><del><strong>not really
+clean since</strong></del></span> <span class="inserted"><ins><em>nonfree, and
data processing is done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
the cloud</a>” (a soothing way of saying “We won't
tell you how and where it's done”), users have no way
- to know what happens</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> the <span
class="removed"><del><strong>cell phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>recordings unless human eavesdroppers <a
-
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure
agreements</a>.</p></em></ins></span>
+ to know what happens to the recordings unless human
eavesdroppers</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
+ break their non-disclosure agreements</a>.</p>
</li>
- <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201902080">
+ <li id="M201902080">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The HP</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS:</strong></del></span>
+ <span class="inserted"><ins><em><p>The HP <a
+ href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
- others.</p>
+ communicates with HP servers</a> to</em></ins></span> make sure
<span class="removed"><del><strong>to place new items on top under each
subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
- <p>The case of toll-collection systems, mentioned in this
article,</strong></del></span> <span class="inserted"><ins><em>make sure the
user</em></ins></span> is <span class="removed"><del><strong>not
- really a matter of proprietary surveillance. These systems are an
- intolerable invasion of privacy,</strong></del></span> <span
class="inserted"><ins><em>still
- paying for the subscription,</em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>hasn't printed more pages than were
+ <p>Specifically,</strong></del></span> <span
class="inserted"><ins><em>the user is still
+ paying for the subscription, and hasn't printed more pages than were
paid for.</p>
- <p>Even though</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
- cases mentioned are done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>ink subscription program may be cheaper in some
- specific cases, it spies on users, and involves totally unacceptable
- restrictions</em></ins></span> in the <span
class="removed"><del><strong>car.</p></li>
+ <p>Even though the ink subscription program may be cheaper in some
+ specific cases,</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>spies on users, and involves totally unacceptable
+ restrictions in</em></ins></span> the <span
class="removed"><del><strong>emails of members</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> of <span
class="removed"><del><strong>Parliament
+ this way, because they pass it through Microsoft.</p></li>
- <li><p>Tesla cars allow the company</strong></del></span> <span
class="inserted"><ins><em>use of ink cartridges that would otherwise be in
- working order.</p>
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>ink cartridges that would otherwise
be</em></ins></span> in <span class="removed"><del><strong>Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span class="inserted"><ins><em>working order.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
- <li id="M201808120">
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201808120">
<!--#set var="DATE" value='<small
class="date-tag">2018-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
- determine</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
- and <span class="removed"><del><strong>c.</a>). The company
says</strong></del></span> <span class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
- turn</em></ins></span> it <span class="removed"><del><strong>doesn't
- store this information, but</strong></del></span> <span
class="inserted"><ins><em>into a listening device</a> for them.</p>
-
- <p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And</em></ins></span> if <span
class="inserted"><ins><em>some government such as China or</em></ins></span>
the <span class="removed"><del><strong>state orders it</strong></del></span>
<span class="inserted"><ins><em>US
- told Amazon</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>data
- and hand it over,</strong></del></span> <span
class="inserted"><ins><em>product in that country,
- do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>moral fiber
to say no?</p>
-
- <p><small>(These crackers are probably hackers too, but please
<a
- href="https://stallman.org/articles/on-hacking.html"> don't use
- “hacking” to mean “breaking
security”</a>.)</small></p></em></ins></span>
+ <p>Crackers found a way to break the security of an Amazon device,
+ and</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically</strong></del></span> <span
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ turn it into a listening device</a></em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
-<!-- #SpywareAtHome</strong></del></span>
- <span class="inserted"><ins><em><li id="M201804140">
- <!--#set var="DATE" value='<small
class="date-tag">2018-04</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make sure to place new
items</strong></del></span>
- <span class="inserted"><ins><em><p>A medical insurance company <a
-
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops</em></ins></span> on
<span class="removed"><del><strong>top under each
subsection</strong></del></span> <span class="inserted"><ins><em>its user by
- sending usage data back over the Internet</a>.</p>
- </li>
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>them.</p>
- <li id="M201706204">
- <!--#set var="DATE" value='<small
class="date-tag">2017-06</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+ <p>It was very difficult for them</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware on</strong></del></span> <span
class="inserted"><ins><em>do this.</em></ins></span> The <span
class="removed"><del><strong>Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
<div style="clear: left;"></div>
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
<ul>
- <li><p>Lots</strong></del></span>
- <span class="inserted"><ins><em><p>Lots</em></ins></span> of
“smart” products are designed <a
-
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen to everyone in the house, all the time</a>.</p>
+ <li>
+ <p>Every “home security” camera,</strong></del></span>
<span class="inserted"><ins><em>job would be much
+ easier for Amazon. And</em></ins></span> if <span
class="removed"><del><strong>its manufacturer can communicate with it,
+ is a surveillance device. <a
+href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+ Canary camera is an example</a>.</p>
+ <p>The article describes wrongdoing by</strong></del></span> <span
class="inserted"><ins><em>some government such as China or</em></ins></span>
the <span class="removed"><del><strong>manufacturer, based
on</strong></del></span> <span class="inserted"><ins><em>US
+ told Amazon to do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>product in</em></ins></span> that <span
class="inserted"><ins><em>country,
+ do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>device is tethered</strong></del></span> <span
class="inserted"><ins><em>moral fiber to say no?</p>
+
+ <p><small>(These crackers are probably hackers too, but please
<a
+ href="https://stallman.org/articles/on-hacking.html"> don't use
+ “hacking”</em></ins></span> to <span
class="inserted"><ins><em>mean “breaking
security”</a>.)</small></p>
+ </li>
+
+ <li id="M201804140">
+ <!--#set var="DATE" value='<small
class="date-tag">2018-04</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A medical insurance company <a
+
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
+ offers</em></ins></span> a <span
class="removed"><del><strong>server.</p>
+ <p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
+ <p>But it also demonstrates</strong></del></span> <span
class="inserted"><ins><em>gratis electronic toothbrush</em></ins></span> that
<span class="inserted"><ins><em>snoops on its user by
+ sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>device gives the company
+ surveillance capability.</p></strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li>
+ <p>The Nest Cam</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201706204">
+ <!--#set var="DATE" value='<small
class="date-tag">2017-06</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Lots of</em></ins></span> “smart” <span
class="removed"><del><strong>camera is</strong></del></span> <span
class="inserted"><ins><em>products are designed</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
+ listen to everyone in</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>house, all</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
<p>Today's technological practice does not include any way of making
a device that can obey your voice commands without potentially spying
- on you. Even if it is air-gapped, it could be saving up records
+ on you. Even if it</em></ins></span> is <span
class="removed"><del><strong>using</strong></del></span> <span
class="inserted"><ins><em>air-gapped,</em></ins></span> it <span
class="inserted"><ins><em>could be saving up records
about you for later examination.</p>
</li>
- <span
class="removed"><del><strong><li><p>Nest</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201407170">
+ <li id="M201407170">
<!--#set var="DATE" value='<small
class="date-tag">2014-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p id="nest-thermometers">Nest</em></ins></span> thermometers send
<a
+ <p id="nest-thermometers">Nest thermometers send <a
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
data about the user</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201310260">
+ <li id="M201310260">
<!--#set var="DATE" value='<small
class="date-tag">2013-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"></em></ins></span>
- Rent-to-own computers were programmed to spy on their
renters</a>.</p>
+
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</em></ins></span> to <span
class="removed"><del><strong>outsmart
+ you.</p></strong></del></span> <span class="inserted"><ins><em>spy
on their renters</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareOnWearables">Wearables</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnWearables">#SpywareOnWearables</a>)</span></em></ins></span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareOnWearables">Wearables</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnWearables">#SpywareOnWearables</a>)</span></em></ins></span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day</strong></del></span>
+<span class="removed"><del><strong><ul>
+ <li><p>E-books</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201807260">
@@ -3557,21 +3509,17 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Internet-enabled watches with proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they have</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>lot of security flaws. They <a
+ privacy. In addition, they have a lot of security flaws. They <a
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
- permit security breakers (and unauthorized people)</em></ins></span> to
<span class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>access</a> the watch.</p>
+ permit security breakers (and unauthorized people) to access</a> the
watch.</p>
- <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent</em></ins></span> and
-<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I
-don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>child and spoof messages to and
from</em></ins></span> the <span class="removed"><del><strong>other way.”
Evidently</strong></del></span> <span class="inserted"><ins><em>watch, possibly
endangering the child.</p>
+ <p>Thus, ill-intentioned unauthorized people</em></ins></span> can
<span class="removed"><del><strong>contain JavaScript
code,</strong></del></span> <span class="inserted"><ins><em>intercept
communications between parent</em></ins></span> and <span
class="removed"><del><strong><a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes</strong></del></span>
<span class="inserted"><ins><em>child and spoof messages to and from the
watch, possibly endangering the child.</p>
- <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>was
-before Amazon “smart” TVs.</p>
+ <p><small>(Note that</em></ins></span> this <span
class="removed"><del><strong>code snoops on readers</a>.</p>
+ </li>
-<ul>
- <li>
- <p>Vizio
- “smart”</strong></del></span> <span
class="inserted"><ins><em>this article misuses the word “<a
+ <li><p>Spyware in many e-readers—not
only</strong></del></span> <span class="inserted"><ins><em>article
misuses</em></ins></span> the
+ <span class="removed"><del><strong>Kindle:</strong></del></span> <span
class="inserted"><ins><em>word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
to mean “crackers.”)</small></p>
</li>
@@ -3579,85 +3527,81 @@
<li id="M201603020">
<!--#set var="DATE" value='<small
class="date-tag">2016-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></em></ins></span>
- that <span class="inserted"><ins><em>connects to an unidentified site in
China</a>.</p>
-
- <p>The article says this</em></ins></span> is <span
class="removed"><del><strong>viewed on them, and not just broadcasts
- and cable</a>. Even if the image is coming from the user's own
- computer, the TV reports what it is. The existence
of</strong></del></span> a <span class="removed"><del><strong>way to
- disable the surveillance, even if it were not hidden
as</strong></del></span> <span class="inserted"><ins><em>back door, but that
could be a
- misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>was in
- these TVs, does not legitimize the
surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>is certainly surveillance, at
least.</p></em></ins></span>
+ <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page the user reads</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects to an unidentified site in China</a>.</p>
+
+ <p>The article says this is a back door, but that could be a
+ misunderstanding. However, it is certainly
surveillance,</em></ins></span> at <span class="removed"><del><strong>what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>least.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>More or less
all</strong></del></span>
+ <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used
+ by most US libraries,</strong></del></span>
<span class="inserted"><ins><em><li id="M201407090">
<!--#set var="DATE" value='<small
class="date-tag">2014-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>An LG</em></ins></span> “smart” <span
class="removed"><del><strong>TVs</strong></del></span> <span
class="inserted"><ins><em>watch is designed</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
-
- <p>The</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to</em></ins></span> report <span class="removed"><del><strong>was as of
2014, but we don't expect this has got better.</p>
-
- <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>its location</em></ins></span> to <span
class="removed"><del><strong>get users' formal
- consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent? Probably the TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>someone else and</em></ins></span> to <span
class="removed"><del><strong>tracking, the TV</strong></del></span> <span
class="inserted"><ins><em>transmit conversations
- too</a>.</p>
+ <p>An LG “smart” watch is designed</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
+ to <span class="removed"><del><strong>Adobe</a>. Adobe's
“excuse”: it's
+ needed</strong></del></span> <span class="inserted"><ins><em>report its
location</em></ins></span> to <span class="removed"><del><strong>check
DRM!</p></strong></del></span> <span class="inserted"><ins><em>someone
else and to transmit conversations
+ too</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInVehicles">Vehicles</h4>
+ <h4 <span class="removed"><del><strong>id="SpywareInVehicles">Spyware
in Vehicles</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInVehicles">Vehicles</h4></em></ins></span>
<span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
</div>
-<ul class="blurbs">
- <li id="M202008181">
+<span class="removed"><del><strong><ul>
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ snooping devices</a>.</p>
+ </li></strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs"></em></ins></span>
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>id="M202008181">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>New Toyotas</em></ins></span> will
- <span class="removed"><del><strong>not work.”</p>
-
- <p>Proper laws would say that TVs are not
allowed</strong></del></span> <span class="inserted"><ins><em><a
+ <p>New Toyotas will <a
href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/">
- upload data</em></ins></span> to <span class="removed"><del><strong>report
what
- the user watches — no exceptions!</p>
- </li>
- <li><p>Vizio goes a step further than other TV manufacturers in
spying</strong></del></span> <span class="inserted"><ins><em>AWS to help create
custom insurance premiums</a>
- based</em></ins></span> on
- <span class="removed"><del><strong>their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so that
advertisers</strong></del></span> <span class="inserted"><ins><em>driver
behaviour.</p>
-
- <p>Before you buy a “connected” car, make sure
you</em></ins></span> can <span
class="removed"><del><strong>track</strong></del></span>
- <span class="inserted"><ins><em>disconnect its cellular antenna and its
GPS antenna. If</em></ins></span> you
- <span class="removed"><del><strong>across devices.</p>
+ upload data to AWS to help create custom insurance premiums</a>
+ based on driver behaviour.</p>
- <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>want
- GPS navigation, get a separate navigator which runs free software
+ <p>Before you buy</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem</strong></del></span>
<span class="inserted"><ins><em>“connected” car, make sure you can
+ disconnect its cellular antenna and its GPS antenna. If you want
+ GPS navigation, get a separate navigator</em></ins></span> which <span
class="removed"><del><strong>allows
+ effectively
+ anyone</strong></del></span> <span class="inserted"><ins><em>runs free
software
and works with Open Street Map.</p>
</li>
<li id="M201912171">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Most modern cars now <a
-
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
- record and send various kinds of data</em></ins></span> to <span
class="removed"><del><strong>turn this off, but having</strong></del></span>
<span class="inserted"><ins><em>the manufacturer</a>. For
- the user, access to the data is nearly impossible, as</em></ins></span> it
<span class="removed"><del><strong>enabled by default</strong></del></span>
<span class="inserted"><ins><em>involves
- cracking the car's computer, which</em></ins></span> is <span
class="removed"><del><strong>an injustice already.</p>
- </li>
+ <p>Most modern cars now</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
+ record</em></ins></span> and <span class="removed"><del><strong>make
changes in</strong></del></span> <span
class="inserted"><ins><em>send</em></ins></span> various
+ <span class="removed"><del><strong>settings</a>.</p>
- <li><p>Tivo's alliance</strong></del></span> <span
class="inserted"><ins><em>always hidden and running</em></ins></span> with
<span class="removed"><del><strong>Viacom adds 2.3 million
households</strong></del></span>
- <span class="inserted"><ins><em>proprietary software.</p>
+ <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>kinds of data</em></ins></span> to <span
class="removed"><del><strong>do because</strong></del></span> the <span
class="removed"><del><strong>system has no authentication when
+ accessed through</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. For</em></ins></span>
+ the <span class="removed"><del><strong>modem. However, even if it asked
for
+ authentication, you couldn't be confident that Nissan has no
+ access. The software in</strong></del></span> <span
class="inserted"><ins><em>user, access to</em></ins></span> the <span
class="removed"><del><strong>car</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> is
+ <span class="removed"><del><strong>proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means</strong></del></span> <span class="inserted"><ins><em>nearly
impossible, as</em></ins></span> it <span class="removed"><del><strong>demands
blind faith from its users</a>.</p>
+
+ <p>Even if no one connects to the car remotely, the cell phone
+ modem enables the phone company to track</strong></del></span> <span
class="inserted"><ins><em>involves
+ cracking</em></ins></span> the car's <span
class="removed"><del><strong>movements all
+ the time; it</strong></del></span> <span
class="inserted"><ins><em>computer, which</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>always hidden and running with
+ proprietary software.</p>
</li>
<li id="M201903290">
@@ -3665,472 +3609,520 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Tesla cars collect lots of personal data, and <a
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
- when they go</em></ins></span> to <span class="inserted"><ins><em>a
junkyard</em></ins></span> the <span class="removed"><del><strong>600 millions
social media profiles the company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>driver's personal data goes</em></ins></span>
with <span class="removed"><del><strong>online
- social media participation, Tivo can now</strong></del></span>
- <span class="inserted"><ins><em>them</a>.</p>
+ when they go</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>a junkyard</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>driver's personal data goes with
+ them</a>.</p></em></ins></span>
</li>
- <li id="M201902011">
+ <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201902011">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The FordPass Connect feature of some Ford vehicles
has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span>
+ <p>The FordPass Connect feature of some Ford vehicles
has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access</em></ins></span> to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>the internal car
network</a>. It is constantly
- connected</em></ins></span> to <span class="removed"><del><strong>be
- picked up</strong></del></span> <span class="inserted"><ins><em>the
cellular phone network and sends Ford a lot of data,
+ near-complete access</em></ins></span> to <span
class="inserted"><ins><em>the internal</em></ins></span> car <span
class="removed"><del><strong>manufacturers, insurance companies, and
+ others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this
article,</strong></del></span> <span
class="inserted"><ins><em>network</a>. It</em></ins></span> is <span
class="removed"><del><strong>not
+ really</strong></del></span> <span class="inserted"><ins><em>constantly
+ connected to the cellular phone network and sends Ford</em></ins></span> a
<span class="removed"><del><strong>matter of proprietary surveillance. These
systems are an
+ intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>lot</em></ins></span> of <span
class="removed"><del><strong>privacy,</strong></del></span> <span
class="inserted"><ins><em>data,
including car location. This feature operates even when the ignition
- key is removed, and users report that they can't disable it.</p>
+ key is removed,</em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>users report that they can't disable it.</p>
- <p>If you own one of these cars, have you succeeded in breaking the
- connectivity</em></ins></span> by <span
class="removed"><del><strong>proprietary malware running on other
devices</strong></del></span> <span class="inserted"><ins><em>disconnecting the
cellular modem, or wrapping the
- antenna</em></ins></span> in
- <span class="removed"><del><strong>range so as</strong></del></span>
<span class="inserted"><ins><em>aluminum foil?</p>
+ <p>If you own one of these cars, have you succeeded in
breaking</em></ins></span> the <span class="removed"><del><strong>invasion
isn't done by malware. The other
+ cases mentioned are done</strong></del></span>
+ <span class="inserted"><ins><em>connectivity</em></ins></span> by <span
class="removed"><del><strong>proprietary malware in</strong></del></span> <span
class="inserted"><ins><em>disconnecting</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>cellular modem, or wrapping</em></ins></span> the
<span class="removed"><del><strong>company</strong></del></span>
+ <span class="inserted"><ins><em>antenna in aluminum foil?</p>
</li>
<li id="M201811300">
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>In China, it is mandatory for electric
- cars</em></ins></span> to <span class="removed"><del><strong>determine
that they are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads</strong></del></span> <span class="inserted"><ins><em>be
equipped</em></ins></span> with <span class="removed"><del><strong>Web
activity, and
- other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
- </li>
- <li><p>Vizio “smart” TVs recognize
and</strong></del></span> <span class="inserted"><ins><em>a terminal
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
- even if it isn't</strong></del></span>
+ cars</em></ins></span> to <span class="removed"><del><strong>extract data
remotely and
+ determine the car's location at any time. (See</strong></del></span>
<span class="inserted"><ins><em>be equipped with a terminal
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>). The company says it doesn't
+ store</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
transfers technical data, including car location,
- to</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p>
- </li>
- <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>government-run platform</a>. In
practice,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- snooping all</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying">
- manufacturers collect this data</a> as part of their own spying, then
- forward it to</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
- </li>
- <li><p>The Samsung “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>government-run platform.</p>
+ to a government-run platform</a>. In practice, <a
+ href="/proprietary/proprietary-surveillance.html#car-spying">
+ manufacturers collect</em></ins></span> this <span
class="removed"><del><strong>information, but if the state
orders</strong></del></span> <span class="inserted"><ins><em>data</a> as
part of their own spying, then
+ forward</em></ins></span> it to <span class="removed"><del><strong>get the
data
+ and hand it over,</strong></del></span> the <span
class="removed"><del><strong>state can store
it.</p></strong></del></span> <span
class="inserted"><ins><em>government-run platform.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201810230">
- <!--#set var="DATE" value='<small
class="date-tag">2018-10</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked</em></ins></span> the <span class="removed"><del><strong>internet
to another
- company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>choices of radio programs</a> in its
- “connected” cars, minute by minute.</p>
- <p>GM did not get users' consent, but</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>could</em></ins></span> have <span
class="removed"><del><strong>to
- give</strong></del></span> <span class="inserted"><ins><em>got that
easily by
- sneaking</em></ins></span> it <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>into</em></ins></span> the <span
class="removed"><del><strong>US or</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for</em></ins></span> some
<span class="removed"><del><strong>other government.</p>
- <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>digital service
- or other. A requirement for consent</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>effectively no protection.</p>
-
- <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="removed"><del><strong>be trusted
unless it is done
- by free software in</strong></del></span> <span
class="inserted"><ins><em>you,
- watching you, following</em></ins></span> your <span
class="removed"><del><strong>own computer.</p>
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure to place new items on top under each
subsection</strong></del></span>
- <p>In its privacy policy, Samsung explicitly confirms
- that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice</strong></del></span>
<span class="inserted"><ins><em>movements, tracking passengers' cell
- phones. <em>All</em> such</em></ins></span> data <span
class="removed"><del><strong>containing sensitive information
will</strong></del></span> <span class="inserted"><ins><em>collection
should</em></ins></span> be <span
class="removed"><del><strong>transmitted</strong></del></span> <span
class="inserted"><ins><em>forbidden.</p>
+ <span class="inserted"><ins><em><li id="M201810230">
+ <!--#set var="DATE" value='<small
class="date-tag">2018-10</small>'
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
- <p>But if you really want</em></ins></span> to
- <span class="removed"><del><strong>third parties</a>.</p>
- </li>
- <li><p>Spyware in
- <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports what the user watches,
and</strong></del></span> <span class="inserted"><ins><em>be safe, we must make
sure</em></ins></span> the <span class="removed"><del><strong>switch to turn
this off has no effect. (The fact</strong></del></span> <span
class="inserted"><ins><em>car's
- hardware cannot collect any of</em></ins></span> that <span
class="removed"><del><strong>the
- transmission reports a 404 error really means nothing; the server
- could save</strong></del></span> <span class="inserted"><ins><em>data,
or</em></ins></span> that <span class="removed"><del><strong>data
anyway.)</p>
-
- <p>Even worse, it
- <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on</strong></del></span> the <span
class="removed"><del><strong>user's local network.</a></p>
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
- <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>software
- is free so we know</em></ins></span> it <span
class="removed"><del><strong>had installed a patch to stop this,
but</strong></del></span> <span class="inserted"><ins><em>won't
collect</em></ins></span> any <span class="removed"><del><strong>product
- could spy this way.</p>
+<ul>
+ <li><p>Lots of “smart” products are
+ designed</strong></del></span>
+ <span class="inserted"><ins><em><p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
+ listen to everyone</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
+ tracked the choices of radio programs</a></em></ins></span> in <span
class="inserted"><ins><em>its
+ “connected” cars, minute by minute.</p>
- <p>Meanwhile, LG TVs
- <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span> of <span class="removed"><del><strong>spying
anyway</a>.</p></strong></del></span> <span
class="inserted"><ins><em>that data.</p></em></ins></span>
+ <p>GM did not get users' consent, but it could have got that easily
by
+ sneaking it into</em></ins></span> the <span
class="removed"><del><strong>house, all</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for some digital service
+ or other. A requirement for consent is effectively no protection.</p>
+
+ <p>The cars can also collect lots of other data: listening to you,
+ watching you, following your movements, tracking passengers' cell
+ phones. <em>All</em> such data collection should be
forbidden.</p>
+
+ <p>But if you really want to be safe, we must make
sure</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+
+ <p>Today's technological practice does not
include</strong></del></span> <span class="inserted"><ins><em>car's
+ hardware cannot collect</em></ins></span> any <span
class="removed"><del><strong>way</strong></del></span> of
+ <span class="removed"><del><strong>making a device</strong></del></span>
that <span class="removed"><del><strong>can obey your voice commands without
+ potentially spying on you. Even if it</strong></del></span> <span
class="inserted"><ins><em>data, or that the software</em></ins></span>
+ is <span class="removed"><del><strong>air-gapped,</strong></del></span>
<span class="inserted"><ins><em>free so we know</em></ins></span> it <span
class="removed"><del><strong>could be
+ saving up records about you for later
examination.</p></strong></del></span> <span
class="inserted"><ins><em>won't collect any of that
data.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they wanted to
record.</a></p></strong></del></span>
+
+ <span class="removed"><del><strong><li><p>Nest thermometers
+ send</strong></del></span>
<span class="inserted"><ins><em><li id="M201711230">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>AI-powered driving apps can <a
-
href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ <p>AI-powered driving apps can</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot of data about the user</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
track your every move</a>.</p></em></ins></span>
</li>
-<span class="removed"><del><strong></ul>
-<!-- #SpywareInGames</strong></del></span>
+ <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed to spy on their
renters</a>.</p></strong></del></span>
<span class="inserted"><ins><em><li id="M201607160">
<!--#set var="DATE" value='<small
class="date-tag">2016-07</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareInGames">Spyware in Games</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
-
- <li>
- <p>The driver for</strong></del></span>
- <span class="inserted"><ins><em><p id="car-spying">Computerized cars
with nonfree software are <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p id="car-spying">Computerized cars with nonfree software are <a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
- snooping devices</a>.</p>
+ snooping devices</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+</div>
+
+<p>Emo Phillips made a joke: The other day</strong></del></span>
- <li id="M201602240">
+ <span class="inserted"><ins><em><li id="M201602240">
<!--#set var="DATE" value='<small
class="date-tag">2016-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p id="nissan-modem">The Nissan Leaf has</em></ins></span> a <span
class="removed"><del><strong>certain gaming keyboard <a
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information</strong></del></span> <span class="inserted"><ins><em>built-in
- cell phone modem which allows effectively anyone</em></ins></span> to
<span class="removed"><del><strong>China</a>.</p>
- </li>
-
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
- access its computers remotely</em></ins></span> and <span
class="removed"><del><strong>then sends personal data about
them</strong></del></span> <span class="inserted"><ins><em>make changes in
various
+ <p id="nissan-modem">The Nissan Leaf has</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>built-in
+ cell phone modem which allows effectively anyone</em></ins></span> to
<span class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em><a
+ href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
+ access its computers remotely</em></ins></span> and
+<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I
+don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>make changes in various
settings</a>.</p>
- <p>That's easy</em></ins></span> to
- <span class="removed"><del><strong>nVidia servers</a>.</p>
- </li>
-
- <li><p>Angry Birds
- <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and</strong></del></span> <span
class="inserted"><ins><em>do because</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage to spy</strong></del></span>
<span class="inserted"><ins><em>system has no authentication
- when accessed</em></ins></span> through <span
class="inserted"><ins><em>the modem. However, even if</em></ins></span> it
<span class="removed"><del><strong>too</a>.
- Here's information on
- <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
- </li>
+ <p>That's easy to do because</em></ins></span> the <span
class="removed"><del><strong>other way.” Evidently that was
+before Amazon “smart” TVs.</p>
- <li><p>Many</strong></del></span> <span
class="inserted"><ins><em>asked
- for authentication, you couldn't be confident that Nissan
- has no access. The software in the car is proprietary,</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and report</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
means
+<ul>
+ <li>
+ <p>Vizio
+ “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything</strong></del></span> <span
class="inserted"><ins><em>system has no authentication
+ when accessed through the modem. However, even if it asked
+ for authentication, you couldn't be confident</em></ins></span> that <span
class="inserted"><ins><em>Nissan
+ has no access. The software in the car</em></ins></span> is <span
class="removed"><del><strong>viewed on them, and not just broadcasts
+ and cable</a>. Even</strong></del></span> <span
class="inserted"><ins><em>proprietary, <a
+ href="/philosophy/free-software-even-more-important.html">which means
it demands blind faith from its users</a>.</p>
- <p>Even if no one connects</em></ins></span> to the
- <span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
-
- <p>A game console</strong></del></span> <span
class="inserted"><ins><em>car remotely, the cell phone modem
- enables the phone company to track the car's movements all the time;
- it</em></ins></span> is <span class="removed"><del><strong>a computer, and
you can't trust a computer with
- a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>possible to physically remove the cell phone modem,
though.</p></em></ins></span>
+ <p>Even</em></ins></span> if <span class="inserted"><ins><em>no one
connects to the car remotely, the cell phone modem
+ enables the phone company to track the car's movements
all</em></ins></span> the <span
class="removed"><del><strong>image</strong></del></span> <span
class="inserted"><ins><em>time;
+ it</em></ins></span> is <span class="removed"><del><strong>coming
from</strong></del></span> <span class="inserted"><ins><em>possible to
physically remove</em></ins></span> the <span
class="removed"><del><strong>user's own
+ computer,</strong></del></span> <span class="inserted"><ins><em>cell phone
modem, though.</p>
</li>
- <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps
- <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201306140">
+ <li id="M201306140">
<!--#set var="DATE" value='<small
class="date-tag">2013-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tesla cars allow the company to extract</em></ins></span>
- data <span class="removed"><del><strong>about their
users</strong></del></span> <span
class="inserted"><ins><em>remotely</em></ins></span> and <span
class="removed"><del><strong>their users'
- friends</strong></del></span> <span class="inserted"><ins><em>determine
the car's location
- at any time. (See Section 2, paragraphs b</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
-
- <p>Even nastier, they do</strong></del></span> <span
class="inserted"><ins><em>c of the <a
-
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- privacy statement</a>.) The company says</em></ins></span> it <span
class="removed"><del><strong>through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
- information, but if the state orders it to get</em></ins></span> the data
- <span class="removed"><del><strong>collected by various
cr…apps</strong></del></span> and <span
class="removed"><del><strong>sites</strong></del></span> <span
class="inserted"><ins><em>hand it
- over, the state can store it.</p>
+ <p>Tesla cars allow</em></ins></span> the <span
class="removed"><del><strong>TV reports what it is. The existence of a
way</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span> to
+ <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>extract
+ data remotely and determine</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden as it was
in
+ these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>car's location
+ at any time. (See Section 2, paragraphs b and c of</em></ins></span> the
<span class="removed"><del><strong>surveillance.</p>
+ </li>
+
+ <li><p>More or less all “smart”
TVs</strong></del></span> <a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report was as of 2014, but we don't
expect</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ privacy statement</a>.) The company says it doesn't
store</em></ins></span> this <span class="removed"><del><strong>has got
better.</p>
+
+ <p>This shows that laws requiring products to get users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens</strong></del></span>
+ <span class="inserted"><ins><em>information, but</em></ins></span> if
<span class="removed"><del><strong>a user declines consent?
Probably</strong></del></span> the <span class="removed"><del><strong>TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>state orders it</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>get</em></ins></span> the <span
class="removed"><del><strong>TV will
+ not work.”</p>
+
+ <p>Proper laws would say that TVs are not allowed to report
what</strong></del></span> <span class="inserted"><ins><em>data and hand it
+ over,</em></ins></span> the <span class="removed"><del><strong>user
watches — no exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>state can store it.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers</strong></del></span>
- <li id="M201303250">
+ <span class="inserted"><ins><em><li id="M201303250">
<!--#set var="DATE" value='<small
class="date-tag">2013-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p id="records-drivers">Proprietary software in cars <a
-
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
- records information about drivers' movements</a>, which
is</em></ins></span> made <span class="removed"><del><strong>by different
- companies.</p>
+ <p id="records-drivers">Proprietary software</em></ins></span> in
<span class="removed"><del><strong>spying on
+ their users: their</strong></del></span> <span
class="inserted"><ins><em>cars</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so that advertisers can track you
+ across devices.</p>
- <p>They use this data to manipulate people</strong></del></span>
- <span class="inserted"><ins><em>available</em></ins></span> to <span
class="removed"><del><strong>buy things,</strong></del></span> <span
class="inserted"><ins><em>car manufacturers, insurance
companies,</em></ins></span> and <span class="removed"><del><strong>hunt
- for “whales” who can be led to spend a
lot</strong></del></span> <span class="inserted"><ins><em>others.</p>
-
- <p>The case</em></ins></span> of <span
class="removed"><del><strong>money. They
- also use</strong></del></span> <span
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
- is not really</em></ins></span> a <span class="removed"><del><strong>back
door to manipulate the game play for specific players.</p>
-
- <p>While</strong></del></span> <span
class="inserted"><ins><em>matter of proprietary surveillance. These systems
- are an intolerable invasion of privacy, and should be replaced with
- anonymous payment systems, but</em></ins></span> the <span
class="removed"><del><strong>article describes gratis games, games that cost
money
- can use</strong></del></span> <span class="inserted"><ins><em>invasion
isn't done by malware. The
- other cases mentioned are done by proprietary malware in</em></ins></span>
the <span class="removed"><del><strong>same
tactics.</p></strong></del></span> <span
class="inserted"><ins><em>car.</p></em></ins></span>
+ <p>It</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
+ records information about drivers' movements</a>,
which</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>made
+ available</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>car manufacturers, insurance companies, and
others.</p>
+
+ <p>The case of toll-collection systems, mentioned
in</em></ins></span> this <span class="removed"><del><strong>off, but having it
enabled by default</strong></del></span> <span
class="inserted"><ins><em>article,</em></ins></span>
+ is <span class="inserted"><ins><em>not really a matter of proprietary
surveillance. These systems
+ are</em></ins></span> an <span class="removed"><del><strong>injustice
already.</p>
+ </li>
+
+ <li><p>Tivo's alliance</strong></del></span> <span
class="inserted"><ins><em>intolerable invasion of privacy, and should be
replaced</em></ins></span> with <span class="removed"><del><strong>Viacom adds
2.3 million households to
+ the 600 millions social media profiles</strong></del></span>
+ <span class="inserted"><ins><em>anonymous payment systems,
but</em></ins></span> the <span class="removed"><del><strong>company already
+ monitors. Tivo customers</strong></del></span> <span
class="inserted"><ins><em>invasion isn't done by malware. The
+ other cases mentioned</em></ins></span> are <span
class="removed"><del><strong>unaware they're being
watched</strong></del></span> <span
class="inserted"><ins><em>done</em></ins></span> by
+ <span class="removed"><del><strong>advertisers. By combining TV viewing
information with online
+ social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>proprietary malware in the car.</p>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareAtRecreation
--></strong></del></span>
-
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareAtRecreation">Spyware at
Recreation</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInVR">Virtual Reality</h4></em></ins></span>
- <span <span class="removed"><del><strong>class="anchor-reference-id">
- (<a
href="#SpywareAtRecreation">#SpywareAtRecreation</a>)</span></strong></del></span>
<span class="inserted"><ins><em>class="anchor-reference-id">(<a
href="#SpywareInVR">#SpywareInVR</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 id="SpywareInVR">Virtual Reality</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVR">#SpywareInVR</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
-
-<ul>
- <li><p>Users are suing Bose for</strong></del></span>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202008182">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Oculus headsets</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing a spyware app for its headphones</a>.
- Specifically, the app would record the names of the audio
files</strong></del></span>
+ <p>Oculus headsets</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing
all</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require</em></ins></span>
- users <span class="removed"><del><strong>listen</strong></del></span> to
<span class="removed"><del><strong>along with the headphone's unique serial
number.
- </p>
- <p>The suit accuses that this was done without the users' consent.
- If the fine print of</strong></del></span> <span
class="inserted"><ins><em>identify themselves to Facebook</a>. This will
give Facebook
- free rein to pervasively snoop on Oculus users.</p>
+ users to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>identify
themselves</em></ins></span> to <span class="removed"><del><strong>be
+ picked up by proprietary malware running on other devices in
+ range so as</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. This will give Facebook
+ free rein</em></ins></span> to <span
class="removed"><del><strong>determine that they are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads with Web activity, and
+ other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>pervasively snoop on Oculus
users.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and
+ <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people are watching</a>,
+ even if</strong></del></span>
- <li id="M201612230">
+ <span class="inserted"><ins><em><li id="M201612230">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>VR equipment, measuring every slight motion,
- creates</em></ins></span> the <span class="removed"><del><strong>app said
that users gave consent</strong></del></span> <span
class="inserted"><ins><em>potential</em></ins></span> for <span
class="removed"><del><strong>this,
- would that make it acceptable? No way! It should be flat out
- <a href="/philosophy/surveillance-vs-democracy.html">
- illegal to design</strong></del></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>most intimate
- surveillance ever. All it takes</em></ins></span> to <span
class="removed"><del><strong>snoop at all</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>make this
potential real <a
-
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
+ creates the potential for the most intimate
+ surveillance ever. All</em></ins></span> it <span
class="removed"><del><strong>isn't a TV channel.</p>
+ </li>
+ <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>takes to make this potential
real</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ snooping all</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
software as malicious as many other programs listed in this
page</a>.</p>
- <p>You can bet Facebook will implement the maximum possible
+ <p>You can bet Facebook will implement</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>maximum possible
surveillance on Oculus Rift devices. The moral is, never trust a VR
system with nonfree software in it.</p></em></ins></span>
</li>
-</ul>
-
-<span class="removed"><del><strong><!-- #SpywareOnTheWeb
--></strong></del></span>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV
+ <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-section">
- <h3 id="SpywareOnTheWeb">Spyware on the Web</h3>
+ <h3 id="SpywareOnTheWeb">Spyware</em></ins></span> on the <span
class="removed"><del><strong>internet to another
+ company, Nuance</a>. Nuance can save it and would then have to
+ give</strong></del></span> <span class="inserted"><ins><em>Web</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnTheWeb">#SpywareOnTheWeb</a>)</span>
</div>
<div style="clear: left;"></div>
<p>In addition, many web sites spy on their visitors. Web sites are not
- programs, so it
- <a href="/philosophy/network-services-arent-free-or-nonfree.html">
- makes no sense to call them “free” or
“proprietary”</a>,
- but the surveillance is an abuse all the same.</p>
-
-<span class="removed"><del><strong><ul>
- <li><p>When</strong></del></span>
+ programs, so</em></ins></span> it
+ <span class="inserted"><ins><em><a
href="/philosophy/network-services-arent-free-or-nonfree.html">
+ makes no sense</em></ins></span> to <span class="removed"><del><strong>the
US</strong></del></span> <span class="inserted"><ins><em>call them
“free”</em></ins></span> or <span class="removed"><del><strong>some
other government.</p>
+ <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>“proprietary”</a>,
+ but the surveillance</em></ins></span> is <span
class="removed"><del><strong>not to be trusted unless</strong></del></span>
<span class="inserted"><ins><em>an abuse all the same.</p>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201904210">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>As of April 2019, it is <a
-
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/">no
- longer possible to disable an
- unscrupulous tracking anti-feature</a> that <a
-
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
+ <p>As of April 2019,</em></ins></span> it is <span
class="removed"><del><strong>done
+ by free software in your own computer.</p>
+
+ <p>In its privacy policy, Samsung explicitly confirms
+ that</strong></del></span> <a <span
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ data containing sensitive information will be
transmitted</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/">no
+ longer possible</em></ins></span> to
+ <span class="removed"><del><strong>third parties</a>.</p>
+ </li>
+ <li><p>Spyware in</strong></del></span> <span
class="inserted"><ins><em>disable an
+ unscrupulous tracking anti-feature</a> that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a> reports what the user
watches,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
users when they follow ping links</a> in Apple Safari, Google Chrome,
- Opera, Microsoft Edge and also in the upcoming Microsoft Edge that is
- going to be based on Chromium.</p>
+ Opera, Microsoft Edge</em></ins></span> and <span
class="inserted"><ins><em>also in</em></ins></span> the <span
class="removed"><del><strong>switch</strong></del></span> <span
class="inserted"><ins><em>upcoming Microsoft Edge that is
+ going</em></ins></span> to <span class="removed"><del><strong>turn this
off has no effect. (The fact</strong></del></span> <span
class="inserted"><ins><em>be based on Chromium.</p>
</li>
<li id="M201901101">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Until 2015, any tweet that listed a geographical tag <a
+ <p>Until 2015, any tweet</em></ins></span> that <span
class="removed"><del><strong>the
+ transmission reports</strong></del></span> <span
class="inserted"><ins><em>listed</em></ins></span> a <span
class="removed"><del><strong>404 error really means
nothing;</strong></del></span> <span class="inserted"><ins><em>geographical tag
<a
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/">
- sent the precise GPS location to Twitter's server</a>. It still
+ sent</em></ins></span> the <span class="removed"><del><strong>server
+ could save that data anyway.)</p>
+
+ <p>Even worse, it</strong></del></span> <span
class="inserted"><ins><em>precise GPS location to Twitter's server</a>.
It still
contains these GPS locations.</p>
</li>
<li id="M201805170">
<!--#set var="DATE" value='<small
class="date-tag">2018-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Storyful program <a
-
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies
- on the reporters that use it</a>.</p>
+ <p>The Storyful program</em></ins></span> <a <span
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies</em></ins></span>
+ on the <span class="removed"><del><strong>user's local
network.</a></p>
+
+ <p>LG later said it had installed</strong></del></span> <span
class="inserted"><ins><em>reporters that use it</a>.</p>
</li>
<li id="M201701060">
<!--#set var="DATE" value='<small
class="date-tag">2017-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>When</em></ins></span> a page uses Disqus
- for comments, <span class="removed"><del><strong><a
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">the</strong></del></span>
<span class="inserted"><ins><em>the</em></ins></span> proprietary Disqus
software <span class="removed"><del><strong>loads</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">loads</em></ins></span>
- a Facebook software package into the browser of every anonymous visitor
- to the page, and makes the page's URL available to <span
class="removed"><del><strong>Facebook</a>.
- </p></li>
+ <p>When</em></ins></span> a <span class="removed"><del><strong>patch
to stop this, but any product
+ could spy this way.</p>
- <li><p>Online</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
+ <p>Meanwhile, LG TVs</strong></del></span> <span
class="inserted"><ins><em>page uses Disqus
+ for comments, the proprietary Disqus software</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">loads
+ a Facebook software package into the browser</em></ins></span> of <span
class="removed"><del><strong>spying anyway</a>.</p>
+ </li>
+ <li>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch,</strong></del></span> <span
class="inserted"><ins><em>every anonymous visitor
+ to the page,</em></ins></span> and <span class="removed"><del><strong>even
what they wanted</strong></del></span> <span class="inserted"><ins><em>makes
the page's URL available</em></ins></span> to <span
class="removed"><del><strong>record.</a></p></strong></del></span>
<span class="inserted"><ins><em>Facebook</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201612064">
+<!-- #SpywareInGames</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201612064">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Online</em></ins></span> sales, with tracking and surveillance of
customers, <a
-
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
- businesses to show different people different prices</a>. Most of
- the tracking is done by recording interactions with servers, but
- proprietary software contributes.</p>
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareInGames">Spyware in Games</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+
+ <li>
+ <p>The driver for a certain gaming keyboard</strong></del></span>
+ <span class="inserted"><ins><em><p>Online sales, with tracking and
surveillance of customers,</em></ins></span> <a <span
class="removed"><del><strong>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
+ businesses</em></ins></span> to <span
class="removed"><del><strong>China</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
- Baidu's Japanese-input and Chinese-input apps spy on
users.</a></p>
+ <li><p>nVidia's</strong></del></span> <span
class="inserted"><ins><em>show different people different prices</a>.
Most of
+ the tracking is done by recording interactions with servers,
but</em></ins></span>
+ proprietary <span class="removed"><del><strong>GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about them to
+ nVidia servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>software contributes.</p></em></ins></span>
</li>
- <li><p>Pages that contain “Like” buttons
- <a
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
- enable Facebook to track visitors</strong></del></span>
+ <span class="removed"><del><strong><li><p>Angry Birds
+ <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and</strong></del></span>
<span class="inserted"><ins><em><li id="M201405140">
<!--#set var="DATE" value='<small
class="date-tag">2014-05</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
- Microsoft SkyDrive allows the NSA</em></ins></span> to <span
class="removed"><del><strong>those pages</a>—even
- users that don't have Facebook accounts.</p></strong></del></span>
<span class="inserted"><ins><em>directly examine users'
+ Microsoft SkyDrive allows</em></ins></span> the NSA <span
class="removed"><del><strong>takes advantage</strong></del></span> to <span
class="removed"><del><strong>spy through it too</a>.
+ Here's information on
+ <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>directly examine users'
data</a>.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
+ <span class="removed"><del><strong><li><p>Many
+ <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on</strong></del></span>
<span class="inserted"><ins><em><li id="M201210240">
<!--#set var="DATE" value='<small
class="date-tag">2012-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many</em></ins></span> web sites rat their visitors to advertising
- networks that track users. Of the top 1000 web sites, <a
-
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
- (as of 5/17/2012) fed their visitors third-party cookies, allowing
- other sites to track them</a>.</p>
+ <p>Many web sites rat</em></ins></span> their <span
class="removed"><del><strong>users and report</strong></del></span> <span
class="inserted"><ins><em>visitors</em></ins></span> to <span
class="inserted"><ins><em>advertising
+ networks that track users. Of</em></ins></span> the
+ <span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
+
+ <p>A game console is a computer, and you can't trust a computer
with
+ a nonfree operating system.</p>
</li>
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
+ <li><p>Modern gratis game cr…apps</strong></del></span>
<span class="inserted"><ins><em>top 1000 web sites,</em></ins></span> <a
<span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
+ (as</em></ins></span> of <span class="removed"><del><strong>data
about</strong></del></span> <span class="inserted"><ins><em>5/17/2012)
fed</em></ins></span> their <span class="removed"><del><strong>users
and</strong></del></span> <span class="inserted"><ins><em>visitors third-party
cookies, allowing
+ other sites to track them</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201208210">
+ <li id="M201208210">
<!--#set var="DATE" value='<small
class="date-tag">2012-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many</em></ins></span> web sites report all their visitors
- to Google by using the Google Analytics service, which <a
+ <p>Many web sites report all</em></ins></span> their <span
class="removed"><del><strong>users'
+ friends and associates</a>.</p>
+
+ <p>Even nastier, they do it through ad networks that merge the data
+ collected</strong></del></span> <span class="inserted"><ins><em>visitors
+ to Google</em></ins></span> by <span class="removed"><del><strong>various
cr…apps</strong></del></span> <span class="inserted"><ins><em>using the
Google Analytics service, which <a
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
- tells Google the IP address and the page that was <span
class="removed"><del><strong>visited.</a></p></strong></del></span>
<span class="inserted"><ins><em>visited</a>.</p></em></ins></span>
+ tells Google the IP address</em></ins></span> and <span
class="inserted"><ins><em>the page that was visited</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201200000">
+ <li id="M201200000">
<!--#set var="DATE" value='<small
class="date-tag">[2012]</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many</em></ins></span> web sites try to collect users' address
books (the user's list
+ <p>Many web</em></ins></span> sites <span
class="removed"><del><strong>made by different
+ companies.</p>
+
+ <p>They use this data to manipulate people</strong></del></span>
<span class="inserted"><ins><em>try</em></ins></span> to <span
class="removed"><del><strong>buy things, and hunt
+ for “whales” who can be led</strong></del></span> <span
class="inserted"><ins><em>collect users' address books (the user's list
of other people's phone numbers or email addresses). This violates
the privacy of those other people.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
- Microsoft SkyDrive allows the NSA</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201110040">
+ <li id="M201110040">
<!--#set var="DATE" value='<small
class="date-tag">2011-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Pages that contain “Like” buttons <a
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
- enable Facebook</em></ins></span> to <span
class="removed"><del><strong>directly examine users'
data</a>.</p></strong></del></span> <span
class="inserted"><ins><em>track visitors to those pages</a>—even
users
- that don't have Facebook accounts.</p></em></ins></span>
+ enable Facebook</em></ins></span> to <span
class="removed"><del><strong>spend a lot of money. They
+ also use a back door</strong></del></span> <span
class="inserted"><ins><em>track visitors</em></ins></span> to <span
class="removed"><del><strong>manipulate the game play for specific
players.</p>
+
+ <p>While the article describes gratis games,
games</strong></del></span> <span class="inserted"><ins><em>those
pages</a>—even users</em></ins></span>
+ that <span class="removed"><del><strong>cost money
+ can use the same tactics.</p></strong></del></span> <span
class="inserted"><ins><em>don't have Facebook
accounts.</p></em></ins></span>
</li>
</ul>
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+<span class="removed"><del><strong><!-- #SpywareAtRecreation
--></strong></del></span>
-<span class="inserted"><ins><em><div class="big-subsection">
- <h4 id="SpywareInJavaScript">JavaScript</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInJavaScript">#SpywareInJavaScript</a>)</span>
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareAtRecreation">Spyware at
Recreation</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInJavaScript">JavaScript</h4></em></ins></span>
+ <span <span class="removed"><del><strong>class="anchor-reference-id">
+ (<a
href="#SpywareAtRecreation">#SpywareAtRecreation</a>)</span></strong></del></span>
<span class="inserted"><ins><em>class="anchor-reference-id">(<a
href="#SpywareInJavaScript">#SpywareInJavaScript</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear: left;"></div>
-<ul class="blurbs">
+<ul>
+ <li><p>Users are suing Bose for</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201811270">
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many web sites use JavaScript code <a
-
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"></em></ins></span>
- to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>top under each subsection</strong></del></span>
<span class="inserted"><ins><em>information that users have typed into a
- form but not sent</a>, in order to learn their identity. Some are
<a
+ <p>Many web sites use JavaScript code</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing a spyware app for its headphones</a>.
+ Specifically, the app would record the names of the audio
files</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
+ to snoop on information that</em></ins></span> users <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>have typed into a
+ form but not sent</a>, in order</em></ins></span> to <span
class="removed"><del><strong>along with the headphone's unique serial number.
+ </p></strong></del></span> <span class="inserted"><ins><em>learn
their identity. Some are <a
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege">
- getting sued</a> for this.</p>
+ getting sued</a> for this.</p></em></ins></span>
- <p>The chat facilities of some customer services use the same sort of
- malware to <a
+ <p>The <span class="removed"><del><strong>suit accuses that this was
done without the users' consent.
+ If</strong></del></span> <span class="inserted"><ins><em>chat facilities
of some customer services use</em></ins></span> the <span
class="removed"><del><strong>fine print</strong></del></span> <span
class="inserted"><ins><em>same sort</em></ins></span> of
+ <span class="inserted"><ins><em>malware to <a
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
- read what the user is typing before it is posted</a>.</p>
+ read what</em></ins></span> the <span class="removed"><del><strong>app
said that users gave consent for this,
+ would that make</strong></del></span> <span
class="inserted"><ins><em>user is typing before</em></ins></span> it <span
class="removed"><del><strong>acceptable? No way! It should be flat
out</strong></del></span> <span class="inserted"><ins><em>is
posted</a>.</p>
</li>
<li id="M201807190">
<!--#set var="DATE" value='<small
class="date-tag">2018-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>British Airways used <a
-
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
- JavaScript on its web site to give other companies personal data on
+ <p>British Airways used</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">
+ illegal</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
+ JavaScript on its web site</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>give other companies personal data on
its customers</a>.</p>
</li>
<li id="M201712300">
<!--#set var="DATE" value='<small
class="date-tag">2017-12</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><div class="big-subsection">
- <h4 id="SpywareInFlash">Spyware in JavaScript and Flash</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
-</div>
-
-<ul>
- <li></strong></del></span>
+ --><!--#echo encoding="none" var="DATE" -->
<p>Some JavaScript malware <a
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
swipes usernames from browser-based password managers</a>.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711150">
+ <li id="M201711150">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
+ --><!--#echo encoding="none" var="DATE" -->
<p>Some websites send
- JavaScript code to collect all the user's input, <a
+ JavaScript code to collect all</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>user's input, <a
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
- can then be used to reproduce the whole session</a>.</p>
+ can then be used</em></ins></span> to <span
class="removed"><del><strong>snoop at all</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>reproduce
the whole session</a>.</p>
<p>If you use LibreJS, it will block that malicious JavaScript
code.</p>
</li>
-
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -4144,92 +4136,169 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Flash and JavaScript are used for <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices</a> to identify users.</p>
+ “fingerprinting” devices</a> to identify
users.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201003010">
+<!-- #SpywareOnTheWeb</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201003010">
<!--#set var="DATE" value='<small
class="date-tag">2010-03</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Flash Player's <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+ <span class="inserted"><ins><em><p>Flash Player's <a
href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/">
- cookie feature helps</em></ins></span> web sites <span
class="removed"><del><strong>use JavaScript code</strong></del></span> <span
class="inserted"><ins><em>track visitors</a>.</p>
+ cookie feature helps web sites track visitors</a>.</p>
</li>
-</ul>
+</ul></em></ins></span>
-<div class="big-subsection">
- <h4 id="SpywareInChrome">Chrome</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareOnTheWeb">Spyware on the
Web</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInChrome">Chrome</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareOnTheWeb">#SpywareOnTheWeb</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInChrome">#SpywareInChrome</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear: left;"></div>
-<ul class="blurbs">
+<p>In addition, many web sites spy on their visitors. Web sites are not
+ programs, so it
+ <a href="/philosophy/network-services-arent-free-or-nonfree.html">
+ makes no sense to call them “free” or
“proprietary”</a>,
+ but the surveillance</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201906220">
<!--#set var="DATE" value='<small
class="date-tag">2019-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google Chrome is an</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"></strong></del></span>
+ <p>Google Chrome</em></ins></span> is an <span
class="removed"><del><strong>abuse all the same.</p>
+
+<ul>
+ <li><p>When a page uses Disqus for
+ comments,</strong></del></span> <a <span
class="removed"><del><strong>href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">the
+ proprietary Disqus software loads a Facebook software package into
+ the browser</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/">
- instrument of surveillance</a>. It lets thousands of trackers invade
- users' computers and report the sites they visit</em></ins></span> to
<span class="removed"><del><strong>snoop on information
that</strong></del></span> <span class="inserted"><ins><em>advertising and
- data companies, first of all to Google. Moreover, if</em></ins></span>
users have <span class="removed"><del><strong>typed into</strong></del></span>
a <span class="removed"><del><strong>form but not
- sent</a>,</strong></del></span>
- <span class="inserted"><ins><em>Gmail account, Chrome automatically logs
them</em></ins></span> in <span
class="removed"><del><strong>order</strong></del></span> to <span
class="removed"><del><strong>learn</strong></del></span> <span
class="inserted"><ins><em>the browser for
- more convenient profiling. On Android, Chrome also
reports</em></ins></span> their <span class="removed"><del><strong>identity.
Some</strong></del></span>
- <span class="inserted"><ins><em>location to Google.</p>
-
- <p>The best way to escape surveillance is to switch to <a
- href="/software/icecat/">IceCat</a>, a modified version of Firefox
- with several changes to protect users' privacy.</p>
+ instrument</em></ins></span> of <span class="removed"><del><strong>every
anonymous visitor to the page,</strong></del></span> <span
class="inserted"><ins><em>surveillance</a>. It lets thousands of trackers
invade
+ users' computers</em></ins></span> and <span
class="removed"><del><strong>makes</strong></del></span> <span
class="inserted"><ins><em>report</em></ins></span> the
+ <span class="removed"><del><strong>page's URL
available</strong></del></span> <span class="inserted"><ins><em>sites they
visit</em></ins></span> to <span
class="removed"><del><strong>Facebook</a>.
+ </p></li>
+
+ <li><p>Online sales, with tracking</strong></del></span> <span
class="inserted"><ins><em>advertising</em></ins></span> and <span
class="removed"><del><strong>surveillance of customers, <a
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
+ businesses to show different people different prices</a>.
Most</strong></del></span>
+ <span class="inserted"><ins><em>data companies, first</em></ins></span> of
<span class="removed"><del><strong>the tracking is done by recording
interactions with
+ servers, but proprietary software contributes.</p>
+ </li>
+
+ <li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
+ Baidu's Japanese-input and Chinese-input apps spy on
users.</a></p>
</li>
- <li id="M201704131">
+ <li><p>Pages that contain “Like” buttons
+ <a
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
+ enable Facebook to track visitors</strong></del></span> <span
class="inserted"><ins><em>all</em></ins></span> to <span
class="removed"><del><strong>those
pages</a>—even</strong></del></span> <span
class="inserted"><ins><em>Google. Moreover, if</em></ins></span> users <span
class="removed"><del><strong>that don't</strong></del></span> have <span
class="removed"><del><strong>Facebook accounts.</p>
+ </li>
+
+ <li><p>Many web sites rat their visitors</strong></del></span>
<span class="inserted"><ins><em>a
+ Gmail account, Chrome automatically logs them in</em></ins></span> to
<span class="removed"><del><strong>advertising networks that track
+ users. Of</strong></del></span> the <span
class="removed"><del><strong>top 1000 web sites,</strong></del></span> <span
class="inserted"><ins><em>browser for
+ more convenient profiling. On Android, Chrome also reports their
+ location to Google.</p>
+
+ <p>The best way to escape surveillance is to switch
to</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
+ (as</strong></del></span>
+ <span
class="inserted"><ins><em>href="/software/icecat/">IceCat</a>, a
modified version</em></ins></span> of <span
class="removed"><del><strong>5/17/2012) fed their visitors third-party cookies,
allowing other
+ sites</strong></del></span> <span class="inserted"><ins><em>Firefox
+ with several changes</em></ins></span> to <span
class="removed"><del><strong>track
them</a>.</p></strong></del></span> <span
class="inserted"><ins><em>protect users' privacy.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Many web sites report
all their visitors to Google by using</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704131">
<!--#set var="DATE" value='<small
class="date-tag">2017-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Low-priced Chromebooks for schools</em></ins></span> are <a
- <span
class="removed"><del><strong>href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
- getting sued</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
+ <p>Low-priced Chromebooks for schools are <a
+ href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
collecting far more data on students than is necessary, and store
it indefinitely</a>. Parents and students complain about the lack
- of transparency on the part of both the educational services and the
- schools, the difficulty of opting out of these services, and the lack
- of proper privacy policies, among other things.</p>
+ of transparency on</em></ins></span> the <span
class="removed"><del><strong>Google Analytics service, which
+ <a
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
+ tells Google</strong></del></span> <span class="inserted"><ins><em>part
of both</em></ins></span> the <span class="removed"><del><strong>IP
address</strong></del></span> <span class="inserted"><ins><em>educational
services</em></ins></span> and the <span class="removed"><del><strong>page that
was visited.</a></p>
+ </li>
+
+ <li><p>Many web sites try to collect users' address books (the
+ user's list</strong></del></span>
+ <span class="inserted"><ins><em>schools, the difficulty</em></ins></span>
of <span class="removed"><del><strong>other people's phone numbers or email
addresses).
+ This violates</strong></del></span> <span
class="inserted"><ins><em>opting out of these services, and</em></ins></span>
the <span class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>lack</em></ins></span>
+ of <span class="removed"><del><strong>those</strong></del></span> <span
class="inserted"><ins><em>proper privacy policies, among</em></ins></span>
other <span class="removed"><del><strong>people.</p>
+ </li>
+
+ <li><p><a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
+ Microsoft SkyDrive allows</strong></del></span> <span
class="inserted"><ins><em>things.</p>
<p>But complaining is not sufficient. Parents, students and teachers
- should realize that the software Google uses to spy on students is
+ should realize that</em></ins></span> the <span
class="removed"><del><strong>NSA to directly examine users'
data</a>.</p>
+ </li>
+</ul>
+
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>software Google uses</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+<div class="big-subsection">
+ <h4 id="SpywareInFlash">Spyware in JavaScript and Flash</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>Some JavaScript malware <a
+
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
+ swipes usernames from browser-based password managers</a>.</p>
+ </li>
+
+ <li>
+ <p>Some websites send JavaScript code</strong></del></span> <span
class="inserted"><ins><em>students is
nonfree, so they can't verify what it really does. The only remedy is
- to persuade school officials to <a
href="/education/edu-schools.html">
- exclusively use free software</a></em></ins></span> for <span
class="removed"><del><strong>this.</p></strong></del></span> <span
class="inserted"><ins><em>both education and school
- administration. If the school is run locally, parents and teachers
- can mandate their representatives at the School Board to refuse the
- budget unless the school initiates a switch to free software. If
- education is run nation-wide, they need to persuade legislators
- (e.g., through free software organizations, political parties,
- etc.) to migrate the public schools to free software.</p>
+ to persuade school officials</em></ins></span> to <span
class="removed"><del><strong>collect all the user's
+ input,</strong></del></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which</strong></del></span>
<span class="inserted"><ins><em>href="/education/edu-schools.html">
+ exclusively use free software</a> for both education and school
+ administration. If the school is run locally, parents and
teachers</em></ins></span>
+ can <span class="removed"><del><strong>then
+ be used to reproduce</strong></del></span> <span
class="inserted"><ins><em>mandate their representatives at</em></ins></span>
the <span class="removed"><del><strong>whole session</a>.</p>
+
+ <p>If you use LibreJS, it will block that malicious JavaScript
+ code.</p>
</li>
- <li id="M201507280">
- <!--#set var="DATE" value='<small
class="date-tag">2015-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Google Chrome makes it easy for an extension to do <a
-
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
- snooping on the user's browsing</a>, and many of them do
so.</p></em></ins></span>
+ <li><p>Many web sites use JavaScript code <a
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"></strong></del></span>
<span class="inserted"><ins><em>School Board</em></ins></span> to <span
class="removed"><del><strong>snoop on information that users have typed
into</strong></del></span> <span class="inserted"><ins><em>refuse the
+ budget unless the school initiates</em></ins></span> a <span
class="removed"><del><strong>form but not
+ sent</a>, in order</strong></del></span> <span
class="inserted"><ins><em>switch</em></ins></span> to <span
class="removed"><del><strong>learn their identity. Some are <a
+
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+ getting sued</a> for this.</p></strong></del></span> <span
class="inserted"><ins><em>free software. If
+ education is run nation-wide, they need to persuade legislators
+ (e.g., through free software organizations, political parties,
+ etc.) to migrate the public schools to free
software.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Flash
Player's</strong></del></span>
- <span class="inserted"><ins><em><li id="M201506180">
- <!--#set var="DATE" value='<small
class="date-tag">2015-06</small>'
+ <span class="inserted"><ins><em><li id="M201507280">
+ <!--#set var="DATE" value='<small
class="date-tag">2015-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google Chrome includes a module that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
+ <p>Google Chrome makes it easy for an extension to
do</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
cookie feature helps web sites track visitors</a>.</p>
</li>
<li><p>Flash</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
+ snooping on the user's browsing</a>,</em></ins></span> and <span
class="removed"><del><strong>JavaScript are also used for</strong></del></span>
<span class="inserted"><ins><em>many of them do so.</p>
+ </li>
+
+ <li id="M201506180">
+ <!--#set var="DATE" value='<small
class="date-tag">2015-06</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Google Chrome includes a module that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ “fingerprinting” devices</a></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
- activates microphones</em></ins></span> and <span
class="removed"><del><strong>JavaScript are also used for
- <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices</a></strong></del></span>
<span class="inserted"><ins><em>transmits audio</em></ins></span> to <span
class="removed"><del><strong>identify users.</p></strong></del></span>
<span class="inserted"><ins><em>its
servers</a>.</p></em></ins></span>
+ activates microphones and transmits audio</em></ins></span> to <span
class="removed"><del><strong>identify users.</p></strong></del></span>
<span class="inserted"><ins><em>its
servers</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -4288,12 +4357,23 @@
<p>While you're using a DJI drone</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M202104060">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-04</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/">WeddingWire
+ app saves people's wedding photos forever and hands over
data</em></ins></span>
+ to <span class="removed"><del><strong>snoop on other people,
DJI</strong></del></span> <span class="inserted"><ins><em>others</a>, and
gives people no control over their personal
+ information/data. The app also sometimes shows old photos and memories
+ to the user without user having control over this.</p>
+ </li>
+
<li id="M202102160">
<!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Google <a
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16">handed
- over personal data of Indian protesters and activists</em></ins></span> to
<span class="removed"><del><strong>snoop on other people,
DJI</strong></del></span> <span class="inserted"><ins><em>Indian
+ over personal data of Indian protesters and activists to Indian
police</a> which led to their arrest. The cops requested the IP
address and the location where a document was created and with that
information, they identified protesters and activists.</p>
@@ -4486,7 +4566,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/15 19:01:22 $
+$Date: 2021/04/26 12:04:34 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.390
retrieving revision 1.391
diff -u -b -r1.390 -r1.391
--- proprietary/po/proprietary-surveillance.de.po 15 Apr 2021 19:01:22
-0000 1.390
+++ proprietary/po/proprietary-surveillance.de.po 26 Apr 2021 12:04:35
-0000 1.391
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-04-15 18:55+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -5819,6 +5819,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
Index: proprietary/po/proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.184
retrieving revision 1.185
diff -u -b -r1.184 -r1.185
--- proprietary/po/proprietary-surveillance.es.po 17 Apr 2021 10:01:12
-0000 1.184
+++ proprietary/po/proprietary-surveillance.es.po 26 Apr 2021 12:04:35
-0000 1.185
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-15 18:55+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2021-04-17 11:26+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -5298,6 +5299,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
Index: proprietary/po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.627
retrieving revision 1.628
diff -u -b -r1.627 -r1.628
--- proprietary/po/proprietary-surveillance.fr.po 15 Apr 2021 20:01:15
-0000 1.627
+++ proprietary/po/proprietary-surveillance.fr.po 26 Apr 2021 12:04:35
-0000 1.628
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-15 18:55+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2021-04-15 22:00+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -5314,6 +5315,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
Index: proprietary/po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.246
retrieving revision 1.247
diff -u -b -r1.246 -r1.247
--- proprietary/po/proprietary-surveillance.it-diff.html 15 Apr 2021
19:01:22 -0000 1.246
+++ proprietary/po/proprietary-surveillance.it-diff.html 26 Apr 2021
12:04:36 -0000 1.247
@@ -632,10 +632,22 @@
<p><a <span
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware and spyware via
- BIOS</a> on Windows installs. Note that the specific
- sabotage method Lenovo used did not affect GNU/Linux; also, a
- “clean” Windows install is not really clean since <a
- href="/proprietary/malware-microsoft.html">Microsoft puts in its
+ BIOS</a> on Windows installs. Note</em></ins></span> that <span
class="removed"><del><strong>90% of the top-ranked gratis
+ proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span> the <span class="removed"><del><strong>paid
proprietary apps, it was only 60%.</p>
+
+ <p>The article confusingly describes gratis apps as “free”,
+ but most of them are</strong></del></span> <span
class="inserted"><ins><em>specific
+ sabotage method Lenovo used did</em></ins></span> not <span
class="removed"><del><strong>in fact
+ <a href="/philosophy/free-sw.html">free software</a>.
+ It also uses the ugly word “monetize”. A good replacement
+ for that word</strong></del></span> <span class="inserted"><ins><em>affect
GNU/Linux; also, a
+ “clean” Windows install</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always that will fit
+ perfectly.</p>
+</li>
+
+<li>
+ <p>Apps for BART</strong></del></span> <span
class="inserted"><ins><em>not really clean since</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft
puts in its
own malware</a>.</p>
</li>
</ul>
@@ -643,7 +655,9 @@
<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+ <h3 id="SpywareOnMobiles">Spyware</em></ins></span> on <span
class="removed"><del><strong>users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With</strong></del></span> <span
class="inserted"><ins><em>Mobiles</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -657,96 +671,205 @@
<li id="M202102200">
<!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The proprietary program Clubhouse
- is malware and a privacy disaster. Clubhouse <a
-
href="https://www.theguardian.com/commentisfree/2021/feb/20/why-hot-new-social-app-clubhouse-spells-nothing-but-trouble">collects
- people's personal data such as recordings of people's
+ <p>The</em></ins></span> proprietary <span
class="removed"><del><strong>apps, one can only hope that they don't.</p>
+</li>
+
+<li>
+ <p>A study found 234 Android apps that track users
by</strong></del></span> <span class="inserted"><ins><em>program Clubhouse
+ is malware and a privacy disaster. Clubhouse</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed in stores or played by TV
programs</a>.
+ </p>
+
+</li>
+
+<li>
+ <p>Pairs of Android apps can collude to transmit
users'</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/commentisfree/2021/feb/20/why-hot-new-social-app-clubhouse-spells-nothing-but-trouble">collects
+ people's</em></ins></span> personal data <span
class="removed"><del><strong>to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens</strong></del></span> <span class="inserted"><ins><em>such as
recordings</em></ins></span> of <span
class="removed"><del><strong>thousands</strong></del></span> <span
class="inserted"><ins><em>people's
conversations</a>, and, as a secondary problem, does not encrypt
them,
- which shows a bad security part of the issue.</p>
+ which shows a bad security part</em></ins></span> of <span
class="removed"><del><strong>pairs that collude</a>.</p>
+</li>
+
+<li>
+<p>Google Play intentionally sends app developers <a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>issue.</p>
<p>A user's unique Clubhouse ID number and chatroom ID are
transmitted
- in plaintext, and Agora (the company behind the app) would likely
- have access to users' raw audio, potentially providing access to
- the Chinese government.</p>
+ in plaintext, and Agora (the company behind</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
- <p>Even with good security of data transmission, collecting personal
- data of people is wrong and a violation of people's privacy
rights.</p>
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>app) would likely
+ have access to users' raw audio, potentially providing access
to</em></ins></span>
+ the <span
class="removed"><del><strong>“consent”</strong></del></span> <span
class="inserted"><ins><em>Chinese government.</p>
+
+ <p>Even with good security</em></ins></span> of <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>data transmission, collecting personal
+ data of people</em></ins></span> is <span class="removed"><del><strong>not
enough
+to legitimize actions like this. At this point, most users have
+stopped reading the “Terms and Conditions” that spell out
+what they are “consenting” to. Google should
clearly</strong></del></span> <span
class="inserted"><ins><em>wrong</em></ins></span> and <span
class="removed"><del><strong>honestly identify the information it collects on
users, instead</strong></del></span> <span class="inserted"><ins><em>a
violation</em></ins></span> of <span class="removed"><del><strong>hiding it in
an obscurely worded EULA.</p>
+
+<p>However, to truly protect</strong></del></span> people's <span
class="removed"><del><strong>privacy, we must prevent Google
+and other companies from getting this personal information in the first
+place!</p></strong></del></span> <span class="inserted"><ins><em>privacy
rights.</p></em></ins></span>
</li>
- <li id="M202101080">
+ <span class="removed"><del><strong><li>
+ <p>Google Play (a component</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202101080">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a
-
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/">forcing
- its users to hand over sensitive personal data</a> to its parent
- company. This increases Facebook's power over users, and further
+ <p>As</em></ins></span> of <span
class="removed"><del><strong>Android)</strong></del></span> <span
class="inserted"><ins><em>2021, WhatsApp (one of Facebook's subsidiaries)
is</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks the users' movements without their permission</a>.</p>
+
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/">forcing
+ its users</em></ins></span> to <span
class="removed"><del><strong>completely stop the
tracking.</strong></del></span> <span class="inserted"><ins><em>hand over
sensitive personal data</a> to its parent
+ company.</em></ins></span> This <span class="removed"><del><strong>is
+ yet another example</strong></del></span> <span
class="inserted"><ins><em>increases Facebook's power over users, and further
jeopardizes people's privacy and security.</p>
- <p>Instead of WhatsApp you can use <a
- href="https://directory.fsf.org/wiki/Jami">GNU Jami</a>, which is
- free software and will not collect your data.</p>
+ <p>Instead</em></ins></span> of <span
class="removed"><del><strong>nonfree software pretending to obey the user,
+ when it's actually doing something else. Such a thing would be almost
+ unthinkable with</strong></del></span> <span
class="inserted"><ins><em>WhatsApp you can use <a
+ href="https://directory.fsf.org/wiki/Jami">GNU Jami</a>, which
is</em></ins></span>
+ free <span
class="removed"><del><strong>software.</p></strong></del></span> <span
class="inserted"><ins><em>software and will not collect your
data.</p></em></ins></span>
</li>
- <li id="M202006260">
+ <span class="removed"><del><strong><li><p>More than 73% of the
most popular Android</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202006260">
<!--#set var="DATE" value='<small
class="date-tag">2020-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Most apps are malware, but
- Trump's campaign app, like Modi's campaign app, is <a
-
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
- especially nasty malware, helping companies snoop on users as well
- as snooping on them itself</a>.</p>
-
- <p>The article says that Biden's app has a less manipulative overall
- approach, but that does not tell us whether it has functionalities we
- consider malicious, such as sending data the user has not explicitly
- asked to send.</p>
- </li>
+ <p>Most</em></ins></span> apps <span class="inserted"><ins><em>are
malware, but
+ Trump's campaign app, like Modi's campaign app, is</em></ins></span> <a
<span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral and location information</a> of their</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
+ especially nasty malware, helping companies snoop on</em></ins></span>
users <span class="removed"><del><strong>with third parties.</p>
+ </li>
+
+ <li><p>“Cryptic communication,” unrelated to the
app's functionality,
+ was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in the 500 most popular gratis Android
apps</a>.</p></strong></del></span> <span
class="inserted"><ins><em>as well
+ as snooping on them itself</a>.</p></em></ins></span>
+
+ <p>The article <span
class="removed"><del><strong>should</strong></del></span> <span
class="inserted"><ins><em>says that Biden's app has a less manipulative overall
+ approach, but that does</em></ins></span> not <span
class="removed"><del><strong>have described these apps</strong></del></span>
<span class="inserted"><ins><em>tell us whether it has functionalities we
+ consider malicious, such</em></ins></span> as
+ <span class="removed"><del><strong>“free”—they
are</strong></del></span> <span class="inserted"><ins><em>sending data the user
has</em></ins></span> not <span class="removed"><del><strong>free software.
The clear way to say
+ “zero price” is “gratis.”</p>
- <li id="M201809121">
+ <p>The article takes for granted that the usual analytics tools are
+ legitimate, but is that valid? Software developers have no
right</strong></del></span> <span class="inserted"><ins><em>explicitly
+ asked</em></ins></span> to
+ <span class="removed"><del><strong>analyze what users are doing or how.
“Analytics” tools that snoop are
+ just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>send.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li><p>Gratis Android apps
(but not <a href="/philosophy/free-sw.html">free software</a>)
+ connect to 100
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201809121">
<!--#set var="DATE" value='<small
class="date-tag">2018-09</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Tiny Lab Productions, along with online ad businesses run
- by Google, Twitter and three other companies are facing a lawsuit <a
-
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html">for
+ by Google, Twitter</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
+ on the average.</p>
+ </li>
+ <li><p>Spyware is present in some Android devices when
they</strong></del></span> <span class="inserted"><ins><em>three other
companies</em></ins></span> are <span class="removed"><del><strong>sold.
+ Some Motorola phones modify Android to</strong></del></span> <span
class="inserted"><ins><em>facing a lawsuit</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html">for
violating people's privacy by collecting their data from mobile games
- and handing over these data to other
companies/advertisers</a>.</p>
+ and handing over these</em></ins></span> data to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
<span class="inserted"><ins><em>other
companies/advertisers</a>.</p></em></ins></span>
</li>
- <li id="M201601110">
+ <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201601110">
<!--#set var="DATE" value='<small
class="date-tag">2016-01</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The natural extension of monitoring
- people through “their” phones is <a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software to make sure they can't “fool”
- the monitoring</a>.</p>
+ people through “their” phones is</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p>
+ </li>
+
+ <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary software</em></ins></span> to <span
class="removed"><del><strong>any file on</strong></del></span> <span
class="inserted"><ins><em>make sure they can't
“fool”</em></ins></span>
+ the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
- <li id="M201510050">
+
+<!-- #SpywareOnMobiles</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201510050">
<!--#set var="DATE" value='<small
class="date-tag">2015-10</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>According to Edward Snowden, <a
- href="http://www.bbc.com/news/uk-34444233">agencies can take over
- smartphones</a> by sending hidden text messages which enable
- them to turn the phones on and off, listen to the microphone,
- retrieve geo-location data from the GPS, take photographs, read
- text messages, read call, location and web browsing history, and
- read the contact list. This malware is designed to disguise itself
- from investigation.</p>
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>According</em></ins></span> to
<span class="removed"><del><strong>place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareIniThings">Spyware in iThings</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+</div>
+
+<ul>
+ <li><p>Apple proposes</strong></del></span> <span
class="inserted"><ins><em>Edward Snowden,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ —</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233">agencies
can take over
+ smartphones</a> by sending hidden text messages</em></ins></span>
which <span class="removed"><del><strong>would mean no way to use it without
having your fingerprints
+ taken. Users would have no way</strong></del></span> <span
class="inserted"><ins><em>enable
+ them</em></ins></span> to <span class="removed"><del><strong>tell
whether</strong></del></span> <span
class="inserted"><ins><em>turn</em></ins></span> the <span
class="removed"><del><strong>phone is snooping</strong></del></span> <span
class="inserted"><ins><em>phones</em></ins></span> on
+ <span class="removed"><del><strong>them.</p></li>
+
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots of personal data</strong></del></span> <span
class="inserted"><ins><em>and off, listen</em></ins></span> to <span
class="removed"><del><strong>Apple's servers</a>. Big Brother can
+ get them</strong></del></span> <span class="inserted"><ins><em>the
microphone,
+ retrieve geo-location data</em></ins></span> from <span
class="removed"><del><strong>there.</p>
</li>
- <li id="M201311120">
+ <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that the user types into
it</a>;</strong></del></span> the <span
class="removed"><del><strong>server records these numbers for at least 30
+ days.</p>
+ </li>
+
+ <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
+ without giving a valid email address</strong></del></span> <span
class="inserted"><ins><em>GPS, take photographs, read
+ text messages, read call, location</em></ins></span> and <span
class="removed"><del><strong>receiving</strong></del></span> <span
class="inserted"><ins><em>web browsing history, and
+ read</em></ins></span> the <span class="removed"><del><strong>code Apple
+ sends</strong></del></span> <span class="inserted"><ins><em>contact
list. This malware is designed</em></ins></span> to <span
class="removed"><del><strong>it.</p></strong></del></span> <span
class="inserted"><ins><em>disguise itself
+ from investigation.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Around 47%
of</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201311120">
<!--#set var="DATE" value='<small
class="date-tag">2013-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones,
Android, and BlackBerry</a>. While there is not much
- detail here, it seems that this does not operate via
- the universal back door that we know nearly all portable
- phones have. It may involve exploiting various bugs. There are <a
-
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots of bugs in the phones' radio software</a>.</p>
+ detail here, it seems that this does not operate via</em></ins></span>
+ the <span class="removed"><del><strong>most popular iOS
apps</strong></del></span> <span class="inserted"><ins><em>universal back door
that we know nearly all portable
+ phones have. It may involve exploiting various bugs. There
are</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ lots</em></ins></span> of <span class="inserted"><ins><em>bugs in the
phones' radio software</a>.</p>
</li>
<li id="M201307000">
@@ -754,9 +877,21 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Portable phones with GPS <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send their GPS location on remote command, and users cannot stop
- them</a>. (The US says it will eventually require all new portable
phones
- to have GPS.)</p>
+ will send</em></ins></span> their <span class="inserted"><ins><em>GPS
location on remote command, and</em></ins></span> users <span
class="removed"><del><strong>with third parties.</p>
+ </li>
+
+ <li><p>iThings automatically upload to Apple's
servers</strong></del></span> <span class="inserted"><ins><em>cannot stop
+ them</a>. (The US says it will eventually require</em></ins></span>
all <span class="removed"><del><strong>the photos and
+ videos they make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you take,
+ and keeps them up</strong></del></span> <span
class="inserted"><ins><em>new portable phones</em></ins></span>
+ to <span class="removed"><del><strong>date on all your devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
+
+ <p>(From</strong></del></span> <span class="inserted"><ins><em>have
GPS.)</p>
</li>
</ul>
@@ -770,9 +905,15 @@
<li id="M202009183">
<!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Facebook <a
-
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops
- on Instagram</a> users by surreptitously turning on the device's
+ <p>Facebook</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
+ information</a> as accessed</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops</em></ins></span>
+ on <span class="removed"><del><strong>24 Sep 2015.) The iCloud feature is
+ <a
href="https://support.apple.com/en-us/HT202033">activated</strong></del></span>
<span class="inserted"><ins><em>Instagram</a> users</em></ins></span> by
<span class="inserted"><ins><em>surreptitously turning on</em></ins></span> the
+ <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
+ “please don't ask where.”</p>
+
+ <p>There is</strong></del></span> <span
class="inserted"><ins><em>device's
camera.</p>
</li>
@@ -780,18 +921,25 @@
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Apple whistleblower Thomas Le Bonniec reports that Apple
- made a practice of surreptitiously activating the Siri software to <a
-
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf">
+ made</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>practice of surreptitiously activating the Siri
software</em></ins></span> to <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default so it still
counts as a
+ surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf">
record users' conversations when they had not activated Siri</a>.
This was not just occasional, it was systematic practice.</p>
<p>His job was to listen to these recordings, in a group that made
- transcripts of them. He does not believes that Apple has ceased this
- practice.</p>
+ transcripts</em></ins></span> of <span class="inserted"><ins><em>them. He
does not believes that Apple has ceased</em></ins></span> this
+ <span class="inserted"><ins><em>practice.</p>
- <p>The only reliable way to prevent this is, for the program that
- controls access to the microphone to decide when the user has
- “activated” any service, to be free software, and the
+ <p>The only reliable way</em></ins></span> to
+ <span class="removed"><del><strong><a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They
needed</strong></del></span> <span class="inserted"><ins><em>prevent this is,
for the program that
+ controls access</em></ins></span> to <span
class="removed"><del><strong>break Apple's
+ security</strong></del></span> <span class="inserted"><ins><em>the
microphone</em></ins></span> to <span class="removed"><del><strong>get at them,
but NSA can access</strong></del></span> <span class="inserted"><ins><em>decide
when the user has
+ “activated”</em></ins></span> any <span
class="removed"><del><strong>of them through</strong></del></span> <span
class="inserted"><ins><em>service, to be free software, and the
operating system under it free as well. This way, users could make
sure Apple can't listen to them.</p>
</li>
@@ -799,64 +947,108 @@
<li id="M201910131">
<!--#set var="DATE" value='<small
class="date-tag">2019-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Safari occasionally <a
-
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
- sends browsing data from Apple devices in China to the Tencent Safe
+ <p>Safari occasionally</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p>Spyware</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing data from Apple devices</em></ins></span> in <span
class="removed"><del><strong>iThings:</strong></del></span> <span
class="inserted"><ins><em>China to</em></ins></span> the <span
class="removed"><del><strong><a class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly
where</strong></del></span> <span class="inserted"><ins><em>Tencent Safe
Browsing service</a>, to check URLs that possibly correspond to
“fraudulent” websites. Since Tencent collaborates
- with the Chinese government, its Safe Browsing black list most certainly
+ with</em></ins></span> the <span class="removed"><del><strong>iThing
is,</strong></del></span> <span class="inserted"><ins><em>Chinese government,
its Safe Browsing black list most certainly
contains the websites of political opponents. By linking the requests
originating from single IP addresses, the government can identify
- dissenters in China and Hong Kong, thus endangering their lives.</p>
+ dissenters in China</em></ins></span> and <span
class="removed"><del><strong>get other info
too.</p></strong></del></span> <span class="inserted"><ins><em>Hong Kong,
thus endangering their lives.</p></em></ins></span>
</li>
- <li id="M201905280">
+ <span class="removed"><del><strong><li><p>There is also a
feature for web sites</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905280">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>In spite of Apple's supposed commitment to
- privacy, iPhone apps contain trackers that are busy at night <a
-
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
+ <p>In spite of Apple's supposed commitment</em></ins></span> to
<span class="removed"><del><strong>track users, which is</strong></del></span>
+ <span class="inserted"><ins><em>privacy, iPhone apps contain trackers that
are busy at night</em></ins></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html">
sending users' personal information to third parties</a>.</p>
- <p>The article mentions specific examples: Microsoft OneDrive,
+ <p>The</em></ins></span> article <span
class="removed"><del><strong>talks about iOS 6, but</strong></del></span> <span
class="inserted"><ins><em>mentions specific examples: Microsoft OneDrive,
Intuit's Mint, Nike, Spotify, The Washington Post, The Weather
Channel (owned by IBM), the crime-alert service Citizen, Yelp
- and DoorDash. But it is likely that most nonfree apps contain
+ and DoorDash. But</em></ins></span> it is <span
class="removed"><del><strong>still true in iOS 7.)</p>
+ </li>
+
+ <li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default,
though</strong></del></span> <span
class="inserted"><ins><em>likely</em></ins></span> that <span
class="removed"><del><strong>can</strong></del></span> <span
class="inserted"><ins><em>most nonfree apps contain
trackers. Some of these send personally identifying data such as phone
fingerprint, exact location, email address, phone number or even
delivery address (in the case of DoorDash). Once this information
- is collected by the company, there is no telling what it will be
- used for.</p>
+ is collected by the company, there is no telling what it
will</em></ins></span> be
+ <span class="removed"><del><strong>turned
off.</p></strong></del></span>
+ <span class="inserted"><ins><em>used for.</p></em></ins></span>
</li>
- <li id="M201711250">
+ <span class="removed"><del><strong><li><p>Apple
can,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711250">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The DMCA and the EU Copyright Directive make it <a
- href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr…apps spy on users</a>, because
- this would require circumventing the iOS DRM.</p>
+ <p>The DMCA</em></ins></span> and <span
class="removed"><del><strong>regularly does,</strong></del></span> <span
class="inserted"><ins><em>the EU Copyright Directive make it</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for the
state</a>.</p>
+ </li>
+
+ <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps the NSA snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal to study how iOS cr…apps spy</em></ins></span> on <span
class="removed"><del><strong>all</strong></del></span> <span
class="inserted"><ins><em>users</a>, because
+ this would require circumventing</em></ins></span> the <span
class="removed"><del><strong>data in an iThing,
+ or it is totally incompetent.</a></p>
+ </li>
+
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of</strong></del></span> iOS <span
class="removed"><del><strong>seem to exist for no
+ possible purpose other than surveillance</a>. Here
is</strong></del></span> <span class="inserted"><ins><em>DRM.</p>
</li>
<li id="M201709210">
<!--#set var="DATE" value='<small
class="date-tag">2017-09</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>In the latest iThings system,
- “turning off” WiFi and Bluetooth the obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ “turning off” WiFi and Bluetooth</em></ins></span> the <span
class="inserted"><ins><em>obvious way</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+</div>
+
+<ul>
+ <li><p>According</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
them off—only until 5am. That's Apple for you—“We
- know you want to be spied on”.</p>
+ know you want</em></ins></span> to <span
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>be spied on”.</p>
</li>
<li id="M201702150">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apple proposes <a
-
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
- fingerprint-scanning touch screen</a>—which would mean no way
- to use it without having your fingerprints taken. Users would have
- no way to tell whether the phone is snooping on them.</p>
+ <p>Apple proposes</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
+ by sending hidden text messages which enable them</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
+ fingerprint-scanning touch screen</a>—which would mean no
way</em></ins></span>
+ to <span class="removed"><del><strong>turn the phones
+ on and off, listen</strong></del></span> <span
class="inserted"><ins><em>use it without having your fingerprints taken. Users
would have
+ no way</em></ins></span> to <span class="inserted"><ins><em>tell
whether</em></ins></span> the <span class="removed"><del><strong>microphone,
retrieve geo-location data from the
+ GPS, take photographs, read text messages, read call, location and web
+ browsing history, and read the contact list. This
malware</strong></del></span> <span
class="inserted"><ins><em>phone</em></ins></span> is <span
class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>snooping on them.</p>
</li>
<li id="M201611170">
@@ -864,58 +1056,117 @@
--><!--#echo encoding="none" var="DATE" -->
<p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots of personal data to Apple's servers</a>. Big Brother can get
- them from there.</p>
+ lots of personal data</em></ins></span> to
+ <span class="removed"><del><strong>disguise itself</strong></del></span>
<span class="inserted"><ins><em>Apple's servers</a>. Big Brother can get
+ them</em></ins></span> from <span
class="removed"><del><strong>investigation.</p></strong></del></span>
<span class="inserted"><ins><em>there.</p></em></ins></span>
</li>
- <li id="M201609280">
+ <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609280">
<!--#set var="DATE" value='<small
class="date-tag">2016-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The iMessage app on iThings <a
-
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that the user types into it</a>; the
- server records these numbers for at least 30 days.</p>
+ <p>The iMessage app on iThings</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
+ and they send so much data that their transmission
is</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells</em></ins></span>
+ a
+ <span class="removed"><del><strong>substantial expense for users. Said
transmission, not wanted or
+ requested by the user, clearly must constitute spying of some
+ kind.</p></li>
+
+ <li><p>A Motorola</strong></del></span> <span
class="inserted"><ins><em>server every</em></ins></span> phone
+ <span class="removed"><del><strong><a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</strong></del></span> <span
class="inserted"><ins><em>number that</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+ </li>
+
+ <li><p>Spyware in Android phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us by a paywall)
+ reports that
+ <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
<span class="inserted"><ins><em>user types into
it</a>;</em></ins></span> the <span class="removed"><del><strong>FBI can
remotely activate</strong></del></span>
+ <span class="inserted"><ins><em>server records these numbers for at least
30 days.</p>
</li>
<li id="M201509240">
<!--#set var="DATE" value='<small
class="date-tag">2015-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>iThings automatically upload to Apple's servers all the photos
- and videos they make.</p>
+ <p>iThings automatically upload to Apple's servers
all</em></ins></span> the <span
class="removed"><del><strong>GPS</strong></del></span> <span
class="inserted"><ins><em>photos</em></ins></span>
+ and <span class="removed"><del><strong>microphone in Android
+ phones</strong></del></span> <span class="inserted"><ins><em>videos they
make.</p>
+
+ <blockquote><p> iCloud Photo Library stores every
photo</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
+ (I suspect this means Windows laptops.) Here is
+ <a href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ </li>
- <blockquote><p> iCloud Photo Library stores every photo and
video you
- take, and keeps them up to date on all your devices. Any edits you
+ <li><p>Portable phones with GPS will send their GPS location on
+ remote command</strong></del></span> <span
class="inserted"><ins><em>video you
+ take,</em></ins></span> and <span class="removed"><del><strong>users
cannot stop them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable
phones</strong></del></span> <span class="inserted"><ins><em>keeps them
up</em></ins></span> to <span class="removed"><del><strong>have GPS.)</p>
+ </li>
+
+ <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span> <span class="inserted"><ins><em>date on all your
devices. Any edits you
make are automatically updated everywhere. […]
</p></blockquote>
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated by the
- startup of iOS</a>. The term “cloud” means “please
+ information</a> as accessed on 24 Sep 2015.) The iCloud
feature</em></ins></span> is <span class="removed"><del><strong>to
restrict</strong></del></span>
+ <span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT202033">activated
by</em></ins></span> the <span
class="removed"><del><strong>use</strong></del></span>
+ <span class="inserted"><ins><em>startup</em></ins></span> of <span
class="removed"><del><strong>data on the user's computer,</strong></del></span>
<span class="inserted"><ins><em>iOS</a>. The term “cloud”
means “please
don't ask where.”</p>
<p>There is a way to
<a href="https://support.apple.com/en-us/HT201104"> deactivate
- iCloud</a>, but it's active by default so it still counts as a
- surveillance functionality.</p>
-
- <p>Unknown people apparently took advantage of this to <a
-
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ iCloud</a>,</em></ins></span> but <span
class="inserted"><ins><em>it's active by default so</em></ins></span> it <span
class="removed"><del><strong>does</strong></del></span> <span
class="inserted"><ins><em>still counts as a</em></ins></span>
+ surveillance
+ <span class="removed"><del><strong>too:</strong></del></span> <span
class="inserted"><ins><em>functionality.</p>
+
+ <p>Unknown people apparently took advantage of this
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA can access any of them through <a
-
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+ security</em></ins></span> to get <span class="removed"><del><strong>the
user's list</strong></del></span> <span class="inserted"><ins><em>at them, but
NSA can access any</em></ins></span> of <span
class="removed"><del><strong>other people's phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>them through <a
+
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201409220">
+
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201409220">
<!--#set var="DATE" value='<small
class="date-tag">2014-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apple can, and regularly does, <a
-
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the state</a>.</p>
+ <p>Apple can, and regularly does,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands to personal</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some</em></ins></span> data <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>from iPhones for</em></ins></span> the <span
class="removed"><del><strong>device</a>.
+ </p>
+ </li>
+
+ <li>
+ <p>Verizon</strong></del></span> <span
class="inserted"><ins><em>state</a>.</p>
+
+ <p>This may have improved with</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that it will</a>
+ pre-install on some of its phones. The app will give Verizon the same
+ information about the users' searches that Google normally gets when
+ they use its search engine.</p>
- <p>This may have improved with <a
-
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">
- iOS 8 security improvements</a>; but <a
- href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ <p>Currently, the app is</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">
+ iOS 8 security improvements</a>; but</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and the
+ user must explicitly opt-in before the app takes effect. However, the
+ app remains spyware—an “optional”
piece</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
not as much as Apple claims</a>.</p>
</li>
@@ -924,19 +1175,34 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist
- for no possible purpose other than surveillance</a>. Here is the
<a
-
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Several “features”</em></ins></span> of <span
class="removed"><del><strong>spyware</strong></del></span> <span
class="inserted"><ins><em>iOS seem to exist
+ for no possible purpose other than surveillance</a>.
Here</em></ins></span> is
+ <span class="removed"><del><strong>still spyware.</p>
+ </li>
+
+ <li><p>The Meitu photo-editing
+ app</strong></del></span> <span
class="inserted"><ins><em>the</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to a Chinese company</a>.</p></li>
+
+ <li><p>A pregnancy test controller application not only
+ can</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
<li id="M201401100">
<!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The <a class="not-a-duplicate"
+ <p>The</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts of data in</strong></del></span> <span
class="inserted"><ins><em>class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing is, and
- get other info too.</p>
+ iBeacon</a> lets stores determine exactly where</em></ins></span>
the <span class="removed"><del><strong>phone, and in server accounts, it can
+ alter them too</a>.
+ </p></li>
+
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before</strong></del></span> <span
class="inserted"><ins><em>iThing is,</em></ins></span> and <span
class="removed"><del><strong>after</strong></del></span>
+ <span class="inserted"><ins><em>get other info too.</p>
</li>
<li id="M201312300">
@@ -944,36 +1210,59 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop on all the data in an iThing, or it
- is totally incompetent</a>.</p>
+ Either Apple helps</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
+
+ <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>NSA snoop
on all</em></ins></span> the <span class="removed"><del><strong>user's
consent”
+ for surveillance</strong></del></span> <span
class="inserted"><ins><em>data in an iThing, or it</em></ins></span>
+ is <span class="removed"><del><strong>inadequate as a protection against
massive
+ surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>totally
incompetent</a>.</p></em></ins></span>
</li>
- <li id="M201308080">
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201308080">
<!--#set var="DATE" value='<small
class="date-tag">2013-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The iThing also <a
-
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though that can be
- turned off.</p>
+ <p>The iThing also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
</li>
- <li id="M201210170">
+ <li><p>Apps</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default, though</em></ins></span>
that <span class="removed"><del><strong>include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>can be
+ turned off.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app
+ <a
+href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201210170">
<!--#set var="DATE" value='<small
class="date-tag">2012-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>There is also a feature for web sites to track users, which is
<a
+ <p>There is also a feature</em></ins></span> for <span
class="removed"><del><strong>known faces</a>,
+ and suggests you to share the picture you take
according</strong></del></span> <span class="inserted"><ins><em>web
sites</em></ins></span> to <span
class="removed"><del><strong>who</strong></del></span> <span
class="inserted"><ins><em>track users, which is <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6, but it is
- still true in iOS 7.)</p>
+ enabled by default</a>. (That article talks about iOS 6, but
it</em></ins></span> is
+ <span class="inserted"><ins><em>still true</em></ins></span> in <span
class="removed"><del><strong>the frame.</p>
+
+ <p>This spyware feature seems to require online
access</strong></del></span> <span class="inserted"><ins><em>iOS 7.)</p>
</li>
<li id="M201204280">
<!--#set var="DATE" value='<small
class="date-tag">2012-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Users cannot make an Apple ID (<a
-
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary
- to install even gratis apps</a>) without giving a valid
- email address and receiving the verification code Apple sends
- to it.</p>
+
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary</em></ins></span>
+ to <span class="removed"><del><strong>some
+ known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>install even gratis apps</a>) without giving a
valid
+ email address and receiving</em></ins></span> the <span
class="removed"><del><strong>pictures are likely</strong></del></span> <span
class="inserted"><ins><em>verification code Apple sends</em></ins></span>
+ to <span class="inserted"><ins><em>it.</p>
</li>
</ul>
@@ -989,58 +1278,95 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Baidu apps were <a
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/">
- caught collecting sensitive personal data</a> that can be used for
- lifetime tracking of users, and putting them in danger. More than 1.4
+ caught collecting sensitive personal data</a> that
can</em></ins></span> be
+ <span class="removed"><del><strong>sent across the wire to Facebook's
servers and face-recognition
+ algorithms.</p>
+
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>used for
+ lifetime tracking</em></ins></span> of <span
class="removed"><del><strong>Facebook users' pictures are private
+ anymore, even if the user didn't
“upload”</strong></del></span> <span
class="inserted"><ins><em>users, and putting</em></ins></span> them <span
class="inserted"><ins><em>in danger. More than 1.4
billion people worldwide are affected by these proprietary apps, and
users' privacy is jeopardized by this surveillance tool. Data collected
- by Baidu may be handed over to the Chinese government, possibly
- putting Chinese people in danger.</p>
+ by Baidu may be handed over</em></ins></span> to the <span
class="removed"><del><strong>service.</p></strong></del></span> <span
class="inserted"><ins><em>Chinese government, possibly
+ putting Chinese people in danger.</p></em></ins></span>
</li>
- <li id="M202010120">
+ <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202010120">
<!--#set var="DATE" value='<small
class="date-tag">2020-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Samsung is forcing its smartphone users in Hong Kong (and Macau)
<a
+ <p>Samsung</em></ins></span> is <span
class="removed"><del><strong>based on proprietary malware (DRM and snooping).
In August
+ 2015 it <a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded</strong></del></span> <span class="inserted"><ins><em>forcing
its smartphone</em></ins></span> users <span
class="removed"><del><strong>submit to increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em>in
Hong Kong (and Macau) <a
href="https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-dns-service-upon-hong-kong-wifi-users/">to
use a public DNS in Mainland China</a>, using software update
released
- in September 2020, which causes many unease and privacy concerns.</p>
+ in September 2020, which causes many unease</em></ins></span> and <span
class="removed"><del><strong>some
+ are starting to realize that it is nasty.</p>
+
+ <p>This article shows the</strong></del></span> <span
class="inserted"><ins><em>privacy concerns.</p>
</li>
<li id="M202004300">
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Xiaomi phones <a
-
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
- many actions the user takes</a>: starting an app, looking at a
folder,
- visiting a website, listening to a song. They send device identifying
+ <p>Xiaomi phones</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report
+ many actions the user takes</a>: starting an app, looking
at</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>folder,
+ visiting a website, listening</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
+ whether they want that. This is</strong></del></span> a <span
class="removed"><del><strong>typical example of
+ the attitude of the proprietary software industry towards
+ those</strong></del></span> <span class="inserted"><ins><em>song. They
send device identifying
information too.</p>
<p>Other nonfree programs snoop too. For instance, Spotify and
other streaming dis-services make a dossier about each user, and <a
- href="/malware/proprietary-surveillance.html#M201508210"> they make
- users identify themselves to pay</a>. Out, out, damned
Spotify!</p>
+
href="/malware/proprietary-surveillance.html#M201508210"></em></ins></span>
they <span class="removed"><del><strong>have subjugated.</p>
+
+ <p>Out,</strong></del></span> <span class="inserted"><ins><em>make
+ users identify themselves to pay</a>. Out,</em></ins></span> out,
damned Spotify!</p>
+ <span class="removed"><del><strong></li>
+ <li><p>Many proprietary apps for mobile devices report which
other
+ apps</strong></del></span>
- <p>Forbes exonerates the same wrongs when the culprits are not
Chinese,
- but we condemn this no matter who does it.</p>
+ <span class="inserted"><ins><em><p>Forbes
exonerates</em></ins></span> the <span class="removed"><del><strong>user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way that at least is visible and
+ optional</a>. Not as bad as what</strong></del></span> <span
class="inserted"><ins><em>same wrongs when</em></ins></span> the <span
class="removed"><del><strong>others do.</p>
</li>
- <li id="M201812060">
+ <li><p>FTC says most mobile apps for children don't respect
privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>culprits are not Chinese,
+ but we condemn this no matter who does it.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on the user</a>. This is in
addition</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201812060">
<!--#set var="DATE" value='<small
class="date-tag">2018-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Facebook's app got “consent” to <a
+ <p>Facebook's app got “consent”</em></ins></span> to
<span class="inserted"><ins><em><a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
upload call logs automatically from Android phones</a> while
disguising
- what the “consent” was for.</p>
+ what</em></ins></span> the <span class="removed"><del><strong>snooping
done by the</strong></del></span> <span
class="inserted"><ins><em>“consent” was for.</p>
</li>
<li id="M201811230">
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>An Android phone was observed to track location even while
- in airplane mode. It didn't send the location data while in
+ <p>An Android</em></ins></span> phone <span
class="removed"><del><strong>company, and perhaps by the
OS</strong></del></span> <span class="inserted"><ins><em>was observed to track
location even while</em></ins></span>
+ in <span class="inserted"><ins><em>airplane mode. It didn't
send</em></ins></span> the
+ <span class="removed"><del><strong>phone.</p>
+
+ <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>location data while in
airplane mode. Instead, <a
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up the data, and sent them all later</a>.</p>
+ it saved up</em></ins></span> the <span
class="removed"><del><strong>question of whether</strong></del></span> <span
class="inserted"><ins><em>data, and sent them all later</a>.</p>
</li>
<li id="M201711210">
@@ -1048,40 +1374,68 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Android tracks location for Google <a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even when
- the phone has no SIM card</a>.</p>
+ even when “location services” are turned off, even
when</em></ins></span>
+ the <span class="removed"><del><strong>app developers get
+ users to say “I agree”. That is</strong></del></span> <span
class="inserted"><ins><em>phone has</em></ins></span> no <span
class="removed"><del><strong>excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>SIM
card</a>.</p></em></ins></span>
</li>
- <li id="M201611150">
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201611150">
<!--#set var="DATE" value='<small
class="date-tag">2016-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some portable phones <a
-
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to China</a>.</p>
+ <p>Some portable phones</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p>
+
+ <p>The FTC criticized this app because it asked the user to
+ approve</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware</em></ins></span> sending <span
class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>lots of</em></ins></span> data to <span
class="removed"><del><strong>the app developer but did not
+ ask about sending it to other companies. This shows the
+ weakness</strong></del></span> <span
class="inserted"><ins><em>China</a>.</p>
</li>
<li id="M201609140">
<!--#set var="DATE" value='<small
class="date-tag">2016-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google Play (a component of Android) <a
+ <p>Google Play (a component</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should a flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>Android) <a
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
tracks the users' movements without their permission</a>.</p>
<p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself to completely stop the tracking. This is
- yet another example of nonfree software pretending to obey the user,
- when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p>
+ disable Google Play itself</em></ins></span> to <span
class="removed"><del><strong>anyone? A free</strong></del></span> <span
class="inserted"><ins><em>completely stop the tracking. This is
+ yet another example of nonfree</em></ins></span> software <span
class="removed"><del><strong>flashlight
+ app</strong></del></span> <span class="inserted"><ins><em>pretending to
obey the user,
+ when it's actually doing something else. Such a thing</em></ins></span>
would <span class="removed"><del><strong>not.</p></strong></del></span>
<span class="inserted"><ins><em>be almost
+ unthinkable with free software.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
- <li id="M201507030">
+<div class="big-subsection">
+ <h4 id="SpywareInGames">Spyware in Games</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+</div>
+
+<ul>
+ <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201507030">
<!--#set var="DATE" value='<small
class="date-tag">2015-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Samsung phones come with <a
-
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>, and they send so much data that their
- transmission is a substantial expense for users. Said transmission,
- not wanted or requested by the user, clearly must constitute spying
+ <p>Samsung phones come with</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
+ that</em></ins></span> users <span class="removed"><del><strong>identify
themselves</strong></del></span> <span class="inserted"><ins><em>can't
delete</a>,</em></ins></span> and <span class="removed"><del><strong>then
sends personal</strong></del></span> <span class="inserted"><ins><em>they send
so much</em></ins></span> data <span class="removed"><del><strong>about them to
+ nVidia servers</a>.</p>
+ </li>
+
+ <li><p>Angry Birds
+ <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies</strong></del></span> <span class="inserted"><ins><em>that their
+ transmission is a substantial expense</em></ins></span> for <span
class="removed"><del><strong>companies, and</strong></del></span> <span
class="inserted"><ins><em>users. Said transmission,
+ not wanted or requested by</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>user, clearly must constitute spying
of some kind.</p>
</li>
@@ -1089,17 +1443,38 @@
<!--#set var="DATE" value='<small
class="date-tag">2014-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file on the
system.</p>
+ Samsung's back door</a> provides access</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
+ Here's information</strong></del></span> <span
class="inserted"><ins><em>any file</em></ins></span> on
+ <span class="removed"><del><strong><a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the system.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware</strong></del></span>
- <li id="M201308010">
+ <span class="inserted"><ins><em><li id="M201308010">
<!--#set var="DATE" value='<small
class="date-tag">2013-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Spyware in Android phones (and Windows? laptops): The Wall Street
- Journal (in an article blocked from us by a paywall) reports that <a
-
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate the GPS and microphone in Android phones
- and laptops</a> (presumably Windows laptops). Here is <a
+ <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,</strong></del></span> <span
class="inserted"><ins><em>Android phones (and Windows? laptops): The Wall Street
+ Journal (in an article blocked from us by</em></ins></span> a <span
class="removed"><del><strong>speech recognition company based
in</strong></del></span> <span class="inserted"><ins><em>paywall) reports that
<a
+
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></em></ins></span>
+ the <span class="removed"><del><strong>U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities;
crackers</strong></del></span> <span
class="inserted"><ins><em>FBI</em></ins></span> can remotely <span
class="removed"><del><strong>control</strong></del></span> <span
class="inserted"><ins><em>activate</em></ins></span> the <span
class="removed"><del><strong>toys with a mobile phone. This would
+ enable crackers to listen</strong></del></span> <span
class="inserted"><ins><em>GPS and microphone</em></ins></span> in <span
class="removed"><del><strong>on a child's speech,</strong></del></span> <span
class="inserted"><ins><em>Android phones</em></ins></span>
+ and <span class="removed"><del><strong>even speak
+ into the toys themselves.</p></strong></del></span> <span
class="inserted"><ins><em>laptops</a> (presumably Windows laptops). Here
is <a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
@@ -1110,111 +1485,198 @@
sold. Some Motorola phones, made when this company was owned
by Google, use a modified version of Android that <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal data to Motorola</a>.</p>
+ sends personal data to Motorola</a>.</p></em></ins></span>
</li>
- <li id="M201307250">
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201307250">
<!--#set var="DATE" value='<small
class="date-tag">2013-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>A Motorola phone <a
-
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p>
+ --><!--#echo encoding="none" var="DATE" --></em></ins></span>
+ <p>A <span class="removed"><del><strong>computerized
vibrator</strong></del></span> <span class="inserted"><ins><em>Motorola
phone</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</em></ins></span> the <span
class="removed"><del><strong>proprietary control app</a>.</p>
+
+ <p>The</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
</li>
<li id="M201302150">
<!--#set var="DATE" value='<small
class="date-tag">2013-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google Play intentionally sends app developers <a
-
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
- the personal details of users that install the app</a>.</p>
-
- <p>Merely asking the “consent” of users is not enough to
- legitimize actions like this. At this point, most users have stopped
- reading the “Terms and Conditions” that spell out what
+ <p>Google Play intentionally sends</em></ins></span> app <span
class="removed"><del><strong>was reporting</strong></del></span> <span
class="inserted"><ins><em>developers <a
+
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
+ the <span class="removed"><del><strong>temperature</strong></del></span>
<span class="inserted"><ins><em>personal details</em></ins></span> of <span
class="inserted"><ins><em>users that install</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
+ minute (thus, indirectly, whether it was surrounded by a person's
+ body), as well as the vibration frequency.</p>
+
+ <p>Note</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
+
+ <p>Merely asking</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about
+ their products, rather than free software which</strong></del></span>
<span class="inserted"><ins><em>“consent” of users is not enough to
+ legitimize actions like this. At this point, most</em></ins></span> users
<span class="removed"><del><strong>could</strong></del></span> have
+ <span class="removed"><del><strong>checked</strong></del></span> <span
class="inserted"><ins><em>stopped
+ reading the “Terms</em></ins></span> and <span
class="removed"><del><strong>changed.</p>
+
+ <p>The company</strong></del></span> <span
class="inserted"><ins><em>Conditions”</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em>spell out what
they are “consenting” to. Google should clearly and
- honestly identify the information it collects on users, instead of
- hiding it in an obscurely worded EULA.</p>
+ honestly identify</em></ins></span> the <span
class="removed"><del><strong>vibrator
+ <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal</strong></del></span>
information <span class="removed"><del><strong>about how
+ people used it</a>.</p>
- <p>However, to truly protect people's privacy, we must prevent Google
- and other companies from getting this personal information in the
- first place!</p>
- </li>
+ <p>The company's statement that it was anonymizing the data may be
+ true, but</strong></del></span> it <span
class="removed"><del><strong>doesn't really matter. If</strong></del></span>
<span class="inserted"><ins><em>collects on users, instead of
+ hiding</em></ins></span> it <span class="removed"><del><strong>had sold
the data to a
+ data broker, the data broker would have been able</strong></del></span>
<span class="inserted"><ins><em>in an obscurely worded EULA.</p>
+
+ <p>However,</em></ins></span> to <span
class="removed"><del><strong>figure out
+ who the user was.</p>
+
+ <p>Following</strong></del></span> <span
class="inserted"><ins><em>truly protect people's privacy, we must prevent Google
+ and other companies from getting</em></ins></span> this <span
class="removed"><del><strong>lawsuit,
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
<span class="inserted"><ins><em>personal information in</em></ins></span> the
<span class="removed"><del><strong>company has been ordered to pay a total of
C$4m</a>
+ to its customers.</p></strong></del></span>
+ <span class="inserted"><ins><em>first place!</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
+ <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
+ manufacturer</a>. Guess what?
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span>
- <li id="M201111170">
+ <span class="inserted"><ins><em><li id="M201111170">
<!--#set var="DATE" value='<small
class="date-tag">2011-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some manufacturers add a <a
-
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier IQ</a>.</p>
+ <p>Some manufacturers add</em></ins></span> a <span
class="removed"><del><strong>way to access the data</a>
+ collected by the manufacturer's snooping.</p>
+
+ <p>That the manufacturer and the FBI could listen to these
conversations
+ was unacceptable by itself.</p></li>
+
+ <li><p>Barbie</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ</a>.</p></em></ins></span>
</li>
</ul>
+<span class="removed"><del><strong><!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div></strong></del></span>
+
+
<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">E-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+<li><p>
+<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201603080">
<!--#set var="DATE" value='<small
class="date-tag">2016-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>E-books can contain JavaScript code, and <a
+ <p>E-books can contain JavaScript code,</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a></strong></del></span>
<span class="inserted"><ins><em><a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops on readers</a>.</p>
+ sometimes this code snoops</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
+Note that</strong></del></span> <span
class="inserted"><ins><em>readers</a>.</p>
</li>
<li id="M201410080">
<!--#set var="DATE" value='<small
class="date-tag">2014-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Adobe made “Digital Editions,”
- the e-reader used by most US libraries, <a
-
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ <p>Adobe made “Digital Editions,”</em></ins></span>
+ the <span class="removed"><del><strong>specific sabotage method
Lenovo</strong></del></span> <span
class="inserted"><ins><em>e-reader</em></ins></span> used <span
class="removed"><del><strong>did not affect
+GNU/Linux; also, a “clean” Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>by most US
libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each
subsection</strong></del></span> <span
class="inserted"><ins><em>Adobe</a>. Adobe's “excuse”: it's
needed to check DRM!</p>
</li>
<li id="M201212030">
<!--#set var="DATE" value='<small
class="date-tag">2012-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Spyware in many e-readers—not only the Kindle: <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+ <span class="inserted"><ins><em><p>Spyware in many
e-readers—not only the Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
report even which page the user reads at what time</a>.</p>
</li>
-</ul>
+</ul></em></ins></span>
<div class="big-section">
- <h3 id="SpywareInApplications">Spyware in Applications</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInApplications">#SpywareInApplications</a>)</span>
+ <h3 <span class="removed"><del><strong>id="SpywareAtWork">Spyware at
Work</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInApplications">Spyware in
Applications</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtWork">#SpywareAtWork</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInApplications">#SpywareInApplications</a>)</span></em></ins></span>
</div>
<div style="clear: left;"></div>
+<span class="removed"><del><strong><ul>
+ <li><p>Investigation
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect the emails of members of Parliament
+ this way, because they pass it through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
+ </li>
+</ul></strong></del></span>
+
<div class="big-subsection">
- <h4 id="SpywareInDesktopApps">Desktop Apps</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDesktopApps">Desktop
Apps</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>Spyware in Skype:</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202011260">
<!--#set var="DATE" value='<small
class="date-tag">2020-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft's Office 365 suite enables employers <a
-
href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance">to
+ <p>Microsoft's Office 365 suite enables employers</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance">to
snoop on each employee</a>. After
- a public outburst, Microsoft stated that <a
-
href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance">it
- would remove this capability</a>. Let's hope so.</p>
+ a public outburst,</em></ins></span> Microsoft <span
class="removed"><del><strong>changed Skype</strong></del></span> <span
class="inserted"><ins><em>stated that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance">it
+ would remove this capability</a>. Let's hope
so.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
- <li id="M201912190">
+
+<!-- #SpywareOnTheRoad</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201912190">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Some Avast and AVG extensions
- for Firefox and Chrome were found to <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>Some Avast and AVG extensions
+ for Firefox and Chrome were found</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
- snoop on users' detailed browsing habits</a>. Mozilla and Google
+ snoop</em></ins></span> on <span class="removed"><del><strong>top under
each subsection</strong></del></span> <span class="inserted"><ins><em>users'
detailed browsing habits</a>. Mozilla and Google
removed the problematic extensions from their stores, but this shows
once more how unsafe nonfree software can be. Tools that are supposed
to protect a proprietary system are, instead, infecting it with
@@ -1223,59 +1685,111 @@
<li id="M201811020">
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Foundry's graphics software <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware on</strong></del></span>
+ <span class="inserted"><ins><em><p>Foundry's graphics software <a
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information to identify who is running it</a>. The result is
- often a legal threat demanding a lot of money.</p>
+ reports information to identify who is running
it</a>.</em></ins></span> The <span
class="removed"><del><strong>Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
- <p>The fact that this is used for repression of forbidden sharing
- makes it even more vicious.</p>
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li></strong></del></span> <span class="inserted"><ins><em>result is
+ often a legal threat demanding a lot of money.</p></em></ins></span>
+
+ <p>The <span class="removed"><del><strong>Nest Cam
“smart” camera</strong></del></span> <span
class="inserted"><ins><em>fact that this</em></ins></span> is <span
class="removed"><del><strong><a
+ href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>,</strong></del></span> <span
class="inserted"><ins><em>used for repression of forbidden sharing
+ makes it</em></ins></span> even <span
class="removed"><del><strong>when</strong></del></span> <span
class="inserted"><ins><em>more vicious.</p>
<p>This illustrates that making unauthorized copies of nonfree
software
- is not a cure for the injustice of nonfree software. It may avoid
- paying for the nasty thing, but cannot make it less nasty.</p>
+ is not a cure for</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>injustice of nonfree software. It may avoid
+ paying for</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using</strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot make</em></ins></span> it
<span class="removed"><del><strong>to outsmart
+ you.</p></strong></del></span> <span
class="inserted"><ins><em>less nasty.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Mobile Apps</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInMobileApps">Mobile
Apps</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>E-books can contain Javascript code,
+ and</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202102010">
<!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many cr…apps, developed by various
- companies for various organizations, do <a
-
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth">
+ companies for various organizations, do</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not
only</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.expressvpn.com/digital-security-lab/investigation-xoth">
location tracking unknown to those companies and those
- organizations</a>. It's actually some widely used libraries that do
- the tracking.</p>
+ organizations</a>. It's actually some widely used libraries that
do</em></ins></span>
+ the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>tracking.</p>
<p>What's unusual here is that proprietary software developer A
tricks
proprietary software developers B1 … B50 into making platforms for
- A to mistreat the end user.</p>
+ A to mistreat</em></ins></span> the <span
class="removed"><del><strong>user reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>end user.</p></em></ins></span>
</li>
- <li id="M202003260">
+ <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used
+ by most US libraries,
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202003260">
<!--#set var="DATE" value='<small
class="date-tag">2020-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Apple iOS version of Zoom <a
+ <p>The Apple iOS version</em></ins></span> of <span
class="inserted"><ins><em>Zoom <a
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account">is
- sending users' data to Facebook</a> even if the user doesn't have
- a Facebook account. According to the article, Zoom and Facebook
+ sending users'</em></ins></span> data to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
+ needed</strong></del></span> <span
class="inserted"><ins><em>Facebook</a> even if the user doesn't have
+ a Facebook account. According</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul>
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>the article, Zoom and Facebook
don't even mention this surveillance on their privacy policy page,
making this an obvious violation of people's privacy even in their
- own terms.</p>
+ own terms.</p></em></ins></span>
</li>
- <li id="M202003010">
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf</strong></del></span> <span
class="inserted"><ins><em>id="M202003010">
<!--#set var="DATE" value='<small
class="date-tag">2020-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The Alipay Health Code app
- estimates whether the user has Covid-19 and <a
+ estimates whether the user</em></ins></span> has <span
class="removed"><del><strong>a built-in cell phone modem which allows
+ effectively
+ anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely</strong></del></span> <span
class="inserted"><ins><em>Covid-19</em></ins></span> and <span
class="removed"><del><strong>make changes in various
+ settings</a>.</p>
+
+ <p>That's easy</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
tells the cops directly</a>.</p>
</li>
@@ -1291,46 +1805,69 @@
<li id="M201912220">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The ToToc messaging app seems to be a <a
+ <p>The ToToc messaging app seems</em></ins></span> to <span
class="removed"><del><strong>do because</strong></del></span> <span
class="inserted"><ins><em>be a <a
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
- spying tool for the government of the United Arab Emirates</a>.
- Any nonfree program could be doing this, and that is a good
- reason to use free software instead.</p>
-
- <p><small>Note: this article uses the word “free”
in
- the sense of “gratis.”</small></p>
+ spying tool for</em></ins></span> the <span
class="removed"><del><strong>system has no authentication when
+ accessed through</strong></del></span> <span
class="inserted"><ins><em>government of</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
+ authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>United Arab Emirates</a>.
+ Any nonfree program could</em></ins></span> be <span
class="removed"><del><strong>confident</strong></del></span> <span
class="inserted"><ins><em>doing this, and</em></ins></span> that <span
class="removed"><del><strong>Nissan has no
+ access. The</strong></del></span> <span class="inserted"><ins><em>is a
good
+ reason to use free</em></ins></span> software <span
class="inserted"><ins><em>instead.</p>
+
+ <p><small>Note: this article uses the word
“free”</em></ins></span> in
+ the <span class="removed"><del><strong>car is
+ proprietary,</strong></del></span> <span class="inserted"><ins><em>sense
of “gratis.”</small></p>
</li>
<li id="M201912090">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>iMonsters and Android phones,
- when used for work, give employers powerful <a
-
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
- snooping and sabotage capabilities</a> if they install their own
- software on the device. Many employers demand to do this. For the
- employee, this is simply nonfree software, as fundamentally unjust
- and as dangerous as any other nonfree software.</p>
+ when used for work, give employers powerful</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its users</a>.</p>
+
+ <p>Even</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
+ snooping and sabotage capabilities</a></em></ins></span> if <span
class="removed"><del><strong>no one connects to the car remotely, the cell phone
+ modem enables</strong></del></span> <span class="inserted"><ins><em>they
install their own
+ software on</em></ins></span> the <span class="removed"><del><strong>phone
company</strong></del></span> <span class="inserted"><ins><em>device. Many
employers demand</em></ins></span> to <span class="removed"><del><strong>track
the car's movements all</strong></del></span> <span
class="inserted"><ins><em>do this. For</em></ins></span> the <span
class="removed"><del><strong>time; it</strong></del></span>
+ <span class="inserted"><ins><em>employee, this</em></ins></span> is <span
class="removed"><del><strong>possible to physically remove the cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>simply nonfree software, as fundamentally unjust
+ and as dangerous as any other nonfree software.</p></em></ins></span>
</li>
- <li id="M201910130">
+ <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201910130">
<!--#set var="DATE" value='<small
class="date-tag">2019-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The Chinese Communist Party's “Study
- the Great Nation” app requires users to grant it <a
-
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access to the phone's microphone, photos, text messages, contacts, and
- internet history</a>, and the Android version was found to contain a
- back-door allowing developers to run any code they wish in the users'
- phone, as “superusers.” Downloading and using this
- app is mandatory at some workplaces.</p>
+ the Great Nation” app requires users to grant it</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access</em></ins></span> to <span class="removed"><del><strong>car
manufacturers, insurance companies,</strong></del></span> <span
class="inserted"><ins><em>the phone's microphone, photos, text messages,
contacts,</em></ins></span> and
+ <span class="removed"><del><strong>others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
is not
+ really a matter of proprietary surveillance. These systems are an
+ intolerable invasion of privacy,</strong></del></span>
+ <span class="inserted"><ins><em>internet
history</a>,</em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
+ payment systems, but</strong></del></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
+ cases mentioned are done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>Android version was found to contain a
+ back-door allowing developers to run any code they wish</em></ins></span>
in the <span class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow the company to extract data
remotely</strong></del></span> <span class="inserted"><ins><em>users'
+ phone, as “superusers.” Downloading</em></ins></span> and
+ <span class="removed"><del><strong>determine the car's
location</strong></del></span> <span class="inserted"><ins><em>using this
+ app is mandatory</em></ins></span> at <span
class="removed"><del><strong>any time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>).</strong></del></span> <span
class="inserted"><ins><em>some workplaces.</p>
- <p>Note: The <a
+ <p>Note:</em></ins></span> The <span
class="removed"><del><strong>company says it doesn't
+ store this information,</strong></del></span> <span
class="inserted"><ins><em><a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated, but
- readable after copy-pasting in a text editor) includes a clarification
- saying that the tests were only performed on the Android version
- of the app, and that, according to Apple, “this kind of
+ Washington Post version of the article</a> (partly
obfuscated,</em></ins></span> but <span
class="removed"><del><strong>if</strong></del></span>
+ <span class="inserted"><ins><em>readable after copy-pasting in a text
editor) includes a clarification
+ saying that</em></ins></span> the <span class="removed"><del><strong>state
orders it to get</strong></del></span> <span class="inserted"><ins><em>tests
were only performed on</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>Android version
+ of the app,</em></ins></span> and <span
class="removed"><del><strong>hand</strong></del></span> <span
class="inserted"><ins><em>that, according to Apple, “this kind of
‘superuser’ surveillance could not be conducted on
Apple's operating system.”</p>
</li>
@@ -1340,52 +1877,90 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Facebook app <a
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks users even when it is turned off</a>, after tricking them
- into giving the app broad permissions in order to use one of its
- functionalities.</p>
+ tracks users even when</em></ins></span> it <span
class="removed"><del><strong>over,</strong></del></span> <span
class="inserted"><ins><em>is turned off</a>, after tricking them
+ into giving</em></ins></span> the <span class="removed"><del><strong>state
can store it.</p></strong></del></span> <span
class="inserted"><ins><em>app broad permissions in order to use one of its
+ functionalities.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<!-- #SpywareAtHome</strong></del></span>
- <li id="M201909090">
+ <span class="inserted"><ins><em><li id="M201909090">
<!--#set var="DATE" value='<small
class="date-tag">2019-09</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Some nonfree period-tracking apps including MIA Fem and Maya <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>Some nonfree period-tracking apps
including MIA Fem and Maya <a
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
- send intimate details of users' lives to Facebook</a>.</p>
+ send intimate details of users' lives</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each
subsection</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
</li>
<li id="M201909060">
<!--#set var="DATE" value='<small
class="date-tag">2019-09</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Keeping track of who downloads a proprietary
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Nest thermometers
+ send</strong></del></span>
+ <span class="inserted"><ins><em><p>Keeping track of who downloads a
proprietary
program is a form of surveillance. There is a
- proprietary program for adjusting a certain telescopic rifle sight. <a
-
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
- A US prosecutor has demanded the list of all the 10,000 or more people
+ proprietary program for adjusting a certain telescopic rifle
sight.</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded the list</em></ins></span> of <span
class="removed"><del><strong>data about</strong></del></span> <span
class="inserted"><ins><em>all</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p></strong></del></span>
<span class="inserted"><ins><em>10,000 or more people
who have installed it</a>.</p>
<p>With a free program there would not be a list of who has installed
- it.</p>
+ it.</p></em></ins></span>
</li>
- <li id="M201907081">
+ <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201907081">
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many unscrupulous mobile-app developers keep finding ways to <a
+ <p>Many unscrupulous mobile-app developers keep finding
ways</em></ins></span> to <span class="removed"><del><strong>spy on their
renters</a>.</p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInTVSets">Spyware</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
bypass user's settings</a>, regulations, and privacy-enhancing
features
- of the operating system, in order to gather as much private data as
+ of the operating system,</em></ins></span> in <span
class="removed"><del><strong>TV Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+</div>
+
+<p>Emo Phillips made a joke: The other day a woman came
up</strong></del></span> <span
class="inserted"><ins><em>order</em></ins></span> to <span
class="removed"><del><strong>me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You</strong></del></span> <span class="inserted"><ins><em>gather
as much private data as
they possibly can.</p>
- <p>Thus, we can't trust rules against spying. What we can trust is
- having control over the software we run.</p>
+ <p>Thus, we</em></ins></span> can't <span
class="removed"><del><strong>see out</strong></del></span> <span
class="inserted"><ins><em>trust rules against spying. What we can trust is
+ having control over</em></ins></span> the <span
class="removed"><del><strong>other way.” Evidently that was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li>
+ <p>Vizio
+ “smart”</strong></del></span> <span
class="inserted"><ins><em>software we run.</p>
</li>
<li id="M201907080">
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many Android apps can track
- users' movements even when the user says <a
-
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ users' movements even when the user says</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
not to allow them access to locations</a>.</p>
<p>This involves an apparently unintentional weakness in Android,
@@ -1395,12 +1970,12 @@
<li id="M201905300">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Femm “fertility” app is secretly a <a
+ <p>The Femm “fertility” app</em></ins></span> is <span
class="removed"><del><strong>viewed</strong></del></span> <span
class="inserted"><ins><em>secretly a <a
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
- <p>It snoops on users, too, as you must expect from nonfree
+ <p>It snoops</em></ins></span> on <span
class="removed"><del><strong>them,</strong></del></span> <span
class="inserted"><ins><em>users, too, as you must expect from nonfree
programs.</p>
</li>
@@ -1413,25 +1988,34 @@
the event.</p>
<p>This app is a spyware that can snoop on a lot of
- sensitive data, including user's location and contact list, and has <a
+ sensitive data, including user's location</em></ins></span> and <span
class="removed"><del><strong>not just broadcasts</strong></del></span> <span
class="inserted"><ins><em>contact list,</em></ins></span> and <span
class="removed"><del><strong>cable</a>. Even if</strong></del></span>
<span class="inserted"><ins><em>has <a
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over the phone.</p>
+ near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>image</strong></del></span> <span
class="inserted"><ins><em>phone.</p>
</li>
<li id="M201904131">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
+ <p>Data collected by menstrual and pregnancy monitoring
apps</em></ins></span> is <span class="removed"><del><strong>coming from the
user's own
+ computer,</strong></del></span> <span class="inserted"><ins><em>often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>. Even though the
- data is “anonymized and aggregated,” it can easily be
- traced back to the woman who uses the app.</p>
+ available to employers and insurance companies</a>. Even
though</em></ins></span> the <span class="removed"><del><strong>TV reports
what</strong></del></span>
+ <span class="inserted"><ins><em>data is “anonymized and
aggregated,”</em></ins></span> it <span class="removed"><del><strong>is.
The existence of a way</strong></del></span> <span
class="inserted"><ins><em>can easily be
+ traced back</em></ins></span> to
+ <span class="removed"><del><strong>disable</strong></del></span> the <span
class="removed"><del><strong>surveillance,</strong></del></span> <span
class="inserted"><ins><em>woman who uses the app.</p>
<p>This has harmful implications for women's rights to equal
employment
and freedom to make their own pregnancy choices. Don't use
- these apps, even if someone offers you a reward to do so. A
- free-software app that does more or less the same thing without
- spying on you is available from <a
+ these apps,</em></ins></span> even if <span
class="removed"><del><strong>it were not hidden as it was in
+ these TVs,</strong></del></span> <span class="inserted"><ins><em>someone
offers you a reward to do so. A
+ free-software app that</em></ins></span> does <span
class="removed"><del><strong>not legitimize the surveillance.</p>
+ </li>
+
+ <li><p>More</strong></del></span> <span
class="inserted"><ins><em>more</em></ins></span> or less <span
class="removed"><del><strong>all “smart” TVs <a
+href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
<span class="inserted"><ins><em>the same thing without
+ spying</em></ins></span> on <span class="removed"><del><strong>their
users</a>.</p>
+
+ <p>The report was as</strong></del></span> <span
class="inserted"><ins><em>you is available from <a
href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
a new one is being developed</a>.</p>
@@ -1440,38 +2024,61 @@
<li id="M201904130">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google tracks the movements of Android phones and iPhones
+ <p>Google tracks the movements</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect
this</strong></del></span> <span class="inserted"><ins><em>Android phones and
iPhones
running Google apps, and sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
saves the data for years</a>.</p>
- <p>Nonfree software in the phone has to be responsible for sending
- the location data to Google.</p>
+ <p>Nonfree software in the phone</em></ins></span> has <span
class="removed"><del><strong>got better.</p>
+
+ <p>This shows that laws requiring products</strong></del></span> to
<span class="removed"><del><strong>get users' formal
+ consent before collecting personal</strong></del></span> <span
class="inserted"><ins><em>be responsible for sending
+ the location</em></ins></span> data <span class="removed"><del><strong>are
totally inadequate.
+ And what happens if</strong></del></span> <span
class="inserted"><ins><em>to Google.</p>
</li>
<li id="M201903251">
<!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many Android phones come with a huge number of <a
+ <p>Many Android phones come with</em></ins></span> a <span
class="removed"><del><strong>user declines consent? Probably the TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>huge number of <a
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access to sensitive data without
- users' knowledge</a>. These hidden apps may either call home with
- the data, or pass it on to user-installed apps that have access to
- the network but no direct access to the data. This results in massive
- surveillance on which the user has absolutely no control.</p>
+ preinstalled nonfree apps that have access</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>sensitive data without
+ users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
+ the <span class="removed"><del><strong>TV will
+ not work.”</p>
+
+ <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>data, or pass it on to user-installed
apps</em></ins></span> that <span class="removed"><del><strong>TVs are not
allowed</strong></del></span> <span class="inserted"><ins><em>have
access</em></ins></span> to <span class="removed"><del><strong>report
what</strong></del></span>
+ the <span class="removed"><del><strong>user watches
—</strong></del></span> <span class="inserted"><ins><em>network
but</em></ins></span> no <span
class="removed"><del><strong>exceptions!</p>
+ </li>
+ <li><p>Vizio goes a step further than other TV
manufacturers</strong></del></span> <span class="inserted"><ins><em>direct
access to the data. This results</em></ins></span> in <span
class="removed"><del><strong>spying</strong></del></span> <span
class="inserted"><ins><em>massive
+ surveillance</em></ins></span> on
+ <span class="removed"><del><strong>their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so</strong></del></span> <span
class="inserted"><ins><em>which the user has absolutely no control.</p>
</li>
<li id="M201903201">
<!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A study of 24 “health” apps found that 19 of them
<a
+ <p>A study of 24 “health” apps found</em></ins></span>
that <span class="removed"><del><strong>advertisers</strong></del></span> <span
class="inserted"><ins><em>19 of them <a
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data to third parties</a>, which can use it
+ send sensitive personal data to third parties</a>,
which</em></ins></span> can <span class="removed"><del><strong>track you
+ across devices.</p>
+
+ <p>It</strong></del></span> <span class="inserted"><ins><em>use it
for invasive advertising or discriminating against people in poor
medical condition.</p>
- <p>Whenever user “consent” is sought, it is buried in
- lengthy terms of service that are difficult to understand. In any case,
+ <p>Whenever user “consent”</em></ins></span> is <span
class="removed"><del><strong>possible to turn this off, but
having</strong></del></span> <span
class="inserted"><ins><em>sought,</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice already.</p>
+ </li>
+
+ <li><p>Tivo's alliance with Viacom adds 2.3 million
households</strong></del></span> <span class="inserted"><ins><em>buried in
+ lengthy terms of service that are difficult</em></ins></span> to
+ <span class="removed"><del><strong>the 600 millions social media
profiles the company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>understand. In any case,
“consent” is not sufficient to legitimize snooping.</p>
</li>
@@ -1479,42 +2086,53 @@
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Facebook offered a convenient proprietary
- library for building mobile apps, which also <a
- href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data to Facebook</a>. Lots of companies built apps that
- way and released them, apparently not realizing that all the personal
- data they collected would go to Facebook as well.</p>
-
- <p>It shows that no one can trust a nonfree program, not even the
- developers of other nonfree programs.</p>
+ library for building mobile apps, which also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all
users</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data</em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots of companies built apps that
+ way</em></ins></span> and <span class="removed"><del><strong>TV
advertisements play inaudible sounds</strong></del></span> <span
class="inserted"><ins><em>released them, apparently not realizing that all the
personal
+ data they collected would go</em></ins></span> to <span
class="removed"><del><strong>be
+ picked up by proprietary malware running on other devices in
+ range so</strong></del></span> <span
class="inserted"><ins><em>Facebook</em></ins></span> as <span
class="removed"><del><strong>to determine</strong></del></span> <span
class="inserted"><ins><em>well.</p>
+
+ <p>It shows</em></ins></span> that <span
class="removed"><del><strong>they are nearby. Once your
+ Internet devices are paired with your TV,
advertisers</strong></del></span> <span class="inserted"><ins><em>no
one</em></ins></span> can
+ <span class="removed"><del><strong>correlate ads with Web activity,
and</strong></del></span> <span class="inserted"><ins><em>trust a nonfree
program, not even the
+ developers of</em></ins></span> other <span
class="removed"><del><strong><a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>nonfree programs.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize</strong></del></span>
- <li id="M201902140">
+ <span class="inserted"><ins><em><li id="M201902140">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The AppCensus database gives information on <a
- href="https://www.appcensus.mobi"> how Android apps use and
- misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
- href="/proprietary/proprietary-surveillance.html#M201812290">
+ href="https://www.appcensus.mobi"> how Android apps
use</em></ins></span> and
+ <span class="inserted"><ins><em>misuse users' personal data</a>. As
of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%) transmit
the</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290">
Advertising ID</a> to other companies, and <a
href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
18,000 (23% of the total) link this ID to hardware identifiers</a>,
so that users cannot escape tracking by resetting it.</p>
<p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But it seems that Google wasn't aware of it,
+ Google's policies. But</em></ins></span> it <span
class="removed"><del><strong>isn't</strong></del></span> <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
and, once informed, was in no hurry to take action. This proves
- that the policies of a development platform are ineffective at
+ that the policies of</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p></strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
preventing nonfree software developers from including malware in
- their programs.</p>
+ their programs.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
- <li id="M201902060">
+ <span class="inserted"><ins><em><li id="M201902060">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many nonfree apps have a surveillance feature for <a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ <p>Many nonfree apps have a surveillance feature
for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
recording all the users' actions</a> in interacting with the
app.</p>
</li>
@@ -1747,7 +2365,7 @@
<li id="M201705040">
<!--#set var="DATE" value='<small
class="date-tag">2017-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A study found 234 Android apps</em></ins></span> that <span
class="removed"><del><strong>90%</strong></del></span> <span
class="inserted"><ins><em>track users by <a
+ <p>A study found 234 Android apps that track users by <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
to ultrasound from beacons placed in stores or played by TV
programs</a>.</p>
@@ -1756,10 +2374,9 @@
<li id="M201704260">
<!--#set var="DATE" value='<small
class="date-tag">2017-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Faceapp appears to do lots</em></ins></span> of <span
class="inserted"><ins><em>surveillance, judging by <a
+ <p>Faceapp appears to do lots of surveillance, judging by <a
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data in</em></ins></span> the <span
class="removed"><del><strong>top-ranked gratis
- proprietary</strong></del></span> <span
class="inserted"><ins><em>device</a>.</p>
+ how much access it demands to personal data in the
device</a>.</p>
</li>
<li id="M201704190">
@@ -1781,8 +2398,7 @@
<li id="M201704074">
<!--#set var="DATE" value='<small
class="date-tag">2017-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Pairs of</em></ins></span> Android apps <span
class="removed"><del><strong>contained recognizable tracking libraries. For
- the paid</strong></del></span> <span class="inserted"><ins><em>can collude
+ <p>Pairs of Android apps can collude
to transmit users' personal data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found tens of thousands of pairs that collude</a>.</p>
@@ -1793,14 +2409,14 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in</em></ins></span> proprietary <span
class="removed"><del><strong>apps,</strong></del></span> <span
class="inserted"><ins><em>search app that</em></ins></span> it <span
class="removed"><del><strong>was</strong></del></span> <span
class="inserted"><ins><em>will</a> pre-install
+ announced an opt-in proprietary search app that it will</a>
pre-install
on some of its phones. The app will give Verizon the same information
about the users' searches that Google normally gets when they use
its search engine.</p>
<p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on</em></ins></span> only <span
class="removed"><del><strong>60%.</p></strong></del></span> <span
class="inserted"><ins><em>one phone</a>, and the user must
+ being pre-installed on only one phone</a>, and the user must
explicitly opt-in before the app takes effect. However, the app
remains spyware—an “optional” piece of spyware is
still spyware.</p>
@@ -1816,48 +2432,29 @@
<li id="M201611280">
<!--#set var="DATE" value='<small
class="date-tag">2016-11</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p>The <span class="removed"><del><strong>article confusingly
describes gratis apps as “free”,
- but most of them are not in fact</strong></del></span> <span
class="inserted"><ins><em>Uber app tracks</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>.
- It also uses</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after</em></ins></span> the <span
class="removed"><del><strong>ugly word “monetize”. A good
replacement</strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The Uber app tracks <a
+
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after the ride</a>.</p>
<p>This example illustrates how “getting the user's
- consent”</em></ins></span> for <span
class="removed"><del><strong>that word</strong></del></span> <span
class="inserted"><ins><em>surveillance</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always that will fit
- perfectly.</p></strong></del></span> <span
class="inserted"><ins><em>inadequate as a protection against
- massive surveillance.</p></em></ins></span>
+ consent” for surveillance is inadequate as a protection against
+ massive surveillance.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Apps for BART</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201611160">
+ <li id="M201611160">
<!--#set var="DATE" value='<small
class="date-tag">2016-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With proprietary apps, one can only hope</strong></del></span>
- <span
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a></em></ins></span> that <span
class="removed"><del><strong>they don't.</p>
-</li>
-
-<li>
- <p>A study found 234</strong></del></span> <span
class="inserted"><ins><em>investigated the privacy and security of
- 283</em></ins></span> Android <span
class="inserted"><ins><em>VPN</em></ins></span> apps <span
class="inserted"><ins><em>concluded</em></ins></span> that <span
class="removed"><del><strong>track users</strong></del></span> <span
class="inserted"><ins><em>“in spite of the promises
- for privacy, security, and anonymity given</em></ins></span> by
- <span class="removed"><del><strong><a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
<span class="inserted"><ins><em>the majority of VPN
- apps—millions of users may be unawarely subject</em></ins></span> to
<span class="removed"><del><strong>ultrasound from beacons placed in stores or
played</strong></del></span> <span class="inserted"><ins><em>poor security
- guarantees and abusive practices inflicted</em></ins></span> by <span
class="removed"><del><strong>TV programs</a>.
- </p>
-
-</li>
+ <p>A <a
+
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a> that investigated the privacy and security of
+ 283 Android VPN apps concluded that “in spite of the promises
+ for privacy, security, and anonymity given by the majority of VPN
+ apps—millions of users may be unawarely subject to poor security
+ guarantees and abusive practices inflicted by VPN apps.”</p>
-<li>
- <p>Pairs</strong></del></span> <span class="inserted"><ins><em>VPN
apps.”</p>
-
- <p>Following is a non-exhaustive list, taken from the research
paper,</em></ins></span>
- of <span class="removed"><del><strong>Android</strong></del></span> <span
class="inserted"><ins><em>some proprietary VPN</em></ins></span> apps <span
class="removed"><del><strong>can collude</strong></del></span> <span
class="inserted"><ins><em>that track users and infringe their
+ <p>Following is a non-exhaustive list, taken from the research paper,
+ of some proprietary VPN apps that track users and infringe their
privacy:</p>
<dl class="compact">
@@ -1867,13 +2464,11 @@
<dt>sFly Network Booster</dt>
<dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning it has full
access</em></ins></span> to <span
class="removed"><del><strong>transmit</strong></del></span> users' <span
class="removed"><del><strong>personal
- data</strong></del></span>
- <span class="inserted"><ins><em>text messages.</dd>
+ permissions upon installation, meaning it has full access to users'
+ text messages.</dd>
<dt>DroidVPN and TigerVPN</dt>
- <dd>Requests the <code>READ_LOGS</code>
permission</em></ins></span> to <span class="removed"><del><strong>servers.
<a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens</strong></del></span> <span class="inserted"><ins><em>read logs
+ <dd>Requests the <code>READ_LOGS</code> permission to
read logs
for other apps and also core system logs. TigerVPN developers have
confirmed this.</dd>
@@ -1883,22 +2478,19 @@
<dt>VPN Services HotspotShield</dt>
<dd>Injects JavaScript code into the HTML pages returned to the
- users. The stated purpose</em></ins></span> of <span
class="removed"><del><strong>thousands</strong></del></span> <span
class="inserted"><ins><em>the JS injection is to display ads. Uses
+ users. The stated purpose of the JS injection is to display ads. Uses
roughly five tracking libraries. Also, it redirects the user's
traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
<dd>Injects JavaScript code into HTML pages, and also uses roughly
- five tracking libraries. Developers</em></ins></span> of <span
class="removed"><del><strong>pairs</strong></del></span> <span
class="inserted"><ins><em>this app have confirmed</em></ins></span> that <span
class="removed"><del><strong>collude</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>the non-premium version of the app does
JavaScript injection for
+ five tracking libraries. Developers of this app have confirmed that
+ the non-premium version of the app does JavaScript injection for
tracking the user and displaying ads.</dd>
- </dl></em></ins></span>
+ </dl>
</li>
-<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201609210">
+ <li id="M201609210">
<!--#set var="DATE" value='<small
class="date-tag">2016-09</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Google's new voice messaging app <a
@@ -1909,41 +2501,19 @@
<li id="M201606050">
<!--#set var="DATE" value='<small
class="date-tag">2016-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Facebook's new Magic Photo</em></ins></span> app <span
class="removed"><del><strong>developers</strong></del></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details of users that install the app</a>.</p>
-
-<p>Merely asking</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+ <p>Facebook's new Magic Photo app <a
+
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections for known faces</a>,
- and suggests you circulate</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>picture you take
according to who</em></ins></span> is <span class="removed"><del><strong>not
enough</strong></del></span>
- <span class="inserted"><ins><em>in the frame.</p>
+ and suggests you circulate the picture you take according to who is
+ in the frame.</p>
- <p>This spyware feature seems</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>require
online access to some
- known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>“Terms and Conditions” that spell out
-what they</strong></del></span> <span
class="inserted"><ins><em>pictures</em></ins></span> are <span
class="removed"><del><strong>“consenting” to. Google should clearly
-and honestly identify</strong></del></span> <span
class="inserted"><ins><em>likely to be
- sent across</em></ins></span> the <span
class="removed"><del><strong>information it collects on users, instead
-of hiding it in an obscurely worded EULA.</p>
-
-<p>However,</strong></del></span> <span
class="inserted"><ins><em>wire</em></ins></span> to <span
class="removed"><del><strong>truly protect people's privacy, we must prevent
Google</strong></del></span> <span class="inserted"><ins><em>Facebook's
servers</em></ins></span> and <span class="removed"><del><strong>other
companies from getting this personal information in the first
-place!</p>
-</li>
-
- <li>
- <p>Google Play (a component</strong></del></span> <span
class="inserted"><ins><em>face-recognition
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means the pictures are likely to be
+ sent across the wire to Facebook's servers and face-recognition
algorithms.</p>
- <p>If so, none</em></ins></span> of <span
class="removed"><del><strong>Android) <a
-
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the</strong></del></span> <span
class="inserted"><ins><em>Facebook</em></ins></span> users' <span
class="removed"><del><strong>movements without their
permission</a>.</p>
-
- <p>Even</strong></del></span> <span
class="inserted"><ins><em>pictures are private anymore,
- even</em></ins></span> if <span class="removed"><del><strong>you disable
Google Maps and location tracking, you must
- disable Google Play itself to completely stop</strong></del></span> the
<span class="removed"><del><strong>tracking. This is
- yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>user didn't “upload”
them</em></ins></span> to <span
class="removed"><del><strong>obey</strong></del></span> the <span
class="removed"><del><strong>user,
- when it's actually doing something else. Such a thing
would</strong></del></span> <span class="inserted"><ins><em>service.</p>
+ <p>If so, none of Facebook users' pictures are private anymore,
+ even if the user didn't “upload” them to the service.</p>
</li>
<li id="M201605310">
@@ -1952,39 +2522,33 @@
<p>Facebook's app listens all the time, <a
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html">to
snoop on what people are listening to or watching</a>. In addition,
- it may</em></ins></span> be <span class="removed"><del><strong>almost
- unthinkable</strong></del></span> <span
class="inserted"><ins><em>analyzing people's conversations to serve
them</em></ins></span> with <span class="removed"><del><strong>free
software.</p></strong></del></span> <span
class="inserted"><ins><em>targeted
- advertisements.</p></em></ins></span>
+ it may be analyzing people's conversations to serve them with targeted
+ advertisements.</p>
</li>
- <span class="removed"><del><strong><li><p>More than
73%</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201604250">
+ <li id="M201604250">
<!--#set var="DATE" value='<small
class="date-tag">2016-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>A pregnancy test controller application not only can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts</em></ins></span> of <span
class="inserted"><ins><em>data in</em></ins></span> the <span
class="removed"><del><strong>most popular Android apps</strong></del></span>
<span class="inserted"><ins><em>phone, and in server accounts,
+ spy on many sorts of data in the phone, and in server accounts,
it can alter them too</a>.</p>
</li>
<li id="M201601130">
<!--#set var="DATE" value='<small
class="date-tag">2016-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apps that include</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio</em></ins></span> and
<span class="removed"><del><strong>location information</a> of
their</strong></del></span> <span class="inserted"><ins><em>TV programs
- are playing nearby</a>. Also on what</em></ins></span> users <span
class="removed"><del><strong>with third
parties.</p></strong></del></span> <span class="inserted"><ins><em>post
on various sites
- such as Facebook, Google+ and Twitter.</p></em></ins></span>
+ <p>Apps that include <a
+
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+ and Twitter.</p>
</li>
- <span
class="removed"><del><strong><li><p>“Cryptic</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511190">
+ <li id="M201511190">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>“Cryptic</em></ins></span> communication,”
+ <p>“Cryptic communication,”
unrelated to the app's functionality, was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
found in the 500 most popular gratis Android apps</a>.</p>
@@ -1998,55 +2562,41 @@
analyze what users are doing or how. “Analytics” tools
that snoop are just as wrong as any other snooping.</p>
</li>
- <span
class="removed"><del><strong><li><p>Gratis</strong></del></span>
- <span class="inserted"><ins><em><li id="M201510300">
+ <li id="M201510300">
<!--#set var="DATE" value='<small
class="date-tag">2015-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>More than 73% and 47% of mobile applications,
for</em></ins></span> Android <span class="removed"><del><strong>apps (but not
<a href="/philosophy/free-sw.html">free software</a>)
- connect to 100</strong></del></span> <span class="inserted"><ins><em>and
iOS
- respectively</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">hand
over
- personal, behavioral</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
- on the average.</p></strong></del></span> <span
class="inserted"><ins><em>location information</a> of their users to
- third parties.</p></em></ins></span>
+ <p>More than 73% and 47% of mobile applications, for Android and iOS
+ respectively <a href="https://techscience.org/a/2015103001/">hand
over
+ personal, behavioral and location information</a> of their users to
+ third parties.</p>
</li>
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
- <span class="inserted"><ins><em><li id="M201508210">
+ <li id="M201508210">
<!--#set var="DATE" value='<small
class="date-tag">2015-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Like most “music screaming” disservices,
Spotify</em></ins></span> is <span class="removed"><del><strong>present
in</strong></del></span>
- <span class="inserted"><ins><em>based on proprietary malware (DRM and
snooping). In August 2015 it <a
+ <p>Like most “music screaming” disservices, Spotify is
+ based on proprietary malware (DRM and snooping). In August 2015 it <a
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>,
and</em></ins></span> some <span class="removed"><del><strong>Android devices
when they</strong></del></span> are <span class="removed"><del><strong>sold.
- Some Motorola phones modify Android</strong></del></span> <span
class="inserted"><ins><em>starting</em></ins></span>
- to <span class="inserted"><ins><em>realize that it is nasty.</p>
-
- <p>This article shows the</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way</em></ins></span> to
<span class="removed"><del><strong>Motorola</a>.</p>
- </li>
+ demanded users submit to increased snooping</a>, and some are
starting
+ to realize that it is nasty.</p>
- <li><p>Some manufacturers add</strong></del></span> <span
class="inserted"><ins><em>“serve”
- users better</a>—never mind whether they want that. This
is</em></ins></span> a
- <span class="removed"><del><strong><a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p></strong></del></span>
- <span class="inserted"><ins><em>typical example of the attitude of the
proprietary software industry
+ <p>This article shows the <a
+
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as a way to “serve”
+ users better</a>—never mind whether they want that. This is a
+ typical example of the attitude of the proprietary software industry
towards those they have subjugated.</p>
- <p>Out, out, damned Spotify!</p></em></ins></span>
+ <p>Out, out, damned Spotify!</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file
on</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201506264">
+ <li id="M201506264">
<!--#set var="DATE" value='<small
class="date-tag">2015-06</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf">
- A study in 2015</a> found that 90% of</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>top-ranked gratis proprietary
+ A study in 2015</a> found that 90% of the top-ranked gratis
proprietary
Android apps contained recognizable tracking libraries. For the paid
proprietary apps, it was only 60%.</p>
@@ -2054,88 +2604,29 @@
“free”, but most of them are not in fact <a
href="/philosophy/free-sw.html">free software</a>. It also uses
the
ugly word “monetize”. A good replacement for that word
- is “exploit”; nearly always that will fit
perfectly.</p></em></ins></span>
+ is “exploit”; nearly always that will fit perfectly.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-
-<!-- #SpywareOnMobiles</strong></del></span>
- <span class="inserted"><ins><em><li id="M201505060">
+ <li id="M201505060">
<!--#set var="DATE" value='<small
class="date-tag">2015-05</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>Gratis Android apps (but not <a
- href="/philosophy/free-sw.html">free software</a>)
connect</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>100 <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Gratis Android apps (but not <a
+ href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
- and advertising</a> URLs,</em></ins></span> on <span
class="removed"><del><strong>top under each subsection</strong></del></span>
<span class="inserted"><ins><em>the average.</p>
+ and advertising</a> URLs, on the average.</p>
</li>
<li id="M201504060">
<!--#set var="DATE" value='<small
class="date-tag">2015-04</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware</strong></del></span>
- <span class="inserted"><ins><em><p>Widely used <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop</em></ins></span> on <span
class="removed"><del><strong>Mobiles</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareIniThings">Spyware</strong></del></span> <span
class="inserted"><ins><em>the user</a>. This is</em></ins></span> in
<span class="removed"><del><strong>iThings</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
-</div>
-
-<ul>
- <li><p>Apple proposes
- <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without having your
fingerprints
- taken. Users would have no way</strong></del></span> <span
class="inserted"><ins><em>addition</em></ins></span> to <span
class="removed"><del><strong>tell whether</strong></del></span>
- the <span class="removed"><del><strong>phone is</strong></del></span>
snooping <span class="removed"><del><strong>on
- them.</p></li>
-
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots of personal data to Apple's servers</a>. Big Brother can
- get them from there.</p>
- </li>
-
- <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every</strong></del></span> <span
class="inserted"><ins><em>done by the</em></ins></span> phone <span
class="removed"><del><strong>number that</strong></del></span> <span
class="inserted"><ins><em>company, and perhaps by</em></ins></span> the <span
class="removed"><del><strong>user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>OS
in</em></ins></span>
- the <span class="removed"><del><strong>server records these numbers for at
least 30
- days.</p>
- </li>
-
- <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
- without giving a valid email address and receiving</strong></del></span>
<span class="inserted"><ins><em>phone.</p>
-
- <p>Don't be distracted by</em></ins></span> the <span
class="removed"><del><strong>code Apple
- sends to it.</p>
- </li>
-
- <li><p>Around 47%</strong></del></span> <span
class="inserted"><ins><em>question</em></ins></span> of <span
class="inserted"><ins><em>whether</em></ins></span> the <span
class="removed"><del><strong>most popular iOS apps
- <a class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a> of
their</strong></del></span> <span class="inserted"><ins><em>app developers
- get</em></ins></span> users <span class="removed"><del><strong>with third
parties.</p>
- </li>
-
- <li><p>iThings automatically upload to Apple's servers all the
photos and
- videos they make.</p>
-
- <blockquote><p>
- iCloud Photo Library stores every photo and video you take,
- and keeps them up</strong></del></span> to <span
class="removed"><del><strong>date on all your devices.
- Any edits you make are automatically updated everywhere. [...]
- </p></blockquote>
+ QR-code scanner apps snoop on the user</a>. This is in addition to
+ the snooping done by the phone company, and perhaps by the OS in
+ the phone.</p>
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud
feature</strong></del></span> <span class="inserted"><ins><em>say “I
agree”. That</em></ins></span> is
- <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span> <span class="inserted"><ins><em>no excuse for
+ <p>Don't be distracted by the question of whether the app developers
+ get users to say “I agree”. That is no excuse for
malware.</p>
</li>
@@ -2143,84 +2634,41 @@
<!--#set var="DATE" value='<small
class="date-tag">2014-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many proprietary apps for mobile devices
- report which other apps</em></ins></span> the
- <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
- “please don't ask where.”</p>
-
- <p>There</strong></del></span> <span class="inserted"><ins><em>user
has installed. <a
-
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</em></ins></span>
- is <span class="inserted"><ins><em>doing this in</em></ins></span> a way
<span class="removed"><del><strong>to <a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by default so it still
counts</strong></del></span> <span class="inserted"><ins><em>that at least is
visible and optional</a>. Not
- as bad</em></ins></span> as <span class="inserted"><ins><em>what the
others do.</p>
+ report which other apps the user has installed. <a
+ href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way that at least is visible and optional</a>. Not
+ as bad as what the others do.</p>
</li>
<li id="M201401150.1">
<!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Simeji keyboard is</em></ins></span> a
- <span class="removed"><del><strong>surveillance functionality.</p>
-
- <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>smartphone version</em></ins></span> of <span
class="removed"><del><strong>this to</strong></del></span> <span
class="inserted"><ins><em>Baidu's</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
+ <p>The Simeji keyboard is a smartphone version of Baidu's <a
+ href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
title="Input Method Editor">IME</abbr></a>.</p>
</li>
<li id="M201312270">
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The nonfree Snapchat app's principal purpose is</em></ins></span>
to <span class="removed"><del><strong>get at them, but NSA can access
any</strong></del></span> <span class="inserted"><ins><em>restrict the
- use</em></ins></span> of <span class="removed"><del><strong>them through
- <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware in iThings:</strong></del></span> <span
class="inserted"><ins><em>data on</em></ins></span> the <span
class="inserted"><ins><em>user's computer, but it does surveillance
too:</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing is,
- and</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to</em></ins></span> get <span class="inserted"><ins><em>the
user's list of</em></ins></span> other <span class="removed"><del><strong>info
too.</p></strong></del></span> <span class="inserted"><ins><em>people's
phone
- numbers</a>.</p></em></ins></span>
+ <p>The nonfree Snapchat app's principal purpose is to restrict the
+ use of data on the user's computer, but it does surveillance too: <a
+
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get the user's list of other people's phone
+ numbers</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>There is also a
feature for web sites to track users, which is</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201312060">
+ <li id="M201312060">
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Brightest Flashlight app</em></ins></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use</em></ins></span> by <span
class="removed"><del><strong>default</a>. (That article talks about iOS
6, but</strong></del></span> <span
class="inserted"><ins><em>companies</a>.</p>
-
- <p>The FTC criticized this app because</em></ins></span> it
- <span class="removed"><del><strong>is still true in iOS 7.)</p>
- </li>
-
- <li><p>The iThing also
- <a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though that can be
- turned off.</p>
- </li>
-
- <li><p>Apple can, and regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the
state</a>.</p>
- </li>
-
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop on all</strong></del></span> <span
class="inserted"><ins><em>asked</em></ins></span> the <span
class="inserted"><ins><em>user to
- approve sending personal</em></ins></span> data <span
class="removed"><del><strong>in an iThing,
- or</strong></del></span> <span class="inserted"><ins><em>to the app
developer but did not ask
- about sending</em></ins></span> it <span class="removed"><del><strong>is
totally incompetent.</a></p>
- </li>
-
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem</strong></del></span> to
<span class="removed"><del><strong>exist for no
- possible purpose</strong></del></span> other <span
class="removed"><del><strong>than surveillance</a>. Here
is</strong></del></span> <span class="inserted"><ins><em>companies. This shows
the weakness of</em></ins></span>
- the <span class="inserted"><ins><em>reject-it-if-you-dislike-snooping
“solution” to
+ <p>The Brightest Flashlight app <a
+
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies</a>.</p>
+
+ <p>The FTC criticized this app because it asked the user to
+ approve sending personal data to the app developer but did not ask
+ about sending it to other companies. This shows the weakness of
+ the reject-it-if-you-dislike-snooping “solution” to
surveillance: why should a flashlight app send any information to
anyone? A free software flashlight app would not.</p>
</li>
@@ -2228,31 +2676,27 @@
<li id="M201212100">
<!--#set var="DATE" value='<small
class="date-tag">2012-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>FTC says most mobile apps for children don't respect
privacy:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
+ <p>FTC says most mobile apps for children don't respect privacy:
<a
+
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware in
Telephones</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInSkype">Skype</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInSkype">#SpywareInSkype</a>)</span></em></ins></span>
+ <h4 id="SpywareInSkype">Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>According</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201908151">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Skype refuses</em></ins></span> to <span
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>say whether it can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
+ <p>Skype refuses to say whether it can <a
+
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
on calls</a>.</p>
- <p>That almost certainly means it</em></ins></span> can <span
class="removed"><del><strong>take over
smartphones</a></strong></del></span> <span class="inserted"><ins><em>do
so.</p>
+ <p>That almost certainly means it can do so.</p>
</li>
<li id="M201307110">
@@ -2277,26 +2721,25 @@
<!--#set var="DATE" value='<small
class="date-tag">2020-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Microsoft is imposing its
- surveillance on the game of Minecraft</em></ins></span> by <span
class="removed"><del><strong>sending hidden text messages</strong></del></span>
<span class="inserted"><ins><em><a
+ surveillance on the game of Minecraft by <a
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
every player to open an account on Microsoft's network</a>. Microsoft
- has bought the game and will merge all accounts into its
network,</em></ins></span>
- which <span class="removed"><del><strong>enable</strong></del></span>
<span class="inserted"><ins><em>will give</em></ins></span> them <span
class="inserted"><ins><em>access</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>people's data.</p>
+ has bought the game and will merge all accounts into its network,
+ which will give them access to people's data.</p>
<p>Minecraft players <a
href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
instead. The essential advantage of Minetest is that it is free
- software, meaning it respects</em></ins></span> the <span
class="removed"><del><strong>phones
- on</strong></del></span> <span class="inserted"><ins><em>user's computer
freedom. As a bonus,
+ software, meaning it respects the user's computer freedom. As a bonus,
it offers more options.</p>
</li>
<li id="M201908210">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft recorded users of Xboxes</em></ins></span> and <span
class="removed"><del><strong>off,</strong></del></span> <span
class="inserted"><ins><em>had <a
+ <p>Microsoft recorded users of Xboxes and had <a
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
- human workers</em></ins></span> listen to the <span
class="removed"><del><strong>microphone, retrieve
geo-location</strong></del></span> <span
class="inserted"><ins><em>recordings</a>.</p>
+ human workers listen to the recordings</a>.</p>
<p>Morally, we see no difference between having human workers listen
and
having speech-recognition systems listen. Both intrude on
privacy.</p>
@@ -2308,9 +2751,7 @@
<p>Red Shell is a spyware that
is found in many proprietary games. It <a
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks</em></ins></span> data <span class="removed"><del><strong>from the
- GPS, take photographs, read text messages, read call,
location</strong></del></span> <span class="inserted"><ins><em>on users'
computers</em></ins></span> and <span class="removed"><del><strong>web
- browsing history,</strong></del></span> <span
class="inserted"><ins><em>sends it to third parties</a>.</p>
+ tracks data on users' computers and sends it to third
parties</a>.</p>
</li>
<li id="M201804144">
@@ -2336,68 +2777,54 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Many <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>report to</em></ins></span> the <span
class="removed"><del><strong>contact list. This malware</strong></del></span>
- <span class="inserted"><ins><em>internet</a>—even what their
users weigh.</p>
-
- <p>A game console</em></ins></span> is <span
class="removed"><del><strong>designed to
- disguise itself from investigation.</p>
- </li>
+ video game consoles snoop on their users and report to the
+ internet</a>—even what their users weigh.</p>
- <li><p>Samsung phones come</strong></del></span> <span
class="inserted"><ins><em>a computer, and you can't trust a
computer</em></ins></span> with
- <span class="inserted"><ins><em>a nonfree operating system.</p>
+ <p>A game console is a computer, and you can't trust a computer with
+ a nonfree operating system.</p>
</li>
<li id="M201509160">
<!--#set var="DATE" value='<small
class="date-tag">2015-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that</strong></del></span>
- <span
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data about their</em></ins></span> users <span
class="removed"><del><strong>can't delete</a>,</strong></del></span> and
<span class="inserted"><ins><em>their users'
+ <p>Modern gratis game cr…apps <a
+
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of data about their users and their users'
friends and associates</a>.</p>
- <p>Even nastier,</em></ins></span> they <span
class="removed"><del><strong>send so much data</strong></del></span> <span
class="inserted"><ins><em>do it through ad networks</em></ins></span> that
<span class="removed"><del><strong>their transmission is</strong></del></span>
<span class="inserted"><ins><em>merge the data
+ <p>Even nastier, they do it through ad networks that merge the data
collected by various cr…apps and sites made by different
companies.</p>
<p>They use this data to manipulate people to buy things, and hunt
for
- “whales” who can be led to spend</em></ins></span> a
- <span class="removed"><del><strong>substantial
expense</strong></del></span> <span class="inserted"><ins><em>lot of money.
They also
- use a back door to manipulate the game play</em></ins></span> for <span
class="removed"><del><strong>users. Said transmission, not wanted or
- requested by</strong></del></span> <span
class="inserted"><ins><em>specific players.</p>
-
- <p>While</em></ins></span> the <span
class="removed"><del><strong>user, clearly must constitute spying of some
- kind.</p></li>
+ “whales” who can be led to spend a lot of money. They also
+ use a back door to manipulate the game play for specific players.</p>
- <li><p>A Motorola phone</strong></del></span> <span
class="inserted"><ins><em>article describes gratis games, games that cost money
+ <p>While the article describes gratis games, games that cost money
can use the same tactics.</p>
</li>
<li id="M201401280">
<!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Angry Birds</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies</em></ins></span> for <span class="removed"><del><strong>voice
all</strong></del></span> <span class="inserted"><ins><em>companies,
and</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>NSA takes advantage
+ <p>Angry Birds <a
+
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and the NSA takes advantage
to spy through it too</a>. Here's information on <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="https://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p></em></ins></span>
+ More about NSA app spying</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware in Android
phones (and Windows? laptops): The Wall
- Street Journal (in an article blocked from us by</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M200510200">
+ <li id="M200510200">
<!--#set var="DATE" value='<small
class="date-tag">2005-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Blizzard Warden is</em></ins></span> a <span
class="removed"><del><strong>paywall)
- reports</strong></del></span> <span class="inserted"><ins><em>hidden
- “cheating-prevention” program</em></ins></span> that <a
<span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
+ <p>Blizzard Warden is a hidden
+ “cheating-prevention” program that <a
+ href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
spies on every process running on a gamer's computer and sniffs a
good deal of personal data</a>, including lots of activities which
have nothing to do with cheating.</p>
@@ -2422,53 +2849,33 @@
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
designed to snoop on users</a> even if they meet
Mozilla's “Minimum Security Standards.” Insecure
- design of</em></ins></span> the <span class="removed"><del><strong>FBI can
remotely activate</strong></del></span> <span class="inserted"><ins><em>program
running on some of these devices <a
-
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes</em></ins></span>
- the <span class="removed"><del><strong>GPS</strong></del></span> <span
class="inserted"><ins><em>user susceptible to be snooped</em></ins></span> and
<span class="removed"><del><strong>microphone</strong></del></span> <span
class="inserted"><ins><em>exploited by crackers as
+ design of the program running on some of these devices <a
+
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes
+ the user susceptible to be snooped and exploited by crackers as
well</a>.</p>
</li>
<li id="M201708280">
<!--#set var="DATE" value='<small
class="date-tag">2017-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The bad security</em></ins></span> in <span
class="removed"><del><strong>Android
- phones and laptops</a>.
- (I suspect this means Windows laptops.) Here is</strong></del></span>
<span class="inserted"><ins><em>many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
- </li>
-
- <li><p>Portable phones with GPS will send their GPS
location</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop</em></ins></span> on
- <span class="removed"><del><strong>remote command and users cannot stop
them:
- <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require</strong></del></span> <span
class="inserted"><ins><em>the people that use them</a>.</p>
-
- <p>Don't be a sucker—reject</em></ins></span> all <span
class="removed"><del><strong>new portable phones
- to have GPS.)</p>
- </li>
+ <p>The bad security in many Internet of Stings devices allows <a
+
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on the people that use them</a>.</p>
- <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span> <span class="inserted"><ins><em>the
stings.</p>
+ <p>Don't be a sucker—reject all the stings.</p>
- <p><small>(It</em></ins></span> is <span
class="removed"><del><strong>to restrict</strong></del></span> <span
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span
class="removed"><del><strong>use of data on</strong></del></span> <span
class="inserted"><ins><em>article uses</em></ins></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
- too:</strong></del></span> <span
class="inserted"><ins><em>term</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the user's list of other people's phone
- numbers.</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p></em></ins></span>
+ <p><small>(It is unfortunate that the article uses the term
<a
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInTVSets">TV
Sets</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></em></ins></span>
+ <h4 id="SpywareInTVSets">TV Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li>
- <p>Faceapp</strong></del></span>
-
-<span class="inserted"><ins><em><p>Emo Phillips made a joke: The other
day a woman came up to me and
+<p>Emo Phillips made a joke: The other day a woman came up to me and
said, “Didn't I see you on television?” I said, “I
don't know. You can't see out the other way.” Evidently that was
before Amazon “smart” TVs.</p>
@@ -2482,7 +2889,7 @@
href="https://frame.work/blog/in-defense-of-dumb-tvs">it's now very
hard to find a TV that doesn't spy on you</a>.</p>
- <p>It</em></ins></span> appears <span class="inserted"><ins><em>that
those manufacturers business model is not to produce
+ <p>It appears that those manufacturers business model is not to
produce
TV and sell them for money, but to collect your personal data and
(possibly) hand over them to others for benefit.</p>
</li>
@@ -2490,78 +2897,50 @@
<li id="M202006250">
<!--#set var="DATE" value='<small
class="date-tag">2020-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>TV manufacturers are able</em></ins></span> to <span
class="removed"><del><strong>do lots of surveillance, judging
by</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
- every second of what the user is watching</a>. This is illegal
due</em></ins></span> to <span class="removed"><del><strong>personal data
in</strong></del></span>
- the <span class="removed"><del><strong>device</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>Video Privacy Protection Act of 1988, but they're
circumventing
- it through EULAs.</p></em></ins></span>
+ <p>TV manufacturers are able to <a
+
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
+ every second of what the user is watching</a>. This is illegal due to
+ the Video Privacy Protection Act of 1988, but they're circumventing
+ it through EULAs.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Verizon</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201901070">
+ <li id="M201901070">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
- pre-install on some of its phones. The app will give
Verizon</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever</em></ins></span> the <span
class="removed"><del><strong>same
- information about</strong></del></span> <span class="inserted"><ins><em>TV
sees,”</a> in</em></ins></span> the <span
class="removed"><del><strong>users' searches that Google normally gets when
- they use its search engine.</p>
-
- <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>own words of</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>company's
- CTO, and this data</em></ins></span> is <span
class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>sold to third parties. This is in return for
- “better service” (meaning more intrusive
ads?)</em></ins></span> and <span class="removed"><del><strong>the
- user must explicitly</strong></del></span> <span
class="inserted"><ins><em>slightly
+ <p>Vizio TVs <a
+
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever the TV sees,”</a> in the own words of
the company's
+ CTO, and this data is sold to third parties. This is in return for
+ “better service” (meaning more intrusive ads?) and slightly
lower retail prices.</p>
<p>What is supposed to make this spying acceptable, according to him,
- is that it is</em></ins></span> opt-in <span
class="removed"><del><strong>before</strong></del></span> <span
class="inserted"><ins><em>in newer models. But since</em></ins></span> the
<span class="removed"><del><strong>app takes effect.
However,</strong></del></span> <span class="inserted"><ins><em>Vizio software is
- nonfree, we don't know what is actually happening behind</em></ins></span>
the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware</strong></del></span> <span
class="inserted"><ins><em>scenes,
+ is that it is opt-in in newer models. But since the Vizio software is
+ nonfree, we don't know what is actually happening behind the scenes,
and there is no guarantee that all future updates will leave the
settings unchanged.</p>
<p>If you already own a Vizio “smart” TV (or any
“smart” TV, for that
- matter), the easiest way to make sure it isn't spying on
you</em></ins></span> is
- <span class="removed"><del><strong>still spyware.</p>
- </li>
-
- <li><p>The Meitu photo-editing
- app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data</strong></del></span>
- to <span class="inserted"><ins><em>disconnect it from the Internet, and
use</em></ins></span> a <span class="removed"><del><strong>Chinese
company</a>.</p></li>
-
- <li><p>A pregnancy test controller
application</strong></del></span> <span class="inserted"><ins><em>terrestrial
antenna
- instead. Unfortunately, this is</em></ins></span> not <span
class="removed"><del><strong>only</strong></del></span> <span
class="inserted"><ins><em>always possible. Another option,
+ matter), the easiest way to make sure it isn't spying on you is
+ to disconnect it from the Internet, and use a terrestrial antenna
+ instead. Unfortunately, this is not always possible. Another option,
if you are technically oriented, is to get your own router (which can
be an old computer running completely free software), and set up a
firewall to block connections to Vizio's servers. Or, as a last resort,
- you</em></ins></span> can <span class="inserted"><ins><em>replace your TV
with another model.</p>
+ you can replace your TV with another model.</p>
</li>
<li id="M201804010">
<!--#set var="DATE" value='<small
class="date-tag">2018-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts of data in</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ <p>Some “Smart” TVs automatically <a
+
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
- <p>We link to</em></ins></span> the <span
class="removed"><del><strong>phone, and in server
accounts,</strong></del></span> <span class="inserted"><ins><em>article for the
facts</em></ins></span> it <span class="removed"><del><strong>can
- alter them too</a>.
- </p></li>
-
- <li><p>The Uber</strong></del></span> <span
class="inserted"><ins><em>presents. It
+ <p>We link to the article for the facts it presents. It
is too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix</em></ins></span>
app <span class="removed"><del><strong>tracks</strong></del></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ moral weakness of surrendering to Netflix. The Netflix app <a
+ href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
@@ -2570,129 +2949,75 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them,</em></ins></span> and <span
class="removed"><del><strong>after</strong></del></span> <span
class="inserted"><ins><em>not just broadcasts and
- cable</a>. Even if</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
-
- <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>image is
coming from</em></ins></span> the user's <span
class="removed"><del><strong>consent”
- for surveillance is inadequate as</strong></del></span> <span
class="inserted"><ins><em>own computer,
- the TV reports what it is. The existence of</em></ins></span> a <span
class="removed"><del><strong>protection against massive</strong></del></span>
<span class="inserted"><ins><em>way to disable the
+ report everything that is viewed on them, and not just broadcasts and
+ cable</a>. Even if the image is coming from the user's own computer,
+ the TV reports what it is. The existence of a way to disable the
surveillance, even if it were not hidden as it was in these TVs,
- does not legitimize the</em></ins></span> surveillance.</p>
- </li>
-
- <span class="removed"><del><strong><li><p>Google's new voice
messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
+ does not legitimize the surveillance.</p>
</li>
- <li><p>Apps that include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511130">
+ <li id="M201511130">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some web</em></ins></span> and TV <span
class="removed"><del><strong>programs
- are playing nearby</a>. Also on what users
post</strong></del></span> <span class="inserted"><ins><em>advertisements play
inaudible
- sounds to be picked up by proprietary malware running</em></ins></span>
- on <span class="removed"><del><strong>various sites
- such</strong></del></span> <span class="inserted"><ins><em>other devices
in range so</em></ins></span> as <span class="removed"><del><strong>Facebook,
Google+</strong></del></span> <span class="inserted"><ins><em>to determine that
they
+ <p>Some web and TV advertisements play inaudible
+ sounds to be picked up by proprietary malware running
+ on other devices in range so as to determine that they
are nearby. Once your Internet devices are paired with
- your TV, advertisers can correlate ads with Web
activity,</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>other <a
+ your TV, advertisers can correlate ads with Web activity, and other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
- cross-device tracking</a>.</p></em></ins></span>
+ cross-device tracking</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511060">
+ <li id="M201511060">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio goes a step further than other TV
- manufacturers in spying on their users: their</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze</em></ins></span> your <span
class="removed"><del><strong>mobile phone's photo collections for known
faces</a>,</strong></del></span> <span class="inserted"><ins><em>viewing
habits in detail</em></ins></span> and <span
class="removed"><del><strong>suggests you to share the
picture</strong></del></span>
- <span class="inserted"><ins><em>link them your IP address</a> so
that advertisers can track</em></ins></span> you <span
class="removed"><del><strong>take according to who</strong></del></span>
- <span class="inserted"><ins><em>across devices.</p>
-
- <p>It</em></ins></span> is <span class="removed"><del><strong>in the
frame.</p>
+ manufacturers in spying on their users: their <a
+
href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so that advertisers can track you
+ across devices.</p>
- <p>This spyware feature seems to require online access to some
- known-faces database, which means the pictures are
likely</strong></del></span> <span
class="inserted"><ins><em>possible</em></ins></span> to <span
class="removed"><del><strong>be
- sent across the wire</strong></del></span> <span
class="inserted"><ins><em>turn this off, but having it enabled by default
+ <p>It is possible to turn this off, but having it enabled by default
is an injustice already.</p>
</li>
<li id="M201511020">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tivo's alliance with Viacom adds 2.3 million
households</em></ins></span>
- to <span class="removed"><del><strong>Facebook's servers and
face-recognition
- algorithms.</p>
-
- <p>If so, none of Facebook users' pictures are private
- anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload” them
to</strong></del></span> <span class="inserted"><ins><em>600 millions social
media profiles</em></ins></span> the <span
class="removed"><del><strong>service.</p>
- </li>
-
- <li><p>Like most “music screaming” disservices,
Spotify
- is based on proprietary malware (DRM and snooping). In August
- 2015 it</strong></del></span> <span class="inserted"><ins><em>company
+ <p>Tivo's alliance with Viacom adds 2.3 million households
+ to the 600 millions social media profiles the company
already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can
now</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
- correlate TV advertisement with online purchases</a>, exposing
all</em></ins></span>
- users <span class="removed"><del><strong>submit</strong></del></span> to
<span class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em>new
combined surveillance by default.</p>
+ information with online social media participation, Tivo can now <a
+ href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ correlate TV advertisement with online purchases</a>, exposing all
+ users to new combined surveillance by default.</p>
</li>
<li id="M201507240">
<!--#set var="DATE" value='<small
class="date-tag">2015-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio “smart” TVs recognize</em></ins></span> and
<span class="removed"><del><strong>some</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Vizio “smart” TVs recognize and <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people</em></ins></span> are <span
class="removed"><del><strong>starting to realize that</strong></del></span>
<span class="inserted"><ins><em>watching</a>, even if</em></ins></span>
it <span class="removed"><del><strong>is nasty.</p>
-
- <p>This article shows the <a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way
- to “serve” users better</a>—never mind
- whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>isn't</em></ins></span> a <span
class="removed"><del><strong>typical example of
- the attitude of the proprietary software industry towards
- those they have subjugated.</p>
-
- <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>TV channel.</p></em></ins></span>
+ what people are watching</a>, even if it isn't a TV
channel.</p>
</li>
- <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other
- apps the user has
- installed.</strong></del></span>
- <span class="inserted"><ins><em><li id="M201505290">
+ <li id="M201505290">
<!--#set var="DATE" value='<small
class="date-tag">2015-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch,</em></ins></span> and
- <span class="removed"><del><strong>optional</a>. Not as bad
as</strong></del></span> <span class="inserted"><ins><em>even</em></ins></span>
what <span class="removed"><del><strong>the others
do.</p></strong></del></span> <span class="inserted"><ins><em>they wanted
to
- record</a>.</p></em></ins></span>
+ <p>Verizon cable TV <a
+
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops on what programs people watch, and even what they wanted to
+ record</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>FTC says most mobile
apps for children don't respect privacy:</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201504300">
+ <li id="M201504300">
<!--#set var="DATE" value='<small
class="date-tag">2015-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
- </li>
-
- <li><p>Widely</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"></em></ins></span>
- used <span class="removed"><del><strong><a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps</strong></del></span> <span
class="inserted"><ins><em>a firmware “upgrade” to make its
TVs</em></ins></span> snoop on <span class="inserted"><ins><em>what
+ <p>Vizio <a
+
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ used a firmware “upgrade” to make its TVs snoop on what
users watch</a>. The TVs did not do that when first sold.</p>
</li>
@@ -2702,51 +3027,41 @@
<p>The Samsung “Smart” TV <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
transmits users' voice on the internet to another company,
Nuance</a>.
- Nuance can save it and would then have to give it to</em></ins></span> the
<span class="removed"><del><strong>user</a>. This</strong></del></span>
<span class="inserted"><ins><em>US or some
+ Nuance can save it and would then have to give it to the US or some
other government.</p>
- <p>Speech recognition</em></ins></span> is <span
class="removed"><del><strong>in addition</strong></del></span> <span
class="inserted"><ins><em>not</em></ins></span> to
- <span class="removed"><del><strong>the snooping</strong></del></span>
<span class="inserted"><ins><em>be trusted unless it is</em></ins></span> done
by <span class="removed"><del><strong>the phone company, and perhaps by the
OS</strong></del></span> <span class="inserted"><ins><em>free
- software</em></ins></span> in <span class="removed"><del><strong>the
- phone.</p>
-
- <p>Don't</strong></del></span> <span
class="inserted"><ins><em>your own computer.</p>
+ <p>Speech recognition is not to be trusted unless it is done by free
+ software in your own computer.</p>
<p>In its privacy policy, Samsung explicitly confirms that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will</em></ins></span> be <span
class="removed"><del><strong>distracted by the question of whether the app
developers get
- users</strong></del></span> <span
class="inserted"><ins><em>transmitted</em></ins></span> to <span
class="removed"><del><strong>say “I agree”.
That</strong></del></span> <span class="inserted"><ins><em>third
+ data containing sensitive information will be transmitted to third
parties</a>.</p>
</li>
<li id="M201411090">
<!--#set var="DATE" value='<small
class="date-tag">2014-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Amazon “Smart” TV</em></ins></span> is <span
class="removed"><del><strong>no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em><a
+ <p>The Amazon “Smart” TV is <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all the time</a>.</p></em></ins></span>
+ snooping all the time</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201409290">
+ <li id="M201409290">
<!--#set var="DATE" value='<small
class="date-tag">2014-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p></em></ins></span>
+ <p>More or less all “smart” TVs <a
+
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
- <p>The <span class="removed"><del><strong>FTC
criticized</strong></del></span> <span class="inserted"><ins><em>report was as
of 2014, but we don't expect</em></ins></span> this <span
class="removed"><del><strong>app because it asked the
user</strong></del></span> <span class="inserted"><ins><em>has got
+ <p>The report was as of 2014, but we don't expect this has got
better.</p>
- <p>This shows that laws requiring products</em></ins></span> to
- <span class="removed"><del><strong>approve sending</strong></del></span>
<span class="inserted"><ins><em>get users' formal
- consent before collecting</em></ins></span> personal data <span
class="inserted"><ins><em>are totally inadequate.
+ <p>This shows that laws requiring products to get users' formal
+ consent before collecting personal data are totally inadequate.
And what happens if a user declines consent? Probably the TV will
- say, “Without your consent</em></ins></span> to <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>app developer but did</strong></del></span> <span
class="inserted"><ins><em>TV will</em></ins></span> not
- <span class="removed"><del><strong>ask about
sending</strong></del></span>
- <span class="inserted"><ins><em>work.”</p>
+ say, “Without your consent to tracking, the TV will not
+ work.”</p>
<p>Proper laws would say that TVs are not allowed to report what the
user watches—no exceptions!</p>
@@ -2765,14 +3080,12 @@
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
snoops on other devices on the user's local network</a>.</p>
- <p>LG later said</em></ins></span> it <span
class="inserted"><ins><em>had installed a patch</em></ins></span> to <span
class="removed"><del><strong>other companies. This shows the
- weakness</strong></del></span> <span class="inserted"><ins><em>stop
this, but any
+ <p>LG later said it had installed a patch to stop this, but any
product could spy this way.</p>
<p>Meanwhile, LG TVs <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots</em></ins></span> of <span class="removed"><del><strong>the
reject-it-if-you-dislike-snooping
- “solution”</strong></del></span> <span
class="inserted"><ins><em>spying anyway</a>.</p>
+ do lots of spying anyway</a>.</p>
</li>
<li id="M201212170">
@@ -2780,31 +3093,24 @@
--><!--#echo encoding="none" var="DATE" -->
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>break security on</em></ins></span> a <span
class="removed"><del><strong>flashlight
- app send any information</strong></del></span> <span
class="inserted"><ins><em>“smart” TV</a>
- and use its camera</em></ins></span> to <span
class="removed"><del><strong>anyone? A free software flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>watch the people who are watching
TV.</p></em></ins></span>
+ Crackers found a way to break security on a “smart”
TV</a>
+ and use its camera to watch the people who are watching TV.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInGames">Spyware in
Games</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInGames">#SpywareInGames</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+ <h4 id="SpywareInCameras">Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201901100">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends personal data about
them</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture</em></ins></span> to
- <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Amazon servers</a>, which save it
+ <p>Amazon Ring “security” devices <a
+
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send the video they capture to Amazon servers</a>, which save it
long-term.</p>
<p>In many cases, the video shows everyone that comes near, or merely
@@ -2813,36 +3119,29 @@
<p>The article focuses on how Ring used to let individual employees
look
at the videos freely. It appears Amazon has tried to prevent that
secondary abuse, but the primary abuse—that Amazon gets the
- video—Amazon expects society to surrender
to.</p></em></ins></span>
+ video—Amazon expects society to surrender to.</p>
</li>
- <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201810300">
+ <li id="M201810300">
<!--#set var="DATE" value='<small
class="date-tag">2018-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give</em></ins></span> the <span class="removed"><del><strong>NSA takes
advantage</strong></del></span> <span class="inserted"><ins><em>manufacturer an
unencrypted copy of everything they
+ <p>Nearly all “home security cameras” <a
+
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give the manufacturer an unencrypted copy of everything they
see</a>. “Home insecurity camera” would be a better
name!</p>
<p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>look at what's in the videos. That's not
+ manufacturers promise not to look at what's in the videos. That's not
security for your home. Security means making sure they don't get to
- see</em></ins></span> through <span class="removed"><del><strong>it
too</a>.
- Here's information on</strong></del></span> <span
class="inserted"><ins><em>your camera.</p>
+ see through your camera.</p>
</li>
<li id="M201603220">
<!--#set var="DATE" value='<small
class="date-tag">2016-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Over 70 brands of network-connected surveillance cameras
have</em></ins></span> <a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ <p>Over 70 brands of network-connected surveillance cameras have
<a
+
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
security bugs that allow anyone to watch through them</a>.</p>
</li>
@@ -2854,34 +3153,25 @@
even when the “owner” switches it “off.”</p>
<p>A “smart” device means the manufacturer is using it
- to outsmart you.</p></em></ins></span>
+ to outsmart you.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInToys">Spyware in
Toys</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <h4 id="SpywareInToys">Toys</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li>
- <p>The “smart” toys My Friend Cayla and i-Que transmit
- <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201711244">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Furby Connect has</em></ins></span> a <span
class="removed"><del><strong>speech recognition company based in the
U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>The Furby Connect has a <a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>toys with</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as</em></ins></span> a
<span class="removed"><del><strong>mobile phone. This would
- enable crackers</strong></del></span>
- <span class="inserted"><ins><em>listening device, remote
changes</em></ins></span> to <span class="removed"><del><strong>listen in on a
child's speech, and even speak</strong></del></span> <span
class="inserted"><ins><em>the code could surely convert it</em></ins></span>
- into <span class="inserted"><ins><em>one.</p>
+ universal back door</a>. If the product as shipped doesn't act as a
+ listening device, remote changes to the code could surely convert it
+ into one.</p>
</li>
<li id="M201711100">
@@ -2889,14 +3179,12 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of</em></ins></span> the <span
class="removed"><del><strong>toys themselves.</p></strong></del></span>
<span class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
+ recordings of the conversation between two users</a>.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201703140">
+ <li id="M201703140">
<!--#set var="DATE" value='<small
class="date-tag">2017-03</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
+ --><!--#echo encoding="none" var="DATE" -->
<p>A computerized vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
was snooping on its users through the proprietary control
app</a>.</p>
@@ -2926,19 +3214,17 @@
customers.</p>
</li>
- <span class="removed"><del><strong><li><p>
“CloudPets”</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702280">
+ <li id="M201702280">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>“CloudPets”</em></ins></span> toys with microphones
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak</em></ins></span> childrens' conversations to the
manufacturer</a>. Guess what? <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers</em></ins></span> found a way to access the data</a>
collected by the
+ <p>“CloudPets” toys with microphones <a
+
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations to the manufacturer</a>. Guess what?
<a
+
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found a way to access the data</a> collected by the
manufacturer's snooping.</p>
- <p>That the manufacturer and <span class="removed"><del><strong>the
FBI could listen to these conversations</strong></del></span> <span
class="inserted"><ins><em>the FBI could listen to these
+ <p>That the manufacturer and the FBI could listen to these
conversations was unacceptable by itself.</p>
</li>
@@ -2977,130 +3263,64 @@
--><!--#echo encoding="none" var="DATE" -->
<p>While you're using a DJI drone
to snoop on other people, DJI is in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-
-<ul class="blurbs">
- <li id="M202009270">
- <!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Many employers are using nonfree
- software, including videoconference software, to <a
-
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
- surveil and monitor staff working at home</a>. If the program reports
- whether you are “active,” that is in effect a malicious
- surveillance feature.</p>
- </li>
-
- <li id="M202008030">
- <!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Google Nest <a
-
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
- is taking over ADT</a>. Google sent out a software
- update to its speaker devices using their back door <a
- href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that
- listens for things like smoke alarms</a> and then notifies your phone
- that an alarm is happening. This means the devices now listen for more
- than just their wake words. Google says the software update was sent
- out prematurely and on accident and Google</em></ins></span> was <span
class="removed"><del><strong>unacceptable by itself.</p></li>
-
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy</strong></del></span> <span
class="inserted"><ins><em>planning</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>disclosing
- this new feature</em></ins></span> and <span
class="removed"><del><strong>adults</a>.</p>
- </li>
-</ul>
-
-
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>offering it</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each
subsection</strong></del></span> <span class="inserted"><ins><em>customers who
pay for it.</p>
- </li>
-
- <li id="M202006300">
- <!--#set var="DATE" value='<small
class="date-tag">2020-06</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
-
-<ul>
-<li><p></strong></del></span>
- <span class="inserted"><ins><em><p>“Bossware” is malware
that bosses</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
- coerce workers into installing in their own computers</a>, so the
- bosses can spy</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
-Note that</strong></del></span> <span class="inserted"><ins><em>them.</p>
-
- <p>This shows why requiring</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a “clean” Windows install</strong></del></span>
<span class="inserted"><ins><em>user's “consent”</em></ins></span>
is not <span class="removed"><del><strong>really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span>
- <span class="inserted"><ins><em>an adequate basis for protecting digital
privacy. The boss can coerce
- most workers into consenting</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it</strong></del></span> <span
class="inserted"><ins><em>almost anything, even probable exposure
- to contagious disease that</em></ins></span> can <span
class="removed"><del><strong>collect the emails of members of
Parliament</strong></del></span> <span class="inserted"><ins><em>be fatal.
Software like</em></ins></span> this <span class="removed"><del><strong>way,
because they pass</strong></del></span> <span class="inserted"><ins><em>should
- be illegal and bosses that demand</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>should be prosecuted for
it.</p></em></ins></span>
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+ <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
</div>
-<ul>
- <li><p>Spyware in Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
+<ul class="blurbs">
+ <li id="M202009270">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Many employers are using nonfree
+ software, including videoconference software, to <a
+
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
+ surveil and monitor staff working at home</a>. If the program reports
+ whether you are “active,” that is in effect a malicious
+ surveillance feature.</p>
+ </li>
+
+ <li id="M202008030">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Google Nest <a
+
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
+ is taking over ADT</a>. Google sent out a software
+ update to its speaker devices using their back door <a
+ href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that
+ listens for things like smoke alarms</a> and then notifies your phone
+ that an alarm is happening. This means the devices now listen for more
+ than just their wake words. Google says the software update was sent
+ out prematurely and on accident and Google was planning on disclosing
+ this new feature and offering it to customers who pay for it.</p>
+ </li>
+
+ <li id="M202006300">
+ <!--#set var="DATE" value='<small
class="date-tag">2020-06</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>“Bossware” is malware that bosses <a
+
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers">
+ coerce workers into installing in their own computers</a>, so the
+ bosses can spy on them.</p>
- <span class="inserted"><ins><em><li id="M201911190">
+ <p>This shows why requiring the user's “consent” is not
+ an adequate basis for protecting digital privacy. The boss can coerce
+ most workers into consenting to almost anything, even probable exposure
+ to contagious disease that can be fatal. Software like this should
+ be illegal and bosses that demand it should be prosecuted for it.</p>
+ </li>
+
+ <li id="M201911190">
<!--#set var="DATE" value='<small
class="date-tag">2019-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Internet-tethered Amazon Ring had
- a security vulnerability that enabled attackers to</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ a security vulnerability that enabled attackers to <a
+
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
access the user's wifi password</a>, and snoop on the household
through connected surveillance devices.</p>
@@ -3108,234 +3328,101 @@
out any significant surveillance if the devices implemented proper
security, including encryption. But many devices with proprietary
software lack this. Of course, they are also used by their
- manufacturers</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>snooping.</p></em></ins></span>
+ manufacturers for snooping.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure to place new items on top under each
subsection</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201907210">
+ <li id="M201907210">
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>The Nest Cam “smart” camera is</strong></del></span>
- <span class="inserted"><ins><em><p>Google “Assistant”
records users' conversations</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even</em></ins></span>
- when <span class="removed"><del><strong>the “owner”
switches</strong></del></span> it <span
class="removed"><del><strong>“off.”</p>
- <p>A “smart” device means the
manufacturer</strong></del></span> is <span
class="removed"><del><strong>using</strong></del></span> <span
class="inserted"><ins><em>not supposed to listen</a>. Thus, when one of
Google's
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Google “Assistant” records users' conversations <a
+
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
+ when it is not supposed to listen</a>. Thus, when one of Google's
subcontractors discloses a thousand confidential voice recordings,
users were easily identified from these recordings.</p>
<p>Since Google “Assistant” uses proprietary software,
there is no
- way to see or control what</em></ins></span> it <span
class="inserted"><ins><em>records or sends.</p>
-
- <p>Rather than trying</em></ins></span> to <span
class="removed"><del><strong>outsmart
- you.</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-
-<ul>
- <li><p>E-books can contain Javascript code,
- and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
- </li>
-
- <li><p>Spyware in many e-readers—not
only</strong></del></span> <span class="inserted"><ins><em>better
control</em></ins></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span> <span
class="inserted"><ins><em>use of recordings, Google
- should not record or listen to</em></ins></span> the <span
class="removed"><del><strong>user reads at what time</a>.</p>
- </li>
-
- <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>person's
voice. It should only
- get commands that</em></ins></span> the <span
class="removed"><del><strong>e-reader used
- by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data</strong></del></span> <span
class="inserted"><ins><em>user wants</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
- needed</strong></del></span> <span
class="inserted"><ins><em>send</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
+ way to see or control what it records or sends.</p>
-<ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>some Google service.</p></em></ins></span>
+ <p>Rather than trying to better control the use of recordings, Google
+ should not record or listen to the person's voice. It should only
+ get commands that the user wants to send to some Google service.</p>
</li>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>id="M201905061">
+ <li id="M201905061">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Amazon Alexa collects</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
- effectively
- anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely</strong></del></span> <span
class="inserted"><ins><em>lot more information from users
+ <p>Amazon Alexa collects a lot more information from users
than is necessary for correct functioning (time, location,
- recordings made without a legitimate prompt),</em></ins></span> and <span
class="removed"><del><strong>make changes in various
- settings</a>.</p>
-
- <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>sends
- it</em></ins></span> to <span class="removed"><del><strong>do because the
system has no authentication when
- accessed through</strong></del></span> <span
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
+ recordings made without a legitimate prompt), and sends
+ it to Amazon's servers, which store it indefinitely. Even
worse, Amazon forwards it to third-party companies. Thus,
even if users request deletion of their data from Amazon's servers, <a
-
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
- the <span class="removed"><del><strong>modem. However, even if it asked
for
- authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>data remain on other servers</a>, where they
can</em></ins></span> be <span class="removed"><del><strong>confident that
Nissan has no
- access. The software in</strong></del></span> <span
class="inserted"><ins><em>accessed by
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
+ the data remain on other servers</a>, where they can be accessed by
advertising companies and government agencies. In other words,
- deleting</em></ins></span> the <span class="removed"><del><strong>car is
- proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from its users</a>.</p>
-
- <p>Even if no one connects to</strong></del></span> <span
class="inserted"><ins><em>collected information doesn't
cancel</em></ins></span> the <span class="removed"><del><strong>car
remotely,</strong></del></span> <span class="inserted"><ins><em>wrong of
+ deleting the collected information doesn't cancel the wrong of
collecting it.</p>
- <p>Data collected by devices such as</em></ins></span> the <span
class="removed"><del><strong>cell phone
- modem enables</strong></del></span> <span class="inserted"><ins><em>Nest
thermostat,</em></ins></span> the <span class="removed"><del><strong>phone
company to track</strong></del></span> <span class="inserted"><ins><em>Philips
- Hue-connected lights,</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>Chamberlain MyQ garage opener and</em></ins></span>
the <span class="removed"><del><strong>time; it is possible to physically
remove</strong></del></span> <span class="inserted"><ins><em>Sonos
- speakers are likewise stored longer than necessary on</em></ins></span>
the <span class="removed"><del><strong>cell phone modem
- though.</p>
- </li>
-
- <li id="records-drivers"><p>Proprietary software in cars
- <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is</strong></del></span> <span class="inserted"><ins><em>servers
- the devices are tethered to. Moreover, they are</em></ins></span> made
available to <span class="removed"><del><strong>car manufacturers, insurance
companies, and
- others.</p>
-
- <p>The case of toll-collection systems, mentioned in this article,
is not
- really</strong></del></span>
- <span class="inserted"><ins><em>Alexa. As</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
- intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>result, Amazon has a very precise
picture</em></ins></span> of <span class="removed"><del><strong>privacy, and
should be replaced with anonymous
- payment systems,</strong></del></span> <span
class="inserted"><ins><em>users' life
- at home, not only in the present,</em></ins></span> but <span
class="inserted"><ins><em>in</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
- cases mentioned are done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>past (and, who knows,</em></ins></span>
- in the <span class="removed"><del><strong>car.</p></li>
-
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>future too?)</p>
+ <p>Data collected by devices such as the Nest thermostat, the Philips
+ Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+ speakers are likewise stored longer than necessary on the servers
+ the devices are tethered to. Moreover, they are made available to
+ Alexa. As a result, Amazon has a very precise picture of users' life
+ at home, not only in the present, but in the past (and, who knows,
+ in the future too?)</p>
</li>
<li id="M201904240">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some of users' commands to</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>Alexa service are <a
+ <p>Some of users' commands to the Alexa service are <a
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees</em></ins></span> to <span
class="removed"><del><strong>extract data remotely</strong></del></span> <span
class="inserted"><ins><em>listen to</a>. The Google</em></ins></span> and
- <span class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>Apple
+ recorded for Amazon employees to listen to</a>. The Google and Apple
voice assistants do similar things.</p>
- <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span class="inserted"><ins><em>Alexa service staff
even has access to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
- location</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
- store this information, but if</strong></del></span> <span
class="inserted"><ins><em>other personal data</a>.</p>
+ <p>A fraction of the Alexa service staff even has access to <a
+
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
+ location and other personal data</a>.</p>
- <p>Since</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>client program is nonfree, and data processing is done
+ <p>Since the client program is nonfree, and data processing is done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
the cloud</a>” (a soothing way of saying “We won't
tell you how and where it's done”), users have no way
- to know what happens</em></ins></span> to <span
class="removed"><del><strong>get the data
- and hand it over,</strong></del></span> the <span
class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>recordings
unless human eavesdroppers <a
+ to know what happens to the recordings unless human eavesdroppers <a
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure
agreements</a>.</p></em></ins></span>
+ break their non-disclosure agreements</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareAtHome</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902080">
+ <li id="M201902080">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS:</strong></del></span>
- <span class="inserted"><ins><em><p>The HP <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The HP <a
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a> to</em></ins></span> make sure
<span class="removed"><del><strong>to place new items on top under each
subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Nest thermometers
- send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot of data about</strong></del></span> the <span
class="removed"><del><strong>user</a>.</p>
- </li>
-
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers</strong></del></span> <span
class="inserted"><ins><em>user is still
- paying for the subscription, and hasn't printed more pages
than</em></ins></span> were <span class="removed"><del><strong>programmed to
spy</strong></del></span>
- <span class="inserted"><ins><em>paid for.</p>
+ communicates with HP servers</a> to make sure the user is still
+ paying for the subscription, and hasn't printed more pages than were
+ paid for.</p>
<p>Even though the ink subscription program may be cheaper in some
- specific cases, it spies</em></ins></span> on <span
class="removed"><del><strong>their renters</a>.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware</strong></del></span> <span
class="inserted"><ins><em>users, and involves totally unacceptable
- restrictions</em></ins></span> in <span class="removed"><del><strong>TV
Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
-</div>
-
-<p>Emo Phillips made a joke: The other day</strong></del></span> <span
class="inserted"><ins><em>the use of ink cartridges that would otherwise be in
+ specific cases, it spies on users, and involves totally unacceptable
+ restrictions in the use of ink cartridges that would otherwise be in
working order.</p>
</li>
<li id="M201808120">
<!--#set var="DATE" value='<small
class="date-tag">2018-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span> to <span
class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>break the security of an Amazon
device,</em></ins></span>
- and
-<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I
-don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ <p>Crackers found a way to break the security of an Amazon device,
+ and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
<p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>other way.”
Evidently</strong></del></span> <span class="inserted"><ins><em>US
- told Amazon to do this, or cease to sell the product in</em></ins></span>
that <span class="removed"><del><strong>was
-before</strong></del></span> <span class="inserted"><ins><em>country,
- do you think</em></ins></span> Amazon <span
class="removed"><del><strong>“smart” TVs.</p>
+ easier for Amazon. And if some government such as China or the US
+ told Amazon to do this, or cease to sell the product in that country,
+ do you think Amazon would have the moral fiber to say no?</p>
-<ul>
- <li>
- <p>Vizio
- “smart”</strong></del></span> <span
class="inserted"><ins><em>would have the moral fiber to say no?</p>
-
- <p><small>(These crackers are probably hackers too, but
please</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything</strong></del></span>
- <span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
+ <p><small>(These crackers are probably hackers too, but please
<a
+ href="https://stallman.org/articles/on-hacking.html"> don't use
“hacking” to mean “breaking
security”</a>.)</small></p>
</li>
@@ -3344,9 +3431,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A medical insurance company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush</em></ins></span> that <span
class="removed"><del><strong>is viewed</strong></del></span> <span
class="inserted"><ins><em>snoops</em></ins></span> on <span
class="removed"><del><strong>them, and not just broadcasts
- and cable</a>. Even if</strong></del></span> <span
class="inserted"><ins><em>its user by
- sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>image is coming from</strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p>
+ offers a gratis electronic toothbrush that snoops on its user by
+ sending usage data back over the Internet</a>.</p>
</li>
<li id="M201706204">
@@ -3354,34 +3440,20 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Lots of “smart” products are designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen to everyone in</em></ins></span> the <span
class="removed"><del><strong>user's own
- computer,</strong></del></span> <span class="inserted"><ins><em>house,
all</em></ins></span> the <span class="removed"><del><strong>TV reports what it
is. The existence</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ listen to everyone in the house, all the time</a>.</p>
- <p>Today's technological practice does not include any
way</em></ins></span> of <span
class="inserted"><ins><em>making</em></ins></span>
- a <span class="removed"><del><strong>way to
- disable the surveillance, even</strong></del></span> <span
class="inserted"><ins><em>device that can obey your voice commands without
potentially spying
- on you. Even</em></ins></span> if it <span
class="removed"><del><strong>were not hidden as</strong></del></span> <span
class="inserted"><ins><em>is air-gapped,</em></ins></span> it <span
class="removed"><del><strong>was in
- these TVs, does not legitimize the
surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>could be saving up records
- about you for later examination.</p></em></ins></span>
+ <p>Today's technological practice does not include any way of making
+ a device that can obey your voice commands without potentially spying
+ on you. Even if it is air-gapped, it could be saving up records
+ about you for later examination.</p>
</li>
- <span class="removed"><del><strong><li><p>More or less all
“smart” TVs</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201407170">
+ <li id="M201407170">
<!--#set var="DATE" value='<small
class="date-tag">2014-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a
-<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
-
- <p>The report was as</strong></del></span>
- <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot</em></ins></span> of <span class="removed"><del><strong>2014, but we don't
expect this has got better.</p>
-
- <p>This shows that laws requiring products to get users' formal
- consent before collecting personal</strong></del></span>
- data <span class="removed"><del><strong>are totally inadequate.
- And what happens if a user declines consent?
Probably</strong></del></span> <span
class="inserted"><ins><em>about</em></ins></span> the <span
class="removed"><del><strong>TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>user</a>.</p>
+ <p id="nest-thermometers">Nest thermometers send <a
+ href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
+ data about the user</a>.</p>
</li>
<li id="M201310260">
@@ -3389,7 +3461,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</em></ins></span> to <span
class="removed"><del><strong>tracking, the TV</strong></del></span> <span
class="inserted"><ins><em>spy on their renters</a>.</p>
+ Rent-to-own computers were programmed to spy on their
renters</a>.</p>
</li>
</ul>
@@ -3407,15 +3479,10 @@
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
monitor how often people wear it</a>.</p>
- <p>This</em></ins></span> will
- <span class="removed"><del><strong>not work.”</p>
-
- <p>Proper laws would say that TVs are not
allowed</strong></del></span> <span class="inserted"><ins><em>teach the
sheeple</em></ins></span> to <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>find it normal that companies
- monitor every aspect of</em></ins></span> what
- <span class="removed"><del><strong>the user watches — no
exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>they do.</p></em></ins></span>
+ <p>This will teach the sheeple to find it normal that companies
+ monitor every aspect of what they do.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio
goes</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<h5 id="SpywareOnSmartWatches">“Smart” Watches</h5>
@@ -3426,19 +3493,13 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Internet-enabled watches with proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they have</em></ins></span> a <span
class="removed"><del><strong>step further than other TV manufacturers in spying
on
- their users: their</strong></del></span> <span
class="inserted"><ins><em>lot of security flaws. They</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in
detail</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
+ privacy. In addition, they have a lot of security flaws. They <a
+
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
permit security breakers (and unauthorized people) to access</a> the
watch.</p>
- <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent</em></ins></span> and
- <span class="removed"><del><strong>link them your IP address</a>
so</strong></del></span> <span class="inserted"><ins><em>child and spoof
messages to and from the watch, possibly endangering the child.</p>
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent and child and spoof messages to and from the
watch, possibly endangering the child.</p>
- <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>advertisers can track you
- across devices.</p>
-
- <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>this article misuses the word “<a
+ <p><small>(Note that this article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
to mean “crackers.”)</small></p>
</li>
@@ -3448,15 +3509,13 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A very cheap “smart watch” comes with an Android app
<a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
+ that connects to an unidentified site in China</a>.</p>
- <p>The article says</em></ins></span> this <span
class="removed"><del><strong>off,</strong></del></span> <span
class="inserted"><ins><em>is a back door,</em></ins></span> but <span
class="removed"><del><strong>having</strong></del></span> <span
class="inserted"><ins><em>that could be a
- misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>certainly surveillance, at
least.</p></em></ins></span>
+ <p>The article says this is a back door, but that could be a
+ misunderstanding. However, it is certainly surveillance, at
least.</p>
</li>
- <span class="removed"><del><strong><li><p>Tivo's
alliance</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201407090">
+ <li id="M201407090">
<!--#set var="DATE" value='<small
class="date-tag">2014-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>An LG “smart” watch is designed <a
@@ -3484,7 +3543,7 @@
<p>Before you buy a “connected” car, make sure you can
disconnect its cellular antenna and its GPS antenna. If you want
GPS navigation, get a separate navigator which runs free software
- and works</em></ins></span> with <span class="removed"><del><strong>Viacom
adds 2.3 million households</strong></del></span> <span
class="inserted"><ins><em>Open Street Map.</p>
+ and works with Open Street Map.</p>
</li>
<li id="M201912171">
@@ -3492,23 +3551,19 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Most modern cars now <a
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
- record and send various kinds of data</em></ins></span> to the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. For</em></ins></span>
- the <span class="removed"><del><strong>company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>user, access to the data is nearly impossible,
as it involves
- cracking the car's computer, which is always hidden and
running</em></ins></span> with <span class="removed"><del><strong>online
- social media participation, Tivo can now</strong></del></span>
- <span class="inserted"><ins><em>proprietary software.</p>
+ record and send various kinds of data to the manufacturer</a>. For
+ the user, access to the data is nearly impossible, as it involves
+ cracking the car's computer, which is always hidden and running with
+ proprietary software.</p>
</li>
<li id="M201903290">
<!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tesla cars collect lots of personal data, and</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
- when they go to a junkyard the driver's personal data
goes</em></ins></span> with <span class="removed"><del><strong>online
purchases</a>, exposing all users</strong></del></span>
- <span class="inserted"><ins><em>them</a>.</p>
+ <p>Tesla cars collect lots of personal data, and <a
+
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
+ when they go to a junkyard the driver's personal data goes with
+ them</a>.</p>
</li>
<li id="M201902011">
@@ -3516,193 +3571,136 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The FordPass Connect feature of some Ford vehicles has <a
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access</em></ins></span> to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>the internal car
network</a>. It is constantly
- connected</em></ins></span> to <span class="removed"><del><strong>be
- picked up</strong></del></span> <span class="inserted"><ins><em>the
cellular phone network and sends Ford a lot of data,
+ near-complete access to the internal car network</a>. It is
constantly
+ connected to the cellular phone network and sends Ford a lot of data,
including car location. This feature operates even when the ignition
key is removed, and users report that they can't disable it.</p>
<p>If you own one of these cars, have you succeeded in breaking the
- connectivity</em></ins></span> by <span
class="removed"><del><strong>proprietary malware running on other
devices</strong></del></span> <span class="inserted"><ins><em>disconnecting the
cellular modem, or wrapping the
- antenna</em></ins></span> in
- <span class="removed"><del><strong>range so as</strong></del></span>
<span class="inserted"><ins><em>aluminum foil?</p>
+ connectivity by disconnecting the cellular modem, or wrapping the
+ antenna in aluminum foil?</p>
</li>
<li id="M201811300">
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>In China, it is mandatory for electric
- cars</em></ins></span> to <span class="removed"><del><strong>determine
that they are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads</strong></del></span> <span class="inserted"><ins><em>be
equipped</em></ins></span> with <span class="removed"><del><strong>Web
activity, and
- other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
- </li>
- <li><p>Vizio “smart” TVs recognize
and</strong></del></span> <span class="inserted"><ins><em>a terminal
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
- even if it isn't</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ cars to be equipped with a terminal that <a
+ href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
transfers technical data, including car location,
- to</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p>
- </li>
- <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>government-run platform</a>. In
practice,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching and listening all</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying">
+ to a government-run platform</a>. In practice, <a
+ href="/proprietary/proprietary-surveillance.html#car-spying">
manufacturers collect this data</a> as part of their own spying, then
- forward it to</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>government-run
platform.</p></em></ins></span>
+ forward it to the government-run platform.</p>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
- <span class="inserted"><ins><em><li id="M201810230">
+ <li id="M201810230">
<!--#set var="DATE" value='<small
class="date-tag">2018-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked</em></ins></span> the <span class="removed"><del><strong>internet
to another
- company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>choices of radio programs</a> in its
+ <p>GM <a
+ href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
+ tracked the choices of radio programs</a> in its
“connected” cars, minute by minute.</p>
- <p>GM did not get users' consent, but</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>could</em></ins></span> have <span
class="removed"><del><strong>to
- give</strong></del></span> <span class="inserted"><ins><em>got that
easily by
- sneaking</em></ins></span> it <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>into</em></ins></span> the <span
class="removed"><del><strong>US or</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for</em></ins></span> some
<span class="removed"><del><strong>other government.</p>
- <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>digital service
- or other. A requirement for consent</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>effectively no protection.</p>
-
- <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="removed"><del><strong>be trusted
unless it is done
- by free software in</strong></del></span> <span
class="inserted"><ins><em>you,
- watching you, following</em></ins></span> your <span
class="removed"><del><strong>own computer.</p>
-
- <p>In its privacy policy, Samsung explicitly confirms
- that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice</strong></del></span>
<span class="inserted"><ins><em>movements, tracking passengers' cell
- phones. <em>All</em> such</em></ins></span> data <span
class="removed"><del><strong>containing sensitive information
will</strong></del></span> <span class="inserted"><ins><em>collection
should</em></ins></span> be <span
class="removed"><del><strong>transmitted</strong></del></span> <span
class="inserted"><ins><em>forbidden.</p>
-
- <p>But if you really want</em></ins></span> to
- <span class="removed"><del><strong>third parties</a>.</p>
- </li>
- <li><p>Spyware in
- <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports what the user watches,
and</strong></del></span> <span class="inserted"><ins><em>be safe, we must make
sure</em></ins></span> the <span class="removed"><del><strong>switch to turn
this off has no effect. (The fact</strong></del></span> <span
class="inserted"><ins><em>car's
- hardware cannot collect any of</em></ins></span> that <span
class="removed"><del><strong>the
- transmission reports a 404 error really means nothing; the server
- could save</strong></del></span> <span class="inserted"><ins><em>data,
or</em></ins></span> that <span class="removed"><del><strong>data
anyway.)</p>
-
- <p>Even worse, it
- <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network.</a></p>
+ <p>GM did not get users' consent, but it could have got that easily
by
+ sneaking it into the contract that users sign for some digital service
+ or other. A requirement for consent is effectively no protection.</p>
- <p>LG later said it had installed a patch to stop this,
but</strong></del></span> <span class="inserted"><ins><em>the software
- is free so we know it won't collect</em></ins></span> any <span
class="removed"><del><strong>product
- could spy this way.</p>
+ <p>The cars can also collect lots of other data: listening to you,
+ watching you, following your movements, tracking passengers' cell
+ phones. <em>All</em> such data collection should be
forbidden.</p>
- <p>Meanwhile, LG TVs
- <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span> of <span class="removed"><del><strong>spying
anyway</a>.</p></strong></del></span> <span
class="inserted"><ins><em>that data.</p></em></ins></span>
+ <p>But if you really want to be safe, we must make sure the car's
+ hardware cannot collect any of that data, or that the software
+ is free so we know it won't collect any of that data.</p>
</li>
- <span class="removed"><del><strong><li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they wanted to
record.</a></p></strong></del></span>
- <span class="inserted"><ins><em><li id="M201711230">
+ <li id="M201711230">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>AI-powered driving apps can <a
href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p></em></ins></span>
+ track your every move</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-<!-- #SpywareAtPlay</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201607160">
+ <li id="M201607160">
<!--#set var="DATE" value='<small
class="date-tag">2016-07</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareAtPlay">Spyware at Play</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
-<li><p>Users</strong></del></span>
- <span class="inserted"><ins><em><p id="car-spying">Computerized cars
with nonfree software</em></ins></span> are <span
class="removed"><del><strong>suing Bose for</strong></del></span> <a
-<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
-distributing</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ --><!--#echo encoding="none" var="DATE" -->
+ <p id="car-spying">Computerized cars with nonfree software are <a
+
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
snooping devices</a>.</p>
</li>
<li id="M201602240">
<!--#set var="DATE" value='<small
class="date-tag">2016-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p id="nissan-modem">The Nissan Leaf has</em></ins></span> a <span
class="removed"><del><strong>spyware app for</strong></del></span> <span
class="inserted"><ins><em>built-in
+ <p id="nissan-modem">The Nissan Leaf has a built-in
cell phone modem which allows effectively anyone to <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
- access</em></ins></span> its <span
class="removed"><del><strong>headphones</a>.
-Specifically,</strong></del></span> <span class="inserted"><ins><em>computers
remotely and make changes in various
+ access its computers remotely and make changes in various
settings</a>.</p>
- <p>That's easy to do because</em></ins></span> the <span
class="removed"><del><strong>app would record</strong></del></span> <span
class="inserted"><ins><em>system has no authentication
- when accessed through</em></ins></span> the <span
class="removed"><del><strong>names of</strong></del></span> <span
class="inserted"><ins><em>modem. However, even if it asked
+ <p>That's easy to do because the system has no authentication
+ when accessed through the modem. However, even if it asked
for authentication, you couldn't be confident that Nissan
- has no access. The software in</em></ins></span> the <span
class="removed"><del><strong>audio files
-users listen</strong></del></span> <span class="inserted"><ins><em>car is
proprietary, <a
+ has no access. The software in the car is proprietary, <a
href="/philosophy/free-software-even-more-important.html">which means
it demands blind faith from its users</a>.</p>
- <p>Even if no one connects</em></ins></span> to <span
class="removed"><del><strong>along with</strong></del></span> the <span
class="removed"><del><strong>headphone's unique serial number.
-</p>
-
-<p>The suit accuses that this was done without</strong></del></span>
<span class="inserted"><ins><em>car remotely,</em></ins></span> the <span
class="removed"><del><strong>users' consent.
-If</strong></del></span> <span class="inserted"><ins><em>cell phone modem
- enables</em></ins></span> the <span class="removed"><del><strong>fine
print of</strong></del></span> <span class="inserted"><ins><em>phone company to
track</em></ins></span> the <span class="removed"><del><strong>app said that
users gave consent for this,
-would that make</strong></del></span> <span class="inserted"><ins><em>car's
movements all the time;</em></ins></span>
- it <span class="removed"><del><strong>acceptable? No way! It should be
flat out
-<a href="/philosophy/surveillance-vs-democracy.html">
-illegal</strong></del></span> <span class="inserted"><ins><em>is
possible</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>physically remove</em></ins></span> the <span
class="removed"><del><strong>app to snoop at all</a>.
-</p></strong></del></span> <span class="inserted"><ins><em>cell phone
modem, though.</p></em></ins></span>
+ <p>Even if no one connects to the car remotely, the cell phone modem
+ enables the phone company to track the car's movements all the time;
+ it is possible to physically remove the cell phone modem, though.</p>
</li>
- <span class="removed"><del><strong><li><p>Many
- <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201306140">
+ <li id="M201306140">
<!--#set var="DATE" value='<small
class="date-tag">2013-06</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Tesla cars allow the company to extract
data remotely and determine the car's location
- at any time. (See Section 2, paragraphs b</em></ins></span> and <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>c of the <a
-
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- privacy statement</a>.) The company says it doesn't store this
- information, but if the state orders it</em></ins></span> to <span
class="inserted"><ins><em>get</em></ins></span> the
- <span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
-
- <p>A game console is a computer,</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> and <span
class="removed"><del><strong>you can't trust a computer with
- a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>hand it
- over, the state can store it.</p></em></ins></span>
+ at any time. (See Section 2, paragraphs b</em></ins></span> and <span
class="removed"><del><strong>listening all</strong></del></span> <span
class="inserted"><ins><em>c of</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+ </li>
+ <li><p>The Samsung “Smart” TV</strong></del></span>
<a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on the internet to another
+ company, Nuance</a>. Nuance can save</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ privacy statement</a>.) The company says</em></ins></span> it <span
class="removed"><del><strong>and would then have to
+ give</strong></del></span> <span class="inserted"><ins><em>doesn't store
this
+ information, but if the state orders</em></ins></span> it to <span
class="inserted"><ins><em>get</em></ins></span> the <span
class="removed"><del><strong>US or some other government.</p>
+ <p>Speech recognition is not to be trusted
unless</strong></del></span> <span class="inserted"><ins><em>data and
hand</em></ins></span> it <span class="removed"><del><strong>is done
+ by free</strong></del></span>
+ <span class="inserted"><ins><em>over, the state can store it.</p>
</li>
- <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201303250">
+ <li id="M201303250">
<!--#set var="DATE" value='<small
class="date-tag">2013-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p id="records-drivers">Proprietary software in
cars</em></ins></span> <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data</strong></del></span>
+ <p id="records-drivers">Proprietary</em></ins></span> software in
<span class="removed"><del><strong>your own computer.</p>
+
+ <p>In its privacy policy, Samsung explicitly confirms
+ that</strong></del></span> <span
class="inserted"><ins><em>cars</em></ins></span> <a <span
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ data containing sensitive</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
- records information</em></ins></span> about <span
class="removed"><del><strong>their users</strong></del></span> <span
class="inserted"><ins><em>drivers' movements</a>, which is made
- available to car manufacturers, insurance companies,</em></ins></span> and
<span class="removed"><del><strong>their users'
- friends</strong></del></span> <span
class="inserted"><ins><em>others.</p>
-
- <p>The case of toll-collection systems, mentioned in this article,
- is not really a matter of proprietary surveillance. These systems
- are an intolerable invasion of privacy,</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
-
- <p>Even nastier, they do it through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>should be replaced
with
- anonymous payment systems, but</em></ins></span> the <span
class="removed"><del><strong>data
- collected</strong></del></span> <span class="inserted"><ins><em>invasion
isn't done</em></ins></span> by <span class="removed"><del><strong>various
cr…apps and sites made</strong></del></span> <span
class="inserted"><ins><em>malware. The
- other cases mentioned are done</em></ins></span> by <span
class="removed"><del><strong>different
- companies.</p>
+ records</em></ins></span> information <span
class="removed"><del><strong>will be transmitted</strong></del></span> <span
class="inserted"><ins><em>about drivers' movements</a>, which is made
+ available</em></ins></span> to
+ <span class="removed"><del><strong>third parties</a>.</p>
+ </li>
+ <li><p>Spyware in
+ <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a> reports what the user
watches,</strong></del></span> <span class="inserted"><ins><em>car
manufacturers, insurance companies,</em></ins></span> and
+ <span class="removed"><del><strong>the switch to
turn</strong></del></span> <span class="inserted"><ins><em>others.</p>
+
+ <p>The case of toll-collection systems, mentioned
in</em></ins></span> this <span class="removed"><del><strong>off has no effect.
(The fact that the
+ transmission reports a 404 error</strong></del></span> <span
class="inserted"><ins><em>article,
+ is not</em></ins></span> really <span class="removed"><del><strong>means
nothing;</strong></del></span> <span class="inserted"><ins><em>a matter of
proprietary surveillance. These systems
+ are an intolerable invasion of privacy, and should be replaced with
+ anonymous payment systems, but</em></ins></span> the <span
class="removed"><del><strong>server
+ could save that data anyway.)</p>
+
+ <p>Even worse, it
+ <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on</strong></del></span> <span class="inserted"><ins><em>invasion
isn't done by malware. The</em></ins></span>
+ other <span class="removed"><del><strong>devices on</strong></del></span>
<span class="inserted"><ins><em>cases mentioned are done by proprietary malware
in</em></ins></span> the <span class="removed"><del><strong>user's local
network.</a></p>
- <p>They use this data to manipulate people</strong></del></span>
<span class="inserted"><ins><em>proprietary malware in the car.</p>
+ <p>LG later said it had installed a patch</strong></del></span>
<span class="inserted"><ins><em>car.</p>
</li>
</ul>
@@ -3718,61 +3716,70 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Oculus headsets <a
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
- users</em></ins></span> to <span class="removed"><del><strong>buy things,
and hunt
- for “whales” who can be led</strong></del></span> <span
class="inserted"><ins><em>identify themselves</em></ins></span> to <span
class="removed"><del><strong>spend a lot of money. They
- also use a back door</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. This will give Facebook
- free rein</em></ins></span> to <span
class="removed"><del><strong>manipulate</strong></del></span> <span
class="inserted"><ins><em>pervasively snoop on Oculus users.</p>
+ users</em></ins></span> to <span class="removed"><del><strong>stop this,
but any product
+ could spy</strong></del></span> <span class="inserted"><ins><em>identify
themselves to Facebook</a>. This will give Facebook
+ free rein to pervasively snoop on Oculus users.</p>
</li>
<li id="M201612230">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>VR equipment, measuring every slight motion,
- creates</em></ins></span> the <span class="removed"><del><strong>game
play</strong></del></span> <span
class="inserted"><ins><em>potential</em></ins></span> for <span
class="removed"><del><strong>specific players.</p>
+ creates the potential for the most intimate
+ surveillance ever. All it takes to make</em></ins></span> this <span
class="removed"><del><strong>way.</p>
- <p>While</strong></del></span> the <span
class="removed"><del><strong>article describes gratis games, games that cost
money</strong></del></span> <span class="inserted"><ins><em>most intimate
- surveillance ever. All it takes to make this potential real <a
-
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
- software as malicious as many other programs listed in this
+ <p>Meanwhile, LG TVs</strong></del></span> <span
class="inserted"><ins><em>potential real</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
+ </li>
+ <li>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
+ software as malicious as many other</em></ins></span> programs <span
class="removed"><del><strong>people watch, and even what they wanted to
record.</a></p></strong></del></span> <span
class="inserted"><ins><em>listed in this
page</a>.</p>
- <p>You</em></ins></span> can <span
class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>bet Facebook will implement</em></ins></span> the
<span class="removed"><del><strong>same
tactics.</p></strong></del></span> <span
class="inserted"><ins><em>maximum possible
+ <p>You can bet Facebook will implement the maximum possible
surveillance on Oculus Rift devices. The moral is, never trust a VR
system with nonfree software in it.</p></em></ins></span>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareOnTheWeb
--></strong></del></span>
+<span class="removed"><del><strong><!-- #SpywareAtPlay
--></strong></del></span>
<div class="big-section">
- <h3 id="SpywareOnTheWeb">Spyware on the Web</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheWeb">#SpywareOnTheWeb</a>)</span>
+ <h3 <span class="removed"><del><strong>id="SpywareAtPlay">Spyware at
Play</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareOnTheWeb">Spyware on the
Web</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtPlay">#SpywareAtPlay</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnTheWeb">#SpywareOnTheWeb</a>)</span></em></ins></span>
</div>
<div style="clear: left;"></div>
-<p>In addition, many web sites spy on their visitors. Web sites are not
- programs, so it
- <a href="/philosophy/network-services-arent-free-or-nonfree.html">
- makes no sense to call them “free” or
“proprietary”</a>,
- but the surveillance is an abuse all the same.</p>
-
<span class="removed"><del><strong><ul>
+<li><p>Users</strong></del></span>
- <li><p>When</strong></del></span>
+<span class="inserted"><ins><em><p>In addition, many web sites spy on
their visitors. Web sites</em></ins></span> are <span
class="removed"><del><strong>suing Bose for</strong></del></span> <span
class="inserted"><ins><em>not
+ programs, so it</em></ins></span>
+ <a
+<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+distributing a spyware app for its headphones</a>.
+Specifically,</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/network-services-arent-free-or-nonfree.html">
+ makes no sense to call them “free” or
“proprietary”</a>,
+ but</em></ins></span> the <span class="removed"><del><strong>app would
record</strong></del></span> <span class="inserted"><ins><em>surveillance is an
abuse all</em></ins></span> the <span
class="removed"><del><strong>names</strong></del></span> <span
class="inserted"><ins><em>same.</p>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201904210">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>As of April 2019, it is <a
+ <p>As</em></ins></span> of <span class="removed"><del><strong>the
audio files
+users listen</strong></del></span> <span class="inserted"><ins><em>April 2019,
it is <a
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/">no
- longer possible to disable an
- unscrupulous tracking anti-feature</a> that <a
+ longer possible</em></ins></span> to <span
class="removed"><del><strong>along with the headphone's unique serial number.
+</p>
+
+<p>The suit accuses</strong></del></span> <span
class="inserted"><ins><em>disable an
+ unscrupulous tracking anti-feature</a></em></ins></span> that <span
class="removed"><del><strong>this was done without</strong></del></span> <span
class="inserted"><ins><em><a
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
users when they follow ping links</a> in Apple Safari, Google Chrome,
- Opera, Microsoft Edge and also in the upcoming Microsoft Edge that is
+ Opera, Microsoft Edge and also in</em></ins></span> the <span
class="removed"><del><strong>users' consent.
+If</strong></del></span> <span class="inserted"><ins><em>upcoming Microsoft
Edge that is
going to be based on Chromium.</p>
</li>
@@ -3781,7 +3788,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Until 2015, any tweet that listed a geographical tag <a
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/">
- sent the precise GPS location to Twitter's server</a>. It still
+ sent</em></ins></span> the <span class="removed"><del><strong>fine print
of</strong></del></span> <span class="inserted"><ins><em>precise GPS location
to Twitter's server</a>. It still
contains these GPS locations.</p>
</li>
@@ -3790,79 +3797,89 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Storyful program <a
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies
- on the reporters that use it</a>.</p>
+ on</em></ins></span> the <span class="removed"><del><strong>app
said</strong></del></span> <span
class="inserted"><ins><em>reporters</em></ins></span> that <span
class="removed"><del><strong>users gave consent</strong></del></span> <span
class="inserted"><ins><em>use it</a>.</p>
</li>
<li id="M201701060">
<!--#set var="DATE" value='<small
class="date-tag">2017-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>When</em></ins></span> a page uses Disqus
- for comments, <span class="removed"><del><strong><a
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">the</strong></del></span>
<span class="inserted"><ins><em>the</em></ins></span> proprietary Disqus
software <span class="removed"><del><strong>loads</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">loads</em></ins></span>
- a Facebook software package into the browser of every anonymous visitor
- to the page, and makes the page's URL available to <span
class="removed"><del><strong>Facebook</a>.
- </p></li>
-
- <li><p>Online</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
+ <p>When a page uses Disqus</em></ins></span>
+ for <span class="removed"><del><strong>this,
+would that make it acceptable? No way! It should be flat
out</strong></del></span> <span class="inserted"><ins><em>comments, the
proprietary Disqus software</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">
+illegal</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">loads
+ a Facebook software package into the browser of every anonymous
visitor</em></ins></span>
+ to <span class="removed"><del><strong>design</strong></del></span> the
<span class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>page, and makes the page's URL
available</em></ins></span> to <span class="removed"><del><strong>snoop at
all</a>.
+</p></strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p></em></ins></span>
</li>
- <li id="M201612064">
+ <span class="removed"><del><strong><li><p>Many
+ <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201612064">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Online</em></ins></span> sales, with tracking and surveillance of
customers, <a
+ <p>Online sales, with tracking</em></ins></span> and <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>surveillance of customers, <a
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
- businesses to show different people different prices</a>. Most of
- the tracking is done by recording interactions with servers, but
- proprietary software contributes.</p>
- </li>
+ businesses</em></ins></span> to <span class="inserted"><ins><em>show
different people different prices</a>. Most of</em></ins></span>
+ the
+ <span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
- <span class="removed"><del><strong><li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
- Baidu's Japanese-input and Chinese-input apps spy on
users.</a></p>
+ <p>A game console</strong></del></span> <span
class="inserted"><ins><em>tracking</em></ins></span> is <span
class="removed"><del><strong>a computer, and you can't trust a
computer</strong></del></span> <span class="inserted"><ins><em>done by
recording interactions</em></ins></span> with
+ <span class="removed"><del><strong>a nonfree operating
system.</p></strong></del></span> <span
class="inserted"><ins><em>servers, but
+ proprietary software contributes.</p></em></ins></span>
</li>
- <li><p>Pages that contain “Like” buttons
- <a
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
- enable Facebook to track visitors</strong></del></span>
+ <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps
+ <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of data about their users and
their</strong></del></span>
<span class="inserted"><ins><em><li id="M201405140">
<!--#set var="DATE" value='<small
class="date-tag">2014-05</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
- Microsoft SkyDrive allows the NSA</em></ins></span> to <span
class="removed"><del><strong>those pages</a>—even
- users that don't have Facebook accounts.</p></strong></del></span>
<span class="inserted"><ins><em>directly examine users'
- data</a>.</p></em></ins></span>
- </li>
+ Microsoft SkyDrive allows the NSA to directly examine</em></ins></span>
users'
+ <span class="removed"><del><strong>friends and
associates</a>.</p>
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
+ <p>Even nastier, they do it through ad</strong></del></span>
+ <span class="inserted"><ins><em>data</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201210240">
+ <li id="M201210240">
<!--#set var="DATE" value='<small
class="date-tag">2012-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many</em></ins></span> web sites rat their visitors to advertising
- networks that track users. Of the top 1000 web sites, <a
+ <p>Many web sites rat their visitors to advertising</em></ins></span>
+ networks that <span
class="removed"><del><strong>merge</strong></del></span> <span
class="inserted"><ins><em>track users. Of</em></ins></span> the <span
class="removed"><del><strong>data
+ collected by various cr…apps and</strong></del></span> <span
class="inserted"><ins><em>top 1000 web sites, <a
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
(as of 5/17/2012) fed their visitors third-party cookies, allowing
- other sites to track them</a>.</p>
- </li>
+ other</em></ins></span> sites <span class="removed"><del><strong>made by
different
+ companies.</p>
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
+ <p>They use this data</strong></del></span> to <span
class="removed"><del><strong>manipulate people</strong></del></span> <span
class="inserted"><ins><em>track them</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201208210">
+ <li id="M201208210">
<!--#set var="DATE" value='<small
class="date-tag">2012-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many</em></ins></span> web sites report all their visitors
- to Google by using the Google Analytics service, which <a
+ <p>Many web sites report all their visitors</em></ins></span>
+ to <span class="removed"><del><strong>buy things,</strong></del></span>
<span class="inserted"><ins><em>Google by using the Google Analytics service,
which <a
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
- tells Google the IP address and the page that was <span
class="removed"><del><strong>visited.</a></p></strong></del></span>
<span class="inserted"><ins><em>visited</a>.</p>
+ tells Google the IP address</em></ins></span> and <span
class="removed"><del><strong>hunt
+ for “whales” who can be led</strong></del></span> <span
class="inserted"><ins><em>the page that was visited</a>.</p>
</li>
<li id="M201200000">
<!--#set var="DATE" value='<small
class="date-tag">[2012]</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many web sites try to collect users' address books (the user's
list
- of other people's phone numbers or email addresses). This violates
- the privacy of those other people.</p>
+ <p>Many web sites try</em></ins></span> to <span
class="removed"><del><strong>spend a lot</strong></del></span> <span
class="inserted"><ins><em>collect users' address books (the user's
list</em></ins></span>
+ of <span class="removed"><del><strong>money. They
+ also use a back door to manipulate the game play for specific
players.</p>
+
+ <p>While</strong></del></span> <span
class="inserted"><ins><em>other people's phone numbers or email addresses).
This violates</em></ins></span>
+ the <span class="removed"><del><strong>article describes gratis games,
games</strong></del></span> <span class="inserted"><ins><em>privacy of those
other people.</p>
</li>
<li id="M201110040">
@@ -3870,51 +3887,54 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Pages that contain “Like” buttons <a
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
- enable Facebook to track visitors to those pages</a>—even users
- that don't have Facebook accounts.</p>
+ enable Facebook to track visitors to those pages</a>—even
users</em></ins></span>
+ that <span class="removed"><del><strong>cost money
+ can use the same tactics.</p></strong></del></span> <span
class="inserted"><ins><em>don't have Facebook
accounts.</p></em></ins></span>
</li>
</ul>
+<span class="removed"><del><strong><!-- #SpywareOnTheWeb
--></strong></del></span>
-<div class="big-subsection">
- <h4 id="SpywareInJavaScript">JavaScript</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInJavaScript">#SpywareInJavaScript</a>)</span>
+
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareOnTheWeb">Spyware on the
Web</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInJavaScript">JavaScript</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareOnTheWeb">#SpywareOnTheWeb</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInJavaScript">#SpywareInJavaScript</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear: left;"></div>
-<ul class="blurbs">
+<p>In addition, many</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201811270">
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many web sites use JavaScript code <a
+ <p>Many</em></ins></span> web sites <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>use JavaScript code <a
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- to snoop on information that users have typed into a
- form but not sent</a>, in order to learn their identity. Some are
<a
-
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege">
+ to snoop</em></ins></span> on <span class="inserted"><ins><em>information
that users have typed into a
+ form but not sent</a>, in order to learn</em></ins></span> their
<span class="removed"><del><strong>visitors. Web sites</strong></del></span>
<span class="inserted"><ins><em>identity. Some</em></ins></span> are <span
class="removed"><del><strong>not
+ programs, so it</strong></del></span> <a <span
class="removed"><del><strong>href="/philosophy/network-services-arent-free-or-nonfree.html">
+ makes no sense</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege">
getting sued</a> for this.</p>
<p>The chat facilities of some customer services use the same sort of
- malware to <a
+ malware</em></ins></span> to <span class="removed"><del><strong>call them
“free” or “proprietary”</a>,
+ but</strong></del></span> <span class="inserted"><ins><em><a
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
- read what the user is typing before it is
posted</a>.</p></em></ins></span>
+ read what</em></ins></span> the <span
class="removed"><del><strong>surveillance</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> is <span
class="removed"><del><strong>an abuse</strong></del></span> <span
class="inserted"><ins><em>typing before it is posted</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201807190">
+ <li id="M201807190">
<!--#set var="DATE" value='<small
class="date-tag">2018-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
- JavaScript on its</em></ins></span> web <span
class="removed"><del><strong>sites try</strong></del></span> <span
class="inserted"><ins><em>site</em></ins></span> to <span
class="removed"><del><strong>collect users' address books (the
- user's list of other people's phone numbers or email addresses).
- This violates the privacy of those</strong></del></span> <span
class="inserted"><ins><em>give</em></ins></span> other <span
class="removed"><del><strong>people.</p></strong></del></span> <span
class="inserted"><ins><em>companies personal data on
- its customers</a>.</p></em></ins></span>
+ JavaScript on its web site to give other companies personal data on
+ its customers</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
- Microsoft SkyDrive allows</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201712300">
+ <li id="M201712300">
<!--#set var="DATE" value='<small
class="date-tag">2017-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Some JavaScript malware <a
@@ -3926,19 +3946,28 @@
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Some websites send
- JavaScript code to collect all</em></ins></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>user's input, <a
-
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
- can then be used</em></ins></span> to <span
class="removed"><del><strong>directly examine users'
data</a>.</p></strong></del></span> <span
class="inserted"><ins><em>reproduce the whole session</a>.</p>
+ JavaScript code to collect</em></ins></span> all the <span
class="removed"><del><strong>same.</p>
+
+<ul>
+
+ <li><p>When a page uses Disqus for
+ comments,</strong></del></span> <span class="inserted"><ins><em>user's
input,</em></ins></span> <a <span
class="removed"><del><strong>href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">the
+ proprietary Disqus software loads a Facebook software package into
+ the browser of every anonymous visitor</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
+ can then be used</em></ins></span> to <span
class="inserted"><ins><em>reproduce</em></ins></span> the <span
class="removed"><del><strong>page, and makes the
+ page's URL available to Facebook</a>.
+ </p></li>
+
+ <li><p>Online sales, with tracking</strong></del></span> <span
class="inserted"><ins><em>whole session</a>.</p>
<p>If you use LibreJS, it will block that malicious JavaScript
- code.</p></em></ins></span>
+ code.</p>
</li>
</ul>
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
-
-<span class="inserted"><ins><em><div class="big-subsection">
+<div class="big-subsection">
<h4 id="SpywareInFlash">Flash</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
</div>
@@ -3947,74 +3976,112 @@
<li id="M201310110">
<!--#set var="DATE" value='<small
class="date-tag">2013-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Flash and JavaScript are used for <a
-
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices</a></em></ins></span> to <span
class="removed"><del><strong>place new items on top under each
subsection</strong></del></span> <span class="inserted"><ins><em>identify
users.</p>
+ <p>Flash</em></ins></span> and <span
class="removed"><del><strong>surveillance of customers,</strong></del></span>
<span class="inserted"><ins><em>JavaScript are used for</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
+ businesses</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ “fingerprinting” devices</a></em></ins></span> to <span
class="removed"><del><strong>show different people different prices</a>.
Most
+ of the tracking is done by recording interactions with
+ servers, but proprietary software
contributes.</p></strong></del></span> <span
class="inserted"><ins><em>identify users.</p></em></ins></span>
</li>
- <li id="M201003010">
+ <span class="removed"><del><strong><li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
+ Baidu's Japanese-input and Chinese-input apps spy on
users.</a></p></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201003010">
<!--#set var="DATE" value='<small
class="date-tag">2010-03</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
- <span class="inserted"><ins><em><p>Flash Player's <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Flash Player's <a
href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/">
- cookie feature helps web sites track visitors</a>.</p>
+ cookie feature helps web sites track
visitors</a>.</p></em></ins></span>
</li>
-</ul></em></ins></span>
+
+ <span class="removed"><del><strong><li><p>Pages that contain
“Like” buttons</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInChrome">Spyware in
Chrome</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInChrome">Chrome</h4></em></ins></span>
+ <h4 id="SpywareInChrome">Chrome</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Google</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201906220">
<!--#set var="DATE" value='<small
class="date-tag">2019-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google</em></ins></span> Chrome <span
class="removed"><del><strong>contains a key logger that</strong></del></span>
<span class="inserted"><ins><em>is an</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
- sends Google every URL typed in</a>, one key
at</strong></del></span>
+ <p>Google Chrome is an</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
+ enable Facebook</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/">
instrument of surveillance</a>. It lets thousands of trackers invade
- users' computers and report the sites they visit to advertising and
- data companies, first of all to Google. Moreover, if users
have</em></ins></span> a <span class="removed"><del><strong>time.</p>
+ users' computers and report the sites they visit</em></ins></span> to
<span class="removed"><del><strong>track visitors</strong></del></span> <span
class="inserted"><ins><em>advertising and
+ data companies, first of all</em></ins></span> to <span
class="removed"><del><strong>those
pages</a>—even</strong></del></span> <span
class="inserted"><ins><em>Google. Moreover, if</em></ins></span> users <span
class="removed"><del><strong>that don't</strong></del></span> have <span
class="removed"><del><strong>Facebook accounts.</p>
</li>
- <li><p>Google</strong></del></span>
- <span class="inserted"><ins><em>Gmail account,</em></ins></span> Chrome
<span class="removed"><del><strong>includes</strong></del></span> <span
class="inserted"><ins><em>automatically logs them in to the browser for
+ <li><p>Many web sites rat their visitors</strong></del></span>
<span class="inserted"><ins><em>a
+ Gmail account, Chrome automatically logs them in</em></ins></span> to
<span class="removed"><del><strong>advertising networks that track
+ users. Of</strong></del></span> the <span
class="removed"><del><strong>top 1000 web sites,</strong></del></span> <span
class="inserted"><ins><em>browser for
more convenient profiling. On Android, Chrome also reports their
location to Google.</p>
- <p>The best way to escape surveillance is to switch to <a
- href="/software/icecat/">IceCat</a>,</em></ins></span> a <span
class="removed"><del><strong>module</strong></del></span> <span
class="inserted"><ins><em>modified version of Firefox
- with several changes to protect users' privacy.</p>
+ <p>The best way to escape surveillance is to switch
to</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
+ (as</strong></del></span>
+ <span
class="inserted"><ins><em>href="/software/icecat/">IceCat</a>, a
modified version</em></ins></span> of <span
class="removed"><del><strong>5/17/2012) fed their visitors third-party cookies,
allowing other
+ sites</strong></del></span> <span class="inserted"><ins><em>Firefox
+ with several changes</em></ins></span> to <span
class="removed"><del><strong>track
them</a>.</p></strong></del></span> <span
class="inserted"><ins><em>protect users' privacy.</p></em></ins></span>
</li>
- <li id="M201704131">
+ <span class="removed"><del><strong><li><p>Many web sites report
all their visitors to Google by using
+ the Google Analytics service, which</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704131">
<!--#set var="DATE" value='<small
class="date-tag">2017-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Low-priced Chromebooks for schools are <a
- href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
+ <p>Low-priced Chromebooks for schools are</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
+ tells Google</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
collecting far more data on students than is necessary, and store
- it indefinitely</a>. Parents and students complain about the lack
- of transparency on the part of both the educational services and the
- schools, the difficulty of opting out of these services, and the lack
- of proper privacy policies, among other things.</p>
+ it indefinitely</a>. Parents and students complain
about</em></ins></span> the <span class="removed"><del><strong>IP
address</strong></del></span> <span class="inserted"><ins><em>lack
+ of transparency on the part of both the educational
services</em></ins></span> and the <span class="removed"><del><strong>page that
was visited.</a></p>
+ </li>
+
+ <li><p>Many web sites try to collect users' address books (the
+ user's list</strong></del></span>
+ <span class="inserted"><ins><em>schools, the difficulty</em></ins></span>
of <span class="removed"><del><strong>other people's phone numbers or email
addresses).
+ This violates</strong></del></span> <span
class="inserted"><ins><em>opting out of these services, and</em></ins></span>
the <span class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>lack</em></ins></span>
+ of <span class="removed"><del><strong>those</strong></del></span> <span
class="inserted"><ins><em>proper privacy policies, among</em></ins></span>
other <span class="removed"><del><strong>people.</p>
+ </li>
+
+ <li><p><a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
+ Microsoft SkyDrive allows</strong></del></span> <span
class="inserted"><ins><em>things.</p>
<p>But complaining is not sufficient. Parents, students and teachers
- should realize</em></ins></span> that <span class="inserted"><ins><em>the
software Google uses to spy on students is
+ should realize that</em></ins></span> the <span
class="removed"><del><strong>NSA to directly examine users'
data</a>.</p>
+ </li>
+</ul>
+
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>software Google uses</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+<div class="big-subsection">
+ <h4 id="SpywareInChrome">Spyware in Chrome</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
+</div>
+
+<ul>
+ <li><p>Google Chrome contains a key logger
that</strong></del></span> <span class="inserted"><ins><em>students is
nonfree, so they can't verify what it really does. The only remedy is
- to persuade school officials to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
- activates microphones</strong></del></span> <span
class="inserted"><ins><em>href="/education/edu-schools.html">
- exclusively use free software</a> for both
education</em></ins></span> and <span class="removed"><del><strong>transmits
audio</strong></del></span> <span class="inserted"><ins><em>school
+ to persuade school officials to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
+ sends Google every URL typed in</a>, one
key</strong></del></span> <span
class="inserted"><ins><em>href="/education/edu-schools.html">
+ exclusively use free software</a> for both education and school
administration. If the school is run locally, parents and teachers
- can mandate their representatives at the School Board</em></ins></span> to
<span class="removed"><del><strong>its
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>refuse the
- budget unless the school initiates a switch to free software. If
+ can mandate their representatives</em></ins></span> at <span
class="inserted"><ins><em>the School Board to refuse the
+ budget unless the school initiates</em></ins></span> a <span
class="removed"><del><strong>time.</p>
+ </li>
+
+ <li><p>Google Chrome includes a module that
+ <a
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
+ activates microphones and transmits audio</strong></del></span> <span
class="inserted"><ins><em>switch to free software. If
education is run nation-wide, they need to persuade legislators
(e.g., through free software organizations, political parties,
- etc.) to migrate the public schools to free
software.</p></em></ins></span>
+ etc.)</em></ins></span> to <span class="removed"><del><strong>its
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>migrate the public schools to free
software.</p></em></ins></span>
</li>
<span
class="removed"><del><strong><li><p>Google</strong></del></span>
@@ -4066,6 +4133,17 @@
<span class="inserted"><ins><em><div style="clear: left;"></div>
<ul class="blurbs">
+ <li id="M202104060">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-04</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/">WeddingWire
+ app saves people's wedding photos forever and hands over data
+ to others</a>, and gives people no control over their personal
+ information/data. The app also sometimes shows old photos and memories
+ to the user without user having control over this.</p>
+ </li>
+
<li id="M202102160">
<!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -4270,7 +4348,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/15 19:01:22 $
+$Date: 2021/04/26 12:04:36 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.402
retrieving revision 1.403
diff -u -b -r1.402 -r1.403
--- proprietary/po/proprietary-surveillance.it.po 15 Apr 2021 19:01:23
-0000 1.402
+++ proprietary/po/proprietary-surveillance.it.po 26 Apr 2021 12:04:36
-0000 1.403
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-15 18:55+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -5461,6 +5461,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
Index: proprietary/po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.264
retrieving revision 1.265
diff -u -b -r1.264 -r1.265
--- proprietary/po/proprietary-surveillance.ja-diff.html 15 Apr 2021
19:01:23 -0000 1.264
+++ proprietary/po/proprietary-surveillance.ja-diff.html 26 Apr 2021
12:04:37 -0000 1.265
@@ -1146,66 +1146,140 @@
<span class="inserted"><ins><em><li id="M201609280">
<!--#set var="DATE" value='<small
class="date-tag">2016-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The iMessage app</em></ins></span> on <span
class="removed"><del><strong>its users through</strong></del></span> <span
class="inserted"><ins><em>iThings <a
-
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that</em></ins></span> the <span
class="removed"><del><strong>proprietary control app</a>.</p>
+ <p>The iMessage app</em></ins></span> on <span
class="removed"><del><strong>its users through the proprietary control
app</a>.</p>
- <p>The app reports</strong></del></span> <span
class="inserted"><ins><em>user types into it</a>;</em></ins></span> the
<span class="removed"><del><strong>temperature of</strong></del></span>
- <span class="inserted"><ins><em>server records these numbers for at least
30 days.</p>
+ <p>The app reports the temperature of the vibrator minute by
+ minute (thus, indirectly, whether it is surrounded
by</strong></del></span> <span class="inserted"><ins><em>iThings <a
+
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells</em></ins></span>
+ a <span class="removed"><del><strong>person's
+ body), and</strong></del></span> <span class="inserted"><ins><em>server
every phone number that</em></ins></span> the <span
class="removed"><del><strong>vibration frequency.</p>
+
+ <p>Note</strong></del></span> <span class="inserted"><ins><em>user
types into it</a>;</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about
+ their products, rather than free software which users can check
+ and change.</p></strong></del></span>
+ <span class="inserted"><ins><em>server records these numbers for at least
30 days.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
- <li id="M201509240">
+ <span class="inserted"><ins><em><li id="M201509240">
<!--#set var="DATE" value='<small
class="date-tag">2015-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>iThings automatically upload to Apple's servers
all</em></ins></span> the <span class="removed"><del><strong>vibrator
minute</strong></del></span> <span class="inserted"><ins><em>photos
- and videos they make.</p>
+ <p>iThings automatically upload</em></ins></span> to <span
class="removed"><del><strong>spy on children</strong></del></span> <span
class="inserted"><ins><em>Apple's servers all the photos</em></ins></span>
+ and <span class="removed"><del><strong>adults.</a>.</p>
+ </li>
+</ul>
+
+
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>videos they make.</p>
<blockquote><p> iCloud Photo Library stores every photo and
video you
- take, and keeps them up to date on all your devices. Any edits you
+ take, and keeps them up</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>date</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p></strong></del></span> <span class="inserted"><ins><em>all
your devices. Any edits you
make are automatically updated everywhere. […]
</p></blockquote>
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a
href="https://support.apple.com/en-us/HT202033">activated</em></ins></span>
by
- <span class="removed"><del><strong>minute (thus, indirectly, whether
it</strong></del></span> <span class="inserted"><ins><em>the
- startup of iOS</a>. The term “cloud” means “please
+ <p>(From</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span> <span
class="inserted"><ins><em>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
+ information</a> as accessed</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a “clean” Windows install</strong></del></span>
<span class="inserted"><ins><em>24 Sep 2015.) The iCloud
feature</em></ins></span> is <span class="removed"><del><strong>not really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows</strong></del></span>
+ <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect</strong></del></span> <span
class="inserted"><ins><em>href="https://support.apple.com/en-us/HT202033">activated
by</em></ins></span> the <span class="removed"><del><strong>emails of
members</strong></del></span>
+ <span class="inserted"><ins><em>startup</em></ins></span> of <span
class="removed"><del><strong>Parliament
+ this way, because they pass it through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>iOS</a>. The term “cloud”
means “please
don't ask where.”</p>
- <p>There</em></ins></span> is <span
class="removed"><del><strong>surrounded</strong></del></span> <span
class="inserted"><ins><em>a way to
- <a href="https://support.apple.com/en-us/HT201104"> deactivate
- iCloud</a>, but it's active</em></ins></span> by <span
class="inserted"><ins><em>default so it still counts as</em></ins></span> a
<span class="removed"><del><strong>person's
- body),</strong></del></span>
- <span class="inserted"><ins><em>surveillance functionality.</p>
+ <p>There is a way to</em></ins></span>
+ <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
+ </li>
+</ul>
+
- <p>Unknown people apparently took advantage of this to <a
-
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware in Skype:</strong></del></span> <span
class="inserted"><ins><em>href="https://support.apple.com/en-us/HT201104">
deactivate
+ iCloud</a>, but it's active by default so it still counts as a
+ surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage of this
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA can access any of them through <a
-
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+ security to get at them, but NSA can access any of them
through</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
</li>
<li id="M201409220">
<!--#set var="DATE" value='<small
class="date-tag">2014-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apple can,</em></ins></span> and <span
class="inserted"><ins><em>regularly does, <a
+ <p>Apple can, and regularly does, <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</em></ins></span> the <span
class="removed"><del><strong>vibration frequency.</p>
-
- <p>Note</strong></del></span> <span
class="inserted"><ins><em>state</a>.</p>
+ remotely extract some data from iPhones</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the state</a>.</p>
<p>This may have improved with <a
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">
iOS 8 security improvements</a>; but <a
href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not as much as Apple claims</a>.</p>
+ not as much as Apple claims</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
- <li id="M201407230">
+<!-- #SpywareOnTheRoad</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407230">
<!--#set var="DATE" value='<small
class="date-tag">2014-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist
+ Several “features” of iOS seem</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each
subsection</strong></del></span> <span class="inserted"><ins><em>exist
for no possible purpose other than surveillance</a>. Here is the
<a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
@@ -1213,8 +1287,11 @@
<li id="M201401100">
<!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The <a class="not-a-duplicate"
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware</strong></del></span>
+ <span class="inserted"><ins><em><p>The <a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
iBeacon</a> lets stores determine exactly where the iThing is, and
get other info too.</p>
@@ -1225,14 +1302,25 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop on all the data in an iThing, or it
+ Either Apple helps the NSA snoop</em></ins></span> on <span
class="removed"><del><strong>The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware</strong></del></span> <span
class="inserted"><ins><em>all the data</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li></strong></del></span> <span class="inserted"><ins><em>an iThing,
or it
is totally incompetent</a>.</p>
</li>
<li id="M201308080">
<!--#set var="DATE" value='<small
class="date-tag">2013-08</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The iThing also <a
+ --><!--#echo encoding="none" var="DATE" --></em></ins></span>
+ <p>The <span class="removed"><del><strong>Nest Cam
“smart” camera</strong></del></span> <span
class="inserted"><ins><em>iThing also <a
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
tells Apple its geolocation</a> by default, though that can be
turned off.</p>
@@ -1241,8 +1329,10 @@
<li id="M201210170">
<!--#set var="DATE" value='<small
class="date-tag">2012-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>There is also a feature for web sites to track users, which is
<a
-
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ <p>There is also a feature for web sites to track users,
which</em></ins></span> is <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it is
still true in iOS 7.)</p>
</li>
@@ -3026,76 +3116,146 @@
deleting the collected information doesn't cancel the wrong of
collecting it.</p>
- <p>Data collected by devices such as the Nest thermostat, the Philips
- Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
- speakers are likewise stored longer than necessary on the servers
- the devices are tethered to. Moreover, they are made available to
- Alexa. As a result, Amazon has a very precise picture of users' life
- at home, not only in the present, but in the past (and, who knows,
- in the future too?)</p>
+ <p>Data collected by devices such as</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>Nest thermostat,</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using it to outsmart
+ you.</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul>
+ <li><p>E-books can contain Javascript
code,</strong></del></span> <span class="inserted"><ins><em>Philips
+ Hue-connected lights, the Chamberlain MyQ garage opener</em></ins></span>
and <span class="removed"><del><strong><a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops</strong></del></span> <span class="inserted"><ins><em>the
Sonos
+ speakers are likewise stored longer than necessary</em></ins></span> on
<span class="removed"><del><strong>readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not
only</strong></del></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>servers</em></ins></span>
+ the <span class="removed"><del><strong>user reads at what
time</a>.</p>
+ </li>
+
+ <li><p>Adobe</strong></del></span> <span
class="inserted"><ins><em>devices are tethered to. Moreover, they
are</em></ins></span> made <span class="removed"><del><strong>“Digital
Editions,” the e-reader used
+ by most US libraries,
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed</strong></del></span> <span
class="inserted"><ins><em>available</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul>
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p>
+ </li>
+
+ <li><p>The Nissan Leaf</strong></del></span>
+ <span class="inserted"><ins><em>Alexa. As a result,
Amazon</em></ins></span> has a <span class="removed"><del><strong>built-in cell
phone modem which allows
+ effectively
+ anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make changes</strong></del></span> <span
class="inserted"><ins><em>very precise picture of users' life
+ at home, not only</em></ins></span> in <span
class="removed"><del><strong>various
+ settings</a>.</p>
+
+ <p>That's easy to do because</strong></del></span> the <span
class="removed"><del><strong>system has no authentication when
+ accessed through</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
+ authentication, you couldn't be confident that Nissan has no
+ access. The software</strong></del></span> <span
class="inserted"><ins><em>past (and, who knows,</em></ins></span>
+ in the <span class="removed"><del><strong>car is
+ proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>future too?)</p>
</li>
<li id="M201904240">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some of users' commands to the Alexa service are <a
+ <p>Some of users' commands</em></ins></span> to the <span
class="removed"><del><strong>car remotely, the cell phone
+ modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>Alexa service are <a
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees to listen to</a>. The Google and Apple
+ recorded for Amazon employees</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>listen to</a>. The Google and Apple
voice assistants do similar things.</p>
- <p>A fraction of the Alexa service staff even has access to <a
+ <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even has access to <a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
location and other personal data</a>.</p>
- <p>Since the client program is nonfree, and data processing is done
+ <p>Since</em></ins></span> the <span
class="removed"><del><strong>time; it</strong></del></span> <span
class="inserted"><ins><em>client program</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>nonfree, and data processing is done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
the cloud</a>” (a soothing way of saying “We won't
tell you how and where it's done”), users have no way
- to know what happens to the recordings unless human eavesdroppers <a
+ to know what happens</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> the <span
class="removed"><del><strong>cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>recordings unless human eavesdroppers <a
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure agreements</a>.</p>
+ break their non-disclosure
agreements</a>.</p></em></ins></span>
</li>
- <li id="M201902080">
+ <span class="removed"><del><strong><li><p>Proprietary software
in cars</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902080">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The HP <a
- href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ <p>The HP</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a> to make sure the user is still
- paying for the subscription, and hasn't printed more pages than were
+ communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance
companies,</strong></del></span> <span class="inserted"><ins><em>make sure the
user is still
+ paying for the subscription,</em></ins></span> and
+ <span class="removed"><del><strong>others.</p>
+
+ <p>The case</strong></del></span> <span
class="inserted"><ins><em>hasn't printed more pages than were
paid for.</p>
<p>Even though the ink subscription program may be cheaper in some
specific cases, it spies on users, and involves totally unacceptable
- restrictions in the use of ink cartridges that would otherwise be in
- working order.</p>
+ restrictions in the use</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span class="inserted"><ins><em>ink cartridges
that would otherwise be</em></ins></span> in <span
class="removed"><del><strong>this article, is not
+ really</strong></del></span>
+ <span class="inserted"><ins><em>working order.</p>
</li>
<li id="M201808120">
<!--#set var="DATE" value='<small
class="date-tag">2018-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Crackers found a way to break the security of an Amazon device,
- and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>matter</strong></del></span> <span
class="inserted"><ins><em>way to break the security</em></ins></span> of <span
class="removed"><del><strong>proprietary surveillance. These systems
are</strong></del></span> an
+ <span class="removed"><del><strong>intolerable invasion of
privacy,</strong></del></span> <span class="inserted"><ins><em>Amazon
device,</em></ins></span>
+ and <span class="removed"><del><strong>should</strong></del></span> <span
class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
- <p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And if some government such as China or the US
- told Amazon to do this, or cease to sell the product in that country,
- do you think Amazon would have the moral fiber to say no?</p>
-
- <p><small>(These crackers are probably hackers too, but please
<a
- href="https://stallman.org/articles/on-hacking.html"> don't use
+ <p>It was very difficult for them to do this. The job
would</em></ins></span> be <span class="removed"><del><strong>replaced with
anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>much
+ easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>invasion isn't done
by malware. The other
+ cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>US
+ told Amazon to do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>product in that country,
+ do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>moral fiber</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
+ determine the car's location at any time. (See</strong></del></span>
<span class="inserted"><ins><em>say no?</p>
+
+ <p><small>(These crackers are probably hackers too, but
please</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>). The</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
“hacking” to mean “breaking
security”</a>.)</small></p>
</li>
<li id="M201804140">
<!--#set var="DATE" value='<small
class="date-tag">2018-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A medical insurance company <a
+ <p>A medical insurance</em></ins></span> company <span
class="removed"><del><strong>says it doesn't
+ store this information, but if</strong></del></span> <span
class="inserted"><ins><em><a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
offers a gratis electronic toothbrush that snoops on its user by
- sending usage data back over the Internet</a>.</p>
+ sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p>
</li>
<li id="M201706204">
@@ -3103,73 +3263,63 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Lots of “smart” products are designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen to everyone in</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed
response:</strong></del></span> <span class="inserted"><ins><em>house, all the
time</a>.</p>
+ listen</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>everyone in the house, all</em></ins></span> the
<span class="inserted"><ins><em>time</a>.</p>
- <p>Today's technological practice does not include any way of
making</em></ins></span>
- a <span class="removed"><del><strong>labeling
- standard with which manufacturers would make statements about
- their products, rather than free software which
users</strong></del></span> <span class="inserted"><ins><em>device
that</em></ins></span> can <span class="removed"><del><strong>check
- and change.</p></strong></del></span> <span
class="inserted"><ins><em>obey your voice commands without potentially spying
+ <p>Today's technological practice does not include any way of making
+ a device that can obey your voice commands without potentially spying
on you. Even if it is air-gapped, it could be saving up records
- about you for later examination.</p></em></ins></span>
+ about you for later examination.</p>
</li>
- <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
- <span class="inserted"><ins><em><li id="M201407170">
+ <li id="M201407170">
<!--#set var="DATE" value='<small
class="date-tag">2014-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
- <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot of
- data about the user</a>.</p>
+ <p id="nest-thermometers">Nest thermometers send <a
+ href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot
of</em></ins></span>
+ data
+ <span class="removed"><del><strong>and hand it
over,</strong></del></span> <span
class="inserted"><ins><em>about</em></ins></span> the <span
class="removed"><del><strong>state can store
it.</p></strong></del></span> <span
class="inserted"><ins><em>user</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201310260">
- <!--#set var="DATE" value='<small
class="date-tag">2013-10</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</em></ins></span> to spy on <span
class="removed"><del><strong>children and
adults.</a>.</p></strong></del></span> <span
class="inserted"><ins><em>their renters</a>.</p></em></ins></span>
- </li>
-</ul>
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure to place new items on top under each
subsection</strong></del></span>
-<span class="removed"><del><strong><!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+ <span class="inserted"><ins><em><li id="M201310260">
+ <!--#set var="DATE" value='<small
class="date-tag">2013-10</small>'
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
</div>
-<div style="clear: left;"></div></strong></del></span>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"></strong></del></span>
+ <span class="inserted"><ins><em><p><a
+
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"></em></ins></span>
+ Rent-to-own computers were programmed to spy on their
renters</a>.</p>
+ </li>
+</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareOnWearables">Wearables</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnWearables">#SpywareOnWearables</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareOnWearables">Wearables</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnWearables">#SpywareOnWearables</a>)</span></em></ins></span>
</div>
-<span class="removed"><del><strong><ul>
-<li><p></strong></del></span>
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201807260">
<!--#set var="DATE" value='<small
class="date-tag">2018-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tommy Hilfiger clothing</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note that</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
+ <p>Tommy Hilfiger clothing <a
+
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
monitor how often people wear it</a>.</p>
- <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a “clean” Windows install is not really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>sheeple</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each
subsection</strong></del></span> <span class="inserted"><ins><em>find it normal
that companies
+ <p>This will teach the sheeple to find it normal that companies
monitor every aspect of what they do.</p>
</li>
</ul>
@@ -3180,30 +3330,22 @@
<ul class="blurbs">
<li id="M202009100">
<!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows</strong></del></span>
- <span class="inserted"><ins><em><p>Internet-enabled watches with
proprietary software
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Internet-enabled watches with proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they have a lot of security flaws.
They</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
- permit security breakers (and unauthorized people) to access</a> the
watch.</p>
+ privacy. In addition, they have</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>lot of security flaws. They <a
+
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
+ permit security breakers (and unauthorized people)</em></ins></span> to
<span class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>access</a> the watch.</p>
+
+ <p>Thus, ill-intentioned unauthorized people can intercept
communications between parent</em></ins></span> and
+<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I
+don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>child and spoof messages to and
from</em></ins></span> the <span class="removed"><del><strong>other way.”
Evidently</strong></del></span> <span class="inserted"><ins><em>watch, possibly
endangering the child.</p>
- <p>Thus, ill-intentioned unauthorized people</em></ins></span> can
<span class="removed"><del><strong>collect</strong></del></span> <span
class="inserted"><ins><em>intercept communications between parent and child and
spoof messages to and from</em></ins></span> the <span
class="removed"><del><strong>emails of members of
Parliament</strong></del></span> <span class="inserted"><ins><em>watch,
possibly endangering the child.</p>
+ <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>was
+before Amazon “smart” TVs.</p>
- <p><small>(Note that</em></ins></span> this <span
class="removed"><del><strong>way, because they pass</strong></del></span> <span
class="inserted"><ins><em>article misuses the word “<a
+<ul>
+ <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>this article misuses
the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
to mean “crackers.”)</small></p>
</li>
@@ -3211,56 +3353,42 @@
<li id="M201603020">
<!--#set var="DATE" value='<small
class="date-tag">2016-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A very cheap “smart watch” comes with an Android app
<a
-
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects to an unidentified site in China</a>.</p>
+ <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span class="removed"><del><strong>href="
+
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects to an unidentified site in
China</a>.</p></em></ins></span>
- <p>The article says this is a back door, but that could be a
- misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+ <p>The <span class="removed"><del><strong>report was as of 2014, but
we don't expect</strong></del></span> <span class="inserted"><ins><em>article
says</em></ins></span> this <span class="removed"><del><strong>has got
better.</p>
- <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>is certainly surveillance, at least.</p>
+ <p>This shows</strong></del></span> <span
class="inserted"><ins><em>is a back door, but</em></ins></span> that <span
class="removed"><del><strong>laws requiring products</strong></del></span>
<span class="inserted"><ins><em>could be a
+ misunderstanding. However, it is certainly surveillance, at
least.</p>
</li>
<li id="M201407090">
<!--#set var="DATE" value='<small
class="date-tag">2014-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>An LG “smart” watch is designed</em></ins></span>
<a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+ <p>An LG “smart” watch is designed <a
+
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
to report its location to someone else and to transmit conversations
- too</a>.</p></em></ins></span>
+ too</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInVehicles">Vehicles</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></em></ins></span>
+ <h4 id="SpywareInVehicles">Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Spyware in Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype
- <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
- </li>
-</ul>
-
-
-
-<!-- #SpywareOnTheRoad</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202008181">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>New Toyotas will <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>New Toyotas will <a
href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/">
- upload data</em></ins></span> to <span class="removed"><del><strong>place
new items</strong></del></span> <span class="inserted"><ins><em>AWS to help
create custom insurance premiums</a>
- based</em></ins></span> on <span class="removed"><del><strong>top under
each subsection</strong></del></span> <span class="inserted"><ins><em>driver
behaviour.</p>
+ upload data to AWS to help create custom insurance premiums</a>
+ based on driver behaviour.</p>
<p>Before you buy a “connected” car, make sure you can
disconnect its cellular antenna and its GPS antenna. If you want
@@ -3270,267 +3398,263 @@
<li id="M201912171">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>The Nest Cam “smart” camera is</strong></del></span>
- <span class="inserted"><ins><em><p>Most modern cars
now</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
- record and send various kinds of data to</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. For</em></ins></span>
- the <span class="removed"><del><strong>manufacturer</strong></del></span>
<span class="inserted"><ins><em>user, access to the data</em></ins></span> is
<span class="removed"><del><strong>using</strong></del></span> <span
class="inserted"><ins><em>nearly impossible, as</em></ins></span> it <span
class="removed"><del><strong>to outsmart
- you.</p></strong></del></span> <span
class="inserted"><ins><em>involves
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Most modern cars now <a
+
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
+ record and send various kinds of data to the manufacturer</a>. For
+ the user, access</em></ins></span> to <span
class="removed"><del><strong>get users' formal
+ consent before collecting personal</strong></del></span> <span
class="inserted"><ins><em>the</em></ins></span> data <span
class="removed"><del><strong>are totally inadequate.
+ And what happens if</strong></del></span> <span
class="inserted"><ins><em>is nearly impossible, as it involves
cracking the car's computer, which is always hidden and running with
- proprietary software.</p></em></ins></span>
+ proprietary software.</p>
</li>
-<span class="removed"><del><strong></ul>
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-
-<ul>
- <li><p>E-books can contain Javascript code,</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201903290">
+ <li id="M201903290">
<!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tesla cars collect lots of personal data,</em></ins></span> and
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
- when they go to a junkyard the driver's personal data goes with
- them</a>.</p></em></ins></span>
+ <p>Tesla cars collect lots of personal data, and <a
+
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
+ when they go to</em></ins></span> a <span
class="removed"><del><strong>user declines consent?
Probably</strong></del></span> <span
class="inserted"><ins><em>junkyard</em></ins></span> the <span
class="removed"><del><strong>TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>driver's personal data goes with
+ them</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902011">
+ <li id="M201902011">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The FordPass Connect feature of some Ford vehicles has <a
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access to the internal car network</a>. It is
constantly
- connected to the cellular phone network and sends Ford a lot of data,
+ near-complete access</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> the <span
class="removed"><del><strong>TV will
+ not work.”</p>
+
+ <p>Proper laws would say that TVs are not
allowed</strong></del></span> <span class="inserted"><ins><em>internal car
network</a>. It is constantly
+ connected</em></ins></span> to <span class="removed"><del><strong>report
what</strong></del></span> the <span class="removed"><del><strong>user watches
— no exceptions!</p>
+ </li>
+ <li><p>Vizio goes</strong></del></span> <span
class="inserted"><ins><em>cellular phone network and sends
Ford</em></ins></span> a <span class="removed"><del><strong>step further than
other TV manufacturers in spying on
+ their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in
detail</strong></del></span> <span class="inserted"><ins><em>lot of data,
including car location. This feature operates even when the ignition
- key is removed, and users report that they can't disable it.</p>
+ key is removed,</em></ins></span> and
+ <span class="removed"><del><strong>link them your IP address</a>
so</strong></del></span> <span class="inserted"><ins><em>users
report</em></ins></span> that <span class="removed"><del><strong>advertisers
can track</strong></del></span> <span class="inserted"><ins><em>they can't
disable it.</p>
+
+ <p>If</em></ins></span> you
+ <span class="removed"><del><strong>across devices.</p>
- <p>If you own one of these cars, have you
succeeded</em></ins></span> in <span class="removed"><del><strong>many
e-readers—not only</strong></del></span> <span
class="inserted"><ins><em>breaking</em></ins></span> the
- <span class="removed"><del><strong>Kindle:</strong></del></span>
- <span class="inserted"><ins><em>connectivity by disconnecting the cellular
modem, or wrapping the
+ <p>It</strong></del></span> <span class="inserted"><ins><em>own
one of these cars, have you succeeded in breaking the
+ connectivity by disconnecting the cellular modem, or wrapping the
antenna in aluminum foil?</p>
</li>
<li id="M201811300">
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>In China, it is mandatory for electric
- cars to be equipped with a terminal that <a
+ <p>In China, it</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>mandatory for electric
+ cars</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>be equipped with a terminal that <a
href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
transfers technical data, including car location,
- to a government-run platform</a>. In practice,</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying">
- manufacturers collect this data</a> as part of their own spying, then
- forward it to</em></ins></span> the <span
class="removed"><del><strong>user reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>government-run platform.</p></em></ins></span>
+ to a government-run platform</a>. In practice, <a
+ href="/proprietary/proprietary-surveillance.html#car-spying">
+ manufacturers collect</em></ins></span> this <span
class="removed"><del><strong>off, but having</strong></del></span> <span
class="inserted"><ins><em>data</a> as part of their own spying, then
+ forward</em></ins></span> it <span class="removed"><del><strong>enabled by
default
+ is an injustice already.</p>
</li>
- <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,”</strong></del></span>
+ <li><p>Tivo's alliance with Viacom adds 2.3 million
households</strong></del></span> to the <span class="removed"><del><strong>600
millions social media profiles</strong></del></span> <span
class="inserted"><ins><em>government-run platform.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201810230">
+ <li id="M201810230">
<!--#set var="DATE" value='<small
class="date-tag">2018-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>GM <a
href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked</em></ins></span> the <span class="removed"><del><strong>e-reader
used</strong></del></span> <span class="inserted"><ins><em>choices of radio
programs</a> in its
- “connected” cars, minute</em></ins></span> by <span
class="removed"><del><strong>most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send</strong></del></span> <span
class="inserted"><ins><em>minute.</p>
+ tracked</em></ins></span> the <span class="removed"><del><strong>company
already
+ monitors. Tivo customers are unaware they're being
watched</strong></del></span> <span class="inserted"><ins><em>choices of radio
programs</a> in its
+ “connected” cars, minute</em></ins></span> by
+ <span class="removed"><del><strong>advertisers. By combining TV viewing
information with online
+ social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing
all</strong></del></span> <span class="inserted"><ins><em>minute.</p>
<p>GM did not get users' consent, but it could have got that easily
by
- sneaking it into the contract that users sign for some digital service
+ sneaking it into the contract that</em></ins></span> users <span
class="inserted"><ins><em>sign for some digital service
or other. A requirement for consent is effectively no protection.</p>
- <p>The cars can also collect</em></ins></span> lots of <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>other data: listening</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
- needed</strong></del></span> <span class="inserted"><ins><em>you,
+ <p>The cars can also collect lots of other data:
listening</em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>you,
watching you, following your movements, tracking passengers' cell
phones. <em>All</em> such data collection should be
forbidden.</p>
- <p>But if you really want</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p></strong></del></span> <span
class="inserted"><ins><em>be safe, we must make sure the car's
+ <p>But if you really want</em></ins></span> to be
+ <span class="removed"><del><strong>picked up by proprietary malware
running on other devices in
+ range</strong></del></span> <span class="inserted"><ins><em>safe, we
must make sure the car's
hardware cannot collect any of that data, or that the software
- is free so we know it won't collect any of that
data.</p></em></ins></span>
+ is free</em></ins></span> so <span class="removed"><del><strong>as to
determine</strong></del></span> <span class="inserted"><ins><em>we know it
won't collect any of</em></ins></span> that <span
class="removed"><del><strong>they are nearby. Once your
+ Internet devices are paired with your TV,
advertisers</strong></del></span> <span
class="inserted"><ins><em>data.</p>
</li>
-<span class="removed"><del><strong></ul>
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
-
-<ul>
-<li><p>Computerized</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711230">
+ <li id="M201711230">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>AI-powered driving apps can <a
-
href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p>
+ <p>AI-powered driving apps</em></ins></span> can
+ <span class="removed"><del><strong>correlate ads with Web activity, and
+ other</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your every move</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and
+ <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people</strong></del></span>
- <li id="M201607160">
+ <span class="inserted"><ins><em><li id="M201607160">
<!--#set var="DATE" value='<small
class="date-tag">2016-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p id="car-spying">Computerized</em></ins></span> cars with nonfree
software are <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"></em></ins></span>
- snooping devices</a>.</p>
+ <p id="car-spying">Computerized cars with nonfree
software</em></ins></span> are <span
class="removed"><del><strong>watching</a>,
+ even if it isn't a TV channel.</p></strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ snooping devices</a>.</p></em></ins></span>
</li>
-
- <span
class="removed"><del><strong><li><p>The</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
<span class="inserted"><ins><em><li id="M201602240">
<!--#set var="DATE" value='<small
class="date-tag">2016-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p id="nissan-modem">The</em></ins></span> Nissan Leaf has a built-in
- cell phone modem which allows effectively anyone <span
class="inserted"><ins><em>to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"></em></ins></span>
- access its computers remotely and make changes in various
+ <p id="nissan-modem">The Nissan Leaf has a built-in
+ cell phone modem which allows effectively anyone to</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
+ access its computers remotely</em></ins></span> and <span
class="removed"><del><strong>listening all</strong></del></span> <span
class="inserted"><ins><em>make changes in various
settings</a>.</p>
- <p>That's easy to do because the system has no authentication
- when accessed through the modem. However, even if it asked
+ <p>That's easy to do because</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+ </li>
+ <li><p>The Samsung “Smart” TV
+ <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span> <span class="inserted"><ins><em>system
has no authentication
+ when accessed through</em></ins></span> the <span
class="removed"><del><strong>internet to another
+ company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>modem. However, even if</em></ins></span> it <span
class="removed"><del><strong>and would then have to
+ give</strong></del></span> <span class="inserted"><ins><em>asked
for authentication, you couldn't be confident that Nissan
has no access. The software in the car is proprietary, <a
- href="/philosophy/free-software-even-more-important.html">which means
- it demands blind faith from its users</a>.</p>
+ href="/philosophy/free-software-even-more-important.html">which
means</em></ins></span>
+ it <span class="inserted"><ins><em>demands blind faith from its
users</a>.</p>
- <p>Even if no one connects to the car remotely, the cell phone modem
- enables the phone company to track the car's movements all the time;
- it is possible to physically remove the cell phone <span
class="removed"><del><strong>modem</strong></del></span> <span
class="inserted"><ins><em>modem,</em></ins></span> though.</p>
+ <p>Even if no one connects</em></ins></span> to the <span
class="removed"><del><strong>US or some other government.</p>
+ <p>Speech recognition is not</strong></del></span> <span
class="inserted"><ins><em>car remotely, the cell phone modem
+ enables the phone company</em></ins></span> to <span
class="removed"><del><strong>be trusted unless</strong></del></span> <span
class="inserted"><ins><em>track the car's movements all the
time;</em></ins></span>
+ it is <span class="removed"><del><strong>done
+ by free software in your own computer.</p>
+ </li>
+ <li><p>Spyware in
+ <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a> reports what</strong></del></span>
<span class="inserted"><ins><em>possible to physically remove</em></ins></span>
the <span class="removed"><del><strong>user watches, and</strong></del></span>
<span class="inserted"><ins><em>cell phone modem, though.</p>
</li>
- <span
class="removed"><del><strong><li><p>Proprietary</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201306140">
+ <li id="M201306140">
<!--#set var="DATE" value='<small
class="date-tag">2013-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tesla cars allow the company to extract
- data remotely and determine the car's location
- at any time. (See Section 2, paragraphs b and c of the <a
-
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ <p>Tesla cars allow</em></ins></span> the <span
class="removed"><del><strong>switch</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span> to <span
class="removed"><del><strong>turn this off has no effect. (The fact
that</strong></del></span> <span class="inserted"><ins><em>extract
+ data remotely and determine</em></ins></span> the
+ <span class="removed"><del><strong>transmission reports a 404 error
really means nothing;</strong></del></span> <span
class="inserted"><ins><em>car's location
+ at any time. (See Section 2, paragraphs b and c of</em></ins></span> the
<span class="removed"><del><strong>server
+ could save that data anyway.)</p>
+
+ <p>Even worse, it</strong></del></span> <a <span
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf">
privacy statement</a>.) The company says it doesn't store this
- information, but if the state orders it to get the data and hand it
- over, the state can store it.</p>
- </li>
+ information, but if</em></ins></span> the <span
class="removed"><del><strong>user's local network.</a></p>
- <li id="M201303250">
- <!--#set var="DATE" value='<small
class="date-tag">2013-03</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p id="records-drivers">Proprietary</em></ins></span> software in
cars <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
- records</em></ins></span> information about drivers' movements</a>,
which is made
- available to car manufacturers, insurance companies, and others.</p>
+ <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>state orders</em></ins></span> it <span
class="removed"><del><strong>had installed a patch</strong></del></span> to
<span class="removed"><del><strong>stop this, but any product
+ could spy this way.</p>
- <p>The case of toll-collection systems, mentioned in this article,
- is not really a matter of proprietary surveillance. These systems
- are an intolerable invasion of privacy, and should be replaced with
- anonymous payment systems, but the <span
class="removed"><del><strong>invasion isn't done by malware. The other
- cases mentioned are done by proprietary malware in the
car.</p></li>
-
- <li><p>Tesla cars allow the company to extract data remotely and
- determine the car's location at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The company says it doesn't
- store this information, but if the state orders it to get the data
- and hand it over,</strong></del></span> <span
class="inserted"><ins><em>invasion isn't done by malware. The
- other cases mentioned are done by proprietary malware in</em></ins></span>
the <span class="removed"><del><strong>state can store it.</p>
+ <p>Meanwhile, LG TVs
+ <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
</li>
-</ul>
-
+ <li>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch,</strong></del></span> <span
class="inserted"><ins><em>get the data</em></ins></span> and <span
class="removed"><del><strong>even what they wanted to
record.</a></p></strong></del></span> <span
class="inserted"><ins><em>hand it
+ over, the state can store it.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+<!-- #SpywareAtPlay</strong></del></span>
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+ <span class="inserted"><ins><em><li id="M201303250">
+ <!--#set var="DATE" value='<small
class="date-tag">2013-03</small>'
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareAtPlay">Spyware at Play</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
</div>
<div style="clear: left;"></div>
<ul>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy on their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>car.</p></em></ins></span>
+ <li><p>Many</strong></del></span>
+ <span class="inserted"><ins><em><p id="records-drivers">Proprietary
software in cars</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users and report to the
+ internet</a>— even what their users weigh.</p>
+
+ <p>A game console</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
+ records information about drivers' movements</a>,
which</em></ins></span> is <span class="removed"><del><strong>a
computer,</strong></del></span> <span class="inserted"><ins><em>made
+ available to car manufacturers, insurance companies,</em></ins></span> and
<span class="removed"><del><strong>you can't trust a computer with
+ a nonfree operating system.</p>
+ </li>
+
+ <li><p>Modern gratis game cr…apps
+ <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect</strong></del></span> <span
class="inserted"><ins><em>others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
+ is not really</em></ins></span> a <span class="removed"><del><strong>wide
range</strong></del></span> <span
class="inserted"><ins><em>matter</em></ins></span> of <span
class="removed"><del><strong>data about their users and their users'
+ friends</strong></del></span> <span
class="inserted"><ins><em>proprietary surveillance. These systems
+ are an intolerable invasion of privacy,</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
+
+ <p>Even nastier, they do it through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>should be replaced
with
+ anonymous payment systems, but</em></ins></span> the <span
class="removed"><del><strong>data
+ collected</strong></del></span> <span class="inserted"><ins><em>invasion
isn't done</em></ins></span> by <span class="removed"><del><strong>various
cr…apps and sites made</strong></del></span> <span
class="inserted"><ins><em>malware. The
+ other cases mentioned are done</em></ins></span> by <span
class="removed"><del><strong>different
+ companies.</p>
+
+ <p>They use this data to manipulate people</strong></del></span>
<span class="inserted"><ins><em>proprietary malware in the car.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInVR">Virtual
Reality</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInVR">#SpywareInVR</a>)</span></em></ins></span>
+ <h4 id="SpywareInVR">Virtual Reality</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVR">#SpywareInVR</a>)</span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202008182">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Oculus headsets <a
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
- users</em></ins></span> to <span class="removed"><del><strong>me and
-said, “Didn't I see you</strong></del></span> <span
class="inserted"><ins><em>identify themselves to Facebook</a>. This will
give Facebook
- free rein to pervasively snoop</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
-don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>Oculus users.</p>
+ users</em></ins></span> to <span class="removed"><del><strong>buy things,
and hunt
+ for “whales” who can be led</strong></del></span> <span
class="inserted"><ins><em>identify themselves</em></ins></span> to <span
class="removed"><del><strong>spend a lot of money. They
+ also use a back door</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. This will give Facebook
+ free rein</em></ins></span> to <span
class="removed"><del><strong>manipulate</strong></del></span> <span
class="inserted"><ins><em>pervasively snoop on Oculus users.</p>
</li>
<li id="M201612230">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>VR equipment, measuring every slight motion,
- creates</em></ins></span> the <span class="removed"><del><strong>other
way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>potential for the
most intimate
- surveillance ever. All it takes to make this potential
real</em></ins></span> <a <span class="removed"><del><strong>href="
-
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
+ creates</em></ins></span> the <span class="removed"><del><strong>game
play</strong></del></span> <span
class="inserted"><ins><em>potential</em></ins></span> for <span
class="removed"><del><strong>specific players.</p>
- <p>The report was</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
- software</em></ins></span> as <span class="removed"><del><strong>of 2014,
but we don't expect</strong></del></span> <span
class="inserted"><ins><em>malicious as many other programs listed
in</em></ins></span> this <span class="removed"><del><strong>has got
better.</p>
+ <p>While</strong></del></span> the <span
class="removed"><del><strong>article describes gratis games, games that cost
money</strong></del></span> <span class="inserted"><ins><em>most intimate
+ surveillance ever. All it takes to make this potential real <a
+
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
+ software as malicious as many other programs listed in this
+ page</a>.</p>
- <p>This shows that laws requiring products to get users' formal
- consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent? Probably the TV
- will say, “Without your consent to tracking, the
TV</strong></del></span>
- <span class="inserted"><ins><em>page</a>.</p>
-
- <p>You can bet Facebook</em></ins></span> will
- <span class="removed"><del><strong>not work.”</p>
-
- <p>Proper laws would say that TVs are not allowed to report
what</strong></del></span> <span
class="inserted"><ins><em>implement</em></ins></span> the <span
class="removed"><del><strong>user watches — no exceptions!</p>
- </li>
- <li><p>Vizio goes</strong></del></span> <span
class="inserted"><ins><em>maximum possible
- surveillance on Oculus Rift devices. The moral is, never
trust</em></ins></span> a <span class="removed"><del><strong>step further than
other TV manufacturers</strong></del></span> <span class="inserted"><ins><em>VR
- system with nonfree software</em></ins></span> in <span
class="removed"><del><strong>spying</strong></del></span> <span
class="inserted"><ins><em>it.</p>
+ <p>You</em></ins></span> can <span
class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>bet Facebook will implement</em></ins></span> the
<span class="removed"><del><strong>same
tactics.</p></strong></del></span> <span
class="inserted"><ins><em>maximum possible
+ surveillance on Oculus Rift devices. The moral is, never trust a VR
+ system with nonfree software in it.</p></em></ins></span>
</li>
</ul>
+<span class="removed"><del><strong><!-- #SpywareOnTheWeb
--></strong></del></span>
+
<div class="big-section">
@@ -3539,92 +3663,71 @@
</div>
<div style="clear: left;"></div>
-<p>In addition, many web sites spy</em></ins></span> on their <span
class="removed"><del><strong>users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a></strong></del></span> <span
class="inserted"><ins><em>visitors. Web sites are not
- programs,</em></ins></span> so <span class="removed"><del><strong>that
advertisers can track you
- across devices.</p>
-
- <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>it
- <a href="/philosophy/network-services-arent-free-or-nonfree.html">
- makes no sense</em></ins></span> to <span class="removed"><del><strong>turn
this off,</strong></del></span> <span class="inserted"><ins><em>call them
“free” or “proprietary”</a>,</em></ins></span>
- but <span class="removed"><del><strong>having it enabled by
default</strong></del></span> <span class="inserted"><ins><em>the
surveillance</em></ins></span> is an <span
class="removed"><del><strong>injustice already.</p>
- </li>
-
- <li><p>Tivo's alliance with Viacom adds 2.3 million households to
- the 600 millions social media profiles</strong></del></span> <span
class="inserted"><ins><em>abuse all</em></ins></span> the <span
class="removed"><del><strong>company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>same.</p>
+<p>In addition, many web sites spy on their visitors. Web sites are not
+ programs, so it
+ <a <span
class="removed"><del><strong>href="/philosophy/network-services-arent-free-or-nonfree.html">
+ makes no sense</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/network-services-arent-free-or-nonfree.html">
+ makes no sense to call them “free” or
“proprietary”</a>,
+ but the surveillance is an abuse all the same.</p>
<ul class="blurbs">
<li id="M201904210">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>As of April 2019, it is</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/">no
- longer possible</em></ins></span> to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>disable an
+ <p>As of April 2019, it is <a
+
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/">no
+ longer possible to disable an
unscrupulous tracking anti-feature</a> that <a
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
users when they follow ping links</a> in Apple Safari, Google Chrome,
- Opera, Microsoft Edge</em></ins></span> and <span
class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>also in the
upcoming Microsoft Edge that is
- going</em></ins></span> to be
- <span class="removed"><del><strong>picked up by proprietary malware
running</strong></del></span> <span
class="inserted"><ins><em>based</em></ins></span> on <span
class="removed"><del><strong>other devices in
- range so as to determine that they are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads with Web activity, and
- other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Chromium.</p></em></ins></span>
+ Opera, Microsoft Edge and also in the upcoming Microsoft Edge that is
+ going to be based on Chromium.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and
- <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people are watching</a>,
- even if it isn't</strong></del></span>
- <span class="inserted"><ins><em><li id="M201901101">
+ <li id="M201901101">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Until 2015, any tweet that listed</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p></strong></del></span> <span
class="inserted"><ins><em>geographical tag <a
+ <p>Until 2015, any tweet that listed a geographical tag <a
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/">
sent the precise GPS location to Twitter's server</a>. It still
- contains these GPS locations.</p></em></ins></span>
+ contains these GPS locations.</p>
</li>
- <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
- <span class="inserted"><ins><em><li id="M201805170">
+ <li id="M201805170">
<!--#set var="DATE" value='<small
class="date-tag">2018-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Storyful program</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching and listening all</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies
- on</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>reporters that use
it</a>.</p></em></ins></span>
+ <p>The Storyful program <a
+
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies
+ on the reporters that use it</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
- <span class="inserted"><ins><em><li id="M201701060">
+ <li id="M201701060">
<!--#set var="DATE" value='<small
class="date-tag">2017-01</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>When a page uses Disqus
- for comments, the proprietary Disqus software</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">loads
- a Facebook software package into</em></ins></span> the <span
class="removed"><del><strong>internet</strong></del></span> <span
class="inserted"><ins><em>browser of every anonymous visitor</em></ins></span>
- to <span class="removed"><del><strong>another
- company, Nuance</a>. Nuance can save it</strong></del></span> <span
class="inserted"><ins><em>the page,</em></ins></span> and <span
class="removed"><del><strong>would then have</strong></del></span> <span
class="inserted"><ins><em>makes the page's URL available</em></ins></span> to
- <span class="removed"><del><strong>give it</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
+ for comments, the proprietary Disqus software <a
+
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">loads
+ a Facebook software package into the browser of every anonymous
visitor</em></ins></span>
+ to <span class="removed"><del><strong>call them “free” or
“proprietary”</a>,
+ but</strong></del></span> the <span
class="removed"><del><strong>surveillance is an abuse all</strong></del></span>
<span class="inserted"><ins><em>page, and makes</em></ins></span> the <span
class="removed"><del><strong>same.</p>
+
+<ul>
+
+ <li><p>Online</strong></del></span> <span
class="inserted"><ins><em>page's URL available to Facebook</a>.</p>
</li>
<li id="M201612064">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Online sales, with tracking and surveillance of customers, <a
+ <p>Online</em></ins></span> sales, with tracking and surveillance of
customers, <a
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
- businesses</em></ins></span> to <span class="inserted"><ins><em>show
different people different prices</a>. Most of</em></ins></span>
- the <span class="removed"><del><strong>US or some other
government.</p>
- <p>Speech recognition is not to be trusted unless
it</strong></del></span> <span
class="inserted"><ins><em>tracking</em></ins></span> is done by <span
class="removed"><del><strong>free</strong></del></span> <span
class="inserted"><ins><em>recording interactions with servers, but
- proprietary</em></ins></span> software <span
class="removed"><del><strong>in your own
computer.</p></strong></del></span> <span
class="inserted"><ins><em>contributes.</p></em></ins></span>
+ businesses to show different people different prices</a>. Most of
+ the tracking is done by recording interactions with servers, but
+ proprietary software contributes.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware
in</strong></del></span>
+
+ <span class="removed"><del><strong><li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
+ Baidu's Japanese-input</strong></del></span>
<span class="inserted"><ins><em><li id="M201405140">
<!--#set var="DATE" value='<small
class="date-tag">2014-05</small>'
@@ -3639,9 +3742,8 @@
<!--#set var="DATE" value='<small
class="date-tag">2012-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many web sites rat their visitors to advertising
- networks that track users. Of the top 1000 web sites,</em></ins></span>
<a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports what</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
+ networks that track users. Of the top 1000 web sites, <a
+
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
(as of 5/17/2012) fed their visitors third-party cookies, allowing
other sites to track them</a>.</p>
</li>
@@ -3650,15 +3752,15 @@
<!--#set var="DATE" value='<small
class="date-tag">2012-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many web sites report all their visitors
- to Google by using</em></ins></span> the <span
class="removed"><del><strong>user watches,</strong></del></span> <span
class="inserted"><ins><em>Google Analytics service, which <a
+ to Google by using the Google Analytics service, which <a
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
- tells Google the IP address</em></ins></span> and the <span
class="removed"><del><strong>switch</strong></del></span> <span
class="inserted"><ins><em>page that was visited</a>.</p>
+ tells Google the IP address and the page that was
visited</a>.</p>
</li>
<li id="M201200000">
<!--#set var="DATE" value='<small
class="date-tag">[2012]</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many web sites try</em></ins></span> to <span
class="removed"><del><strong>turn this off has no effect. (The
fact</strong></del></span> <span class="inserted"><ins><em>collect users'
address books (the user's list
+ <p>Many web sites try to collect users' address books (the user's
list
of other people's phone numbers or email addresses). This violates
the privacy of those other people.</p>
</li>
@@ -3685,29 +3787,24 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Many web sites use JavaScript code <a
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- to snoop on information</em></ins></span> that <span
class="inserted"><ins><em>users have typed into a
+ to snoop on information that users have typed into a
form but not sent</a>, in order to learn their identity. Some are
<a
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege">
getting sued</a> for this.</p>
- <p>The chat facilities of some customer services
use</em></ins></span> the
- <span class="removed"><del><strong>transmission reports a 404 error
really means nothing;</strong></del></span> <span
class="inserted"><ins><em>same sort of
+ <p>The chat facilities of some customer services use the same sort of
malware to <a
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
- read what</em></ins></span> the <span class="removed"><del><strong>server
- could save that data anyway.)</p>
-
- <p>Even worse,</strong></del></span> <span
class="inserted"><ins><em>user is typing before</em></ins></span> it <span
class="inserted"><ins><em>is posted</a>.</p>
+ read what the user is typing before it is posted</a>.</p>
</li>
<li id="M201807190">
<!--#set var="DATE" value='<small
class="date-tag">2018-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>British Airways used</em></ins></span> <a <span
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
- JavaScript</em></ins></span> on <span class="inserted"><ins><em>its web
site to give</em></ins></span> other <span
class="removed"><del><strong>devices</strong></del></span> <span
class="inserted"><ins><em>companies personal data</em></ins></span> on
- <span class="inserted"><ins><em>its customers</a>.</p>
+ <p>British Airways used <a
+
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
+ JavaScript on its web site to give other companies personal data on
+ its customers</a>.</p>
</li>
<li id="M201712300">
@@ -3722,60 +3819,44 @@
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Some websites send
- JavaScript code to collect all</em></ins></span> the user's <span
class="removed"><del><strong>local network.</a></p>
-
- <p>LG later said it had installed a patch to stop this, but any
product
- could spy this way.</p>
-
- <p>Meanwhile, LG TVs</strong></del></span> <span
class="inserted"><ins><em>input,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
- </li>
- <li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they
wanted</strong></del></span>
- <span
class="inserted"><ins><em>href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
- can then be used</em></ins></span> to <span
class="removed"><del><strong>record.</a></p></strong></del></span>
<span class="inserted"><ins><em>reproduce the whole session</a>.</p>
+ JavaScript code to collect all the user's input, <a
+
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
+ can then be used to reproduce the whole session</a>.</p>
<p>If you use LibreJS, it will block that malicious JavaScript
- code.</p></em></ins></span>
+ code.</p>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareAtPlay
--></strong></del></span>
-
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareAtPlay">Spyware at
Play</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInFlash">Flash</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtPlay">#SpywareAtPlay</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInFlash">#SpywareInFlash</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 id="SpywareInFlash">Flash</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
-
-<ul>
- <li><p>Many
- <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users</strong></del></span>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201310110">
<!--#set var="DATE" value='<small
class="date-tag">2013-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Flash</em></ins></span> and <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>JavaScript are used for <a
-
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices</a></em></ins></span> to <span
class="removed"><del><strong>the
- internet</a>— even what their users weigh.</p>
+ <p>Flash</em></ins></span> and <span
class="removed"><del><strong>Chinese-input apps spy on
users.</a></p>
+ </li>
- <p>A game console is a computer, and you can't trust a computer
with
- a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>identify users.</p></em></ins></span>
+ <li><p>Pages that contain “Like”
buttons</strong></del></span> <span class="inserted"><ins><em>JavaScript are
used for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
+ enable Facebook to track visitors</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ “fingerprinting” devices</a></em></ins></span> to <span
class="removed"><del><strong>those pages</a>—even
+ users that don't have Facebook accounts.</p></strong></del></span>
<span class="inserted"><ins><em>identify users.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Many</strong></del></span>
<span class="inserted"><ins><em><li id="M201003010">
<!--#set var="DATE" value='<small
class="date-tag">2010-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Flash Player's</em></ins></span> <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/">
- cookie feature helps web sites track visitors</a>.</p>
+ <p>Flash Player's <a
+
href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/">
+ cookie feature helps</em></ins></span> web sites <span
class="removed"><del><strong>rat their visitors to advertising networks
that</strong></del></span> track
+ <span class="removed"><del><strong>users. Of the top 1000 web
sites,</strong></del></span> <span
class="inserted"><ins><em>visitors</a>.</p>
</li>
</ul>
@@ -3789,108 +3870,59 @@
<li id="M201906220">
<!--#set var="DATE" value='<small
class="date-tag">2019-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google Chrome is an <a
-
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/">
- instrument</em></ins></span> of <span class="removed"><del><strong>data
about their users and their</strong></del></span> <span
class="inserted"><ins><em>surveillance</a>. It lets thousands of trackers
invade</em></ins></span>
- users'
- <span class="removed"><del><strong>friends</strong></del></span> <span
class="inserted"><ins><em>computers</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
-
- <p>Even nastier, they do it through ad networks that
merge</strong></del></span> <span
class="inserted"><ins><em>report</em></ins></span> the <span
class="removed"><del><strong>data
- collected by various cr…apps and</strong></del></span> sites
<span class="removed"><del><strong>made by different
- companies.</p>
+ <p>Google Chrome is an</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
+ (as</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/">
+ instrument</em></ins></span> of <span
class="removed"><del><strong>5/17/2012) fed their visitors third-party cookies,
allowing other</strong></del></span> <span
class="inserted"><ins><em>surveillance</a>. It lets thousands of trackers
invade
+ users' computers and report the</em></ins></span> sites <span
class="inserted"><ins><em>they visit</em></ins></span> to <span
class="removed"><del><strong>track them</a>.</p>
+ </li>
- <p>They use this</strong></del></span> <span
class="inserted"><ins><em>they visit to advertising and</em></ins></span>
- data <span class="inserted"><ins><em>companies, first of all to Google.
Moreover, if users have a
- Gmail account, Chrome automatically logs them in to the browser for
+ <li><p>Many web sites report</strong></del></span> <span
class="inserted"><ins><em>advertising and
+ data companies, first of</em></ins></span> all <span
class="removed"><del><strong>their visitors</strong></del></span> to <span
class="removed"><del><strong>Google by using</strong></del></span> <span
class="inserted"><ins><em>Google. Moreover, if users have a
+ Gmail account, Chrome automatically logs them in to</em></ins></span> the
<span class="removed"><del><strong>Google Analytics service,
which</strong></del></span> <span class="inserted"><ins><em>browser for
more convenient profiling. On Android, Chrome also reports their
location to Google.</p>
- <p>The best way</em></ins></span> to <span
class="removed"><del><strong>manipulate people</strong></del></span> <span
class="inserted"><ins><em>escape surveillance is</em></ins></span> to <span
class="removed"><del><strong>buy things, and hunt
- for “whales” who can be led</strong></del></span> <span
class="inserted"><ins><em>switch</em></ins></span> to <span
class="removed"><del><strong>spend</strong></del></span> <span
class="inserted"><ins><em><a
- href="/software/icecat/">IceCat</a>,</em></ins></span> a <span
class="removed"><del><strong>lot</strong></del></span> <span
class="inserted"><ins><em>modified version</em></ins></span> of <span
class="removed"><del><strong>money. They
- also use a back door</strong></del></span> <span
class="inserted"><ins><em>Firefox
- with several changes</em></ins></span> to <span
class="removed"><del><strong>manipulate the game play for specific
players.</p>
-
- <p>While the article describes gratis games, games that cost money
- can use the same tactics.</p></strong></del></span> <span
class="inserted"><ins><em>protect users' privacy.</p></em></ins></span>
+ <p>The best way to escape surveillance is to switch
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
+ tells Google</strong></del></span>
+ <span
class="inserted"><ins><em>href="/software/icecat/">IceCat</a>, a
modified version of Firefox
+ with several changes to protect users' privacy.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareOnTheWeb</strong></del></span>
- <span class="inserted"><ins><em><li id="M201704131">
+ <li id="M201704131">
<!--#set var="DATE" value='<small
class="date-tag">2017-04</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareOnTheWeb">Spyware</strong></del></span>
- <span class="inserted"><ins><em><p>Low-priced Chromebooks for
schools are <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Low-priced Chromebooks for schools are <a
href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
- collecting far more data</em></ins></span> on <span
class="inserted"><ins><em>students than is necessary, and store
- it indefinitely</a>. Parents and students complain
about</em></ins></span> the <span class="removed"><del><strong>Web</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheWeb">#SpywareOnTheWeb</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<p>In addition, many web sites spy</strong></del></span> <span
class="inserted"><ins><em>lack
- of transparency</em></ins></span> on <span
class="removed"><del><strong>their visitors. Web sites are not
- programs, so it
- <a href="/philosophy/network-services-arent-free-or-nonfree.html">
- makes no sense to call them “free” or
“proprietary”</a>,
- but</strong></del></span> the <span
class="removed"><del><strong>surveillance is an abuse all</strong></del></span>
<span class="inserted"><ins><em>part of both</em></ins></span> the <span
class="removed"><del><strong>same.</p>
-
-<ul>
-
- <li><p>Online sales, with tracking</strong></del></span> <span
class="inserted"><ins><em>educational services</em></ins></span> and <span
class="removed"><del><strong>surveillance</strong></del></span> <span
class="inserted"><ins><em>the
- schools, the difficulty</em></ins></span> of <span
class="removed"><del><strong>customers, <a
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
- businesses to show different people different prices</a>.
Most</strong></del></span> <span class="inserted"><ins><em>opting
out</em></ins></span> of <span class="inserted"><ins><em>these services,
and</em></ins></span> the <span
class="removed"><del><strong>tracking</strong></del></span> <span
class="inserted"><ins><em>lack
- of proper privacy policies, among other things.</p>
-
- <p>But complaining</em></ins></span> is <span
class="removed"><del><strong>done by recording interactions with
- servers, but proprietary software contributes.</p>
- </li>
-
- <li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
- Baidu's Japanese-input</strong></del></span> <span
class="inserted"><ins><em>not sufficient. Parents, students</em></ins></span>
and <span class="removed"><del><strong>Chinese-input apps spy on
users.</a></p>
+ collecting far more data on students than is necessary, and store
+ it indefinitely</a>. Parents and students complain
about</em></ins></span> the <span class="removed"><del><strong>IP
address</strong></del></span> <span class="inserted"><ins><em>lack
+ of transparency on the part of both the educational
services</em></ins></span> and the <span class="removed"><del><strong>page that
was visited.</a></p>
</li>
- <li><p>Pages that contain “Like” buttons
- <a
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
- enable Facebook to track visitors to those pages</a>—even
- users that don't have Facebook accounts.</p>
+ <li><p>Many web sites try to collect users' address books (the
+ user's list</strong></del></span>
+ <span class="inserted"><ins><em>schools, the difficulty</em></ins></span>
of <span class="removed"><del><strong>other people's phone numbers or email
addresses).
+ This violates</strong></del></span> <span
class="inserted"><ins><em>opting out of these services, and</em></ins></span>
the <span class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>lack</em></ins></span>
+ of <span class="removed"><del><strong>those</strong></del></span> <span
class="inserted"><ins><em>proper privacy policies, among</em></ins></span>
other <span class="removed"><del><strong>people.</p>
</li>
- <li><p>Many web sites rat their visitors to advertising
networks</strong></del></span> <span class="inserted"><ins><em>teachers
- should realize</em></ins></span> that <span
class="removed"><del><strong>track
- users. Of</strong></del></span> the <span
class="removed"><del><strong>top 1000 web sites, <a
-
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
- (as of 5/17/2012) fed their visitors third-party cookies, allowing other
- sites</strong></del></span> <span class="inserted"><ins><em>software
Google uses</em></ins></span> to <span class="removed"><del><strong>track
them</a>.</p>
- </li>
+ <li><p><a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
+ Microsoft SkyDrive allows</strong></del></span> <span
class="inserted"><ins><em>things.</p>
- <li><p>Many web sites report all their
visitors</strong></del></span> <span class="inserted"><ins><em>spy on students
is
+ <p>But complaining is not sufficient. Parents, students and teachers
+ should realize that the software Google uses to spy on students is
nonfree, so they can't verify what it really does. The only remedy is
- to persuade school officials</em></ins></span> to <span
class="removed"><del><strong>Google by using
- the Google Analytics service, which</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
- tells Google</strong></del></span> <span
class="inserted"><ins><em>href="/education/edu-schools.html">
+ to persuade school officials to <a
href="/education/edu-schools.html">
exclusively use free software</a> for both education and school
- administration. If</em></ins></span> the <span
class="removed"><del><strong>IP address</strong></del></span> <span
class="inserted"><ins><em>school is run locally, parents</em></ins></span> and
<span class="inserted"><ins><em>teachers
- can mandate their representatives at</em></ins></span> the <span
class="removed"><del><strong>page that was visited.</a></p>
- </li>
-
- <li><p>Many web sites try</strong></del></span> <span
class="inserted"><ins><em>School Board</em></ins></span> to <span
class="removed"><del><strong>collect users' address books (the
- user's list of other people's phone numbers or email addresses).
- This violates</strong></del></span> <span
class="inserted"><ins><em>refuse</em></ins></span> the <span
class="removed"><del><strong>privacy of those other people.</p>
- </li>
-
- <li><p><a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
- Microsoft SkyDrive allows</strong></del></span>
- <span class="inserted"><ins><em>budget unless</em></ins></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>school initiates a switch</em></ins></span> to <span
class="removed"><del><strong>directly examine users' data</a>.</p>
+ administration. If the school is run locally, parents and teachers
+ can mandate their representatives at</em></ins></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>School Board</em></ins></span> to <span
class="removed"><del><strong>directly examine users' data</a>.</p>
</li>
</ul>
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>free software. If
- education is run nation-wide, they need</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each
subsection</strong></del></span> <span class="inserted"><ins><em>persuade
legislators
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>refuse the
+ budget unless the school initiates a switch</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each
subsection</strong></del></span> <span class="inserted"><ins><em>free software.
If
+ education is run nation-wide, they need to persuade legislators
(e.g., through free software organizations, political parties,
etc.) to migrate the public schools to free software.</p>
</li>
@@ -3949,6 +3981,17 @@
<span class="inserted"><ins><em><div style="clear: left;"></div>
<ul class="blurbs">
+ <li id="M202104060">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-04</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/">WeddingWire
+ app saves people's wedding photos forever and hands over data
+ to others</a>, and gives people no control over their personal
+ information/data. The app also sometimes shows old photos and memories
+ to the user without user having control over this.</p>
+ </li>
+
<li id="M202102160">
<!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -4153,7 +4196,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/15 19:01:23 $
+$Date: 2021/04/26 12:04:37 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.384
retrieving revision 1.385
diff -u -b -r1.384 -r1.385
--- proprietary/po/proprietary-surveillance.ja.po 15 Apr 2021 19:01:23
-0000 1.384
+++ proprietary/po/proprietary-surveillance.ja.po 26 Apr 2021 12:04:37
-0000 1.385
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-15 18:55+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -4375,6 +4375,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
Index: proprietary/po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.323
retrieving revision 1.324
diff -u -b -r1.323 -r1.324
--- proprietary/po/proprietary-surveillance.pot 15 Apr 2021 19:01:23 -0000
1.323
+++ proprietary/po/proprietary-surveillance.pot 26 Apr 2021 12:04:37 -0000
1.324
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-04-15 18:55+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -3551,6 +3551,16 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a "
+"href=\"https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/\">WeddingWire
"
+"app saves people's wedding photos forever and hands over data to others</a>, "
+"and gives people no control over their personal information/data. The app "
+"also sometimes shows old photos and memories to the user without user having "
+"control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google <a "
"href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16\">handed
"
"over personal data of Indian protesters and activists to Indian police</a> "
Index: proprietary/po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.708
retrieving revision 1.709
diff -u -b -r1.708 -r1.709
--- proprietary/po/proprietary-surveillance.ru.po 16 Apr 2021 05:31:06
-0000 1.708
+++ proprietary/po/proprietary-surveillance.ru.po 26 Apr 2021 12:04:37
-0000 1.709
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-04-15 18:55+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -5255,6 +5256,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"Google <a href=\"https://www.indiatoday.in/technology/news/story/disha-ravi-"
"arrest-puts-privacy-of-all-google-india-users-in-"
"doubt-1769772-2021-02-16\">handed over personal data of Indian protesters "
Index: proprietary/po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.248
retrieving revision 1.249
diff -u -b -r1.248 -r1.249
--- proprietary/po/proprietary.de-diff.html 18 Apr 2021 08:31:19 -0000
1.248
+++ proprietary/po/proprietary.de-diff.html 26 Apr 2021 12:04:37 -0000
1.249
@@ -224,6 +224,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202104060">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-04</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/">WeddingWire
+ app saves people's wedding photos forever and hands over data
+ to others</a>, and gives people no control over their personal
+ information/data. The app also sometimes shows old photos and memories
+ to the user without user having control over this.</p>
+ </li>
+
<li id="M202104090">
<!--#set var="DATE" value='<small
class="date-tag">2021-04</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -272,25 +283,6 @@
is unacceptable. <a href="/proprietary/proprietary-drm.html">DRM is
an injustice to people</a>.</p>
</li>
-
- <li id="M202103090">
- <!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams">Over
150 thousand security cameras that used Verkada
- company's proprietary software are cracked</a> by a major security
- breach. Crackers have had access to security archives of various
- gyms, hospitals, jails, schools, and police stations that have used
- Verdaka's cameras.</p>
-
- <p><a href="/philosophy/surveillance-vs-democracy.html">It is
injustice
- to the public</a> for gyms, stores, hospitals, jails, and schools to
- hand “security” footage to a company from which the government
can
- collect it at any time, without even telling them.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -355,7 +347,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/18 08:31:19 $
+$Date: 2021/04/26 12:04:37 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.283
retrieving revision 1.284
diff -u -b -r1.283 -r1.284
--- proprietary/po/proprietary.de.po 18 Apr 2021 08:31:19 -0000 1.283
+++ proprietary/po/proprietary.de.po 26 Apr 2021 12:04:37 -0000 1.284
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -480,6 +480,15 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/"
"article/critical-zoom-vulnerability-triggers-remote-code-execution-without-"
"user-input/\">can be used to launch remote code execution (RCE) attacks</a> "
@@ -525,42 +534,6 @@
"injustice to people</a>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-"
-"tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand security "
-"cameras that used Verkada company's proprietary software are cracked</a> by "
-"a major security breach. Crackers have had access to security archives of "
-"various gyms, hospitals, jails, schools, and police stations that have used "
-"Verdaka's cameras."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"“security” footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-# | [-It is unfortunate-]{+<small>Please note+} that the article [-uses the
-# | term <a
-# |
href=\"/philosophy/words-to-avoid.html#Monetize\">“monetize”</a>.-]
-# | {+wrongly refers to crackers as “<a
-# | href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>
-# | +}
-#, fuzzy
-#| msgid ""
-#| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
-#| "words-to-avoid.html#Monetize\">“monetize”</a>."
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/words-"
-"to-avoid#Monetize\">âmonetarisierenâ</a> verwendet."
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
@@ -674,6 +647,18 @@
#, fuzzy
#~| msgid ""
+#~| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
+#~| "words-to-avoid.html#Monetize\">“monetize”</a>."
+#~ msgid ""
+#~ "<small>Please note that the article wrongly refers to crackers as “"
+#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</"
+#~ "small>"
+#~ msgstr ""
+#~ "Es ist bedauerlich, dass der Artikel den Begriff <a href=\"/philosophy/"
+#~ "words-to-avoid#Monetize\">âmonetarisierenâ</a> verwendet."
+
+#, fuzzy
+#~| msgid ""
#~| "The Amazon “smart” TV is <a href=\"http://www.theguardian."
#~| "com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-"
#~| "listening-surveillance\"> snooping all the time</a>."
Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.435
retrieving revision 1.436
diff -u -b -r1.435 -r1.436
--- proprietary/po/proprietary.es.po 20 Apr 2021 11:32:18 -0000 1.435
+++ proprietary/po/proprietary.es.po 26 Apr 2021 12:04:37 -0000 1.436
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -341,6 +342,15 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/"
"article/critical-zoom-vulnerability-triggers-remote-code-execution-without-"
"user-input/\">can be used to launch remote code execution (RCE) attacks</a> "
@@ -416,45 +426,6 @@
"inaceptable. <a href=\"/proprietary/proprietary-drm.html\">El DRM es una "
"injusticia para la gente</a>."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-"
-"tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand security "
-"cameras that used Verkada company's proprietary software are cracked</a> by "
-"a major security breach. Crackers have had access to security archives of "
-"various gyms, hospitals, jails, schools, and police stations that have used "
-"Verdaka's cameras."
-msgstr ""
-"Un fallo de seguridad ha permitido que <a href=\"https://www.bloomberg.com/"
-"news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-"
-"security-cams\">que más de 150.000 cámaras de seguridad que utilizaban el "
-"software privativo de la compañÃa Verkada hayan sido <cite>crackeadas</"
-"cite></a>. Los atacantes han accedido a los archivos de seguridad de "
-"gimnasios, hospitales, prisiones, centros educativos y comisarÃas que han "
-"utilizado las cámaras de Verdaka."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"“security” footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">Es una injusticia "
-"para la gente</a> que acude a gimnasios, comercios, hospitales, prisiones y "
-"centros educativos entregar filmaciones de «seguridad» a una compañÃa de
la "
-"que el Gobierno puede obtenerlas en cualquier momento, sin ni siquiera "
-"decÃrselo."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>Advierta que en ese artÃculo se refieren erróneamente a los "
-"«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
-"html#Hacker\">«<cite>hackers</cite>»</a></small>"
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Ver más…</a>"
@@ -538,3 +509,40 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima actualización:"
+
+#~ msgid ""
+#~ "<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-"
+#~ "expose-tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand "
+#~ "security cameras that used Verkada company's proprietary software are "
+#~ "cracked</a> by a major security breach. Crackers have had access to "
+#~ "security archives of various gyms, hospitals, jails, schools, and police "
+#~ "stations that have used Verdaka's cameras."
+#~ msgstr ""
+#~ "Un fallo de seguridad ha permitido que <a href=\"https://www.bloomberg."
+#~ "com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-"
+#~ "of-150-000-security-cams\">que más de 150.000 cámaras de seguridad que "
+#~ "utilizaban el software privativo de la compañÃa Verkada hayan sido "
+#~ "<cite>crackeadas</cite></a>. Los atacantes han accedido a los archivos de "
+#~ "seguridad de gimnasios, hospitales, prisiones, centros educativos y "
+#~ "comisarÃas que han utilizado las cámaras de Verdaka."
+
+#~ msgid ""
+#~ "<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
+#~ "the public</a> for gyms, stores, hospitals, jails, and schools to hand "
+#~ "“security” footage to a company from which the government can "
+#~ "collect it at any time, without even telling them."
+#~ msgstr ""
+#~ "<a href=\"/philosophy/surveillance-vs-democracy.html\">Es una injusticia "
+#~ "para la gente</a> que acude a gimnasios, comercios, hospitales, prisiones "
+#~ "y centros educativos entregar filmaciones de «seguridad» a una
compañÃa "
+#~ "de la que el Gobierno puede obtenerlas en cualquier momento, sin ni "
+#~ "siquiera decÃrselo."
+
+#~ msgid ""
+#~ "<small>Please note that the article wrongly refers to crackers as “"
+#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</"
+#~ "small>"
+#~ msgstr ""
+#~ "<small>Advierta que en ese artÃculo se refieren erróneamente a los "
+#~ "«<cite>crackers</cite>» como <a href=\"/philosophy/words-to-avoid.es."
+#~ "html#Hacker\">«<cite>hackers</cite>»</a></small>"
Index: proprietary/po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.476
retrieving revision 1.477
diff -u -b -r1.476 -r1.477
--- proprietary/po/proprietary.fr.po 18 Apr 2021 09:16:44 -0000 1.476
+++ proprietary/po/proprietary.fr.po 26 Apr 2021 12:04:38 -0000 1.477
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2021-04-18 11:16+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -338,6 +339,15 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/"
"article/critical-zoom-vulnerability-triggers-remote-code-execution-without-"
"user-input/\">can be used to launch remote code execution (RCE) attacks</a> "
@@ -411,41 +421,6 @@
"qui est inacceptable. <a href=\"/proprietary/proprietary-drm.html\">Les DRM "
"traitent les gens de manière injuste</a>."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-"
-"tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand security "
-"cameras that used Verkada company's proprietary software are cracked</a> by "
-"a major security breach. Crackers have had access to security archives of "
-"various gyms, hospitals, jails, schools, and police stations that have used "
-"Verdaka's cameras."
-msgstr ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-"
-"tesla-jails-in-breach-of-150-000-security-cams\">Le piratage d'au moins "
-"150 000 caméras de surveillance fonctionnant avec un logiciel de
Verkada</a> "
-"a permis aux crackers d'accéder aux enregistrements de divers gymnases, "
-"hôpitaux, prisons, écoles et commissariats de police."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"“security” footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">C'est faire du tort "
-"au public</a> que de communiquer les enregistrements de caméras dites « de
"
-"sécurité » à une entreprise chez qui le gouvernement peut aller les
chercher "
-"n'importe quand, sans même avertir les personnes concernées."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>(Notez que cet article utilise le terme « <a
href=\"/philosophy/words-"
-"to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Voir plus…</a>"
@@ -522,3 +497,37 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-"
+#~ "expose-tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand "
+#~ "security cameras that used Verkada company's proprietary software are "
+#~ "cracked</a> by a major security breach. Crackers have had access to "
+#~ "security archives of various gyms, hospitals, jails, schools, and police "
+#~ "stations that have used Verdaka's cameras."
+#~ msgstr ""
+#~ "<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-"
+#~ "expose-tesla-jails-in-breach-of-150-000-security-cams\">Le piratage d'au "
+#~ "moins 150 000 caméras de surveillance fonctionnant avec un logiciel de "
+#~ "Verkada</a> a permis aux crackers d'accéder aux enregistrements de divers
"
+#~ "gymnases, hôpitaux, prisons, écoles et commissariats de police."
+
+#~ msgid ""
+#~ "<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
+#~ "the public</a> for gyms, stores, hospitals, jails, and schools to hand "
+#~ "“security” footage to a company from which the government can "
+#~ "collect it at any time, without even telling them."
+#~ msgstr ""
+#~ "<a href=\"/philosophy/surveillance-vs-democracy.html\">C'est faire du "
+#~ "tort au public</a> que de communiquer les enregistrements de caméras "
+#~ "dites « de sécurité » à une entreprise chez qui le gouvernement
peut "
+#~ "aller les chercher n'importe quand, sans même avertir les personnes "
+#~ "concernées."
+
+#~ msgid ""
+#~ "<small>Please note that the article wrongly refers to crackers as “"
+#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</"
+#~ "small>"
+#~ msgstr ""
+#~ "<small>(Notez que cet article utilise le terme « <a href=\"/philosophy/"
+#~ "words-to-avoid.html#Hacker\">hackers</a> » à mauvais escient.)</small>"
Index: proprietary/po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.260
retrieving revision 1.261
diff -u -b -r1.260 -r1.261
--- proprietary/po/proprietary.it-diff.html 18 Apr 2021 08:31:19 -0000
1.260
+++ proprietary/po/proprietary.it-diff.html 26 Apr 2021 12:04:38 -0000
1.261
@@ -58,9 +58,8 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
@@ -71,8 +70,9 @@
-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width { width: 55em; }
-</style></em></ins></span>
+ .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -223,6 +223,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202104060">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-04</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/">WeddingWire
+ app saves people's wedding photos forever and hands over data
+ to others</a>, and gives people no control over their personal
+ information/data. The app also sometimes shows old photos and memories
+ to the user without user having control over this.</p>
+ </li>
+
<li id="M202104090">
<!--#set var="DATE" value='<small
class="date-tag">2021-04</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -271,25 +282,6 @@
is unacceptable. <a href="/proprietary/proprietary-drm.html">DRM is
an injustice to people</a>.</p>
</li>
-
- <li id="M202103090">
- <!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams">Over
150 thousand security cameras that used Verkada
- company's proprietary software are cracked</a> by a major security
- breach. Crackers have had access to security archives of various
- gyms, hospitals, jails, schools, and police stations that have used
- Verdaka's cameras.</p>
-
- <p><a href="/philosophy/surveillance-vs-democracy.html">It is
injustice
- to the public</a> for gyms, stores, hospitals, jails, and schools to
- hand “security” footage to a company from which the government
can
- collect it at any time, without even telling them.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -354,7 +346,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/18 08:31:19 $
+$Date: 2021/04/26 12:04:38 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.292
retrieving revision 1.293
diff -u -b -r1.292 -r1.293
--- proprietary/po/proprietary.it.po 18 Apr 2021 08:31:19 -0000 1.292
+++ proprietary/po/proprietary.it.po 26 Apr 2021 12:04:38 -0000 1.293
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -485,6 +485,15 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/"
"article/critical-zoom-vulnerability-triggers-remote-code-execution-without-"
"user-input/\">can be used to launch remote code execution (RCE) attacks</a> "
@@ -530,30 +539,6 @@
"injustice to people</a>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-"
-"tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand security "
-"cameras that used Verkada company's proprietary software are cracked</a> by "
-"a major security breach. Crackers have had access to security archives of "
-"various gyms, hospitals, jails, schools, and police stations that have used "
-"Verdaka's cameras."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"“security” footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.265
retrieving revision 1.266
diff -u -b -r1.265 -r1.266
--- proprietary/po/proprietary.ja-diff.html 18 Apr 2021 08:31:19 -0000
1.265
+++ proprietary/po/proprietary.ja-diff.html 26 Apr 2021 12:04:38 -0000
1.266
@@ -28,10 +28,10 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -63,8 +63,8 @@
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none; }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -171,8 +171,8 @@
</ul>
</td>
<td>
- <ul>
- <li><a
href="/proprietary/malware-appliances.html">Appliances</a></li>
+ <ul></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
<li><a
href="/proprietary/malware-cars.html">Cars</a></li>
<li><a
href="/proprietary/malware-games.html">Games</a></li>
<li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
@@ -183,8 +183,8 @@
<li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
<li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
<li><a
href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a
href="/proprietary/malware-google.html">Google</a></li>
+ <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -205,10 +205,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -228,6 +228,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202104060">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-04</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/">WeddingWire
+ app saves people's wedding photos forever and hands over data
+ to others</a>, and gives people no control over their personal
+ information/data. The app also sometimes shows old photos and memories
+ to the user without user having control over this.</p>
+ </li>
+
<li id="M202104090">
<!--#set var="DATE" value='<small
class="date-tag">2021-04</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -276,25 +287,6 @@
is unacceptable. <a href="/proprietary/proprietary-drm.html">DRM is
an injustice to people</a>.</p>
</li>
-
- <li id="M202103090">
- <!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams">Over
150 thousand security cameras that used Verkada
- company's proprietary software are cracked</a> by a major security
- breach. Crackers have had access to security archives of various
- gyms, hospitals, jails, schools, and police stations that have used
- Verdaka's cameras.</p>
-
- <p><a href="/philosophy/surveillance-vs-democracy.html">It is
injustice
- to the public</a> for gyms, stores, hospitals, jails, and schools to
- hand “security” footage to a company from which the government
can
- collect it at any time, without even telling them.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -359,7 +351,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/18 08:31:19 $
+$Date: 2021/04/26 12:04:38 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.276
retrieving revision 1.277
diff -u -b -r1.276 -r1.277
--- proprietary/po/proprietary.ja.po 18 Apr 2021 08:31:19 -0000 1.276
+++ proprietary/po/proprietary.ja.po 26 Apr 2021 12:04:38 -0000 1.277
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -343,6 +343,15 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/"
"article/critical-zoom-vulnerability-triggers-remote-code-execution-without-"
"user-input/\">can be used to launch remote code execution (RCE) attacks</a> "
@@ -388,30 +397,6 @@
"injustice to people</a>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-"
-"tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand security "
-"cameras that used Verkada company's proprietary software are cracked</a> by "
-"a major security breach. Crackers have had access to security archives of "
-"various gyms, hospitals, jails, schools, and police stations that have used "
-"Verdaka's cameras."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"“security” footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
#. type: Content of: <div><p>
#, fuzzy
#| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
Index: proprietary/po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.261
retrieving revision 1.262
diff -u -b -r1.261 -r1.262
--- proprietary/po/proprietary.nl-diff.html 18 Apr 2021 08:31:19 -0000
1.261
+++ proprietary/po/proprietary.nl-diff.html 26 Apr 2021 12:04:38 -0000
1.262
@@ -223,6 +223,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202104060">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-04</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/">WeddingWire
+ app saves people's wedding photos forever and hands over data
+ to others</a>, and gives people no control over their personal
+ information/data. The app also sometimes shows old photos and memories
+ to the user without user having control over this.</p>
+ </li>
+
<li id="M202104090">
<!--#set var="DATE" value='<small
class="date-tag">2021-04</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -271,25 +282,6 @@
is unacceptable. <a href="/proprietary/proprietary-drm.html">DRM is
an injustice to people</a>.</p>
</li>
-
- <li id="M202103090">
- <!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams">Over
150 thousand security cameras that used Verkada
- company's proprietary software are cracked</a> by a major security
- breach. Crackers have had access to security archives of various
- gyms, hospitals, jails, schools, and police stations that have used
- Verdaka's cameras.</p>
-
- <p><a href="/philosophy/surveillance-vs-democracy.html">It is
injustice
- to the public</a> for gyms, stores, hospitals, jails, and schools to
- hand “security” footage to a company from which the government
can
- collect it at any time, without even telling them.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -354,7 +346,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/18 08:31:19 $
+$Date: 2021/04/26 12:04:38 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.266
retrieving revision 1.267
diff -u -b -r1.266 -r1.267
--- proprietary/po/proprietary.nl.po 18 Apr 2021 08:31:19 -0000 1.266
+++ proprietary/po/proprietary.nl.po 26 Apr 2021 12:04:38 -0000 1.267
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -388,6 +388,15 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/"
"article/critical-zoom-vulnerability-triggers-remote-code-execution-without-"
"user-input/\">can be used to launch remote code execution (RCE) attacks</a> "
@@ -433,30 +442,6 @@
"injustice to people</a>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-"
-"tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand security "
-"cameras that used Verkada company's proprietary software are cracked</a> by "
-"a major security breach. Crackers have had access to security archives of "
-"various gyms, hospitals, jails, schools, and police stations that have used "
-"Verdaka's cameras."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"“security” footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Mobiles</a>-]
# | {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.278
retrieving revision 1.279
diff -u -b -r1.278 -r1.279
--- proprietary/po/proprietary.pl-diff.html 18 Apr 2021 08:31:19 -0000
1.278
+++ proprietary/po/proprietary.pl-diff.html 26 Apr 2021 12:04:38 -0000
1.279
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -57,13 +57,13 @@
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
+#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none; }
#TOC a:hover { text-decoration: underline;</em></ins></span> }
-->
</style>
@@ -121,8 +121,8 @@
<hr class="thin" />
</div>
-<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>March, 2021, the pages in this directory list
around 500
-instances of malicious functionalities (with more than 590 references to
+<p>As of March, 2021, the pages in this directory list around 500
+instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 590
references to
back them up), but there are surely thousands more we don't know
about.</p>
<p>If you want to be notified when we add new items or make other
changes,
@@ -167,18 +167,18 @@
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li>
- <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
- <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
- <li><a
href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <ul>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
+ <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -222,6 +222,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202104060">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-04</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/">WeddingWire
+ app saves people's wedding photos forever and hands over data
+ to others</a>, and gives people no control over their personal
+ information/data. The app also sometimes shows old photos and memories
+ to the user without user having control over this.</p>
+ </li>
+
<li id="M202104090">
<!--#set var="DATE" value='<small
class="date-tag">2021-04</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -270,25 +281,6 @@
is unacceptable. <a href="/proprietary/proprietary-drm.html">DRM is
an injustice to people</a>.</p>
</li>
-
- <li id="M202103090">
- <!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams">Over
150 thousand security cameras that used Verkada
- company's proprietary software are cracked</a> by a major security
- breach. Crackers have had access to security archives of various
- gyms, hospitals, jails, schools, and police stations that have used
- Verdaka's cameras.</p>
-
- <p><a href="/philosophy/surveillance-vs-democracy.html">It is
injustice
- to the public</a> for gyms, stores, hospitals, jails, and schools to
- hand “security” footage to a company from which the government
can
- collect it at any time, without even telling them.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -353,7 +345,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/18 08:31:19 $
+$Date: 2021/04/26 12:04:38 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.259
retrieving revision 1.260
diff -u -b -r1.259 -r1.260
--- proprietary/po/proprietary.pl.po 18 Apr 2021 08:31:19 -0000 1.259
+++ proprietary/po/proprietary.pl.po 26 Apr 2021 12:04:38 -0000 1.260
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -569,6 +569,15 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/"
"article/critical-zoom-vulnerability-triggers-remote-code-execution-without-"
"user-input/\">can be used to launch remote code execution (RCE) attacks</a> "
@@ -614,30 +623,6 @@
"injustice to people</a>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-"
-"tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand security "
-"cameras that used Verkada company's proprietary software are cracked</a> by "
-"a major security breach. Crackers have had access to security archives of "
-"various gyms, hospitals, jails, schools, and police stations that have used "
-"Verdaka's cameras."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"“security” footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/philosophy/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary/po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.256
retrieving revision 1.257
diff -u -b -r1.256 -r1.257
--- proprietary/po/proprietary.pot 18 Apr 2021 08:31:19 -0000 1.256
+++ proprietary/po/proprietary.pot 26 Apr 2021 12:04:38 -0000 1.257
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -280,6 +280,16 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a "
+"href=\"https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/\">WeddingWire
"
+"app saves people's wedding photos forever and hands over data to others</a>, "
+"and gives people no control over their personal information/data. The app "
+"also sometimes shows old photos and memories to the user without user having "
+"control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A zero-day vulnerability in Zoom which <a "
"href=\"https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/\">can
"
"be used to launch remote code execution (RCE) attacks</a> has been disclosed "
@@ -326,30 +336,6 @@
"injustice to people</a>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a "
-"href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams\">Over
"
-"150 thousand security cameras that used Verkada company's proprietary "
-"software are cracked</a> by a major security breach. Crackers have had "
-"access to security archives of various gyms, hospitals, jails, schools, and "
-"police stations that have used Verdaka's cameras."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"“security” footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr ""
Index: proprietary/po/proprietary.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br-diff.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary/po/proprietary.pt-br-diff.html 23 Apr 2021 10:29:19 -0000
1.19
+++ proprietary/po/proprietary.pt-br-diff.html 26 Apr 2021 12:04:38 -0000
1.20
@@ -198,111 +198,103 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
- <li <span
class="removed"><del><strong>id="M202102010"></strong></del></span> <span
class="inserted"><ins><em>id="M202104090"></em></ins></span>
+ <li <span
class="removed"><del><strong>id="M202102010"></strong></del></span> <span
class="inserted"><ins><em>id="M202104060"></em></ins></span>
<!--#set var="DATE" value='<small <span
class="removed"><del><strong>class="date-tag">2021-02</small>'</strong></del></span>
<span
class="inserted"><ins><em>class="date-tag">2021-04</small>'</em></ins></span>
--><!--#echo encoding="none" var="DATE" -->
<span class="removed"><del><strong><p>Many cr…apps, developed
by various
- companies for various organizations, do</strong></del></span>
- <span class="inserted"><ins><em><p>A zero-day vulnerability in Zoom
which</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.expressvpn.com/digital-security-lab/investigation-xoth">
- location tracking unknown to those companies and those
- organizations</a>. It's actually some widely</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/">can
- be</em></ins></span> used <span class="removed"><del><strong>libraries
that do
+ companies for various organizations, do <a
+
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth">
+ location tracking unknown</strong></del></span>
+ <span class="inserted"><ins><em><p><a
+
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/">WeddingWire
+ app saves people's wedding photos forever and hands over
data</em></ins></span>
+ to <span class="removed"><del><strong>those
companies</strong></del></span> <span
class="inserted"><ins><em>others</a>,</em></ins></span> and <span
class="removed"><del><strong>those
+ organizations</a>. It's actually some widely used libraries that do
the tracking.</p>
<p>What's unusual here is that proprietary software developer A
tricks
proprietary software developers B1 … B50 into making platforms for
- A</strong></del></span> to <span class="removed"><del><strong>mistreat the
end user.</p></strong></del></span> <span
class="inserted"><ins><em>launch remote code execution (RCE) attacks</a>
has been
- disclosed by researchers. The researchers demonstrated a three-bug
- attack chain that caused an RCE on a target machine, and all without
- any form of user interaction.</p></em></ins></span>
+ A</strong></del></span> <span class="inserted"><ins><em>gives people no
control over their personal
+ information/data. The app also sometimes shows old photos and
memories</em></ins></span>
+ to <span class="removed"><del><strong>mistreat</strong></del></span> the
<span class="removed"><del><strong>end user.</p></strong></del></span>
<span class="inserted"><ins><em>user without user having control over
this.</p></em></ins></span>
</li>
- <li <span
class="removed"><del><strong>id="M202010120"></strong></del></span> <span
class="inserted"><ins><em>id="M202102160"></em></ins></span>
- <!--#set var="DATE" value='<small <span
class="removed"><del><strong>class="date-tag">2020-10</small>'</strong></del></span>
<span
class="inserted"><ins><em>class="date-tag">2021-02</small>'</em></ins></span>
+ <li <span
class="removed"><del><strong>id="M202010120"></strong></del></span> <span
class="inserted"><ins><em>id="M202104090"></em></ins></span>
+ <!--#set var="DATE" value='<small <span
class="removed"><del><strong>class="date-tag">2020-10</small>'</strong></del></span>
<span
class="inserted"><ins><em>class="date-tag">2021-04</small>'</em></ins></span>
--><!--#echo encoding="none" var="DATE" -->
- <span class="removed"><del><strong><p>Samsung is forcing its
smartphone users in Hong Kong (and Macau)</strong></del></span>
- <span class="inserted"><ins><em><p>Google</em></ins></span> <a
+ <span class="removed"><del><strong><p>Samsung is forcing its
smartphone users</strong></del></span>
+ <span class="inserted"><ins><em><p>A zero-day
vulnerability</em></ins></span> in <span class="removed"><del><strong>Hong Kong
(and Macau)</strong></del></span> <span class="inserted"><ins><em>Zoom
which</em></ins></span> <a
<span
class="removed"><del><strong>href="https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-dns-service-upon-hong-kong-wifi-users/">to
- use a public DNS in Mainland China</a>, using software update
released
- in September 2020,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16">handed
- over personal data of Indian protesters and activists to Indian
- police</a></em></ins></span> which <span
class="removed"><del><strong>causes many unease</strong></del></span> <span
class="inserted"><ins><em>led to their arrest. The cops requested the IP
- address</em></ins></span> and <span class="removed"><del><strong>privacy
concerns.</p></strong></del></span> <span class="inserted"><ins><em>the
location where a document was created and with that
- information, they identified protesters and
activists.</p></em></ins></span>
+ use</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/">can
+ be used to launch remote code execution (RCE) attacks</a> has been
+ disclosed by researchers. The researchers demonstrated</em></ins></span> a
<span class="removed"><del><strong>public DNS in Mainland China</a>,
using software update released
+ in September 2020, which causes many unease</strong></del></span> <span
class="inserted"><ins><em>three-bug
+ attack chain that caused an RCE on a target machine,</em></ins></span> and
<span class="removed"><del><strong>privacy
concerns.</p></strong></del></span> <span class="inserted"><ins><em>all
without
+ any form of user interaction.</p></em></ins></span>
</li>
- <li <span
class="removed"><del><strong>id="M202101130"></strong></del></span> <span
class="inserted"><ins><em>id="M202007020"></em></ins></span>
- <!--#set var="DATE" value='<small <span
class="removed"><del><strong>class="date-tag">2021-01</small>'</strong></del></span>
<span
class="inserted"><ins><em>class="date-tag">2020-07</small>'</em></ins></span>
+ <li <span
class="removed"><del><strong>id="M202101130"></strong></del></span> <span
class="inserted"><ins><em>id="M202102160"></em></ins></span>
+ <!--#set var="DATE" value='<small <span
class="removed"><del><strong>class="date-tag">2021-01</small>'</strong></del></span>
<span
class="inserted"><ins><em>class="date-tag">2021-02</small>'</em></ins></span>
--><!--#echo encoding="none" var="DATE" -->
<span class="removed"><del><strong><p>The authorities in Venice
track the</strong></del></span>
- <span class="inserted"><ins><em><p>BMW is trying
to</em></ins></span> <a
+ <span class="inserted"><ins><em><p>Google</em></ins></span> <a
<span
class="removed"><del><strong>href="https://edition.cnn.com/travel/article/venice-control-room-tourism/index.html">
movements</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates">lock
- certain features of its cars, and force people to pay to use
part</em></ins></span> of <span class="removed"><del><strong>all
tourists</a> using their portable phones. The article
- says that <em>at present</em></strong></del></span>
- the <span class="removed"><del><strong>system</strong></del></span> <span
class="inserted"><ins><em>car they already bought</a>.
This</em></ins></span> is <span class="removed"><del><strong>configured to
report only
+ <span
class="inserted"><ins><em>href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16">handed
+ over personal data</em></ins></span> of <span
class="removed"><del><strong>all tourists</a> using</strong></del></span>
<span class="inserted"><ins><em>Indian protesters and activists to Indian
+ police</a> which led to</em></ins></span> their <span
class="removed"><del><strong>portable phones.</strong></del></span> <span
class="inserted"><ins><em>arrest.</em></ins></span> The <span
class="removed"><del><strong>article
+ says that <em>at present</em></strong></del></span> <span
class="inserted"><ins><em>cops requested</em></ins></span> the <span
class="removed"><del><strong>system is configured to report only
aggregated information. But that could be changed. What will that
system do 10 years from now? What will a similar system in another
- country do? Those are</strong></del></span> <span
class="inserted"><ins><em>done through forced update
- of</em></ins></span> the <span class="removed"><del><strong>questions this
raises.</p></strong></del></span> <span class="inserted"><ins><em>car
software via a radio-operated back door.</p></em></ins></span>
+ country do? Those are</strong></del></span> <span
class="inserted"><ins><em>IP
+ address and</em></ins></span> the <span
class="removed"><del><strong>questions this
raises.</p></strong></del></span> <span
class="inserted"><ins><em>location where a document was created and with that
+ information, they identified protesters and
activists.</p></em></ins></span>
</li>
- <li <span
class="removed"><del><strong>id="M202101110"></strong></del></span> <span
class="inserted"><ins><em>id="M202103100"></em></ins></span>
- <!--#set var="DATE" value='<small <span
class="removed"><del><strong>class="date-tag">2021-01</small>'</strong></del></span>
<span
class="inserted"><ins><em>class="date-tag">2021-03</small>'</em></ins></span>
+ <li <span
class="removed"><del><strong>id="M202101110"></strong></del></span> <span
class="inserted"><ins><em>id="M202007020"></em></ins></span>
+ <!--#set var="DATE" value='<small <span
class="removed"><del><strong>class="date-tag">2021-01</small>'</strong></del></span>
<span
class="inserted"><ins><em>class="date-tag">2020-07</small>'</em></ins></span>
--><!--#echo encoding="none" var="DATE" -->
<span class="removed"><del><strong><p>A cracker</strong></del></span>
- <span class="inserted"><ins><em><p>Amazon's monopoly and DRM
is</em></ins></span> <a
+ <span class="inserted"><ins><em><p>BMW is trying
to</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.vice.com/en/article/m7apnn/your-cock-is-mine-now-hacker-locks-internet-connected-chastity-cage-demands-ransom">took
- control of people's internet-connected chastity cages</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/technology/2021/03/10/amazon-library-ebook-monopoly/">stopping
- public libraries from lending e-books</em></ins></span> and <span
class="removed"><del><strong>demanded
- ransom</a>. The chastity cages are being
controlled</strong></del></span>
- <span class="inserted"><ins><em>audiobooks</a>. Amazon became
powerful in e-book world</em></ins></span> by <span
class="inserted"><ins><em><a
- href="/philosophy/why-call-it-the-swindle.html">Swindle</a>,
- and is now misusing its power and violates people's rights using
- <a href="https://www.defectivebydesign.org">Digital Restrictions
- Management</a>.</p>
-
- <p>The article is written in</em></ins></span> a <span
class="removed"><del><strong>proprietary
+ control</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates">lock
+ certain features</em></ins></span> of <span
class="removed"><del><strong>people's internet-connected chastity
cages</strong></del></span> <span class="inserted"><ins><em>its
cars,</em></ins></span> and <span class="removed"><del><strong>demanded
+ ransom</a>. The chastity cages are being controlled by a proprietary
app (mobile program).</p>
- <p><small>(Please note</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span> that <span
class="removed"><del><strong>the article
- wrongly refers</strong></del></span> <span
class="inserted"><ins><em>endorses DRM in general, which
- is unacceptable. <a href="/proprietary/proprietary-drm.html">DRM is
- an injustice</em></ins></span> to <span
class="removed"><del><strong>crackers as "<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p></strong></del></span>
<span class="inserted"><ins><em>people</a>.</p></em></ins></span>
+ <p><small>(Please note that the article
+ wrongly refers</strong></del></span> <span class="inserted"><ins><em>force
people</em></ins></span> to <span class="removed"><del><strong>crackers as
"<a
+
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p></strong></del></span>
<span class="inserted"><ins><em>pay to use part of
+ the car they already bought</a>. This is done through forced update
+ of the car software via a radio-operated back
door.</p></em></ins></span>
</li>
- <li <span
class="removed"><del><strong>id="M202101080"></strong></del></span> <span
class="inserted"><ins><em>id="M202103090"></em></ins></span>
+ <li <span
class="removed"><del><strong>id="M202101080"></strong></del></span> <span
class="inserted"><ins><em>id="M202103100"></em></ins></span>
<!--#set var="DATE" value='<small <span
class="removed"><del><strong>class="date-tag">2021-01</small>'</strong></del></span>
<span
class="inserted"><ins><em>class="date-tag">2021-03</small>'</em></ins></span>
--><!--#echo encoding="none" var="DATE" -->
- <span class="removed"><del><strong><p>As of 2021, WhatsApp
(one</strong></del></span>
- <span class="inserted"><ins><em><p><a
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams">Over
150 thousand security cameras that used Verkada
- company's proprietary software are cracked</a> by a major security
- breach. Crackers have had access to security archives</em></ins></span> of
<span class="removed"><del><strong>Facebook's
subsidiaries)</strong></del></span> <span class="inserted"><ins><em>various
- gyms, hospitals, jails, schools, and police stations that have used
- Verdaka's cameras.</p>
-
- <p><a
href="/philosophy/surveillance-vs-democracy.html">It</em></ins></span> is
<span class="removed"><del><strong><a
-
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/">forcing
- its users</strong></del></span> <span class="inserted"><ins><em>injustice
- to the public</a> for gyms, stores, hospitals, jails, and
schools</em></ins></span> to
- hand <span class="removed"><del><strong>over sensitive personal
data</a></strong></del></span> <span
class="inserted"><ins><em>“security” footage</em></ins></span> to
<span class="removed"><del><strong>its parent
- company. This increases Facebook's power over users, and further
- jeopardizes people's privacy and security.</p>
-
- <p>Instead of WhatsApp you can use <a
- href="https://directory.fsf.org/wiki/Jami">GNU
Jami</a>,</strong></del></span> <span class="inserted"><ins><em>a company
from</em></ins></span> which <span class="removed"><del><strong>is
- free software and will not</strong></del></span> <span
class="inserted"><ins><em>the government can</em></ins></span>
- collect <span class="removed"><del><strong>your
data.</p></strong></del></span> <span class="inserted"><ins><em>it at any
time, without even telling them.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p></em></ins></span>
+ <span class="removed"><del><strong><p>As of 2021, WhatsApp (one of
Facebook's subsidiaries)</strong></del></span>
+ <span class="inserted"><ins><em><p>Amazon's monopoly and
DRM</em></ins></span> is <a
+ <span
class="removed"><del><strong>href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/">forcing
+ its users to hand over sensitive personal data</a>
to</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/technology/2021/03/10/amazon-library-ebook-monopoly/">stopping
+ public libraries from lending e-books and
+ audiobooks</a>. Amazon became powerful in e-book world by <a
+ href="/philosophy/why-call-it-the-swindle.html">Swindle</a>,
+ and is now misusing</em></ins></span> its <span
class="removed"><del><strong>parent
+ company. This increases Facebook's</strong></del></span> power <span
class="removed"><del><strong>over users,</strong></del></span> and <span
class="removed"><del><strong>further
+ jeopardizes</strong></del></span> <span
class="inserted"><ins><em>violates</em></ins></span> people's <span
class="removed"><del><strong>privacy and security.</p>
+
+ <p>Instead of WhatsApp you can use</strong></del></span> <span
class="inserted"><ins><em>rights using</em></ins></span>
+ <a
+ <span
class="removed"><del><strong>href="https://directory.fsf.org/wiki/Jami">GNU
Jami</a>,</strong></del></span> <span
class="inserted"><ins><em>href="https://www.defectivebydesign.org">Digital
Restrictions
+ Management</a>.</p>
+
+ <p>The article is written in a way that endorses DRM in
general,</em></ins></span> which
+ is
+ <span class="removed"><del><strong>free software and will not collect your
data.</p></strong></del></span> <span
class="inserted"><ins><em>unacceptable. <a
href="/proprietary/proprietary-drm.html">DRM is
+ an injustice to people</a>.</p></em></ins></span>
</li>
</ul>
<span class="inserted"><ins><em><p class="button right-align">
@@ -367,7 +359,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/23 10:29:19 $
+$Date: 2021/04/26 12:04:38 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.408
retrieving revision 1.409
diff -u -b -r1.408 -r1.409
--- proprietary/po/proprietary.pt-br.po 18 Apr 2021 08:31:19 -0000 1.408
+++ proprietary/po/proprietary.pt-br.po 26 Apr 2021 12:04:38 -0000 1.409
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2021-02-07 15:33-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -341,6 +341,15 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/"
"article/critical-zoom-vulnerability-triggers-remote-code-execution-without-"
"user-input/\">can be used to launch remote code execution (RCE) attacks</a> "
@@ -386,37 +395,6 @@
"injustice to people</a>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-"
-"tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand security "
-"cameras that used Verkada company's proprietary software are cracked</a> by "
-"a major security breach. Crackers have had access to security archives of "
-"various gyms, hospitals, jails, schools, and police stations that have used "
-"Verdaka's cameras."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"“security” footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "<small>(Please note that the article wrongly refers to crackers as \"<a "
-#| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</em> "
-"como â<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>â.)</"
-"small>"
-
#. type: Content of: <div><p>
#, fuzzy
#| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
@@ -497,6 +475,19 @@
msgid "Updated:"
msgstr "Ãltima atualização:"
+#, fuzzy
+#~| msgid ""
+#~| "<small>(Please note that the article wrongly refers to crackers as \"<a "
+#~| "href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>\".)</small>"
+#~ msgid ""
+#~ "<small>Please note that the article wrongly refers to crackers as “"
+#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</"
+#~ "small>"
+#~ msgstr ""
+#~ "<small>(Note que o artigo, de forma incorreta, refere-se a <em>crackers</"
+#~ "em> como â<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</"
+#~ "a>â.)</small>"
+
#~ msgid ""
#~ "Many cr…apps, developed by various companies for various "
#~ "organizations, do <a href=\"https://www.expressvpn.com/digital-security-"
Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.498
retrieving revision 1.499
diff -u -b -r1.498 -r1.499
--- proprietary/po/proprietary.ru.po 19 Apr 2021 14:01:29 -0000 1.498
+++ proprietary/po/proprietary.ru.po 26 Apr 2021 12:04:39 -0000 1.499
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -340,6 +341,15 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/"
"article/critical-zoom-vulnerability-triggers-remote-code-execution-without-"
"user-input/\">can be used to launch remote code execution (RCE) attacks</a> "
@@ -413,43 +423,6 @@
"Ñелом, ÑÑо непÑиемлемо. <a
href=\"/proprietary/proprietary-drm.html"
"\">ЦиÑÑовое ÑпÑавление огÑаниÑениÑми
неÑпÑаведливо по оÑноÑÐµÐ½Ð¸Ñ Ðº лÑдÑм</a>."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-"
-"tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand security "
-"cameras that used Verkada company's proprietary software are cracked</a> by "
-"a major security breach. Crackers have had access to security archives of "
-"various gyms, hospitals, jails, schools, and police stations that have used "
-"Verdaka's cameras."
-msgstr ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-"
-"tesla-jails-in-breach-of-150-000-security-cams\">СвÑÑе 150 ÑÑÑÑÑ
ÐºÐ°Ð¼ÐµÑ "
-"наблÑдениÑ, в коÑоÑÑÑ
пÑименÑлиÑÑ
неÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ð¸ Verkada, "
-"бÑли взломанÑ</a> Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑеÑÑезного
ÑпÑÑÐµÐ½Ð¸Ñ Ð² заÑиÑе. ÐзломÑики полÑÑили "
-"доÑÑÑп к аÑÑ
ивам оÑ
ÑÐ°Ð½Ñ ÑазлиÑнÑÑ
ÑпоÑÑзалов, болÑниÑ, ÑÑÑем, Ñкол и "
-"оÑделений полиÑии, коÑоÑÑе пÑименÑли
камеÑÑ Verdaka."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"“security” footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">Ðо
оÑноÑÐµÐ½Ð¸Ñ Ðº "
-"обÑеÑÑÐ²Ñ Ð½ÐµÑпÑаведливо</a>, когда
ÑпоÑÑзалÑ, магазинÑ, болÑниÑÑ Ð¸ ÑÐºÐ¾Ð»Ñ "
-"вÑÑÑаÑÑ Ð·Ð°Ð¿Ð¸Ñи “оÑ
Ñанє компании, Ñ
коÑоÑой гоÑÑдаÑÑÑво Ð¼Ð¾Ð¶ÐµÑ "
-"ÑобиÑаÑÑ Ð¸Ñ
в лÑбое вÑемÑ, не говоÑÑ Ð¸Ð¼ об
ÑÑом."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href=\"/philosophy/words-to-avoid."
-"html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ Ð¾Ð±Ð¾Ð·Ð½Ð°ÑÐµÐ½Ð¸Ñ "
-"взломÑиков.</small>"
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Ðалее...</a>"
@@ -530,6 +503,41 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-"
+#~ "expose-tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand "
+#~ "security cameras that used Verkada company's proprietary software are "
+#~ "cracked</a> by a major security breach. Crackers have had access to "
+#~ "security archives of various gyms, hospitals, jails, schools, and police "
+#~ "stations that have used Verdaka's cameras."
+#~ msgstr ""
+#~ "<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-"
+#~ "expose-tesla-jails-in-breach-of-150-000-security-cams\">СвÑÑе 150
ÑÑÑÑÑ "
+#~ "ÐºÐ°Ð¼ÐµÑ Ð½Ð°Ð±Ð»ÑдениÑ, в коÑоÑÑÑ
пÑименÑлиÑÑ
неÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ð¸ "
+#~ "Verkada, бÑли взломанÑ</a> Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ
ÑеÑÑезного ÑпÑÑÐµÐ½Ð¸Ñ Ð² заÑиÑе. "
+#~ "ÐзломÑики полÑÑили доÑÑÑп к аÑÑ
ивам оÑ
ÑÐ°Ð½Ñ ÑазлиÑнÑÑ
ÑпоÑÑзалов, болÑниÑ, "
+#~ "ÑÑÑем, Ñкол и оÑделений полиÑии, коÑоÑÑе
пÑименÑли камеÑÑ Verdaka."
+
+#~ msgid ""
+#~ "<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
+#~ "the public</a> for gyms, stores, hospitals, jails, and schools to hand "
+#~ "“security” footage to a company from which the government can "
+#~ "collect it at any time, without even telling them."
+#~ msgstr ""
+#~ "<a href=\"/philosophy/surveillance-vs-democracy.html\">Ðо
оÑноÑÐµÐ½Ð¸Ñ Ðº "
+#~ "обÑеÑÑÐ²Ñ Ð½ÐµÑпÑаведливо</a>, когда
ÑпоÑÑзалÑ, магазинÑ, болÑниÑÑ Ð¸ ÑÐºÐ¾Ð»Ñ "
+#~ "вÑÑÑаÑÑ Ð·Ð°Ð¿Ð¸Ñи “оÑ
Ñанє компании,
Ñ ÐºÐ¾ÑоÑой гоÑÑдаÑÑÑво Ð¼Ð¾Ð¶ÐµÑ "
+#~ "ÑобиÑаÑÑ Ð¸Ñ
в лÑбое вÑемÑ, не говоÑÑ Ð¸Ð¼
об ÑÑом."
+
+#~ msgid ""
+#~ "<small>Please note that the article wrongly refers to crackers as “"
+#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</"
+#~ "small>"
+#~ msgstr ""
+#~ "<small>ÐамеÑÑÑе, ÑÑо в ÑÑаÑÑе ÑеÑмин <a
href=\"/philosophy/words-to-avoid."
+#~ "html#Hacker\">“Ñ
акеÑÑ”</a> невеÑно
иÑполÑзÑеÑÑÑ Ð´Ð»Ñ "
+#~ "обознаÑÐµÐ½Ð¸Ñ Ð²Ð·Ð»Ð¾Ð¼Ñиков.</small>"
+
+#~ msgid ""
#~ "TV manufacturers are turning to produce only “Smart” TV sets "
#~ "(which include spyware) that <a href=\"https://frame.work/blog/in-defense-"
#~ "of-dumb-tvs\">it's now very hard to find a TV that doesn't spy on you</a>."
Index: proprietary/po/proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.152
retrieving revision 1.153
diff -u -b -r1.152 -r1.153
--- proprietary/po/proprietary.tr.po 19 Apr 2021 05:51:36 -0000 1.152
+++ proprietary/po/proprietary.tr.po 26 Apr 2021 12:04:39 -0000 1.153
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2021-04-19 07:49+0200\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Poedit 2.4.2\n"
@@ -336,6 +337,15 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/"
"article/critical-zoom-vulnerability-triggers-remote-code-execution-without-"
"user-input/\">can be used to launch remote code execution (RCE) attacks</a> "
@@ -410,44 +420,6 @@
"edilemez. <a href=\"/proprietary/proprietary-drm.html\">DRM insanlara karÅı
"
"bir haksızlıktır</a>."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-"
-"tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand security "
-"cameras that used Verkada company's proprietary software are cracked</a> by "
-"a major security breach. Crackers have had access to security archives of "
-"various gyms, hospitals, jails, schools, and police stations that have used "
-"Verdaka's cameras."
-msgstr ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-"
-"tesla-jails-in-breach-of-150-000-security-cams\">Verkada Åirketinin özel "
-"mülk yazılımını kullanan 150 binden fazla güvenlik kamerası</a>
büyük bir "
-"güvenlik ihlaliyle kırıldı. Güvenlik kırıcıları, Verdaka'nın
kameralarını "
-"kullanan çeÅitli spor salonu, hastane, hapishane, okul ve polis merkezinin "
-"güvenlik arÅivlerine eriÅime sahip oldu."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"“security” footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-"Spor salonlarının, maÄazaların, hastanelerin, hapishanelerin ve
okulların, "
-"“güvenlik” görüntü kayıtlarını, hükümetin istediÄi
zaman "
-"toplayabileceÄi Åekilde, ve hatta onlara hiç bir Åey söylemeden, bir
Åirkete "
-"teslim edilmesi <a href=\"/philosophy/surveillance-vs-democracy.html\">halka "
-"yönelik bir haksızlıktır</a> ."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>Bu yazı güvenlik kırıcılarını hatalı bir Åekilde \"<a
href=\"/"
-"philosophy/words-to-avoid.html#Hacker\">üstât (hacker)</a>\" olarak "
-"adlandırmaktır.</small>"
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Daha fazlası…</a>"
@@ -533,6 +505,43 @@
msgstr "Son Güncelleme:"
#~ msgid ""
+#~ "<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-"
+#~ "expose-tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand "
+#~ "security cameras that used Verkada company's proprietary software are "
+#~ "cracked</a> by a major security breach. Crackers have had access to "
+#~ "security archives of various gyms, hospitals, jails, schools, and police "
+#~ "stations that have used Verdaka's cameras."
+#~ msgstr ""
+#~ "<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-"
+#~ "expose-tesla-jails-in-breach-of-150-000-security-cams\">Verkada "
+#~ "Åirketinin özel mülk yazılımını kullanan 150 binden fazla güvenlik
"
+#~ "kamerası</a> büyük bir güvenlik ihlaliyle kırıldı. Güvenlik
kırıcıları, "
+#~ "Verdaka'nın kameralarını kullanan çeÅitli spor salonu, hastane, "
+#~ "hapishane, okul ve polis merkezinin güvenlik arÅivlerine eriÅime sahip "
+#~ "oldu."
+
+#~ msgid ""
+#~ "<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
+#~ "the public</a> for gyms, stores, hospitals, jails, and schools to hand "
+#~ "“security” footage to a company from which the government can "
+#~ "collect it at any time, without even telling them."
+#~ msgstr ""
+#~ "Spor salonlarının, maÄazaların, hastanelerin, hapishanelerin ve "
+#~ "okulların, “güvenlik” görüntü kayıtlarını, hükümetin
istediÄi "
+#~ "zaman toplayabileceÄi Åekilde, ve hatta onlara hiç bir Åey
söylemeden, "
+#~ "bir Åirkete teslim edilmesi <a href=\"/philosophy/surveillance-vs-"
+#~ "democracy.html\">halka yönelik bir haksızlıktır</a> ."
+
+#~ msgid ""
+#~ "<small>Please note that the article wrongly refers to crackers as “"
+#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</"
+#~ "small>"
+#~ msgstr ""
+#~ "<small>Bu yazı güvenlik kırıcılarını hatalı bir Åekilde \"<a
href=\"/"
+#~ "philosophy/words-to-avoid.html#Hacker\">üstât (hacker)</a>\" olarak "
+#~ "adlandırmaktır.</small>"
+
+#~ msgid ""
#~ "TV manufacturers are turning to produce only “Smart” TV sets "
#~ "(which include spyware) that <a href=\"https://frame.work/blog/in-defense-"
#~ "of-dumb-tvs\">it's now very hard to find a TV that doesn't spy on you</a>."
Index: proprietary/po/proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.190
retrieving revision 1.191
diff -u -b -r1.190 -r1.191
--- proprietary/po/proprietary.zh-cn.po 19 Apr 2021 06:30:03 -0000 1.190
+++ proprietary/po/proprietary.zh-cn.po 26 Apr 2021 12:04:39 -0000 1.191
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2021-04-19 13:38+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-04-26 11:55+0000\n"
"X-Generator: Poedit 2.3\n"
#. type: Content of: <title>
@@ -315,6 +316,15 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/"
"article/critical-zoom-vulnerability-triggers-remote-code-execution-without-"
"user-input/\">can be used to launch remote code execution (RCE) attacks</a> "
@@ -379,39 +389,6 @@
"æ¤æç« ä»¥ä¸ç§æ¯æ DRM
çå£å»æ¥æ°åï¼ååä¸ä¹æ¯ä¸å¯¹çã<a href=\"/proprietary/"
"proprietary-drm.html\">DRM æ¯å¯¹äººä»¬çä¸å
¬æ£</a>ã"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-"
-"tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand security "
-"cameras that used Verkada company's proprietary software are cracked</a> by "
-"a major security breach. Crackers have had access to security archives of "
-"various gyms, hospitals, jails, schools, and police stations that have used "
-"Verdaka's cameras."
-msgstr ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-"
-"tesla-jails-in-breach-of-150-000-security-cams\">è¶
è¿ 15 ä¸ä½¿ç¨ Verkada
å
¬å¸"
-"ä¸æ软件çå®å
¨æåå¤´è¢«ç ´è§£</a>ï¼å¯¼è´å®å
¨æ³æ¼ãç ´è§£è
è·åäºå¤ä¸ªä½¿ç¨ Verdaka æ"
-"å头çå¥èº«æ¿ãçç±ãå¦æ ¡åè¦å¯å±çå®å
¨æ°æ®æ¡£æ¡ã"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"“security” footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-"å¨æªè¢«åç¥çæ
åµä¸ï¼å°æ¶åå¥èº«æ¿ãååºãå»é¢ãçç±åå¦æ ¡ç “å®å
¨"
-"” æ°æ®äº¤ç»ä¼éæ¶å°å®ä»¬äº¤ç»æ¿åºçå
¬å¸ <a
href=\"/philosophy/"
-"surveillance-vs-democracy.html\">对å
¬ä¼æ¯ä¸å
¬æ£ç</a>ã"
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-"<small>请注æï¼æ¬æé误å°å°“<a
href=\"/philosophy/words-to-avoid."
-"html#Hacker\">é»å®¢</a>”ä¸è¯å½æéªå®¢æ¥ç¨ã</small>"
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">æ´å¤å
容…</a>"
@@ -493,6 +470,37 @@
msgstr "æåæ´æ°ï¼"
#~ msgid ""
+#~ "<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-"
+#~ "expose-tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand "
+#~ "security cameras that used Verkada company's proprietary software are "
+#~ "cracked</a> by a major security breach. Crackers have had access to "
+#~ "security archives of various gyms, hospitals, jails, schools, and police "
+#~ "stations that have used Verdaka's cameras."
+#~ msgstr ""
+#~ "<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-"
+#~ "expose-tesla-jails-in-breach-of-150-000-security-cams\">è¶
è¿ 15
ä¸ä½¿ç¨ "
+#~ "Verkada å
¬å¸ä¸æ软件çå®å
¨æåå¤´è¢«ç ´è§£</a>ï¼å¯¼è´å®å
¨æ³æ¼ãç ´è§£è
è·åäºå¤ä¸ª"
+#~ "ä½¿ç¨ Verdaka æå头çå¥èº«æ¿ãçç±ãå¦æ ¡åè¦å¯å±çå®å
¨æ°æ®æ¡£æ¡ã"
+
+#~ msgid ""
+#~ "<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
+#~ "the public</a> for gyms, stores, hospitals, jails, and schools to hand "
+#~ "“security” footage to a company from which the government can "
+#~ "collect it at any time, without even telling them."
+#~ msgstr ""
+#~ "å¨æªè¢«åç¥çæ
åµä¸ï¼å°æ¶åå¥èº«æ¿ãååºãå»é¢ãçç±åå¦æ ¡ç “å®å
¨"
+#~ "” æ°æ®äº¤ç»ä¼éæ¶å°å®ä»¬äº¤ç»æ¿åºçå
¬å¸ <a
href=\"/philosophy/"
+#~ "surveillance-vs-democracy.html\">对å
¬ä¼æ¯ä¸å
¬æ£ç</a>ã"
+
+#~ msgid ""
+#~ "<small>Please note that the article wrongly refers to crackers as “"
+#~ "<a href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</"
+#~ "small>"
+#~ msgstr ""
+#~ "<small>请注æï¼æ¬æé误å°å°“<a
href=\"/philosophy/words-to-avoid."
+#~ "html#Hacker\">é»å®¢</a>”ä¸è¯å½æéªå®¢æ¥ç¨ã</small>"
+
+#~ msgid ""
#~ "TV manufacturers are turning to produce only “Smart” TV sets "
#~ "(which include spyware) that <a href=\"https://frame.work/blog/in-defense-"
#~ "of-dumb-tvs\">it's now very hard to find a TV that doesn't spy on you</a>."
Index: proprietary/po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.241
retrieving revision 1.242
diff -u -b -r1.241 -r1.242
--- proprietary/po/proprietary.zh-tw-diff.html 18 Apr 2021 08:31:19 -0000
1.241
+++ proprietary/po/proprietary.zh-tw-diff.html 26 Apr 2021 12:04:39 -0000
1.242
@@ -224,6 +224,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202104060">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-04</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/">WeddingWire
+ app saves people's wedding photos forever and hands over data
+ to others</a>, and gives people no control over their personal
+ information/data. The app also sometimes shows old photos and memories
+ to the user without user having control over this.</p>
+ </li>
+
<li id="M202104090">
<!--#set var="DATE" value='<small
class="date-tag">2021-04</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -272,25 +283,6 @@
is unacceptable. <a href="/proprietary/proprietary-drm.html">DRM is
an injustice to people</a>.</p>
</li>
-
- <li id="M202103090">
- <!--#set var="DATE" value='<small
class="date-tag">2021-03</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams">Over
150 thousand security cameras that used Verkada
- company's proprietary software are cracked</a> by a major security
- breach. Crackers have had access to security archives of various
- gyms, hospitals, jails, schools, and police stations that have used
- Verdaka's cameras.</p>
-
- <p><a href="/philosophy/surveillance-vs-democracy.html">It is
injustice
- to the public</a> for gyms, stores, hospitals, jails, and schools to
- hand “security” footage to a company from which the government
can
- collect it at any time, without even telling them.</p>
-
- <p><small>Please note that the article
- wrongly refers to crackers as “<a
-
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -355,7 +347,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/18 08:31:19 $
+$Date: 2021/04/26 12:04:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.246
retrieving revision 1.247
diff -u -b -r1.246 -r1.247
--- proprietary/po/proprietary.zh-tw.po 18 Apr 2021 08:31:20 -0000 1.246
+++ proprietary/po/proprietary.zh-tw.po 26 Apr 2021 12:04:39 -0000 1.247
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-04-18 08:25+0000\n"
+"POT-Creation-Date: 2021-04-26 11:55+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -458,6 +458,15 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A zero-day vulnerability in Zoom which <a href=\"https://www.zdnet.com/"
"article/critical-zoom-vulnerability-triggers-remote-code-execution-without-"
"user-input/\">can be used to launch remote code execution (RCE) attacks</a> "
@@ -503,30 +512,6 @@
"injustice to people</a>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-"
-"tesla-jails-in-breach-of-150-000-security-cams\">Over 150 thousand security "
-"cameras that used Verkada company's proprietary software are cracked</a> by "
-"a major security breach. Crackers have had access to security archives of "
-"various gyms, hospitals, jails, schools, and police stations that have used "
-"Verdaka's cameras."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<a href=\"/philosophy/surveillance-vs-democracy.html\">It is injustice to "
-"the public</a> for gyms, stores, hospitals, jails, and schools to hand "
-"“security” footage to a company from which the government can "
-"collect it at any time, without even telling them."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"<small>Please note that the article wrongly refers to crackers as “<a "
-"href=\"/philosophy/words-to-avoid.html#Hacker\">hackers</a>”.</small>"
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.377
retrieving revision 1.378
diff -u -b -r1.377 -r1.378
--- proprietary/po/pt-br.po 18 Apr 2021 08:31:20 -0000 1.377
+++ proprietary/po/pt-br.po 26 Apr 2021 12:04:39 -0000 1.378
@@ -9191,6 +9191,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Prodigy maths game played in schools at no cost entices students to play "
"it at home, where <a href=\"https://www.theguardian.com/technology/2021/"
"feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "
Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.640
retrieving revision 1.641
diff -u -b -r1.640 -r1.641
--- proprietary/po/ru.po 19 Apr 2021 14:32:49 -0000 1.640
+++ proprietary/po/ru.po 26 Apr 2021 12:04:39 -0000 1.641
@@ -11105,6 +11105,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Prodigy maths game played in schools at no cost entices students to play "
"it at home, where <a href=\"https://www.theguardian.com/technology/2021/"
"feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "
Index: proprietary/po/tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- proprietary/po/tr.po 18 Apr 2021 08:31:20 -0000 1.170
+++ proprietary/po/tr.po 26 Apr 2021 12:04:39 -0000 1.171
@@ -8294,6 +8294,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Prodigy maths game played in schools at no cost entices students to play "
"it at home, where <a href=\"https://www.theguardian.com/technology/2021/"
"feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "
Index: proprietary/po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- proprietary/po/zh-cn.po 19 Apr 2021 06:30:03 -0000 1.172
+++ proprietary/po/zh-cn.po 26 Apr 2021 12:04:39 -0000 1.173
@@ -8020,6 +8020,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Prodigy maths game played in schools at no cost entices students to play "
"it at home, where <a href=\"https://www.theguardian.com/technology/2021/"
"feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "
Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.306
retrieving revision 1.307
diff -u -b -r1.306 -r1.307
--- proprietary/po/zh-tw.po 18 Apr 2021 08:31:20 -0000 1.306
+++ proprietary/po/zh-tw.po 26 Apr 2021 12:04:39 -0000 1.307
@@ -7774,6 +7774,15 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.wired.com/story/weddings-social-media-apps-photos-"
+"memories-miscarriage-problem/\">WeddingWire app saves people's wedding "
+"photos forever and hands over data to others</a>, and gives people no "
+"control over their personal information/data. The app also sometimes shows "
+"old photos and memories to the user without user having control over this."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"The Prodigy maths game played in schools at no cost entices students to play "
"it at home, where <a href=\"https://www.theguardian.com/technology/2021/"
"feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model\"> "
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www philosophy/words-to-avoid.es.html philosoph...,
GNUN <=