[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Sat, 4 Jun 2022 11:32:24 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 22/06/04 11:32:23
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.pt-br-diff.html
proprietary-surveillance.pt-br.po
proprietary-surveillance.ru.po pt-br.po ru.po
tr.po zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.396&r2=1.397
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.578&r2=1.579
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.700&r2=1.701
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.396&r2=1.397
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.404&r2=1.405
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.397&r2=1.398
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.396&r2=1.397
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.395&r2=1.396
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.239&r2=1.240
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.431&r2=1.432
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.288&r2=1.289
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.710&r2=1.711
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.303&r2=1.304
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.443&r2=1.444
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.321&r2=1.322
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.424&r2=1.425
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.363&r2=1.364
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pt-br-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pt-br.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.781&r2=1.782
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.483&r2=1.484
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.829&r2=1.830
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.290&r2=1.291
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.294&r2=1.295
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.396&r2=1.397
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.396
retrieving revision 1.397
diff -u -b -r1.396 -r1.397
--- de.po 4 Jun 2022 15:02:48 -0000 1.396
+++ de.po 4 Jun 2022 15:32:14 -0000 1.397
@@ -12990,6 +12990,14 @@
#. type: Content of: <div><div><div><ul><li>
# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
+# | {+href=\"#SpywareInAllApps\">All Apps</a>+}
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">⦠in Anwendungssoftware</a>"
+
+#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
# | {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
#, fuzzy
#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
@@ -13458,6 +13466,23 @@
msgstr " "
#. type: Content of: <div><div><div><h4>
+msgid "All Apps"
+msgstr ""
+
+#. type: Content of: <div><div><div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr " "
+
+#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr ""
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.578
retrieving revision 1.579
diff -u -b -r1.578 -r1.579
--- es.po 4 Jun 2022 15:02:49 -0000 1.578
+++ es.po 4 Jun 2022 15:32:14 -0000 1.579
@@ -11531,6 +11531,14 @@
"<a href=\"#SpywareInApplications\">Código espÃa en las aplicaciones</a>"
#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
+# | {+href=\"#SpywareInAllApps\">All+} Apps</a>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Aplicaciones para móviles</a>"
+
+#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr "<a href=\"#SpywareInDesktopApps\">Aplicaciones de escritorio</a>"
@@ -11882,6 +11890,28 @@
"\">#SpywareInApplications</a>)</span>"
#. type: Content of: <div><div><div><h4>
+# | [-Mobile-]{+All+} Apps
+#, fuzzy
+#| msgid "Mobile Apps"
+msgid "All Apps"
+msgstr "Aplicaciones para móviles"
+
+#. type: Content of: <div><div><div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr "Aplicaciones de escritorio"
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.700
retrieving revision 1.701
diff -u -b -r1.700 -r1.701
--- fr.po 4 Jun 2022 15:02:49 -0000 1.700
+++ fr.po 4 Jun 2022 15:32:15 -0000 1.701
@@ -11545,6 +11545,14 @@
msgstr "<a href=\"#SpywareInApplications\">Espions dans les applications</a>"
#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
+# | {+href=\"#SpywareInAllApps\">All+} Apps</a>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Sur mobile</a>"
+
+#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr "<a href=\"#SpywareInDesktopApps\">Sur ordinateur de bureau</a>"
@@ -11896,6 +11904,28 @@
"\">#SpywareInApplications</a>)</span>"
#. type: Content of: <div><div><div><h4>
+# | [-Mobile-]{+All+} Apps
+#, fuzzy
+#| msgid "Mobile Apps"
+msgid "All Apps"
+msgstr "Sur mobile"
+
+#. type: Content of: <div><div><div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr "Sur ordinateur de bureau"
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.396
retrieving revision 1.397
diff -u -b -r1.396 -r1.397
--- it.po 4 Jun 2022 15:02:49 -0000 1.396
+++ it.po 4 Jun 2022 15:32:15 -0000 1.397
@@ -11874,6 +11874,14 @@
#. type: Content of: <div><div><div><ul><li>
# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
+# | {+href=\"#SpywareInAllApps\">All Apps</a>+}
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Spyware in applicazioni mobili</a>"
+
+#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
# | {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
#, fuzzy
#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
@@ -12337,6 +12345,25 @@
"\">#SpywareIniThings</a>)</span>"
#. type: Content of: <div><div><div><h4>
+msgid "All Apps"
+msgstr ""
+
+#. type: Content of: <div><div><div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr ""
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.404
retrieving revision 1.405
diff -u -b -r1.404 -r1.405
--- ja.po 4 Jun 2022 15:02:49 -0000 1.404
+++ ja.po 4 Jun 2022 15:32:16 -0000 1.405
@@ -9782,6 +9782,12 @@
msgstr "<a href=\"#SpywareInApplications\">ã¢ããªã®ã¹ãã¤ã¦ã§ã¢</a>"
#. type: Content of: <div><div><div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a
href=\"#SpywareInMobileApps\">ã¢ãã¤ã«ã»ã¢ããªã®ã¹ãã¤ã¦ã§ã¢</a>"
+
+#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr ""
@@ -10165,6 +10171,24 @@
"\">#SpywareInApplications</a>)</span>"
#. type: Content of: <div><div><div><h4>
+#, fuzzy
+#| msgid "Spyware in Mobile Applications"
+msgid "All Apps"
+msgstr "ã¢ãã¤ã«ã»ã¢ããªã®ã¹ãã¤ã¦ã§ã¢"
+
+#. type: Content of: <div><div><div>
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr ""
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.397
retrieving revision 1.398
diff -u -b -r1.397 -r1.398
--- nl.po 4 Jun 2022 15:02:50 -0000 1.397
+++ nl.po 4 Jun 2022 15:32:16 -0000 1.398
@@ -8749,6 +8749,18 @@
#. type: Content of: <div><div><div><ul><li>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
+# | devices</a>-] {+href=\"#SpywareInAllApps\">All Apps</a>+}
+#, fuzzy
+#| msgid ""
+#| "<a href=\"/proprietary/malware-mobiles.html\">Malware in mobile devices</"
+#| "a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr ""
+"<a href=\"/proprietary/malware-mobiles.html\">Malware in mobiele apparaten</"
+"a>"
+
+#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
#, fuzzy
#| msgid ""
@@ -9093,6 +9105,16 @@
msgstr ""
#. type: Content of: <div><div><div><h4>
+msgid "All Apps"
+msgstr ""
+
+#. type: Content of: <div><div><div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr ""
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.396
retrieving revision 1.397
diff -u -b -r1.396 -r1.397
--- pl.po 4 Jun 2022 15:02:50 -0000 1.396
+++ pl.po 4 Jun 2022 15:32:16 -0000 1.397
@@ -8014,6 +8014,17 @@
#. type: Content of: <div><div><div><ul><li>
# | <a [-href=\"/philosophy/malware-mobiles.html\">Malware in mobile
+# | devices</a>-] {+href=\"#SpywareInAllApps\">All Apps</a>+}
+#, fuzzy
+#| msgid ""
+#| "<a href=\"/philosophy/malware-mobiles.html\">Malware in mobile devices</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr ""
+"<a href=\"/philosophy/malware-mobiles.html\">Malware w urzÄ
dzeniach "
+"mobilnych</a>"
+
+#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"/philosophy/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
#, fuzzy
#| msgid ""
@@ -8346,6 +8357,16 @@
msgstr ""
#. type: Content of: <div><div><div><h4>
+msgid "All Apps"
+msgstr ""
+
+#. type: Content of: <div><div><div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr ""
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.395
retrieving revision 1.396
diff -u -b -r1.395 -r1.396
--- pot 4 Jun 2022 15:02:50 -0000 1.395
+++ pot 4 Jun 2022 15:32:17 -0000 1.396
@@ -7602,6 +7602,10 @@
msgstr ""
#. type: Content of: <div><div><div><ul><li>
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr ""
+
+#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr ""
@@ -7886,6 +7890,16 @@
msgstr ""
#. type: Content of: <div><div><div><h4>
+msgid "All Apps"
+msgstr ""
+
+#. type: Content of: <div><div><div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr ""
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.239
retrieving revision 1.240
diff -u -b -r1.239 -r1.240
--- proprietary-surveillance.de-diff.html 4 Jun 2022 15:02:50 -0000
1.239
+++ proprietary-surveillance.de-diff.html 4 Jun 2022 15:32:17 -0000
1.240
@@ -149,15 +149,16 @@
<ul></em></ins></span>
<li><a <span
class="removed"><del><strong>href="#SpywareInToys">Spyware in
Toys</a></li>
</ul>
- </li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInDesktopApps">Desktop
Apps</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareOnSmartWatches">Spyware on Smart
Watches</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInMobileApps">Mobile
Apps</a></li></em></ins></span>
+ </li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInAllApps">All
Apps</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareOnSmartWatches">Spyware on Smart
Watches</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInDesktopApps">Desktop
Apps</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="#SpywareAtLowLevel">Spyware at Low
Level</a>
- <ul></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInSkype">Skype</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareInBIOS">Spyware in
BIOS</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInGames">Games</a></li></em></ins></span>
+ <ul></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInMobileApps">Mobile
Apps</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareInBIOS">Spyware in
BIOS</a></li>
</ul>
- <span class="removed"><del><strong></li>
- <li><a href="#SpywareAtWork">Spyware at
Work</a></strong></del></span>
- <span class="inserted"><ins><em><h4><a
href="#SpywareInEquipment">Spyware in Connected
Equipment</a></h4></em></ins></span>
+ </li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInSkype">Skype</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareAtWork">Spyware at
Work</a></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInGames">Games</a></li>
+ </ul>
+ <h4><a href="#SpywareInEquipment">Spyware in Connected
Equipment</a></h4></em></ins></span>
<ul>
<li><a <span
class="removed"><del><strong>href="#SpywareInSkype">Spyware in
Skype</a></li>
</ul>
@@ -741,7 +742,7 @@
<li id="M202101080">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>As of 2021, WhatsApp (one</em></ins></span> of <span
class="inserted"><ins><em>Facebook's subsidiaries) is <a
+ <p>As</em></ins></span> of <span class="inserted"><ins><em>2021,
WhatsApp (one of Facebook's subsidiaries) is <a
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/">forcing
its</em></ins></span> users <span class="removed"><del><strong>may be
unawarely subject</strong></del></span> to <span
class="removed"><del><strong>poor security guarantees and abusive practices
inflicted by
VPN apps.”</p>
@@ -1522,6 +1523,11 @@
</div>
<div style="clear: left;"></div>
+<div class="big-subsection">
+ <h4 id="SpywareInAllApps">All Apps</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInAllApps">#SpywareInAllApps</a>)</span>
+</div>
+
<ul class="blurbs">
<li id="M202205240">
<!--#set var="DATE" value='<small
class="date-tag">2022-05</small>'
@@ -2351,12 +2357,12 @@
GNU/Linux; also, a “clean” Windows install is not really
clean since <a href="/proprietary/malware-microsoft.html">Microsoft
puts</strong></del></span> <span class="inserted"><ins><em>intend to make
these apps spy; on the contrary, it
- worked</em></ins></span> in <span class="inserted"><ins><em>various ways
to prevent that, and deleted these apps after
+ worked in various ways to prevent that, and deleted these apps after
discovering what they did. So we cannot blame Google specifically
for the snooping of these apps.</p>
<p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares in the responsibility for the injustice of their being
+ therefore shares</em></ins></span> in <span class="inserted"><ins><em>the
responsibility for the injustice of their being
nonfree. It also distributes</em></ins></span> its own <span
class="removed"><del><strong>malware</a>.
</p></li>
</ul>
@@ -2595,20 +2601,20 @@
five tracking libraries. Developers of</em></ins></span> this <span
class="removed"><del><strong>code snoops on
readers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>app have confirmed that
the non-premium version of the app does JavaScript injection for
tracking the user and displaying ads.</dd>
- </dl>
+ </dl></em></ins></span>
</li>
- <li id="M201609210">
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609210">
<!--#set var="DATE" value='<small
class="date-tag">2016-09</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Google's new voice messaging app <a
href="https://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></em></ins></span>
+ all conversations</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201606050">
+ <li id="M201606050">
<!--#set var="DATE" value='<small
class="date-tag">2016-06</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Facebook's new Magic Photo app <a
@@ -3412,16 +3418,16 @@
<span class="inserted"><ins><em><li id="M201711100">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A remote-control sex toy was found to make <a
-
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-surveillance">audio
+ <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-surveillance">audio
recordings of the conversation between two users</a>.</p>
</li>
<li id="M201703140">
<!--#set var="DATE" value='<small
class="date-tag">2017-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ <p>A computerized vibrator <a
+
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
was snooping on its</em></ins></span> users <span
class="removed"><del><strong>identify themselves</strong></del></span> <span
class="inserted"><ins><em>through the proprietary control
app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
@@ -3898,7 +3904,7 @@
phones. <em>All</em> such data collection should be
forbidden.</p>
<p>But if you really want to be safe, we must make sure the car's
- hardware cannot collect any of</em></ins></span> that <span
class="inserted"><ins><em>data, or that the software
+ hardware cannot collect any of that data, or</em></ins></span> that <span
class="inserted"><ins><em>the software
is free so we know it won't collect any of that data.</p>
</li>
@@ -3980,8 +3986,8 @@
<ul class="blurbs">
<li id="M202008182">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
- <span class="inserted"><ins><em><p>Oculus headsets <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Oculus headsets <a
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
users to identify themselves to Facebook</a>. This will give Facebook
free rein to pervasively snoop on Oculus users.</p>
@@ -3989,8 +3995,8 @@
<li id="M201612230">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>VR equipment, measuring every slight motion,
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+ <span class="inserted"><ins><em><p>VR equipment, measuring every
slight motion,
creates the potential for the most intimate
surveillance ever. All it takes to make this potential real <a
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
@@ -4649,7 +4655,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/06/04 15:02:50 $
+$Date: 2022/06/04 15:32:17 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.431
retrieving revision 1.432
diff -u -b -r1.431 -r1.432
--- proprietary-surveillance.de.po 4 Jun 2022 15:02:50 -0000 1.431
+++ proprietary-surveillance.de.po 4 Jun 2022 15:32:18 -0000 1.432
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2022-06-04 14:55+0000\n"
+"POT-Creation-Date: 2022-06-04 15:25+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -270,6 +270,14 @@
#. type: Content of: <div><div><div><ul><li>
# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
+# | {+href=\"#SpywareInAllApps\">All Apps</a>+}
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">⦠in Anwendungssoftware</a>"
+
+#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
# | {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
#, fuzzy
#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
@@ -2452,6 +2460,23 @@
"\">#SpywareInApplications</a>)</span>"
msgstr " "
+#. type: Content of: <div><div><div><h4>
+msgid "All Apps"
+msgstr ""
+
+#. type: Content of: <div><div><div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr " "
+
#. type: Content of: <div><div><ul><li><p>
msgid ""
"A worldwide investigation found that most of the applications that school "
Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.288
retrieving revision 1.289
diff -u -b -r1.288 -r1.289
--- proprietary-surveillance.es.po 4 Jun 2022 15:02:51 -0000 1.288
+++ proprietary-surveillance.es.po 4 Jun 2022 15:32:19 -0000 1.289
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-06-04 14:55+0000\n"
+"POT-Creation-Date: 2022-06-04 15:25+0000\n"
"PO-Revision-Date: 2022-04-19 00:42+0200\n"
"Last-Translator: Dora Scilipoti <dora AT gnu DOT org>\n"
"Language-Team: Spanish\n"
@@ -204,6 +204,14 @@
"<a href=\"#SpywareInApplications\">Código espÃa en las aplicaciones</a>"
#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
+# | {+href=\"#SpywareInAllApps\">All+} Apps</a>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Aplicaciones para móviles</a>"
+
+#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr "<a href=\"#SpywareInDesktopApps\">Aplicaciones de escritorio</a>"
@@ -1789,6 +1797,28 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInApplications"
"\">#SpywareInApplications</a>)</span>"
+#. type: Content of: <div><div><div><h4>
+# | [-Mobile-]{+All+} Apps
+#, fuzzy
+#| msgid "Mobile Apps"
+msgid "All Apps"
+msgstr "Aplicaciones para móviles"
+
+#. type: Content of: <div><div><div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
#. type: Content of: <div><div><ul><li><p>
msgid ""
"A worldwide investigation found that most of the applications that school "
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.710
retrieving revision 1.711
diff -u -b -r1.710 -r1.711
--- proprietary-surveillance.fr.po 4 Jun 2022 15:02:51 -0000 1.710
+++ proprietary-surveillance.fr.po 4 Jun 2022 15:32:19 -0000 1.711
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-06-04 14:55+0000\n"
+"POT-Creation-Date: 2022-06-04 15:25+0000\n"
"PO-Revision-Date: 2022-05-11 12:31+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -195,6 +195,14 @@
msgstr "<a href=\"#SpywareInApplications\">Espions dans les applications</a>"
#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
+# | {+href=\"#SpywareInAllApps\">All+} Apps</a>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Sur mobile</a>"
+
+#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr "<a href=\"#SpywareInDesktopApps\">Sur ordinateur de bureau</a>"
@@ -1783,6 +1791,28 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInApplications"
"\">#SpywareInApplications</a>)</span>"
+#. type: Content of: <div><div><div><h4>
+# | [-Mobile-]{+All+} Apps
+#, fuzzy
+#| msgid "Mobile Apps"
+msgid "All Apps"
+msgstr "Sur mobile"
+
+#. type: Content of: <div><div><div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
#. type: Content of: <div><div><ul><li><p>
msgid ""
"A worldwide investigation found that most of the applications that school "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.303
retrieving revision 1.304
diff -u -b -r1.303 -r1.304
--- proprietary-surveillance.it-diff.html 4 Jun 2022 15:02:51 -0000
1.303
+++ proprietary-surveillance.it-diff.html 4 Jun 2022 15:32:20 -0000
1.304
@@ -141,12 +141,13 @@
<span class="inserted"><ins><em><h4><a</em></ins></span>
href="#SpywareOnMobiles">Spyware on <span
class="removed"><del><strong>Mobiles</a></strong></del></span> <span
class="inserted"><ins><em>Mobiles</a></h4></em></ins></span>
<ul>
<li><a <span
class="removed"><del><strong>href="#SpywareIniThings">Spyware in
iThings</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInTelephones">All
“Smart” Phones</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareInTelephones">Spyware in
Telephones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareIniThings">iThings</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareInMobileApps">Spyware in Mobile
Applications</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInAndroid">Android
Telephones</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareInGames">Spyware</strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">E-Readers</a></li>
+ <li><a <span
class="removed"><del><strong>href="#SpywareInTelephones">Spyware
in</strong></del></span> <span
class="inserted"><ins><em>href="#SpywareIniThings">iThings</a></li>
+ <li><a href="#SpywareInAndroid">Android</em></ins></span>
Telephones</a></li>
+ <li><a <span
class="removed"><del><strong>href="#SpywareInMobileApps">Spyware</strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">E-Readers</a></li>
</ul>
- <h4><a href="#SpywareInApplications">Spyware</em></ins></span>
in <span
class="removed"><del><strong>Games</a></li></strong></del></span>
<span class="inserted"><ins><em>Applications</a></h4>
+ <h4><a href="#SpywareInApplications">Spyware</em></ins></span>
in <span class="removed"><del><strong>Mobile
Applications</a></li></strong></del></span> <span
class="inserted"><ins><em>Applications</a></h4>
<ul></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareInGames">Spyware in
Games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInAllApps">All
Apps</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="#SpywareInToys">Spyware in
Toys</a></li>
</ul>
</li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInDesktopApps">Desktop
Apps</a></li></em></ins></span>
@@ -1409,14 +1410,19 @@
</div>
<div style="clear: left;"></div>
+<div class="big-subsection">
+ <h4 id="SpywareInAllApps">All Apps</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInAllApps">#SpywareInAllApps</a>)</span>
+</div>
+
<ul class="blurbs">
<li id="M202205240">
<!--#set var="DATE" value='<small
class="date-tag">2022-05</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>A worldwide investigation found</em></ins></span> that <span
class="removed"><del><strong>it will</a>
pre-install on some</strong></del></span>
- <span class="inserted"><ins><em>most</em></ins></span> of <span
class="removed"><del><strong>its phones. The app will give Verizon the same
- information about</strong></del></span> the <span
class="removed"><del><strong>users' searches</strong></del></span> <span
class="inserted"><ins><em>applications</em></ins></span> that <span
class="removed"><del><strong>Google normally gets when
+ <span class="inserted"><ins><em>most</em></ins></span> of <span
class="removed"><del><strong>its phones. The app will give
Verizon</strong></del></span> the <span class="removed"><del><strong>same
+ information about the users' searches</strong></del></span> <span
class="inserted"><ins><em>applications</em></ins></span> that <span
class="removed"><del><strong>Google normally gets when
they use its search engine.</p>
<p>Currently,</strong></del></span> <span
class="inserted"><ins><em>school districts
@@ -1867,10 +1873,11 @@
<p>The company</strong></del></span> <span
class="inserted"><ins><em>own pregnancy choices. Don't use
these apps, even if someone offers you a reward to do so. A
- free-software app</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em>does more or less</em></ins></span> the <span
class="removed"><del><strong>vibrator</strong></del></span> <span
class="inserted"><ins><em>same thing without
- spying on you is available from</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots</strong></del></span>
- <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,
and <a
+ free-software app</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em>does more or less</em></ins></span> the <span
class="removed"><del><strong>vibrator
+ <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots</strong></del></span> <span
class="inserted"><ins><em>same thing without
+ spying on you is available from <a
+ href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
a new one is being developed</a>.</p>
</li>
@@ -2943,8 +2950,8 @@
<li id="M201901070">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Vizio TVs <a
+ --><!--#echo encoding="none" var="DATE" --></em></ins></span>
+ <p>Vizio <span class="inserted"><ins><em>TVs <a
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
collect “whatever the TV sees,”</a> in the own words of
the company's
CTO, and this data is sold to third parties. This is in return for
@@ -2957,7 +2964,7 @@
and there is no guarantee that all future updates will leave the
settings unchanged.</p>
- <p>If you already own a Vizio “smart” TV (or any
“smart” TV, for that
+ <p>If you already own a Vizio</em></ins></span> “smart”
<span class="inserted"><ins><em>TV (or any “smart” TV, for that
matter), the easiest way to make sure it isn't spying on you is
to disconnect it from the Internet, and use a terrestrial antenna
instead. Unfortunately, this is not always possible. Another option,
@@ -2976,16 +2983,16 @@
<p>We link to the article for the facts it presents. It
is too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix app <a
- href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ moral weakness of surrendering to Netflix. The Netflix
app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
<li id="M201702060">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p>Vizio “smart” <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs</em></ins></span>
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Vizio “smart” <a
+
href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs</em></ins></span>
report everything that is viewed on them, and not just broadcasts and
cable</a>. Even if the image is coming from the user's own computer,
the TV reports what it is. The existence of a way to disable the
@@ -3072,20 +3079,20 @@
watching</strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
snoops on what programs people watch,</em></ins></span> and <span
class="removed"><del><strong>listening all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>even what they wanted to
- record</a>.</p>
+ record</a>.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>The</strong></del></span>
- <li id="M201504300">
+ <span class="inserted"><ins><em><li id="M201504300">
<!--#set var="DATE" value='<small
class="date-tag">2015-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio <a
href="https://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
used a firmware “upgrade” to make its TVs snoop on what
- users watch</a>. The TVs did not do that when first
sold.</p></em></ins></span>
+ users watch</a>. The TVs did not do that when first sold.</p>
</li>
- <span
class="removed"><del><strong><li><p>The</strong></del></span>
- <span class="inserted"><ins><em><li id="M201502090">
+ <li id="M201502090">
<!--#set var="DATE" value='<small
class="date-tag">2015-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The</em></ins></span> Samsung “Smart” TV <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits</strong></del></span>
@@ -3801,8 +3808,8 @@
<ul class="blurbs">
<li id="M202008182">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Oculus headsets <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+ <span class="inserted"><ins><em><p>Oculus headsets <a
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
users to identify themselves to Facebook</a>. This will give Facebook
free rein to pervasively snoop on Oculus users.</p>
@@ -3810,8 +3817,8 @@
<li id="M201612230">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
- <span class="inserted"><ins><em><p>VR equipment, measuring every
slight motion,
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>VR equipment, measuring every slight motion,
creates the potential for the most intimate
surveillance ever. All it takes to make this potential real <a
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
@@ -4003,8 +4010,8 @@
<li id="M201807190">
<!--#set var="DATE" value='<small
class="date-tag">2018-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>British Airways used <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+ <span class="inserted"><ins><em><p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
JavaScript on its web site to give other companies personal data on
its customers</a>.</p>
@@ -4020,8 +4027,8 @@
<li id="M201711150">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
- <span class="inserted"><ins><em><p>Some websites send
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Some websites send
JavaScript code to collect all the user's input, <a
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
can then be used to reproduce the whole session</a>.</p>
@@ -4447,7 +4454,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/06/04 15:02:51 $
+$Date: 2022/06/04 15:32:20 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.443
retrieving revision 1.444
diff -u -b -r1.443 -r1.444
--- proprietary-surveillance.it.po 4 Jun 2022 15:02:51 -0000 1.443
+++ proprietary-surveillance.it.po 4 Jun 2022 15:32:21 -0000 1.444
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-06-04 14:55+0000\n"
+"POT-Creation-Date: 2022-06-04 15:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -261,6 +261,14 @@
#. type: Content of: <div><div><div><ul><li>
# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
+# | {+href=\"#SpywareInAllApps\">All Apps</a>+}
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Spyware in applicazioni mobili</a>"
+
+#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
# | {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
#, fuzzy
#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
@@ -2331,6 +2339,25 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareIniThings"
"\">#SpywareIniThings</a>)</span>"
+#. type: Content of: <div><div><div><h4>
+msgid "All Apps"
+msgstr ""
+
+#. type: Content of: <div><div><div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
#. type: Content of: <div><div><ul><li><p>
msgid ""
"A worldwide investigation found that most of the applications that school "
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.321
retrieving revision 1.322
diff -u -b -r1.321 -r1.322
--- proprietary-surveillance.ja-diff.html 4 Jun 2022 15:02:51 -0000
1.321
+++ proprietary-surveillance.ja-diff.html 4 Jun 2022 15:32:21 -0000
1.322
@@ -141,12 +141,13 @@
<span class="inserted"><ins><em><h4><a</em></ins></span>
href="#SpywareOnMobiles">Spyware on <span
class="removed"><del><strong>Mobiles</a></strong></del></span> <span
class="inserted"><ins><em>Mobiles</a></h4></em></ins></span>
<ul>
<li><a <span
class="removed"><del><strong>href="#SpywareIniThings">Spyware in
iThings</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInTelephones">All
“Smart” Phones</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareInTelephones">Spyware in
Telephones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareIniThings">iThings</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareInMobileApps">Spyware in Mobile
Applications</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInAndroid">Android
Telephones</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareInGames">Spyware</strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">E-Readers</a></li>
+ <li><a <span
class="removed"><del><strong>href="#SpywareInTelephones">Spyware
in</strong></del></span> <span
class="inserted"><ins><em>href="#SpywareIniThings">iThings</a></li>
+ <li><a href="#SpywareInAndroid">Android</em></ins></span>
Telephones</a></li>
+ <li><a <span
class="removed"><del><strong>href="#SpywareInMobileApps">Spyware</strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">E-Readers</a></li>
</ul>
- <h4><a href="#SpywareInApplications">Spyware</em></ins></span>
in <span
class="removed"><del><strong>Games</a></li></strong></del></span>
<span class="inserted"><ins><em>Applications</a></h4>
+ <h4><a href="#SpywareInApplications">Spyware</em></ins></span>
in <span class="removed"><del><strong>Mobile
Applications</a></li></strong></del></span> <span
class="inserted"><ins><em>Applications</a></h4>
<ul></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareInGames">Spyware in
Games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInAllApps">All
Apps</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="#SpywareInToys">Spyware in
Toys</a></li>
</ul>
</li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInDesktopApps">Desktop
Apps</a></li></em></ins></span>
@@ -187,15 +188,15 @@
<li><a <span
class="removed"><del><strong>href="#SpywareEverywhere">Spyware
Everywhere</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInJavaScript">JavaScript</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="#SpywareInVR">Spyware In
VR</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInFlash">Flash</a></li></em></ins></span>
</ul>
+<span class="removed"><del><strong></div></strong></del></span>
<span class="inserted"><ins><em><h4><a
href="#SpywareInNetworks">Spyware in
Networks</a></h4></em></ins></span>
</div>
-<span class="removed"><del><strong></div>
-<div style="clear: left;"></div>
+<div <span class="removed"><del><strong>style="clear: left;"></div>
-<!-- #Introduction --></strong></del></span>
+<!-- #Introduction -->
-<div class="big-section">
+<div</strong></del></span> class="big-section">
<h3 id="Introduction">Introduction</h3>
</div>
<div style="clear: left;"></div>
@@ -1150,15 +1151,15 @@
<p>Facebook's app got “consent” to <a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
upload call logs automatically</em></ins></span> from <span
class="inserted"><ins><em>Android phones</a> while disguising
- what the “consent” was for.</p>
+ what</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call,</strong></del></span> <span
class="inserted"><ins><em>“consent” was for.</p>
</li>
<li id="M201811230">
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>An Android phone was observed to track location even while
- in airplane mode. It didn't send</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call,</strong></del></span> location <span
class="inserted"><ins><em>data while in
+ <p>An Android phone was observed to track</em></ins></span> location
<span class="inserted"><ins><em>even while
+ in airplane mode. It didn't send the location data while in
airplane mode. Instead, <a
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
it saved up the data,</em></ins></span> and <span
class="removed"><del><strong>web
@@ -1237,55 +1238,149 @@
</li>
<span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
- remote command and users cannot stop them:</strong></del></span>
+ remote command and users cannot stop them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable phones
+ to have GPS.)</p>
+ </li>
+
+ <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span>
<span class="inserted"><ins><em><li id="M201307280">
<!--#set var="DATE" value='<small
class="date-tag">2013-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Spyware is present in some Android devices when they are
+ <p>Spyware</em></ins></span> is <span
class="removed"><del><strong>to restrict
+ the</strong></del></span> <span class="inserted"><ins><em>present in
some Android devices when they are
sold. Some Motorola phones, made when this company was owned
- by Google, use a modified version of Android that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable
phones</strong></del></span>
+ by Google,</em></ins></span> use <span class="inserted"><ins><em>a
modified version</em></ins></span> of <span class="removed"><del><strong>data
on the user's computer, but it does surveillance
+ too:</strong></del></span> <span class="inserted"><ins><em>Android
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal data</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p></em></ins></span>
+ sends personal data</em></ins></span> to <span
class="removed"><del><strong>get the user's list of other people's phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
- <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose</strong></del></span>
+<ul>
+
+ <li><p>The Uber app tracks</strong></del></span>
<span class="inserted"><ins><em><li id="M201307250">
<!--#set var="DATE" value='<small
class="date-tag">2013-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A Motorola phone <a
-
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p>
+ <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after the ride</a>.</p>
+
+ <p>This example illustrates how “getting the user's
consent”</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens</em></ins></span> for <span
class="removed"><del><strong>surveillance is inadequate as a protection against
massive
+ surveillance.</p>
+ </li>
+
+ <li><p>Google's new</strong></del></span> voice <span
class="removed"><del><strong>messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs</strong></del></span>
all <span class="removed"><del><strong>conversations</a>.</p>
+ </li>
+
+ <li><p>Apps that include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>the time</a>.</p></em></ins></span>
</li>
- <li id="M201302150">
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201302150">
<!--#set var="DATE" value='<small
class="date-tag">2013-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google Play intentionally sends app developers <a
-
href="https://gadgets360.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
- the personal details of users that install the app</a>.</p>
-
- <p>Merely asking the “consent” of
users</em></ins></span> is <span class="inserted"><ins><em>not
enough</em></ins></span> to <span
class="removed"><del><strong>restrict</strong></del></span>
- <span class="inserted"><ins><em>legitimize actions like this. At this
point, most users have stopped
- reading</em></ins></span> the <span class="removed"><del><strong>use of
data on</strong></del></span> <span class="inserted"><ins><em>“Terms and
Conditions” that spell out what
- they are “consenting” to. Google should clearly and
- honestly identify</em></ins></span> the <span
class="removed"><del><strong>user's computer, but</strong></del></span> <span
class="inserted"><ins><em>information</em></ins></span> it <span
class="removed"><del><strong>does surveillance
- too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"></strong></del></span>
<span class="inserted"><ins><em>collects on users, instead of
- hiding</em></ins></span> it <span
class="removed"><del><strong>tries</strong></del></span> <span
class="inserted"><ins><em>in an obscurely worded EULA.</p>
-
- <p>However,</em></ins></span> to <span
class="removed"><del><strong>get the user's list of other</strong></del></span>
<span class="inserted"><ins><em>truly protect</em></ins></span> people's <span
class="removed"><del><strong>phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>privacy, we must prevent Google
- and other companies from getting this personal information in the
- first place!</p>
+ <p>Google Play intentionally sends</em></ins></span> app <span
class="inserted"><ins><em>developers</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known faces</a>,
+ and suggests you to share the picture you take according to who
+ is in the frame.</p>
+
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means the pictures are likely to be
+ sent across</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://gadgets360.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
+ the <span class="removed"><del><strong>wire to Facebook's servers and
face-recognition
+ algorithms.</p>
+
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>personal details</em></ins></span> of <span
class="removed"><del><strong>Facebook users' pictures are private
+ anymore, even if</strong></del></span> <span
class="inserted"><ins><em>users that install</em></ins></span> the <span
class="removed"><del><strong>user didn't “upload” them
to</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
+
+ <p>Merely asking</em></ins></span> the <span
class="removed"><del><strong>service.</p>
+ </li>
+
+ <li><p>Like most “music screaming” disservices,
Spotify
+ is based on proprietary malware (DRM and snooping). In August
+ 2015 it <a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded</strong></del></span> <span
class="inserted"><ins><em>“consent” of</em></ins></span> users
<span class="removed"><del><strong>submit to increased snooping</a>, and
some
+ are starting to realize that it</strong></del></span> is <span
class="removed"><del><strong>nasty.</p>
+
+ <p>This article shows the <a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as a way</strong></del></span>
<span class="inserted"><ins><em>not enough</em></ins></span> to <span
class="removed"><del><strong>“serve”</strong></del></span>
+ <span class="inserted"><ins><em>legitimize actions like this. At this
point, most</em></ins></span> users <span
class="removed"><del><strong>better</a>—never mind
+ whether they want that. This is a typical example of
+ the attitude of the proprietary software industry towards
+ those they</strong></del></span> have <span
class="removed"><del><strong>subjugated.</p>
+
+ <p>Out, out, damned Spotify!</p>
+ </li>
+ <li><p>Many proprietary apps for mobile devices report which
other
+ apps</strong></del></span> <span class="inserted"><ins><em>stopped
+ reading</em></ins></span> the <span class="removed"><del><strong>user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way that at least is visible</strong></del></span>
<span class="inserted"><ins><em>“Terms</em></ins></span> and
+ <span class="removed"><del><strong>optional</a>. Not as bad
as</strong></del></span> <span class="inserted"><ins><em>Conditions” that
spell out</em></ins></span> what
+ <span class="inserted"><ins><em>they are “consenting” to.
Google should clearly and
+ honestly identify</em></ins></span> the <span
class="removed"><del><strong>others do.</p>
+ </li>
+
+ <li><p>FTC says most mobile apps for children don't respect
privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ </li>
+
+ <li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop</strong></del></span> <span
class="inserted"><ins><em>information it collects</em></ins></span> on <span
class="removed"><del><strong>the user</a>. This is</strong></del></span>
<span class="inserted"><ins><em>users, instead of
+ hiding it</em></ins></span> in <span
class="removed"><del><strong>addition</strong></del></span> <span
class="inserted"><ins><em>an obscurely worded EULA.</p>
+
+ <p>However,</em></ins></span> to
+ <span class="removed"><del><strong>the snooping done by the phone
company,</strong></del></span> <span class="inserted"><ins><em>truly protect
people's privacy, we must prevent Google</em></ins></span>
+ and <span class="removed"><del><strong>perhaps by the OS in the
+ phone.</p>
+
+ <p>Don't be distracted by the question of whether the app
developers get
+ users to say “I agree”. That is no excuse for
malware.</p>
+ </li>
+
+ <li><p>The Brightest Flashlight app
+ <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p>
+
+ <p>The FTC criticized</strong></del></span> <span
class="inserted"><ins><em>other companies from getting</em></ins></span> this
<span class="removed"><del><strong>app because it asked the user to
+ approve sending</strong></del></span> personal <span
class="removed"><del><strong>data to the app developer but did not
+ ask about sending it to other companies. This shows the
+ weakness of</strong></del></span> <span
class="inserted"><ins><em>information in</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should</strong></del></span>
+ <span class="inserted"><ins><em>first place!</p>
</li>
<li id="M201111170">
<!--#set var="DATE" value='<small
class="date-tag">2011-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some manufacturers add a <a
+ <p>Some manufacturers add</em></ins></span> a <span
class="removed"><del><strong>flashlight
+ app send any information to anyone? A free software flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em><a
href="https://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
hidden general surveillance package such as Carrier
IQ</a>.</p></em></ins></span>
</li>
@@ -1293,223 +1388,298 @@
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInGames">Spyware in
Games</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInGames">#SpywareInGames</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
-
- <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before</strong></del></span>
+ <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201603080">
<!--#set var="DATE" value='<small
class="date-tag">2016-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>E-books can contain JavaScript code,</em></ins></span> and <span
class="removed"><del><strong>after the ride</a>.</p>
-
- <p>This example illustrates how “getting the user's
consent”
- for surveillance is inadequate as a protection against massive
- surveillance.</p>
- </li>
-
- <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
+ <p>E-books can contain JavaScript code,</em></ins></span> and <span
class="removed"><del><strong>then sends personal data about them to
+ nVidia servers</a>.</p>
</li>
- <li><p>Apps that include</strong></del></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also on what users
post</strong></del></span>
+ <li><p>Angry Birds</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and the NSA takes advantage to spy through it
too</a>.
+ Here's information</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops</em></ins></span> on <span
class="removed"><del><strong>various sites
- such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>readers</a>.</p></em></ins></span>
+ sometimes this code snoops</em></ins></span> on
+ <span class="removed"><del><strong><a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>readers</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
+<ul>
+
+ <li><p>A company that makes internet-controlled
vibrators</strong></del></span>
<span class="inserted"><ins><em><li id="M201410080">
<!--#set var="DATE" value='<small
class="date-tag">2014-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Adobe made “Digital Editions,”
- the e-reader used by most US libraries,</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known faces</a>,
- and suggests you</strong></del></span>
+ the e-reader used by most US libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
+ being sued for collecting</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data</em></ins></span> to <span
class="removed"><del><strong>share the picture you take
according</strong></del></span> <span
class="inserted"><ins><em>Adobe</a>. Adobe's “excuse”: it's
- needed</em></ins></span> to <span class="removed"><del><strong>who
- is</strong></del></span> <span class="inserted"><ins><em>check
DRM!</p>
+ send</em></ins></span> lots of <span class="removed"><del><strong>personal
information about how
+ people use it</a>.</p>
+
+ <p>The company's statement that it anonymizes the data may be
+ true, but it doesn't really matter. If it sells
the</strong></del></span> data to <span class="removed"><del><strong>a
+ data broker, the data broker can figure out who the user is.</p>
</li>
- <li id="M201212030">
- <!--#set var="DATE" value='<small
class="date-tag">2012-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>many
e-readers—not only</em></ins></span> the <span
class="removed"><del><strong>frame.</p>
+ <li><p>A computerized
+ vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops
+ on its users through the proprietary control app</a>.</p>
- <p>This spyware feature seems to require online access to some
- known-faces database, which means the pictures are likely to be
- sent across the wire to Facebook's servers and face-recognition
- algorithms.</p>
+ <p>The app reports the temperature of the vibrator minute by
+ minute (thus, indirectly, whether it is surrounded by a person's
+ body), and the vibration frequency.</p>
- <p>If so, none of Facebook users' pictures are private
- anymore,</strong></del></span> <span class="inserted"><ins><em>Kindle:
<a
- href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
- report</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>which page</em></ins></span> the user <span
class="removed"><del><strong>didn't “upload” them to the
service.</p></strong></del></span> <span class="inserted"><ins><em>reads
at what time</a>.</p></em></ins></span>
+ <p>Note the totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about
+ their products, rather than free software which users
can</strong></del></span> <span class="inserted"><ins><em>Adobe</a>.
Adobe's “excuse”: it's
+ needed to</em></ins></span> check
+ <span class="removed"><del><strong>and
change.</p></strong></del></span> <span
class="inserted"><ins><em>DRM!</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
- <span
class="removed"><del><strong><li><p>Like</strong></del></span>
-<span class="inserted"><ins><em></ul>
+ <span class="inserted"><ins><em><li id="M201212030">
+ <!--#set var="DATE" value='<small
class="date-tag">2012-12</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Spyware in many e-readers—not only the
Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults.</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
+ report even which page the user reads at what
time</a>.</p></em></ins></span>
+ </li>
+</ul>
+
+
+<span class="removed"><del><strong><!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
<div class="big-section">
- <h3 id="SpywareInApplications">Spyware in Applications</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInApplications">#SpywareInApplications</a>)</span>
+ <h3 <span class="removed"><del><strong>id="SpywareAtLowLevel">Spyware
at Low Level</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInApplications">Spyware in
Applications</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInApplications">#SpywareInApplications</a>)</span></em></ins></span>
</div>
<div style="clear: left;"></div>
-<ul class="blurbs">
+<div class="big-subsection">
+ <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInAllApps">All
Apps</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInAllApps">#SpywareInAllApps</a>)</span></em></ins></span>
+</div>
+
+<span class="removed"><del><strong><ul>
+<li><p>
+<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
+Note</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202205240">
<!--#set var="DATE" value='<small
class="date-tag">2022-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A worldwide investigation found that</em></ins></span>
- most <span class="removed"><del><strong>“music screaming”
disservices, Spotify
- is based on proprietary malware (DRM and snooping). In August
- 2015 it <a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some
- are starting to realize</strong></del></span> <span
class="inserted"><ins><em>of the applications</em></ins></span> that <span
class="removed"><del><strong>it is nasty.</p>
+ <p>A worldwide investigation found</em></ins></span> that
+ <span class="inserted"><ins><em>most of</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a “clean” Windows install is not really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows</strong></del></span> <span
class="inserted"><ins><em>applications that school districts
+ recommended for remote education during the COVID-19
pandemic</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
- <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>school districts
- recommended for remote education during</em></ins></span> the <span
class="inserted"><ins><em>COVID-19 pandemic</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping</strong></del></span>
+ <p>Specifically, it can</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20220525011540/https://www.washingtonpost.com/technology/2022/05/24/remote-school-app-tracking-privacy/">track
- and collect personal data from children</em></ins></span> as <span
class="removed"><del><strong>a way</strong></del></span> <span
class="inserted"><ins><em>young as below the age of
- five</a>. These applications, and their websites, send the collected
- information</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
- whether</strong></del></span> <span class="inserted"><ins><em>ad giants
such as Facebook and Goodle, and</em></ins></span> they <span
class="removed"><del><strong>want that. This is a typical example
of</strong></del></span> <span class="inserted"><ins><em>are
- still being used in</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>classrooms even after some</em></ins></span> of the
<span class="removed"><del><strong>proprietary software industry towards
- those they have subjugated.</p>
+ and</em></ins></span> collect <span class="inserted"><ins><em>personal
data from children as young as below</em></ins></span> the <span
class="removed"><del><strong>emails of members</strong></del></span> <span
class="inserted"><ins><em>age</em></ins></span> of <span
class="removed"><del><strong>Parliament
+ this way, because</strong></del></span>
+ <span class="inserted"><ins><em>five</a>. These applications, and
their websites, send the collected
+ information to ad giants such as Facebook and Goodle,
and</em></ins></span> they <span class="removed"><del><strong>pass it through
Microsoft.</p></li>
- <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>schools
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>are
+ still being used</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>the classrooms even after some of the schools
reopened.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other
- apps the user has
- installed.</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInDesktopApps">Desktop Apps</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDesktopApps">Desktop
Apps</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>Spyware in Skype:</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202011260">
<!--#set var="DATE" value='<small
class="date-tag">2020-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft's Office 365 suite enables employers</em></ins></span>
<a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in</strong></del></span>
+ <p>Microsoft's Office 365 suite enables employers</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance">to
- snoop on each employee</a>. After</em></ins></span>
- a <span class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>public outburst, Microsoft stated</em></ins></span>
that <span class="removed"><del><strong>at least is visible and
- optional</a>. Not as bad as what the others do.</p>
- </li>
-
- <li><p>FTC says most mobile apps for children don't respect
privacy:</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
+ snoop on each employee</a>. After
+ a public outburst,</em></ins></span> Microsoft <span
class="removed"><del><strong>changed Skype</strong></del></span> <span
class="inserted"><ins><em>stated that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance">it
would remove this capability</a>. Let's hope
so.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
- <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+
+<!-- #SpywareOnTheRoad</strong></del></span>
<span class="inserted"><ins><em><li id="M201912190">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Some Avast and AVG extensions
- for Firefox and Chrome were found to</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"></em></ins></span>
- snoop on <span class="removed"><del><strong>the user</a>. This is in
addition to
- the snooping done by the phone company,</strong></del></span> <span
class="inserted"><ins><em>users' detailed browsing habits</a>.
Mozilla</em></ins></span> and <span class="removed"><del><strong>perhaps by the
OS in the
- phone.</p>
-
- <p>Don't be distracted by the question of
whether</strong></del></span> <span class="inserted"><ins><em>Google
- removed</em></ins></span> the <span class="removed"><del><strong>app
developers get
- users</strong></del></span> <span class="inserted"><ins><em>problematic
extensions from their stores, but this shows
- once more how unsafe nonfree software can be. Tools that are
supposed</em></ins></span>
- to <span class="removed"><del><strong>say “I agree”. That is
no excuse for malware.</p></strong></del></span> <span
class="inserted"><ins><em>protect a proprietary system are, instead, infecting
it with
- additional malware (the system itself being the original
malware).</p></em></ins></span>
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>Some Avast and AVG extensions
+ for Firefox and Chrome were found</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
+ snoop</em></ins></span> on <span class="removed"><del><strong>top under
each subsection</strong></del></span> <span class="inserted"><ins><em>users'
detailed browsing habits</a>. Mozilla and Google
+ removed the problematic extensions from their stores, but this shows
+ once more how unsafe nonfree software can be. Tools that are supposed
+ to protect a proprietary system are, instead, infecting it with
+ additional malware (the system itself being the original
malware).</p>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201811020">
+ <li id="M201811020">
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Foundry's graphics software</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information to identify who is running it</a>. The result is
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware on</strong></del></span>
+ <span class="inserted"><ins><em><p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information to identify who is running
it</a>.</em></ins></span> The <span
class="removed"><del><strong>Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li></strong></del></span> <span class="inserted"><ins><em>result is
often a legal threat demanding a lot of money.</p></em></ins></span>
- <p>The <span class="removed"><del><strong>FTC
criticized</strong></del></span> <span class="inserted"><ins><em>fact
that</em></ins></span> this <span class="removed"><del><strong>app
because</strong></del></span> <span class="inserted"><ins><em>is used for
repression of forbidden sharing
- makes</em></ins></span> it <span class="removed"><del><strong>asked the
user to
- approve sending personal data to the app developer but
did</strong></del></span> <span class="inserted"><ins><em>even more
vicious.</p>
+ <p>The <span class="removed"><del><strong>Nest Cam
“smart” camera</strong></del></span> <span
class="inserted"><ins><em>fact that this</em></ins></span> is <span
class="removed"><del><strong><a
+ href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>,</strong></del></span> <span
class="inserted"><ins><em>used for repression of forbidden sharing
+ makes it</em></ins></span> even <span
class="removed"><del><strong>when</strong></del></span> <span
class="inserted"><ins><em>more vicious.</p>
<p>This illustrates that making unauthorized copies of nonfree
software
- is</em></ins></span> not
- <span class="removed"><del><strong>ask about sending it to other
companies. This shows</strong></del></span> <span class="inserted"><ins><em>a
cure for</em></ins></span> the
- <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="inserted"><ins><em>nonfree software. It may avoid
- paying for</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should a flashlight
- app send any information to anyone? A free software flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot make it less
nasty.</p></em></ins></span>
+ is not a cure for</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>injustice of nonfree software. It may avoid
+ paying for</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using</strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot make</em></ins></span> it
<span class="removed"><del><strong>to outsmart
+ you.</p></strong></del></span> <span
class="inserted"><ins><em>less nasty.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInGames">Spyware in
Games</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInMobileApps">Mobile
Apps</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInGames">#SpywareInGames</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></em></ins></span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInMobileApps">Mobile
Apps</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
+ <li><p>E-books can contain Javascript code,
+ and</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202204040">
<!--#set var="DATE" value='<small
class="date-tag">2022-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>New Amazon worker chat app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves</strong></del></span>
+ <p>New Amazon worker chat app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not
only</strong></del></span>
<span
class="inserted"><ins><em>href="https://theintercept.com/2022/04/04/amazon-union-living-wage-restrooms-chat-app/">would
ban specific words Amazon doesn't like</a>, such as
- “union”, “restrooms”,</em></ins></span> and <span
class="removed"><del><strong>then sends personal data about them to
- nVidia servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>“pay
- raise”. If the app was free, workers could modify the program
+ “union”, “restrooms”, and “pay
+ raise”. If</em></ins></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>app was free, workers could modify</em></ins></span>
the <span class="removed"><del><strong>user reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>program
so it acts as they wish, not how Amazon wants
it.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
+ <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used</strong></del></span>
<span class="inserted"><ins><em><li id="M202203010">
<!--#set var="DATE" value='<small
class="date-tag">2022-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The nonfree app “Along,”
- developed by a company controlled by Zuckerberg,</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</strong></del></span>
+ developed</em></ins></span> by <span class="removed"><del><strong>most US
libraries,</strong></del></span> <span class="inserted"><ins><em>a company
controlled by Zuckerberg,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data</strong></del></span>
<span
class="inserted"><ins><em>href="https://kappanonline.org/dont-go-along-with-corporate-schemes-to-gather-up-student-data/">
- leads students to reveal to their teacher personal information</a>
- about themselves and their families. Conversations are
recorded</em></ins></span>
- and the <span class="removed"><del><strong>NSA takes
advantage</strong></del></span> <span class="inserted"><ins><em>collected data
sent</em></ins></span> to <span class="removed"><del><strong>spy through it
too</a>.
- Here's information on</strong></del></span> <span
class="inserted"><ins><em>the company, which grants itself the
- right to sell it. See also</em></ins></span> <a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More</strong></del></span>
- <span
class="inserted"><ins><em>href="/education/educational-malware-app-along.html#content">Educational
Malware App “Along”</a>.</p>
+ leads students</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
+ needed</strong></del></span> <span
class="inserted"><ins><em>reveal</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul>
+<li><p>Computerized cars with nonfree
software</strong></del></span> <span class="inserted"><ins><em>their teacher
personal information</a>
+ about themselves and their families. Conversations</em></ins></span> are
+ <span class="removed"><del><strong><a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p>
+ </li>
+
+ <li><p>The Nissan Leaf has a built-in cell phone modem which
allows
+ effectively
+ anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely</strong></del></span> <span
class="inserted"><ins><em>recorded</em></ins></span>
+ and <span class="removed"><del><strong>make changes in various
+ settings</a>.</p>
+
+ <p>That's easy to do because the system has no authentication when
+ accessed through the modem. However, even if it asked for
+ authentication, you couldn't be confident that Nissan has no
+ access. The software in the car is
+ proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects to the car remotely, the cell phone
+ modem enables</strong></del></span> the <span
class="removed"><del><strong>phone company</strong></del></span> <span
class="inserted"><ins><em>collected data sent</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>company, which grants itself</em></ins></span> the
<span class="removed"><del><strong>time; it is possible</strong></del></span>
+ <span class="inserted"><ins><em>right</em></ins></span> to <span
class="removed"><del><strong>physically remove the cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>sell it. See also <a
+
href="/education/educational-malware-app-along.html#content">Educational
Malware App “Along”</a>.</p>
</li>
<li id="M202201270">
@@ -1517,31 +1687,34 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The data broker X-Mode <a
href="https://themarkup.org/privacy/2022/01/27/gay-bi-dating-app-muslim-prayer-apps-sold-data-on-peoples-location-to-a-controversial-data-broker">bought
- location data</em></ins></span> about <span
class="removed"><del><strong>NSA app
spying</a>.</p></strong></del></span> <span
class="inserted"><ins><em>20,000 people collected by around 100 different
+ location data about 20,000 people collected by around 100 different
malicious apps</a>.</p></em></ins></span>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware</strong></del></span>
+ <span class="removed"><del><strong><li><p>Proprietary
software</strong></del></span>
<span class="inserted"><ins><em><li id="M202111090">
<!--#set var="DATE" value='<small
class="date-tag">2021-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A building</em></ins></span> in <span
class="removed"><del><strong>Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
-
- <li><p>A company that makes internet-controlled
vibrators</strong></del></span> <span class="inserted"><ins><em>LA, with a
supermarket in it,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
- being sued</strong></del></span>
+ <p>A building</em></ins></span> in <span
class="removed"><del><strong>cars</strong></del></span> <span
class="inserted"><ins><em>LA, with a supermarket in it,</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.latimes.com/business/story/2021-11-09/column-trader-joes-parking-app">demands
- customers load a particular app to pay</em></ins></span> for <span
class="removed"><del><strong>collecting lots</strong></del></span> <span
class="inserted"><ins><em>parking in the parking
- lot</a>, and accept pervasive surveillance. They also have the
- option</em></ins></span> of <span
class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>entering their license plate numbers in a kiosk. That
is
- an injustice, too.</p>
+ customers load a particular app</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance
companies,</strong></del></span> <span class="inserted"><ins><em>pay for
parking in the parking
+ lot</a>,</em></ins></span> and
+ <span class="removed"><del><strong>others.</p>
+
+ <p>The case</strong></del></span> <span
class="inserted"><ins><em>accept pervasive surveillance. They also have the
+ option</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span class="inserted"><ins><em>entering their
license plate numbers</em></ins></span> in <span
class="removed"><del><strong>this article, is not
+ really</strong></del></span> a <span class="removed"><del><strong>matter
of proprietary surveillance. These systems are</strong></del></span> <span
class="inserted"><ins><em>kiosk. That is</em></ins></span>
+ an
+ <span class="removed"><del><strong>intolerable invasion of privacy, and
should be replaced with anonymous
+ payment systems, but the invasion isn't done by malware. The other
+ cases mentioned are done by proprietary malware in the
car.</p></li>
+
+ <li><p>Tesla cars allow the company to extract data remotely and
+ determine the car's location at any time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>injustice, too.</p>
</li>
<li id="M202106030">
@@ -1549,25 +1722,46 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/">TikTok
- apps collect biometric identifiers and biometric</em></ins></span>
information <span class="removed"><del><strong>about how
- people use it</a>.</p>
-
- <p>The company's statement that</strong></del></span> <span
class="inserted"><ins><em>from
- users' smartphones</a>. The company behind</em></ins></span> it
<span class="removed"><del><strong>anonymizes the data may be
- true, but</strong></del></span> <span class="inserted"><ins><em>does
whatever</em></ins></span> it <span class="removed"><del><strong>doesn't really
matter. If</strong></del></span> <span class="inserted"><ins><em>wants
- and collects whatever data</em></ins></span> it <span
class="removed"><del><strong>sells the</strong></del></span> <span
class="inserted"><ins><em>can.</p>
+ apps collect biometric identifiers</em></ins></span> and <span
class="removed"><del><strong>c.</a>).</strong></del></span> <span
class="inserted"><ins><em>biometric information from
+ users' smartphones</a>.</em></ins></span> The company <span
class="removed"><del><strong>says</strong></del></span> <span
class="inserted"><ins><em>behind</em></ins></span> it <span
class="removed"><del><strong>doesn't
+ store this information, but if the state orders</strong></del></span>
<span class="inserted"><ins><em>does whatever</em></ins></span> it <span
class="removed"><del><strong>to get the data</strong></del></span> <span
class="inserted"><ins><em>wants</em></ins></span>
+ and <span class="removed"><del><strong>hand</strong></del></span> <span
class="inserted"><ins><em>collects whatever data</em></ins></span> it <span
class="removed"><del><strong>over, the state can store
it.</p></strong></del></span> <span
class="inserted"><ins><em>can.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
- <li id="M202104060">
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure to place new items on top under each
subsection</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202104060">
<!--#set var="DATE" value='<small
class="date-tag">2021-04</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span>
+ <span class="inserted"><ins><em><p>The <a
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/">WeddingWire
- app saves people's wedding photos forever and hands over</em></ins></span>
data
- to <span class="removed"><del><strong>a
- data broker,</strong></del></span> <span
class="inserted"><ins><em>others</a>, giving users no control over their
personal
- information/data. The app also sometimes shows old photos and
- memories to users, without giving them any control over this
+ app saves people's wedding photos forever and hands over
data</em></ins></span>
+ to <span class="removed"><del><strong>spy on</strong></del></span> <span
class="inserted"><ins><em>others</a>, giving users no control
over</em></ins></span> their <span
class="removed"><del><strong>renters</a>.</p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+</div>
+
+<p>Emo Phillips made a joke:</strong></del></span> <span
class="inserted"><ins><em>personal
+ information/data.</em></ins></span> The <span
class="removed"><del><strong>other day a woman came up</strong></del></span>
<span class="inserted"><ins><em>app also sometimes shows old photos and
+ memories</em></ins></span> to <span
class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>users, without giving them any control over this
either.</p>
</li>
@@ -1577,232 +1771,170 @@
<p>Many cr…apps, developed by various
companies for various organizations, do <a
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth">
- location tracking unknown to those companies and those
- organizations</a>. It's actually some widely used libraries that do
- the tracking.</p>
+ location tracking unknown to those companies</em></ins></span> and
+<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I
+don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>those
+ organizations</a>. It's actually some widely used libraries that
do</em></ins></span>
+ the <span class="removed"><del><strong>other way.”
Evidently</strong></del></span> <span
class="inserted"><ins><em>tracking.</p>
- <p>What's unusual here is that proprietary software developer A
tricks
+ <p>What's unusual here is</em></ins></span> that <span
class="removed"><del><strong>was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li><p>More or less all “smart” TVs <a href="
+
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>proprietary software developer A tricks
proprietary software developers B1 … B50 into making platforms for
- A to mistreat</em></ins></span> the <span class="inserted"><ins><em>end
user.</p>
+ A to mistreat the end user.</p>
</li>
<li id="M202003260">
<!--#set var="DATE" value='<small
class="date-tag">2020-03</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The Apple iOS version of Zoom <a
+ --><!--#echo encoding="none" var="DATE" --></em></ins></span>
+ <p>The <span class="removed"><del><strong>report was
as</strong></del></span> <span class="inserted"><ins><em>Apple iOS
version</em></ins></span> of <span class="removed"><del><strong>2014, but we
don't expect this has got better.</p>
+
+ <p>This shows that laws requiring products to
get</strong></del></span> <span class="inserted"><ins><em>Zoom <a
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account">is
- sending users'</em></ins></span> data <span
class="removed"><del><strong>broker can figure out who</strong></del></span>
<span class="inserted"><ins><em>to Facebook</a> even if</em></ins></span>
the user <span class="removed"><del><strong>is.</p></strong></del></span>
<span class="inserted"><ins><em>doesn't have
- a Facebook account. According to the article, Zoom and Facebook
- don't even mention this surveillance on their privacy policy page,
- making this an obvious violation of people's privacy even in their
+ sending</em></ins></span> users' <span class="removed"><del><strong>formal
+ consent before collecting personal</strong></del></span> data <span
class="removed"><del><strong>are totally inadequate.
+ And what happens if a user declines consent? Probably the TV
+ will say, “Without your consent to tracking, the TV will
+ not work.”</p>
+
+ <p>Proper laws would say that TVs are not
allowed</strong></del></span> to <span class="removed"><del><strong>report
what</strong></del></span> <span class="inserted"><ins><em>Facebook</a>
even if</em></ins></span> the user <span class="removed"><del><strong>watches
— no exceptions!</p>
+ </li>
+ <li><p>Vizio goes</strong></del></span> <span
class="inserted"><ins><em>doesn't have</em></ins></span>
+ a <span class="removed"><del><strong>step further than other TV
manufacturers in spying</strong></del></span> <span
class="inserted"><ins><em>Facebook account. According to the article, Zoom and
Facebook
+ don't even mention this surveillance</em></ins></span> on their <span
class="removed"><del><strong>users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so that advertisers can track you
+ across devices.</p>
+
+ <p>It is possible to turn</strong></del></span> <span
class="inserted"><ins><em>privacy policy page,
+ making</em></ins></span> this <span class="removed"><del><strong>off, but
having it enabled by default
+ is</strong></del></span> an <span class="removed"><del><strong>injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>obvious violation of people's privacy even in their
own terms.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>A computerized
- vibrator</strong></del></span>
+ <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to</strong></del></span>
<span class="inserted"><ins><em><li id="M202003010">
<!--#set var="DATE" value='<small
class="date-tag">2020-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The Alipay Health Code app
- estimates whether the user has Covid-19 and</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops
- on its users through</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
- tells</em></ins></span> the <span class="removed"><del><strong>proprietary
control app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>cops directly</a>.</p>
+ estimates whether</em></ins></span> the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span class="inserted"><ins><em>user has
Covid-19 and <a
+
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
+ tells</em></ins></span> the <span class="removed"><del><strong>company
already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>cops directly</a>.</p>
</li>
<li id="M202001290">
<!--#set var="DATE" value='<small
class="date-tag">2020-01</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p>The <span class="inserted"><ins><em>Amazon Ring</em></ins></span>
app <span class="removed"><del><strong>reports</strong></del></span> <span
class="inserted"><ins><em>does <a
-
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
- surveillance for other companies as well as for Amazon</a>.</p>
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The Amazon Ring app does</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all users to
+ new combined</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"></em></ins></span>
+ surveillance <span class="removed"><del><strong>by
default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible sounds to be
+ picked up by proprietary malware running on</strong></del></span> <span
class="inserted"><ins><em>for</em></ins></span> other <span
class="removed"><del><strong>devices in
+ range so</strong></del></span> <span
class="inserted"><ins><em>companies</em></ins></span> as <span
class="removed"><del><strong>to determine that they are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads with Web activity, and
+ other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>well as for
Amazon</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and
+ <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people are watching</a>,
+ even if it isn't</strong></del></span>
- <li id="M201912220">
+ <span class="inserted"><ins><em><li id="M201912220">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The ToToc messaging app seems to be a <a
-
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
- spying tool for</em></ins></span> the <span
class="removed"><del><strong>temperature</strong></del></span> <span
class="inserted"><ins><em>government</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether it is surrounded by a person's
- body),</strong></del></span> <span class="inserted"><ins><em>United Arab
Emirates</a>.
- Any nonfree program could be doing this,</em></ins></span> and <span
class="removed"><del><strong>the vibration frequency.</p>
-
- <p>Note the totally inadequate proposed
response:</strong></del></span> <span class="inserted"><ins><em>that
is</em></ins></span> a <span class="removed"><del><strong>labeling
- standard with which manufacturers would make statements about
- their products, rather than</strong></del></span> <span
class="inserted"><ins><em>good
- reason to use</em></ins></span> free software <span
class="removed"><del><strong>which users can check
- and change.</p></strong></del></span> <span
class="inserted"><ins><em>instead.</p>
+ <p>The ToToc messaging app seems to be</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p>
+ </li>
+ <li><p>The Amazon “Smart” TV</strong></del></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching and listening all</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
+ spying tool for</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+ </li>
+ <li><p>The Samsung “Smart” TV
+ <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span> <span
class="inserted"><ins><em>government of</em></ins></span> the <span
class="removed"><del><strong>internet to another
+ company, Nuance</a>. Nuance can save it</strong></del></span> <span
class="inserted"><ins><em>United Arab Emirates</a>.
+ Any nonfree program could be doing this,</em></ins></span> and <span
class="removed"><del><strong>would then have to
+ give it to the US or some other government.</p>
+ <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>a good
+ reason</em></ins></span> to <span class="removed"><del><strong>be trusted
unless it is done
+ by</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> free software <span
class="inserted"><ins><em>instead.</p>
- <p><small>Note: this article uses the word “free”
in
- the sense of
“gratis.”</small></p></em></ins></span>
+ <p><small>Note: this article uses the word
“free”</em></ins></span> in <span class="removed"><del><strong>your
own computer.</p></strong></del></span>
+ <span class="inserted"><ins><em>the sense of
“gratis.”</small></p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
+ <span class="removed"><del><strong><li><p>Spyware
in</strong></del></span>
<span class="inserted"><ins><em><li id="M201912090">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>iMonsters and Android phones,
- when used for work, give employers powerful</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy</strong></del></span>
+ when used for work, give employers powerful</em></ins></span> <a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a> reports what the user
watches,</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
- snooping and sabotage capabilities</a> if they install their own
- software</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>the device. Many employers demand to do this. For
the
- employee, this is simply nonfree software, as fundamentally
unjust</em></ins></span>
- and <span
class="removed"><del><strong>adults.</a>.</p></strong></del></span>
<span class="inserted"><ins><em>as dangerous as any other nonfree
software.</p></em></ins></span>
+ snooping</em></ins></span> and <span class="inserted"><ins><em>sabotage
capabilities</a> if they install their own
+ software on</em></ins></span> the <span
class="removed"><del><strong>switch</strong></del></span> <span
class="inserted"><ins><em>device. Many employers demand</em></ins></span> to
<span class="removed"><del><strong>turn this off has no effect. (The fact that
the
+ transmission reports a 404 error really means
nothing;</strong></del></span> <span class="inserted"><ins><em>do this.
For</em></ins></span> the <span
class="removed"><del><strong>server</strong></del></span>
+ <span class="inserted"><ins><em>employee, this is simply nonfree software,
as fundamentally unjust
+ and as dangerous as any other nonfree software.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareAtLowLevel</strong></del></span>
- <span class="inserted"><ins><em><li id="M201910130">
+ <li id="M201910130">
<!--#set var="DATE" value='<small
class="date-tag">2019-10</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>The Chinese Communist Party's
“Study
- the Great Nation” app requires users</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
-
-<ul>
-<li><p></strong></del></span> <span
class="inserted"><ins><em>grant it</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The Chinese Communist Party's “Study
+ the Great Nation” app requires users to grant it <a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
access to the phone's microphone, photos, text messages, contacts, and
- internet history</a>,</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows installs.
-Note that</strong></del></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>Android
version was found to contain</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows
install</strong></del></span>
- <span class="inserted"><ins><em>back-door allowing developers to run any
code they wish in the users'
+ internet history</a>, and the Android version was found to contain a
+ back-door allowing developers to run any code they wish in the users'
phone, as “superusers.” Downloading and using this
- app</em></ins></span> is <span class="removed"><del><strong>not really
-clean since</strong></del></span> <span class="inserted"><ins><em>mandatory at
some workplaces.</p>
+ app is mandatory at some workplaces.</p>
- <p>Note: The</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span>
- <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ <p>Note: The <a
+
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
Washington Post version of the article</a> (partly obfuscated, but
- readable after copy-pasting</em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items</strong></del></span> <span
class="inserted"><ins><em>a text editor) includes a clarification
- saying that the tests were only performed</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it can collect</strong></del></span> the <span
class="removed"><del><strong>emails of members</strong></del></span> <span
class="inserted"><ins><em>Android version</em></ins></span>
- of <span class="removed"><del><strong>Parliament
- this way, because they pass it through Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware in Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype
- <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
- </li>
-</ul>
-
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>the app, and that, according</em></ins></span> to
<span class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>Apple, “this kind of
- ‘superuser’ surveillance could not be
conducted</em></ins></span> on <span class="removed"><del><strong>top under
each subsection</strong></del></span>
- <span class="inserted"><ins><em>Apple's operating system.”</p>
+ readable after copy-pasting in a text editor) includes a clarification
+ saying that the tests were only performed on the Android version
+ of the app, and that, according to Apple, “this kind of
+ ‘superuser’ surveillance</em></ins></span> could <span
class="removed"><del><strong>save</strong></del></span> <span
class="inserted"><ins><em>not be conducted on
+ Apple's operating system.”</p>
</li>
<li id="M201909091">
<!--#set var="DATE" value='<small
class="date-tag">2019-09</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
-
-<ul>
- <li></strong></del></span>
- <p>The <span class="removed"><del><strong>Nest Cam
“smart” camera is</strong></del></span> <span
class="inserted"><ins><em>Facebook app</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks users</em></ins></span> even when <span
class="removed"><del><strong>the “owner”
switches</strong></del></span> it <span
class="removed"><del><strong>“off.”</p>
- <p>A “smart” device means the
manufacturer</strong></del></span> is <span class="removed"><del><strong>using
it</strong></del></span> <span class="inserted"><ins><em>turned off</a>,
after tricking them
- into giving the app broad permissions in order</em></ins></span> to <span
class="removed"><del><strong>outsmart
- you.</p></strong></del></span> <span class="inserted"><ins><em>use
one of its
- functionalities.</p></em></ins></span>
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The Facebook app <a
+
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
+ tracks users even when it is turned off</a>, after tricking them
+ into giving the app broad permissions in order to use one of its
+ functionalities.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-
-<ul>
- <li><p>E-books can contain Javascript code,</strong></del></span>
- <span class="inserted"><ins><em><li id="M201909090">
+ <li id="M201909090">
<!--#set var="DATE" value='<small
class="date-tag">2019-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some nonfree period-tracking apps including MIA
Fem</em></ins></span> and <span
class="inserted"><ins><em>Maya</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
- send intimate details of users' lives to
Facebook</a>.</p></em></ins></span>
+ <p>Some nonfree period-tracking apps including MIA Fem and Maya <a
+
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
+ send intimate details of users' lives to Facebook</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware in many
e-readers—not only</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201909060">
+ <li id="M201909060">
<!--#set var="DATE" value='<small
class="date-tag">2019-09</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Keeping track of who downloads a proprietary
program is a form of surveillance. There is a
proprietary program for adjusting a certain telescopic rifle sight. <a
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
- A US prosecutor has demanded</em></ins></span> the
- <span class="removed"><del><strong>Kindle:</strong></del></span> <span
class="inserted"><ins><em>list of all the 10,000 or more people
+ A US prosecutor has demanded the list of all the 10,000 or more people
who have installed it</a>.</p>
<p>With a free program there would not be a list of who has installed
@@ -1812,115 +1944,86 @@
<li id="M201907081">
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many unscrupulous mobile-app developers keep finding ways
to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ <p>Many unscrupulous mobile-app developers keep finding ways to <a
+
href="https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
bypass user's settings</a>, regulations, and privacy-enhancing
features
- of the operating system, in order to gather as much private data
as</em></ins></span>
- they <span class="removed"><del><strong>report even which
page</strong></del></span> <span class="inserted"><ins><em>possibly
can.</p>
+ of the operating system, in order to gather as much private data as
+ they possibly can.</p>
<p>Thus, we can't trust rules against spying. What we can trust is
- having control over</em></ins></span> the <span
class="removed"><del><strong>user reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>software we run.</p></em></ins></span>
+ having control over the software we run.</p>
</li>
- <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,”</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201907080">
+ <li id="M201907080">
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many Android apps can track
- users' movements even when</em></ins></span> the <span
class="removed"><del><strong>e-reader used
- by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>user says</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
- needed</strong></del></span> <span class="inserted"><ins><em>allow them
access</em></ins></span> to <span class="removed"><del><strong>check
DRM!</p>
- </li>
-</ul>
+ users' movements even when the user says <a
+
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not to allow them access to locations</a>.</p>
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware</strong></del></span> <span
class="inserted"><ins><em>locations</a>.</p>
-
- <p>This involves an apparently unintentional
weakness</em></ins></span> in <span
class="removed"><del><strong>Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
-
-<ul>
-<li><p>Computerized cars with nonfree software
are</strong></del></span> <span class="inserted"><ins><em>Android,
+ <p>This involves an apparently unintentional weakness in Android,
exploited intentionally by malicious apps.</p>
</li>
<li id="M201905300">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Femm “fertility” app is secretly
a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
+ <p>The Femm “fertility” app is secretly a <a
+
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
<p>It snoops on users, too, as you must expect from nonfree
- programs.</p></em></ins></span>
+ programs.</p>
</li>
- <span class="removed"><del><strong><li><p>The Nissan Leaf
has</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905060">
+ <li id="M201905060">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>BlizzCon 2019 imposed</em></ins></span> a <span
class="removed"><del><strong>built-in cell</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>BlizzCon 2019 imposed a <a
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement to run a proprietary</em></ins></span> phone <span
class="removed"><del><strong>modem which allows
- effectively
- anyone</strong></del></span> <span class="inserted"><ins><em>app</a>
to be allowed into
+ requirement to run a proprietary phone app</a> to be allowed into
the event.</p>
- <p>This app is a spyware that can snoop on a lot of
- sensitive data, including user's location and contact list, and
has</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely</strong></del></span>
- <span
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ <p>This app is a spyware</em></ins></span> that <span
class="inserted"><ins><em>can snoop on a lot of
+ sensitive data, including user's location and contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
near-complete control</a> over the phone.</p>
</li>
<li id="M201904131">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Data collected by menstrual</em></ins></span> and <span
class="removed"><del><strong>make changes in various
- settings</a>.</p>
-
- <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>pregnancy monitoring apps is often <a
+ <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available</em></ins></span> to <span class="removed"><del><strong>do
because</strong></del></span> <span class="inserted"><ins><em>employers and
insurance companies</a>. Even though</em></ins></span> the <span
class="removed"><del><strong>system has no authentication when
- accessed through</strong></del></span>
- <span class="inserted"><ins><em>data is “anonymized and
aggregated,” it can easily be
- traced back to</em></ins></span> the <span
class="removed"><del><strong>modem. However,</strong></del></span> <span
class="inserted"><ins><em>woman who uses the app.</p>
+ available to employers and insurance companies</a>. Even though
the</em></ins></span>
+ data <span class="removed"><del><strong>anyway.)</p>
+
+ <p>Even worse,</strong></del></span> <span
class="inserted"><ins><em>is “anonymized and
aggregated,”</em></ins></span> it <span class="inserted"><ins><em>can
easily be
+ traced back to the woman who uses the app.</p>
<p>This has harmful implications for women's rights to equal
employment
and freedom to make their own pregnancy choices. Don't use
- these apps,</em></ins></span> even if <span
class="removed"><del><strong>it asked for
- authentication,</strong></del></span> <span
class="inserted"><ins><em>someone offers</em></ins></span> you <span
class="removed"><del><strong>couldn't be confident</strong></del></span> <span
class="inserted"><ins><em>a reward to do so. A
- free-software app</em></ins></span> that <span
class="removed"><del><strong>Nissan has no
- access. The software in</strong></del></span> <span
class="inserted"><ins><em>does more or less</em></ins></span> the <span
class="removed"><del><strong>car</strong></del></span> <span
class="inserted"><ins><em>same thing without
- spying on you</em></ins></span> is
- <span class="removed"><del><strong>proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith</strong></del></span> <span
class="inserted"><ins><em>available</em></ins></span> from <span
class="removed"><del><strong>its users</a>.</p>
-
- <p>Even if no</strong></del></span> <span
class="inserted"><ins><em><a
- href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
+ these apps, even if someone offers you a reward to do so. A
+ free-software app that does more or less the same thing without
+ spying on you is available from</em></ins></span> <a <span
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,
and <a
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
- a new</em></ins></span> one <span class="removed"><del><strong>connects
to</strong></del></span> <span class="inserted"><ins><em>is being
developed</a>.</p>
+ a new one is being developed</a>.</p>
</li>
<li id="M201904130">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google tracks</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>movements of Android phones and iPhones
+ <p>Google tracks the movements of Android phones and iPhones
running Google apps, and sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves</em></ins></span> the <span class="removed"><del><strong>cell phone
- modem enables</strong></del></span> <span class="inserted"><ins><em>data
for years</a>.</p>
+ saves the data for years</a>.</p>
- <p>Nonfree software in</em></ins></span> the phone <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>has</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>be responsible for sending</em></ins></span>
- the <span class="removed"><del><strong>car's movements
all</strong></del></span> <span class="inserted"><ins><em>location data to
Google.</p>
+ <p>Nonfree software in the phone has to be responsible for sending
+ the location data to Google.</p>
</li>
<li id="M201903251">
@@ -1929,26 +2032,18 @@
<p>Many Android phones come with a huge number of <a
href="https://web.archive.org/web/20190326145122/https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
preinstalled nonfree apps that have access to sensitive data without
- users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
- the <span class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>data, or pass</em></ins></span> it <span
class="removed"><del><strong>is possible</strong></del></span> <span
class="inserted"><ins><em>on to user-installed apps that have
access</em></ins></span> to <span class="removed"><del><strong>physically
remove</strong></del></span>
- the <span class="removed"><del><strong>cell phone modem
- though.</p>
- </li>
-
- <li><p>Proprietary software</strong></del></span> <span
class="inserted"><ins><em>network but no direct access to the data. This
results</em></ins></span> in <span class="removed"><del><strong>cars
- <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,</strong></del></span> <span
class="inserted"><ins><em>massive
- surveillance on</em></ins></span> which <span
class="inserted"><ins><em>the user has absolutely no control.</p>
+ users' knowledge</a>. These hidden apps may either call home with
+ the data, or pass it</em></ins></span> on <span
class="inserted"><ins><em>to user-installed apps that have access to
+ the network but no direct access to the data. This results in massive
+ surveillance on which the user has absolutely no control.</p>
</li>
<li id="M201903211">
<!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The MoviePass dis-service <a
-
href="https://www.cnet.com/culture/entertainment/moviepass-founder-wants-to-use-facial-recognition-to-score-you-free-movies/"></em></ins></span>
- is <span class="removed"><del><strong>made available</strong></del></span>
<span class="inserted"><ins><em>planning</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
- others.</p>
-
- <p>The case</strong></del></span> <span
class="inserted"><ins><em>use face recognition to track people's eyes</a>
+
href="https://www.cnet.com/culture/entertainment/moviepass-founder-wants-to-use-facial-recognition-to-score-you-free-movies/">
+ is planning to use face recognition to track people's eyes</a>
to make sure they won't put their phones down or look away during
ads—and trackers.</p>
</li>
@@ -1956,50 +2051,50 @@
<li id="M201903201">
<!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A study</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span class="inserted"><ins><em>24
“health” apps found that 19 of them <a
+ <p>A study of 24 “health” apps found that 19 of them
<a
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
send sensitive personal data to third parties</a>, which can use it
- for invasive advertising or discriminating against
people</em></ins></span> in <span class="removed"><del><strong>this
article,</strong></del></span> <span class="inserted"><ins><em>poor
+ for invasive advertising or discriminating against people in poor
medical condition.</p>
<p>Whenever user “consent” is sought, it is buried in
lengthy terms of service that are difficult to understand. In any case,
- “consent”</em></ins></span> is not
- <span class="removed"><del><strong>really</strong></del></span> <span
class="inserted"><ins><em>sufficient to legitimize snooping.</p>
+ “consent” is not sufficient to legitimize snooping.</p>
</li>
<li id="M201902230">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Facebook offered</em></ins></span> a <span
class="removed"><del><strong>matter of</strong></del></span> <span
class="inserted"><ins><em>convenient</em></ins></span> proprietary <span
class="removed"><del><strong>surveillance. These systems are an
- intolerable invasion of privacy,</strong></del></span>
- <span class="inserted"><ins><em>library for building mobile apps, which
also <a
+ <p>Facebook offered a convenient proprietary
+ library for building mobile apps, which also <a
href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
sent personal data to Facebook</a>. Lots of companies built apps that
way and released them, apparently not realizing that all the personal
data they collected would go to Facebook as well.</p>
<p>It shows that no one can trust a nonfree program, not even the
- developers of other nonfree programs.</p>
+ developers of</em></ins></span> other <span
class="removed"><del><strong>devices</strong></del></span> <span
class="inserted"><ins><em>nonfree programs.</p>
</li>
<li id="M201902140">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The AppCensus database gives information on <a
+ <p>The AppCensus database gives information</em></ins></span> on
<span class="inserted"><ins><em><a
href="https://www.appcensus.io/"> how Android apps use and
misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
+ 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span class="removed"><del><strong>user's local
network.</a></p>
+
+ <p>LG later said</strong></del></span> <span
class="inserted"><ins><em><a
href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies,</em></ins></span> and <span
class="inserted"><ins><em><a
+ Advertising ID</a> to other companies, and <a
href="https://blog.appcensus.io/2019/02/14/ad-ids-behaving-badly/">
18,000 (23% of the total) link this ID to hardware identifiers</a>,
so that users cannot escape tracking by resetting it.</p>
<p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But it seems that Google wasn't aware of it,
+ Google's policies. But</em></ins></span> it <span
class="removed"><del><strong>had installed</strong></del></span> <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
and, once informed, was in no hurry to take action. This proves
- that the policies of a development platform are ineffective at
+ that the policies of</em></ins></span> a <span
class="removed"><del><strong>patch</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
preventing nonfree software developers from including malware in
their programs.</p>
</li>
@@ -2015,8 +2110,8 @@
<li id="M201902041.1">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Twenty nine “beauty camera” apps that used to
- be on Google Play had one or more malicious functionalities, such as <a
+ <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>stop
this,</strong></del></span>
+ <span class="inserted"><ins><em>be on Google Play had one or more
malicious functionalities, such as <a
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
stealing users' photos</a> instead of “beautifying” them,
pushing unwanted and often malicious ads on users, and redirecting
@@ -2024,8 +2119,8 @@
the user interface of most of them was designed to make uninstallation
difficult.</p>
- <p>Users</em></ins></span> should <span class="inserted"><ins><em>of
course uninstall these dangerous apps if they
- haven't yet, but they should also stay away from nonfree apps in
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet,</em></ins></span> but <span class="removed"><del><strong>any
product</strong></del></span> <span class="inserted"><ins><em>they should also
stay away from nonfree apps in
general. <em>All</em> nonfree apps carry a potential risk
because
there is no easy way of knowing what they really do.</p>
</li>
@@ -2038,8 +2133,10 @@
href="https://www.top10vpn.com/research/free-vpn-investigations/risk-index/">
25% fail to protect their users' privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
- source code—often used for invasive advertising—that could
- potentially also</em></ins></span> be <span
class="removed"><del><strong>replaced</strong></del></span> <span
class="inserted"><ins><em>used to spy on users. Other technical flaws were
+ source code—often used for invasive
advertising—that</em></ins></span> could
+ <span class="inserted"><ins><em>potentially also be used
to</em></ins></span> spy <span class="removed"><del><strong>this way.</p>
+
+ <p>Meanwhile, LG TVs</strong></del></span> <span
class="inserted"><ins><em>on users. Other technical flaws were
found as well.</p>
<p>Moreover, a previous investigation had found that <a
@@ -2054,12 +2151,11 @@
<li id="M201901050">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Weather Channel app <a
-
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ <p>The Weather Channel app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
stored users' locations to the company's server</a>. The company is
- being sued, demanding that it notify the users of what it will
do</em></ins></span>
- with <span class="removed"><del><strong>anonymous
- payment systems,</strong></del></span> <span
class="inserted"><ins><em>the data.</p>
+ being sued, demanding that it notify the users of what it
will</em></ins></span> do <span
class="removed"><del><strong>lots</strong></del></span>
+ <span class="inserted"><ins><em>with the data.</p>
<p>We think that lawsuit is about a side issue. What the company does
with the data is a secondary issue. The principal wrong here is that
@@ -2074,7 +2170,7 @@
<li id="M201812290">
<!--#set var="DATE" value='<small
class="date-tag">2018-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Around 40% of gratis Android apps <a
+ <p>Around 40%</em></ins></span> of <span
class="inserted"><ins><em>gratis Android apps <a
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
report on the user's actions to Facebook</a>.</p>
@@ -2082,9 +2178,9 @@
Facebook can correlate the data it obtains from the same machine via
various apps. Some of them send Facebook detailed information about
the user's activities in the app; others only say that the user is
- using that app,</em></ins></span> but <span class="inserted"><ins><em>that
alone is often quite informative.</p>
+ using that app, but that alone is often quite informative.</p>
- <p>This spying occurs regardless of whether</em></ins></span> the
<span class="removed"><del><strong>invasion isn't done</strong></del></span>
<span class="inserted"><ins><em>user has a Facebook
+ <p>This</em></ins></span> spying <span
class="removed"><del><strong>anyway</a>.</p></strong></del></span>
<span class="inserted"><ins><em>occurs regardless of whether the user has a
Facebook
account.</p>
</li>
@@ -2105,7 +2201,7 @@
tracking”</a>.</p>
<p>There are other ways to turn off the other kinds of location
- tracking, but most users will be tricked</em></ins></span> by <span
class="removed"><del><strong>malware.</strong></del></span> <span
class="inserted"><ins><em>the misleading control.</p>
+ tracking, but most users will be tricked by the misleading
control.</p>
</li>
<li id="M201806110">
@@ -2133,8 +2229,7 @@
and collect information about its users</a>. 40% of the apps were
found to insecurely snitch on its users. Furthermore, they could
detect only some methods of snooping, in these proprietary apps whose
- source code they cannot look at.</em></ins></span> The other
- <span class="removed"><del><strong>cases mentioned</strong></del></span>
<span class="inserted"><ins><em>apps might be snooping
+ source code they cannot look at. The other apps might be snooping
in other ways.</p>
<p>This is evidence that proprietary apps generally work against
@@ -2177,12 +2272,13 @@
<p>Spotify app <a
href="https://www.sec.gov/Archives/edgar/data/1639920/000119312518063434/d494294df1.htm">harvests
users' data to personally identify and know people</a> through music,
- their mood, mindset, activities, and tastes. There</em></ins></span> are
<span class="inserted"><ins><em>over 150
+ their mood, mindset, activities, and tastes. There are over 150
billion events logged daily on the program which contains users'
- data and personal information.</p>
+ data and personal information.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li></strong></del></span>
- <li id="M201711240">
+ <span class="inserted"><ins><em><li id="M201711240">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Tracking software in popular Android apps
@@ -2194,9 +2290,9 @@
<li id="M201709020">
<!--#set var="DATE" value='<small
class="date-tag">2017-09</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
-
href="https://old.reddit.com/r/Instagram/comments/6xkhi8/ig_suddenly_asking_for_phone_number_not_visible/">Instagram
+ --><!--#echo encoding="none" var="DATE" --></em></ins></span>
+ <p><a <span
class="removed"><del><strong>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://old.reddit.com/r/Instagram/comments/6xkhi8/ig_suddenly_asking_for_phone_number_not_visible/">Instagram
is forcing users to give away their phone numbers</a> and won't let
people continue using the app if they refuse.</p>
</li>
@@ -2232,7 +2328,7 @@
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google have</em></ins></span> done <span
class="inserted"><ins><em>a better job of preventing apps from
+ <p>Could Google have done a better job of preventing apps from
cheating? There is no systematic way for Google, or Android users,
to inspect executable proprietary apps to see what they do.</p>
@@ -2263,10 +2359,10 @@
<li id="M201705040">
<!--#set var="DATE" value='<small
class="date-tag">2017-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A study found 234 Android apps that track users</em></ins></span>
by <span class="inserted"><ins><em><a
+ <p>A study found 234 Android apps that track users by <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
- programs</a>.</p>
+ to ultrasound from beacons placed in stores or played by</em></ins></span>
TV <span class="removed"><del><strong>snoops</strong></del></span>
+ <span class="inserted"><ins><em>programs</a>.</p>
</li>
<li id="M201704260">
@@ -2307,7 +2403,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in</em></ins></span> proprietary <span
class="removed"><del><strong>malware</strong></del></span> <span
class="inserted"><ins><em>search app that it will</a> pre-install
+ announced an opt-in proprietary search app that it will</a>
pre-install
on some of its phones. The app will give Verizon the same information
about the users' searches that Google normally gets when they use
its search engine.</p>
@@ -2402,13 +2498,11 @@
<p>Facebook's new Magic Photo app <a
href="https://www.theregister.com/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections for known faces</a>,
- and suggests you circulate the picture you take according to who
is</em></ins></span>
- in the <span class="removed"><del><strong>car.</p></li>
-
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>frame.</p>
+ and suggests you circulate the picture you take according to who is
+ in the frame.</p>
<p>This spyware feature seems to require online access to some
- known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>pictures are likely</em></ins></span> to <span
class="removed"><del><strong>extract</strong></del></span> <span
class="inserted"><ins><em>be
+ known-faces database, which means the pictures are likely to be
sent across the wire to Facebook's servers and face-recognition
algorithms.</p>
@@ -2421,7 +2515,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Facebook's app listens all the time, <a
href="https://www.independent.co.uk/tech/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
- snoop on what people are listening to or watching</a>. In addition,
+ snoop</em></ins></span> on what <span
class="removed"><del><strong>programs</strong></del></span> people <span
class="removed"><del><strong>watch,</strong></del></span> <span
class="inserted"><ins><em>are listening to or watching</a>. In addition,
it may be analyzing people's conversations to serve them with targeted
advertisements.</p>
</li>
@@ -2431,8 +2525,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A pregnancy test controller application not only can <a
href="https://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts of</em></ins></span> data <span
class="removed"><del><strong>remotely</strong></del></span> <span
class="inserted"><ins><em>in the phone,</em></ins></span> and
- <span class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>in server accounts,
+ spy on many sorts of data in the phone,</em></ins></span> and <span
class="removed"><del><strong>even</strong></del></span> <span
class="inserted"><ins><em>in server accounts,
it can alter them too</a>.</p>
</li>
@@ -2450,7 +2543,7 @@
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>“Cryptic communication,”
- unrelated to</em></ins></span> the <span
class="removed"><del><strong>car's</strong></del></span> <span
class="inserted"><ins><em>app's functionality, was <a
+ unrelated to the app's functionality, was <a
href="https://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
found in the 500 most popular gratis Android apps</a>.</p>
@@ -2460,7 +2553,7 @@
<p>The article takes for granted that the usual analytics tools are
legitimate, but is that valid? Software developers have no right to
- analyze what users are doing or how. “Analytics” tools
+ analyze</em></ins></span> what <span class="inserted"><ins><em>users are
doing or how. “Analytics” tools
that snoop are just as wrong as any other snooping.</p>
</li>
@@ -2469,7 +2562,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>More than 73% and 47% of mobile applications, for Android and iOS
respectively <a href="https://techscience.org/a/2015103001/">hand
over
- personal, behavioral and</em></ins></span> location <span
class="inserted"><ins><em>information</a> of their users to
+ personal, behavioral and location information</a> of their users to
third parties.</p>
</li>
@@ -2484,18 +2577,23 @@
<p>This article shows the <a
href="https://www.theregister.com/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way to “serve”
+ twisted ways that</em></ins></span> they <span
class="removed"><del><strong>wanted</strong></del></span> <span
class="inserted"><ins><em>present snooping as a way</em></ins></span> to <span
class="removed"><del><strong>record.</a></p></strong></del></span>
<span class="inserted"><ins><em>“serve”
users better</a>—never mind whether they want that. This is a
typical example of the attitude of the proprietary software industry
towards those they have subjugated.</p>
- <p>Out, out, damned Spotify!</p>
+ <p>Out, out, damned Spotify!</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201506264">
+<!-- #SpywareAtPlay</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201506264">
<!--#set var="DATE" value='<small
class="date-tag">2015-06</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p><a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareAtPlay">Spyware</strong></del></span>
+ <span class="inserted"><ins><em><p><a
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf">
A study in 2015</a> found that 90% of the top-ranked gratis
proprietary
Android apps contained recognizable tracking libraries. For the paid
@@ -2537,7 +2635,7 @@
<p>Many proprietary apps for mobile devices
report which other apps the user has installed. <a
href="https://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that</em></ins></span> at <span
class="inserted"><ins><em>least is visible and optional</a>. Not
+ is doing this in a way that</em></ins></span> at <span
class="removed"><del><strong>Play</h3></strong></del></span> <span
class="inserted"><ins><em>least is visible and optional</a>. Not
as bad as what the others do.</p>
</li>
@@ -2570,27 +2668,26 @@
approve sending personal data to the app developer but did not ask
about sending it to other companies. This shows the weakness of
the reject-it-if-you-dislike-snooping “solution” to
- surveillance: why should a flashlight app send</em></ins></span> any <span
class="removed"><del><strong>time. (See</strong></del></span> <span
class="inserted"><ins><em>information to
+ surveillance: why should a flashlight app send any information to
anyone? A free software flashlight app would not.</p>
</li>
<li id="M201212100">
<!--#set var="DATE" value='<small
class="date-tag">2012-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>FTC says most mobile apps for children don't respect
privacy:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+ <p>FTC says most mobile apps for children don't respect privacy:
<a
+
href="https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInSkype">Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+ <h4 id="SpywareInSkype">Skype</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtPlay">#SpywareAtPlay</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInSkype">#SpywareInSkype</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201908151">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -2610,10 +2707,13 @@
href="https://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
specifically for spying</a>.</p>
</li>
-</ul>
+</ul></em></ins></span>
-<div class="big-subsection">
+<div <span class="removed"><del><strong>style="clear: left;"></div>
+
+<ul>
+ <li><p>Many</strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
<h4 id="SpywareInGames">Games</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
</div>
@@ -2626,15 +2726,14 @@
surveillance on the game of Minecraft by <a
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
every player to open an account on Microsoft's network</a>. Microsoft
- has bought the game</em></ins></span> and <span
class="removed"><del><strong>c.</a>).</strong></del></span> <span
class="inserted"><ins><em>will merge all accounts into its network,
+ has bought the game and will merge all accounts into its network,
which will give them access to people's data.</p>
<p>Minecraft players <a
href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
- instead.</em></ins></span> The <span class="removed"><del><strong>company
says</strong></del></span> <span class="inserted"><ins><em>essential advantage
of Minetest is that</em></ins></span> it <span
class="removed"><del><strong>doesn't
- store this information, but if</strong></del></span> <span
class="inserted"><ins><em>is free
- software, meaning it respects</em></ins></span> the <span
class="removed"><del><strong>state orders</strong></del></span> <span
class="inserted"><ins><em>user's computer freedom. As a bonus,</em></ins></span>
- it <span class="inserted"><ins><em>offers more options.</p>
+ instead. The essential advantage of Minetest is that it is free
+ software, meaning it respects the user's computer freedom. As a bonus,
+ it offers more options.</p>
</li>
<li id="M201908210">
@@ -2642,7 +2741,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Microsoft recorded users of Xboxes and had <a
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
- human workers listen</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> the <span
class="inserted"><ins><em>recordings</a>.</p>
+ human workers listen to the recordings</a>.</p>
<p>Morally, we see no difference between having human workers listen
and
having speech-recognition systems listen. Both intrude on
privacy.</p>
@@ -2654,14 +2753,14 @@
<p>Red Shell is a spyware that
is found in many proprietary games. It <a
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks</em></ins></span> data <span class="inserted"><ins><em>on users'
computers</em></ins></span> and <span
class="removed"><del><strong>hand</strong></del></span> <span
class="inserted"><ins><em>sends</em></ins></span> it <span
class="removed"><del><strong>over,</strong></del></span> <span
class="inserted"><ins><em>to third parties</a>.</p>
+ tracks data on users' computers and sends it to third
parties</a>.</p>
</li>
<li id="M201804144">
<!--#set var="DATE" value='<small
class="date-tag">2018-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>ArenaNet surreptitiously installed a spyware
- program along with an update to</em></ins></span> the <span
class="removed"><del><strong>state</strong></del></span> <span
class="inserted"><ins><em>massive
+ program along with an update to the massive
multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
href="https://techraptor.net/gaming/news/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
to snoop on all open processes running on its user's
computer</a>.</p>
@@ -2670,8 +2769,8 @@
<li id="M201711070">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The driver for a certain gaming keyboard <a
-
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
+ <p>The driver for a certain gaming keyboard</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information to China</a>.</p>
</li>
@@ -2679,19 +2778,22 @@
<!--#set var="DATE" value='<small
class="date-tag">2015-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many <a
-
href="https://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html">
+
href="https://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html"></em></ins></span>
video game consoles snoop on their users and report to the
- internet</a>—even what their users weigh.</p>
+ <span class="removed"><del><strong>internet</a>—
even</strong></del></span>
+ <span
class="inserted"><ins><em>internet</a>—even</em></ins></span> what
their users weigh.</p>
<p>A game console is a computer, and you can't trust a computer with
a nonfree operating system.</p>
</li>
- <li id="M201509160">
+ <span
class="removed"><del><strong><li><p>Modern</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201509160">
<!--#set var="DATE" value='<small
class="date-tag">2015-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Modern gratis game cr…apps <a
-
href="https://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ <p>Modern</em></ins></span> gratis game cr…apps <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"></em></ins></span>
collect a wide range of data about their users and their users'
friends and associates</a>.</p>
@@ -2700,25 +2802,20 @@
companies.</p>
<p>They use this data to manipulate people to buy things, and hunt
for
- “whales” who</em></ins></span> can <span
class="removed"><del><strong>store it.</p></strong></del></span> <span
class="inserted"><ins><em>be led to spend a lot of money. They also
+ “whales” who can be led to spend a lot of money. They also
use a back door to manipulate the game play for specific players.</p>
<p>While the article describes gratis games, games that cost money
- can use the same tactics.</p></em></ins></span>
+ can use the same tactics.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareAtHome</strong></del></span>
<span class="inserted"><ins><em><li id="M201401280">
<!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>Angry Birds <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Angry Birds <a
href="https://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and the NSA takes advantage</em></ins></span>
- to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>spy through it
too</a>. Here's information</em></ins></span> on <span
class="removed"><del><strong>top under each subsection</strong></del></span>
<span class="inserted"><ins><em><a
+ spies for companies, and the NSA takes advantage
+ to spy through it too</a>. Here's information on <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
@@ -2729,29 +2826,27 @@
<li id="M200510200">
<!--#set var="DATE" value='<small
class="date-tag">2005-10</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
- <span class="inserted"><ins><em><p>Blizzard Warden is a hidden
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Blizzard Warden is a hidden
“cheating-prevention” program that <a
href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
spies on every process running on a gamer's computer and sniffs a
good deal of personal data</a>, including lots of activities which
have nothing to do with cheating.</p>
- </li>
-</ul></em></ins></span>
+ </li></em></ins></span>
+</ul>
+<span class="removed"><del><strong><!--
#SpywareOnTheWeb</strong></del></span>
-<div class="big-section">
- <h3 <span class="removed"><del><strong>id="SpywareAtHome">Spyware at
Home</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInEquipment">Spyware in Connected
Equipment</h3></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtHome">#SpywareAtHome</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
+
+<span class="inserted"><ins><em><div class="big-section">
+ <h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
</div>
<div style="clear: left;"></div>
-<span class="removed"><del><strong><ul>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202101050">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -2759,7 +2854,7 @@
href="https://foundation.mozilla.org/en/privacynotincluded/">“Privacy
Not Included”</a> list <a
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
- designed</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>users</a> even if they meet
+ designed to snoop on users</a> even if they meet
Mozilla's “Minimum Security Standards.” Insecure
design of the program running on some of these devices <a
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes
@@ -2769,21 +2864,21 @@
<li id="M201708280">
<!--#set var="DATE" value='<small
class="date-tag">2017-08</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The bad security in many Internet of Stings devices allows <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+ <span class="inserted"><ins><em><p>The bad security in many Internet
of Stings devices allows <a
href="https://www.techdirt.com/2017/08/28/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you/">ISPs
to snoop on the people that use them</a>.</p>
<p>Don't be a sucker—reject all the stings.</p>
<p><small>(It is unfortunate that the article uses the term
<a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p></em></ins></span>
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV</strong></del></span> <span
class="inserted"><ins><em>id="SpywareInTVSets">TV</em></ins></span>
Sets</h4>
+ <h4 id="SpywareInTVSets">TV Sets</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
@@ -2792,22 +2887,14 @@
don't know. You can't see out the other way.” Evidently that was
before Amazon “smart” TVs.</p>
-<span class="removed"><del><strong><ul>
- <li><p>More or less all “smart”
TVs</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202201290">
<!--#set var="DATE" value='<small
class="date-tag">2022-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>“Smart” TV producers</em></ins></span> <a <span
class="removed"><del><strong>href="
-
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2022/jan/29/what-your-smart-tv-knows-about-you-and-how-to-stop-it-harvesting-data">are
- spying</em></ins></span> on <span class="inserted"><ins><em>people using
various methods</a>, and harvest</em></ins></span> their <span
class="removed"><del><strong>users</a>.</p>
-
- <p>The report was as of 2014, but we don't expect this has got
better.</p>
-
- <p>This shows</strong></del></span>
- <span class="inserted"><ins><em>data. They are collecting audio, video,
and TV usage data to profile
+ <p>“Smart” TV producers <a
+
href="https://www.theguardian.com/technology/2022/jan/29/what-your-smart-tv-knows-about-you-and-how-to-stop-it-harvesting-data">are
+ spying on people using various methods</a>, and harvest their
+ data. They are collecting audio, video, and TV usage data to profile
people.</p>
</li>
@@ -2815,23 +2902,21 @@
<!--#set var="DATE" value='<small
class="date-tag">2020-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>TV manufacturers are turning to produce only
- “Smart” TV sets (which include spyware)</em></ins></span> that
<span class="removed"><del><strong>laws requiring
products</strong></del></span> <span class="inserted"><ins><em><a
+ “Smart” TV sets (which include spyware) that <a
href="https://frame.work/blog/in-defense-of-dumb-tvs">it's now very
- hard</em></ins></span> to <span class="removed"><del><strong>get users'
formal
- consent before collecting</strong></del></span> <span
class="inserted"><ins><em>find a TV that doesn't spy on you</a>.</p>
+ hard to find a TV that doesn't spy on you</a>.</p>
<p>It appears that those manufacturers business model is not to
produce
- TV and sell them for money, but to collect your</em></ins></span> personal
data <span class="inserted"><ins><em>and
+ TV and sell them for money, but to collect your personal data and
(possibly) hand over them to others for benefit.</p>
</li>
<li id="M202006250">
<!--#set var="DATE" value='<small
class="date-tag">2020-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>TV manufacturers</em></ins></span> are <span
class="removed"><del><strong>totally inadequate.
- And</strong></del></span> <span class="inserted"><ins><em>able to <a
+ <p>TV manufacturers are able to <a
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
- every second of</em></ins></span> what <span
class="removed"><del><strong>happens if a</strong></del></span> <span
class="inserted"><ins><em>the</em></ins></span> user <span
class="removed"><del><strong>declines consent? Probably</strong></del></span>
<span class="inserted"><ins><em>is watching</a>. This is illegal due to
+ every second of what the user is watching</a>. This is illegal due to
the Video Privacy Protection Act of 1988, but they're circumventing
it through EULAs.</p>
</li>
@@ -2841,25 +2926,21 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio TVs <a
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever</em></ins></span> the TV
- <span class="removed"><del><strong>will say, “Without your
consent</strong></del></span> <span
class="inserted"><ins><em>sees,”</a> in the own words of the
company's
- CTO, and this data is sold</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>third parties. This is in return for
+ collect “whatever the TV sees,”</a> in the own words of
the company's
+ CTO, and this data is sold to third parties. This is in return for
“better service” (meaning more intrusive ads?) and slightly
lower retail prices.</p>
<p>What is supposed to make this spying acceptable, according to him,
- is that it is opt-in in newer models. But since</em></ins></span> the
<span class="removed"><del><strong>TV</strong></del></span> <span
class="inserted"><ins><em>Vizio software is
+ is that it is opt-in in newer models. But since the Vizio software is
nonfree, we don't know what is actually happening behind the scenes,
- and there is no guarantee that all future updates</em></ins></span> will
- <span class="removed"><del><strong>not work.”</p>
-
- <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>leave the
+ and there is no guarantee that all future updates will leave the
settings unchanged.</p>
- <p>If you already own a Vizio “smart” TV (or any
“smart” TV, for</em></ins></span> that <span
class="removed"><del><strong>TVs are</strong></del></span>
- <span class="inserted"><ins><em>matter), the easiest way to make sure it
isn't spying on you is
+ <p>If you already own a Vizio “smart” TV (or any
“smart” TV, for that
+ matter), the easiest way to make sure it isn't spying on you is
to disconnect it from the Internet, and use a terrestrial antenna
- instead. Unfortunately, this is</em></ins></span> not <span
class="removed"><del><strong>allowed</strong></del></span> <span
class="inserted"><ins><em>always possible. Another option,
+ instead. Unfortunately, this is not always possible. Another option,
if you are technically oriented, is to get your own router (which can
be an old computer running completely free software), and set up a
firewall to block connections to Vizio's servers. Or, as a last resort,
@@ -2875,7 +2956,7 @@
<p>We link to the article for the facts it presents. It
is too bad that the article finishes by advocating the
- moral weakness of surrendering</em></ins></span> to <span
class="inserted"><ins><em>Netflix. The Netflix app <a
+ moral weakness of surrendering to Netflix. The Netflix app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
@@ -2884,16 +2965,15 @@
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio “smart” <a
-
href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs</em></ins></span>
- report <span class="inserted"><ins><em>everything that is viewed on them,
and not just broadcasts and
+
href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them, and not just broadcasts and
cable</a>. Even if the image is coming from the user's own computer,
- the TV reports</em></ins></span> what <span class="inserted"><ins><em>it
is. The existence of a way to disable</em></ins></span> the <span
class="removed"><del><strong>user watches — no
exceptions!</p></strong></del></span>
- <span class="inserted"><ins><em>surveillance, even if it were not hidden
as it was in these TVs,
- does not legitimize the surveillance.</p></em></ins></span>
+ the TV reports what it is. The existence of a way to disable the
+ surveillance, even if it were not hidden as it was in these TVs,
+ does not legitimize the surveillance.</p>
</li>
- <span
class="removed"><del><strong><li><p>Vizio</strong></del></span>
- <span class="inserted"><ins><em><li id="M201511130">
+ <li id="M201511130">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Some web and TV advertisements play inaudible
@@ -2908,9 +2988,9 @@
<li id="M201511060">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio</em></ins></span> goes a step further than other TV
- manufacturers in spying on their users: their <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"></em></ins></span>
+ <p>Vizio goes a step further than other TV
+ manufacturers in spying on their users: their <a
+
href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
“smart” TVs analyze your viewing habits in detail and
link them your IP address</a> so that advertisers can track you
across devices.</p>
@@ -2919,44 +2999,33 @@
is an injustice already.</p>
</li>
- <span
class="removed"><del><strong><li><p>Tivo's</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511020">
+ <li id="M201511020">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tivo's</em></ins></span> alliance with Viacom adds 2.3 million
households
+ <p>Tivo's alliance with Viacom adds 2.3 million households
to the 600 millions social media profiles the company
already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can now <a
<span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
- correlate</em></ins></span> TV advertisement with online
purchases</a>, exposing all
- users to new combined surveillance by <span
class="removed"><del><strong>default.</p></li>
- <li><p>Some web and TV advertisements play inaudible sounds to be
- picked up by proprietary malware running on other devices in
- range so as to determine that they are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads with Web activity, and
- other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>default.</p></em></ins></span>
+ information with online social media participation, Tivo can now <a
+
href="https://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ correlate TV advertisement with online purchases</a>, exposing all
+ users to new combined surveillance by default.</p>
</li>
- <span
class="removed"><del><strong><li><p>Vizio</strong></del></span>
- <span class="inserted"><ins><em><li id="M201507240">
+ <li id="M201507240">
<!--#set var="DATE" value='<small
class="date-tag">2015-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio</em></ins></span> “smart” TVs recognize and
<a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.engadget.com/2015-07-24-vizio-ipo-inscape-acr.html">track</em></ins></span>
+ <p>Vizio “smart” TVs recognize and <a
+
href="https://www.engadget.com/2015-07-24-vizio-ipo-inscape-acr.html">track
what people are watching</a>, even if it isn't a TV
channel.</p>
</li>
- <span class="removed"><del><strong><li><p>The Amazon
“Smart”</strong></del></span>
- <span class="inserted"><ins><em><li id="M201505290">
+ <li id="M201505290">
<!--#set var="DATE" value='<small
class="date-tag">2015-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Verizon cable</em></ins></span> TV <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch,</em></ins></span> and <span
class="removed"><del><strong>listening all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>even what they wanted to
+ <p>Verizon cable TV <a
+
href="https://arstechnica.com/information-technology/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops on what programs people watch, and even what they wanted to
record</a>.</p>
</li>
@@ -2966,34 +3035,32 @@
<p>Vizio <a
href="https://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
used a firmware “upgrade” to make its TVs snoop on what
- users watch</a>. The TVs did not do that when first
sold.</p></em></ins></span>
+ users watch</a>. The TVs did not do that when first sold.</p>
</li>
- <span
class="removed"><del><strong><li><p>The</strong></del></span>
- <span class="inserted"><ins><em><li id="M201502090">
+ <li id="M201502090">
<!--#set var="DATE" value='<small
class="date-tag">2015-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The</em></ins></span> Samsung “Smart” TV <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits</em></ins></span> users' voice on the internet to another
company, Nuance</a>.
+ <p>The Samsung “Smart” TV <a
+
href="https://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice on the internet to another company,
Nuance</a>.
Nuance can save it and would then have to give it to the US or some
other government.</p>
<p>Speech recognition is not to be trusted unless it is done by free
software in your own computer.</p>
- <span class="inserted"><ins><em><p>In its privacy policy, Samsung
explicitly confirms that <a
+ <p>In its privacy policy, Samsung explicitly confirms that <a
href="https://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
data containing sensitive information will be transmitted to third
- parties</a>.</p></em></ins></span>
+ parties</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware
in</strong></del></span>
- <span class="inserted"><ins><em><li id="M201411090">
+ <li id="M201411090">
<!--#set var="DATE" value='<small
class="date-tag">2014-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Amazon “Smart” TV is</em></ins></span> <a
<span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ <p>The Amazon “Smart” TV is <a
+
href="https://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
snooping all the time</a>.</p>
</li>
@@ -3020,62 +3087,53 @@
<li id="M201405200">
<!--#set var="DATE" value='<small
class="date-tag">2014-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Spyware in</em></ins></span> LG “smart” <span
class="removed"><del><strong>TVs</a></strong></del></span> <span
class="inserted"><ins><em>TVs <a
-
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"></em></ins></span>
+ <p>Spyware in LG “smart” TVs <a
+
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
reports what the user watches, and the switch to turn this off has
- no <span class="removed"><del><strong>effect.</strong></del></span> <span
class="inserted"><ins><em>effect</a>.</em></ins></span> (The fact that
the transmission reports a 404 error
+ no effect</a>. (The fact that the transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
- <p>Even worse, it <a <span
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://rrrrambles.wordpress.com/2013/11/21/lg-tv-logging-filenames-from-network-folders/"></em></ins></span>
- snoops on other devices on the user's local <span
class="removed"><del><strong>network.</a></p></strong></del></span>
<span class="inserted"><ins><em>network</a>.</p></em></ins></span>
+ <p>Even worse, it <a
+
href="https://rrrrambles.wordpress.com/2013/11/21/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on the user's local network</a>.</p>
<p>LG later said it had installed a patch to stop this, but any
product could spy this way.</p>
- <p>Meanwhile, LG TVs <a <span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/"></em></ins></span>
+ <p>Meanwhile, LG TVs <a
+
href="https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/">
do lots of spying anyway</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops</strong></del></span>
- <span class="inserted"><ins><em><li id="M201212170">
+ <li id="M201212170">
<!--#set var="DATE" value='<small
class="date-tag">2012-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security</em></ins></span> on <span
class="removed"><del><strong>what programs people watch,</strong></del></span>
<span class="inserted"><ins><em>a “smart”
TV</a></em></ins></span>
- and <span class="removed"><del><strong>even what they
wanted</strong></del></span> <span class="inserted"><ins><em>use its
camera</em></ins></span> to <span
class="removed"><del><strong>record.</a></p></strong></del></span>
<span class="inserted"><ins><em>watch the people who are watching
TV.</p></em></ins></span>
+ Crackers found a way to break security on a “smart”
TV</a>
+ and use its camera to watch the people who are watching TV.</p>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareAtPlay
--></strong></del></span>
-
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareAtPlay">Spyware at
Play</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtPlay">#SpywareAtPlay</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
-<ul>
- <li><p>Many</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201901100">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.engadget.com/2019-01-10-ring-gave-employees-access-customer-video-feeds.html">
- send the</em></ins></span> video <span class="removed"><del><strong>game
consoles snoop</strong></del></span> <span class="inserted"><ins><em>they
capture to Amazon servers</a>, which save it
+ <p>Amazon Ring “security” devices <a
+
href="https://www.engadget.com/2019-01-10-ring-gave-employees-access-customer-video-feeds.html">
+ send the video they capture to Amazon servers</a>, which save it
long-term.</p>
<p>In many cases, the video shows everyone that comes near, or merely
passes by, the user's front door.</p>
- <p>The article focuses</em></ins></span> on <span
class="removed"><del><strong>their users and report</strong></del></span> <span
class="inserted"><ins><em>how Ring used to let individual employees look
+ <p>The article focuses on how Ring used to let individual employees
look
at the videos freely. It appears Amazon has tried to prevent that
secondary abuse, but the primary abuse—that Amazon gets the
video—Amazon expects society to surrender to.</p>
@@ -3091,8 +3149,7 @@
name!</p>
<p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not</em></ins></span> to <span
class="inserted"><ins><em>look at what's in</em></ins></span> the
- <span
class="removed"><del><strong>internet</a>—</strong></del></span>
<span class="inserted"><ins><em>videos. That's not
+ manufacturers promise not to look at what's in the videos. That's not
security for your home. Security means making sure they don't get to
see through your camera.</p>
</li>
@@ -3109,10 +3166,10 @@
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The Nest Cam “smart” camera is <a
- href="https://www.bbc.com/news/technology-34922712">always
watching</a>,</em></ins></span>
- even <span class="removed"><del><strong>what their users
weigh.</p></strong></del></span> <span class="inserted"><ins><em>when the
“owner” switches it “off.”</p></em></ins></span>
+ href="https://www.bbc.com/news/technology-34922712">always
watching</a>,
+ even when the “owner” switches it “off.”</p>
- <p>A <span class="removed"><del><strong>game
console</strong></del></span> <span
class="inserted"><ins><em>“smart” device means the
manufacturer</em></ins></span> is <span class="inserted"><ins><em>using it
+ <p>A “smart” device means the manufacturer is using it
to outsmart you.</p>
</li>
</ul>
@@ -3127,7 +3184,7 @@
<li id="M201711244">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Furby Connect has</em></ins></span> a <span
class="removed"><del><strong>computer,</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>The Furby Connect has a <a
href="https://www.contextis.com/en/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
universal back door</a>. If the product as shipped doesn't act as a
listening device, remote changes to the code could surely convert it
@@ -3155,8 +3212,8 @@
<p>Note the totally inadequate proposed response: a labeling
standard with which manufacturers would make statements about their
- products, rather than free software which users could have
checked</em></ins></span>
- and <span class="removed"><del><strong>you can't
trust</strong></del></span> <span class="inserted"><ins><em>changed.</p>
+ products, rather than free software which users could have checked
+ and changed.</p>
<p>The company that made the vibrator <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
@@ -3164,7 +3221,7 @@
used it</a>.</p>
<p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the data
to</em></ins></span> a <span
class="removed"><del><strong>computer</strong></del></span> <span
class="inserted"><ins><em>data
+ true, but it doesn't really matter. If it had sold the data to a data
broker, the data broker would have been able to figure out who the
user was.</p>
@@ -3177,11 +3234,11 @@
<li id="M201702280">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>“CloudPets” toys</em></ins></span> with <span
class="inserted"><ins><em>microphones <a
+ <p>“CloudPets” toys with microphones <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
leak childrens' conversations to the manufacturer</a>. Guess what?
<a
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found</em></ins></span> a <span class="inserted"><ins><em>way to
access the data</a> collected by the
+ Crackers found a way to access the data</a> collected by the
manufacturer's snooping.</p>
<p>That the manufacturer and the FBI could listen to these
@@ -3237,33 +3294,27 @@
<li id="M202009270">
<!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many employers are using</em></ins></span> nonfree <span
class="removed"><del><strong>operating system.</p></strong></del></span>
- <span class="inserted"><ins><em>software, including videoconference
software, to <a
+ <p>Many employers are using nonfree
+ software, including videoconference software, to <a
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
surveil and monitor staff working at home</a>. If the program reports
whether you are “active,” that is in effect a malicious
- surveillance feature.</p></em></ins></span>
+ surveillance feature.</p>
</li>
- <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M202008030">
+ <li id="M202008030">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google Nest</em></ins></span> <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
- is taking over ADT</a>. Google sent out</em></ins></span> a <span
class="removed"><del><strong>wide range of data about</strong></del></span>
<span class="inserted"><ins><em>software
- update to its speaker devices using</em></ins></span> their <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>back door <a
+ <p>Google Nest <a
+
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
+ is taking over ADT</a>. Google sent out a software
+ update to its speaker devices using their back door <a
href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that
- listens for things like smoke alarms</a></em></ins></span> and <span
class="inserted"><ins><em>then notifies your phone
+ listens for things like smoke alarms</a> and then notifies your phone
that an alarm is happening. This means the devices now listen for more
- than just</em></ins></span> their <span
class="removed"><del><strong>users'
- friends</strong></del></span> <span class="inserted"><ins><em>wake
words. Google says the software update was sent
- out prematurely</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
-
- <p>Even nastier, they do</strong></del></span> <span
class="inserted"><ins><em>on accident and Google was planning on disclosing
- this new feature and offering</em></ins></span> it <span
class="inserted"><ins><em>to customers who pay for it.</p>
+ than just their wake words. Google says the software update was sent
+ out prematurely and on accident and Google was planning on disclosing
+ this new feature and offering it to customers who pay for it.</p>
</li>
<li id="M202006300">
@@ -3287,8 +3338,8 @@
<p>Internet-tethered Amazon Ring had
a security vulnerability that enabled attackers to <a
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
- access the user's wifi password</a>, and snoop on the
household</em></ins></span>
- through <span class="removed"><del><strong>ad
networks</strong></del></span> <span class="inserted"><ins><em>connected
surveillance devices.</p>
+ access the user's wifi password</a>, and snoop on the household
+ through connected surveillance devices.</p>
<p>Knowledge of the wifi password would not be sufficient to carry
out any significant surveillance if the devices implemented proper
@@ -3311,7 +3362,7 @@
<p>Rather than trying to better control the use of recordings, Google
should not record or listen to the person's voice. It should only
- get commands</em></ins></span> that <span
class="removed"><del><strong>merge</strong></del></span> the <span
class="inserted"><ins><em>user wants to send to some Google service.</p>
+ get commands that the user wants to send to some Google service.</p>
</li>
<li id="M201905061">
@@ -3322,20 +3373,17 @@
recordings made without a legitimate prompt), and sends
it to Amazon's servers, which store it indefinitely. Even
worse, Amazon forwards it to third-party companies. Thus,
- even if users request deletion of their</em></ins></span> data <span
class="inserted"><ins><em>from Amazon's servers, <a
+ even if users request deletion of their data from Amazon's servers, <a
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
the data remain on other servers</a>, where they can be accessed by
advertising companies and government agencies. In other words,
deleting the collected information doesn't cancel the wrong of
collecting it.</p>
- <p>Data</em></ins></span> collected by <span
class="removed"><del><strong>various cr…apps</strong></del></span> <span
class="inserted"><ins><em>devices such as the Nest thermostat, the Philips
- Hue-connected lights, the Chamberlain MyQ garage opener</em></ins></span>
and <span class="removed"><del><strong>sites</strong></del></span> <span
class="inserted"><ins><em>the Sonos
+ <p>Data collected by devices such as the Nest thermostat, the Philips
+ Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
speakers are likewise stored longer than necessary on the servers
- the devices are tethered to. Moreover, they are</em></ins></span> made
<span class="removed"><del><strong>by different
- companies.</p>
-
- <p>They use this</strong></del></span> <span
class="inserted"><ins><em>available to
+ the devices are tethered to. Moreover, they are made available to
Alexa. As a result, Amazon has a very precise picture of users' life
at home, not only in the present, but in the past (and, who knows,
in the future too?)</p>
@@ -3353,11 +3401,11 @@
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
location and other personal data</a>.</p>
- <p>Since the client program is nonfree, and</em></ins></span> data
<span class="inserted"><ins><em>processing is done
+ <p>Since the client program is nonfree, and data processing is done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
the cloud</a>” (a soothing way of saying “We won't
- tell you how and where it's done”), users have no
way</em></ins></span>
- to <span class="removed"><del><strong>manipulate
people</strong></del></span> <span class="inserted"><ins><em>know what
happens</em></ins></span> to <span class="removed"><del><strong>buy
things,</strong></del></span> <span class="inserted"><ins><em>the recordings
unless human eavesdroppers <a
+ tell you how and where it's done”), users have no way
+ to know what happens to the recordings unless human eavesdroppers <a
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
break their non-disclosure agreements</a>.</p>
</li>
@@ -3369,7 +3417,7 @@
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
communicates with HP servers</a> to make sure the user is still
- paying for the subscription,</em></ins></span> and <span
class="removed"><del><strong>hunt</strong></del></span> <span
class="inserted"><ins><em>hasn't printed more pages than were
+ paying for the subscription, and hasn't printed more pages than were
paid for.</p>
<p>Even though the ink subscription program may be cheaper in some
@@ -3383,7 +3431,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Crackers found a way to break the security of an Amazon device,
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
- turn it into a listening device</a></em></ins></span> for <span
class="removed"><del><strong>“whales” who</strong></del></span>
<span class="inserted"><ins><em>them.</p>
+ turn it into a listening device</a> for them.</p>
<p>It was very difficult for them to do this. The job would be much
easier for Amazon. And if some government such as China or the US
@@ -3412,8 +3460,8 @@
listen to everyone in the house, all the time</a>.</p>
<p>Today's technological practice does not include any way of making
- a device that</em></ins></span> can <span class="inserted"><ins><em>obey
your voice commands without potentially spying
- on you. Even if it is air-gapped, it could</em></ins></span> be <span
class="removed"><del><strong>led</strong></del></span> <span
class="inserted"><ins><em>saving up records
+ a device that can obey your voice commands without potentially spying
+ on you. Even if it is air-gapped, it could be saving up records
about you for later examination.</p>
</li>
@@ -3430,7 +3478,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</em></ins></span> to <span
class="removed"><del><strong>spend</strong></del></span> <span
class="inserted"><ins><em>spy on their renters</a>.</p>
+ Rent-to-own computers were programmed to spy on their
renters</a>.</p>
</li>
</ul>
@@ -3462,8 +3510,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Internet-enabled watches with proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they have</em></ins></span> a lot of <span
class="removed"><del><strong>money.</strong></del></span> <span
class="inserted"><ins><em>security flaws.</em></ins></span> They
- <span class="removed"><del><strong>also use</strong></del></span> <span
class="inserted"><ins><em><a
+ privacy. In addition, they have a lot of security flaws. They <a
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
permit security breakers (and unauthorized people) to access</a> the
watch.</p>
@@ -3481,7 +3528,7 @@
href="https://www.theregister.com/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
that connects to an unidentified site in China</a>.</p>
- <p>The article says this is</em></ins></span> a back <span
class="removed"><del><strong>door</strong></del></span> <span
class="inserted"><ins><em>door, but that could be a
+ <p>The article says this is a back door, but that could be a
misunderstanding. However, it is certainly surveillance, at
least.</p>
</li>
@@ -3489,8 +3536,8 @@
<!--#set var="DATE" value='<small
class="date-tag">2014-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>An LG “smart” watch is designed <a
-
href="https://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
- to <span class="removed"><del><strong>manipulate</strong></del></span>
<span class="inserted"><ins><em>report its location to someone else and to
transmit conversations
+
href="https://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+ to report its location to someone else and to transmit conversations
too</a>.</p>
</li>
</ul>
@@ -3507,10 +3554,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://gizmodo.com/get-ready-for-in-car-ads-1846888390">Ford
- is planning to force ads on drivers in cars</a>,
with</em></ins></span> the <span class="removed"><del><strong>game
play</strong></del></span> <span
class="inserted"><ins><em>ability</em></ins></span> for <span
class="removed"><del><strong>specific players.</p>
-
- <p>While</strong></del></span>
- the <span class="removed"><del><strong>article describes gratis games,
games</strong></del></span> <span class="inserted"><ins><em>owner to pay extra
to turn them off. The system probably imposes
+ is planning to force ads on drivers in cars</a>, with the ability for
+ the owner to pay extra to turn them off. The system probably imposes
surveillance on drivers too.</p>
</li>
@@ -3556,7 +3601,7 @@
near-complete access to the internal car network</a>. It is
constantly
connected to the cellular phone network and sends Ford a lot of data,
including car location. This feature operates even when the ignition
- key is removed, and users report</em></ins></span> that <span
class="removed"><del><strong>cost money</strong></del></span> <span
class="inserted"><ins><em>they can't disable it.</p>
+ key is removed, and users report that they can't disable it.</p>
<p>If you own one of these cars, have you succeeded in breaking the
connectivity by disconnecting the cellular modem, or wrapping the
@@ -3588,11 +3633,11 @@
sneaking it into the contract that users sign for some digital service
or other. A requirement for consent is effectively no protection.</p>
- <p>The cars</em></ins></span> can <span
class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>also collect lots of other data: listening to you,
+ <p>The cars can also collect lots of other data: listening to you,
watching you, following your movements, tracking passengers' cell
phones. <em>All</em> such data collection should be
forbidden.</p>
- <p>But if you really want to be safe, we must make
sure</em></ins></span> the <span class="removed"><del><strong>same
tactics.</p></strong></del></span> <span class="inserted"><ins><em>car's
+ <p>But if you really want to be safe, we must make sure the car's
hardware cannot collect any of that data, or that the software
is free so we know it won't collect any of that data.</p>
</li>
@@ -3658,14 +3703,12 @@
is not really a matter of proprietary surveillance. These systems
are an intolerable invasion of privacy, and should be replaced with
anonymous payment systems, but the invasion isn't done by malware. The
- other cases mentioned are done by proprietary malware in the
car.</p></em></ins></span>
+ other cases mentioned are done by proprietary malware in the car.</p>
</li>
</ul>
-<span class="removed"><del><strong><!--
#SpywareOnTheWeb</strong></del></span>
-
-<span class="inserted"><ins><em><div class="big-subsection">
+<div class="big-subsection">
<h4 id="SpywareInVR">Virtual Reality</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInVR">#SpywareInVR</a>)</span>
</div>
@@ -3673,8 +3716,8 @@
<ul class="blurbs">
<li id="M202008182">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
- <span class="inserted"><ins><em><p>Oculus headsets <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Oculus headsets <a
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
users to identify themselves to Facebook</a>. This will give Facebook
free rein to pervasively snoop on Oculus users.</p>
@@ -3864,13 +3907,13 @@
<span
class="removed"><del><strong>href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
snooping</strong></del></span>
<span
class="inserted"><ins><em>href="https://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- to snoop</em></ins></span> on <span class="inserted"><ins><em>information
that users have typed into a
+ to snoop on information that users have typed into a
form but not sent</a>, in order to learn their identity. Some are
<a
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege">
getting sued</a> for this.</p>
- <p>The chat facilities of some customer services
use</em></ins></span> the <span class="removed"><del><strong>user's
browsing</a>, and many</strong></del></span> <span
class="inserted"><ins><em>same sort</em></ins></span> of <span
class="removed"><del><strong>them do so.</p></strong></del></span>
- <span class="inserted"><ins><em>malware to <a
+ <p>The chat facilities of some customer services use the same sort of
+ malware to <a
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
read what the user is typing before it is posted</a>.</p>
</li>
@@ -3880,7 +3923,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
- JavaScript on its web site to give other companies personal data on
+ JavaScript</em></ins></span> on <span class="inserted"><ins><em>its web
site to give other companies personal data on
its customers</a>.</p>
</li>
@@ -3896,7 +3939,7 @@
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Some websites send
- JavaScript code to collect all the user's input, <a
+ JavaScript code to collect all</em></ins></span> the user's <span
class="removed"><del><strong>browsing</a>, and many of them do
so.</p></strong></del></span> <span class="inserted"><ins><em>input, <a
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
can then be used to reproduce the whole session</a>.</p>
@@ -3947,14 +3990,14 @@
<p>Google's proprietary Chrome web browser <a
href="https://www.techrepublic.com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/">
added a surveillance API (idle detection API)</a> which lets
- websites ask Chrome to report when a user with a web page
open</em></ins></span> is <span class="removed"><del><strong>also
used</strong></del></span>
- <span class="inserted"><ins><em>idle.</p>
+ websites ask Chrome to report when a user with a web page open is
+ idle.</p>
</li>
<li id="M201906220">
<!--#set var="DATE" value='<small
class="date-tag">2019-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google Chrome is an <a
+ <p>Google Chrome</em></ins></span> is <span
class="removed"><del><strong>also used</strong></del></span> <span
class="inserted"><ins><em>an <a
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/">
instrument of surveillance</a>. It lets thousands of trackers invade
users' computers and report the sites they visit to advertising and
@@ -4303,7 +4346,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/06/04 15:02:51 $
+$Date: 2022/06/04 15:32:21 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.424
retrieving revision 1.425
diff -u -b -r1.424 -r1.425
--- proprietary-surveillance.ja.po 4 Jun 2022 15:02:52 -0000 1.424
+++ proprietary-surveillance.ja.po 4 Jun 2022 15:32:21 -0000 1.425
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-06-04 14:55+0000\n"
+"POT-Creation-Date: 2022-06-04 15:25+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -214,6 +214,12 @@
msgstr "<a href=\"#SpywareInApplications\">ã¢ããªã®ã¹ãã¤ã¦ã§ã¢</a>"
#. type: Content of: <div><div><div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a
href=\"#SpywareInMobileApps\">ã¢ãã¤ã«ã»ã¢ããªã®ã¹ãã¤ã¦ã§ã¢</a>"
+
+#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr ""
@@ -1788,6 +1794,24 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInApplications"
"\">#SpywareInApplications</a>)</span>"
+#. type: Content of: <div><div><div><h4>
+#, fuzzy
+#| msgid "Spyware in Mobile Applications"
+msgid "All Apps"
+msgstr "ã¢ãã¤ã«ã»ã¢ããªã®ã¹ãã¤ã¦ã§ã¢"
+
+#. type: Content of: <div><div><div>
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
#. type: Content of: <div><div><ul><li><p>
msgid ""
"A worldwide investigation found that most of the applications that school "
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.363
retrieving revision 1.364
diff -u -b -r1.363 -r1.364
--- proprietary-surveillance.pot 4 Jun 2022 15:02:52 -0000 1.363
+++ proprietary-surveillance.pot 4 Jun 2022 15:32:21 -0000 1.364
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-06-04 14:55+0000\n"
+"POT-Creation-Date: 2022-06-04 15:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -166,6 +166,10 @@
msgstr ""
#. type: Content of: <div><div><div><ul><li>
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr ""
+
+#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr ""
@@ -1234,6 +1238,16 @@
"href=\"#SpywareInApplications\">#SpywareInApplications</a>)</span>"
msgstr ""
+#. type: Content of: <div><div><div><h4>
+msgid "All Apps"
+msgstr ""
+
+#. type: Content of: <div><div><div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a "
+"href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+
#. type: Content of: <div><div><ul><li><p>
msgid ""
"A worldwide investigation found that most of the applications that school "
Index: proprietary-surveillance.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pt-br-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-surveillance.pt-br-diff.html 4 Jun 2022 15:02:52 -0000
1.16
+++ proprietary-surveillance.pt-br-diff.html 4 Jun 2022 15:32:21 -0000
1.17
@@ -122,7 +122,8 @@
</ul>
<h4><a href="#SpywareInApplications">Spyware in
Applications</a></h4>
<ul>
- <li><a href="#SpywareInDesktopApps">Desktop
Apps</a></li>
+ <li><a <span
class="inserted"><ins><em>href="#SpywareInAllApps">All
Apps</a></li>
+ <li><a</em></ins></span>
href="#SpywareInDesktopApps">Desktop Apps</a></li>
<li><a href="#SpywareInMobileApps">Mobile
Apps</a></li>
<li><a href="#SpywareInSkype">Skype</a></li>
<li><a href="#SpywareInGames">Games</a></li>
@@ -1142,7 +1143,12 @@
</div>
<div style="clear: left;"></div>
-<span class="inserted"><ins><em><ul class="blurbs">
+<div class="big-subsection">
+ <h4 <span class="inserted"><ins><em>id="SpywareInAllApps">All
Apps</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInAllApps">#SpywareInAllApps</a>)</span>
+</div>
+
+<ul class="blurbs">
<li id="M202205240">
<!--#set var="DATE" value='<small
class="date-tag">2022-05</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1156,10 +1162,10 @@
still being used in the classrooms even after some of the schools
reopened.</p>
</li>
-</ul></em></ins></span>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInDesktopApps">Desktop Apps</h4>
+ <h4</em></ins></span> id="SpywareInDesktopApps">Desktop Apps</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span>
</div>
@@ -3772,7 +3778,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/06/04 15:02:52 $
+$Date: 2022/06/04 15:32:21 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pt-br.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary-surveillance.pt-br.po 4 Jun 2022 15:02:52 -0000 1.37
+++ proprietary-surveillance.pt-br.po 4 Jun 2022 15:32:21 -0000 1.38
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-06-04 14:55+0000\n"
+"POT-Creation-Date: 2022-06-04 15:25+0000\n"
"PO-Revision-Date: 2021-06-26 09:40-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -197,6 +197,12 @@
"aplicativos</a>"
#. type: Content of: <div><div><div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Aplicativos móveis</a>"
+
+#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr "<a href=\"#SpywareInDesktopApps\">Aplicativos de desktop</a>"
@@ -1974,6 +1980,24 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInApplications"
"\">#SpywareInApplications</a>)</span>"
+#. type: Content of: <div><div><div><h4>
+#, fuzzy
+#| msgid "Mobile Apps"
+msgid "All Apps"
+msgstr "Aplicativos móveis"
+
+#. type: Content of: <div><div><div>
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
#. type: Content of: <div><div><ul><li><p>
msgid ""
"A worldwide investigation found that most of the applications that school "
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.781
retrieving revision 1.782
diff -u -b -r1.781 -r1.782
--- proprietary-surveillance.ru.po 4 Jun 2022 15:02:52 -0000 1.781
+++ proprietary-surveillance.ru.po 4 Jun 2022 15:32:21 -0000 1.782
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2022-06-04 14:55+0000\n"
+"POT-Creation-Date: 2022-06-04 15:25+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -194,6 +194,14 @@
msgstr "<a href=\"#SpywareInApplications\">ÐÑикладнÑе
пÑогÑаммÑ</a>"
#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
+# | {+href=\"#SpywareInAllApps\">All+} Apps</a>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">ÐобилÑнÑе
пÑиложениÑ</a>"
+
+#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr "<a href=\"#SpywareInDesktopApps\">ÐÑогÑаммÑ
наÑÑолÑнÑÑ
компÑÑÑеÑов</a>"
@@ -1767,6 +1775,28 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInApplications"
"\">#SpywareInApplications</a>)</span>"
+#. type: Content of: <div><div><div><h4>
+# | [-Mobile-]{+All+} Apps
+#, fuzzy
+#| msgid "Mobile Apps"
+msgid "All Apps"
+msgstr "ÐобилÑнÑе пÑиложениÑ"
+
+#. type: Content of: <div><div><div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
#. type: Content of: <div><div><ul><li><p>
msgid ""
"A worldwide investigation found that most of the applications that school "
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.483
retrieving revision 1.484
diff -u -b -r1.483 -r1.484
--- pt-br.po 4 Jun 2022 15:02:53 -0000 1.483
+++ pt-br.po 4 Jun 2022 15:32:22 -0000 1.484
@@ -12359,6 +12359,12 @@
"aplicativos</a>"
#. type: Content of: <div><div><div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Aplicativos móveis</a>"
+
+#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr "<a href=\"#SpywareInDesktopApps\">Aplicativos de desktop</a>"
@@ -12722,6 +12728,24 @@
"\">#SpywareInApplications</a>)</span>"
#. type: Content of: <div><div><div><h4>
+#, fuzzy
+#| msgid "Mobile Apps"
+msgid "All Apps"
+msgstr "Aplicativos móveis"
+
+#. type: Content of: <div><div><div>
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr "Aplicativos de desktop"
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.829
retrieving revision 1.830
diff -u -b -r1.829 -r1.830
--- ru.po 4 Jun 2022 15:02:53 -0000 1.829
+++ ru.po 4 Jun 2022 15:32:22 -0000 1.830
@@ -11482,6 +11482,14 @@
msgstr "<a href=\"#SpywareInApplications\">ÐÑикладнÑе
пÑогÑаммÑ</a>"
#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
+# | {+href=\"#SpywareInAllApps\">All+} Apps</a>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">ÐобилÑнÑе
пÑиложениÑ</a>"
+
+#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr "<a href=\"#SpywareInDesktopApps\">ÐÑогÑаммÑ
наÑÑолÑнÑÑ
компÑÑÑеÑов</a>"
@@ -11832,6 +11840,28 @@
"\">#SpywareInApplications</a>)</span>"
#. type: Content of: <div><div><div><h4>
+# | [-Mobile-]{+All+} Apps
+#, fuzzy
+#| msgid "Mobile Apps"
+msgid "All Apps"
+msgstr "ÐобилÑнÑе пÑиложениÑ"
+
+#. type: Content of: <div><div><div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr "ÐÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°ÑÑолÑнÑÑ
компÑÑÑеÑов"
Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.290
retrieving revision 1.291
diff -u -b -r1.290 -r1.291
--- tr.po 4 Jun 2022 15:02:53 -0000 1.290
+++ tr.po 4 Jun 2022 15:32:22 -0000 1.291
@@ -9152,6 +9152,12 @@
msgstr ""
#. type: Content of: <div><div><div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"/proprietary/malware-mobiles.html\">Mobil aygıtlar</a>"
+
+#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr ""
@@ -9448,6 +9454,16 @@
msgstr ""
#. type: Content of: <div><div><div><h4>
+msgid "All Apps"
+msgstr ""
+
+#. type: Content of: <div><div><div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr ""
Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.294
retrieving revision 1.295
diff -u -b -r1.294 -r1.295
--- zh-cn.po 4 Jun 2022 15:02:54 -0000 1.294
+++ zh-cn.po 4 Jun 2022 15:32:23 -0000 1.295
@@ -8770,6 +8770,12 @@
msgstr ""
#. type: Content of: <div><div><div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a href=\"/proprietary/malware-mobiles.html\">ææº</a>"
+
+#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr ""
@@ -9066,6 +9072,16 @@
msgstr ""
#. type: Content of: <div><div><div><h4>
+msgid "All Apps"
+msgstr ""
+
+#. type: Content of: <div><div><div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr ""
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.396
retrieving revision 1.397
diff -u -b -r1.396 -r1.397
--- zh-tw.po 4 Jun 2022 15:02:54 -0000 1.396
+++ zh-tw.po 4 Jun 2022 15:32:23 -0000 1.397
@@ -8028,6 +8028,16 @@
#. type: Content of: <div><div><div><ul><li>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
+# | devices</a>-] {+href=\"#SpywareInAllApps\">All Apps</a>+}
+#, fuzzy
+#| msgid ""
+#| "<a href=\"/proprietary/malware-mobiles.html\">Malware in mobile devices</"
+#| "a>"
+msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+msgstr "<a
href=\"/proprietary/malware-mobiles.html\">è¡åè£ç½®çæ¡æè»é«</a>"
+
+#. type: Content of: <div><div><div><ul><li>
+# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
#, fuzzy
#| msgid ""
@@ -8348,6 +8358,16 @@
msgstr ""
#. type: Content of: <div><div><div><h4>
+msgid "All Apps"
+msgstr ""
+
+#. type: Content of: <div><div><div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+"\">#SpywareInAllApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr ""
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=