[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www planetfeeds.ru.html fun/humor.ru.html fun/p...
From: |
GNUN |
Subject: |
www planetfeeds.ru.html fun/humor.ru.html fun/p... |
Date: |
Sat, 4 Jun 2022 13:03:25 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 22/06/04 13:03:24
Modified files:
. : planetfeeds.ru.html
fun : humor.ru.html
fun/po : humor.ru-en.html humor.ru.po
po : planetfeeds.ru.po
proprietary : all.ru.html malware-edtech.ru.html
proprietary-surveillance.ru.html
proprietary.ru.html
proprietary/po : all.ru-en.html all.ru.po de.po es.po fr.po
it.po ja.po malware-edtech.ru-en.html
malware-edtech.ru.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.pt-br-diff.html
proprietary-surveillance.pt-br.po
proprietary-surveillance.ru-en.html
proprietary-surveillance.ru.po
proprietary.ru-en.html proprietary.ru.po
pt-br.po ru.po tr.po zh-cn.po zh-tw.po
software : recent-releases-include.ru.html
software/po : recent-releases-include.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/planetfeeds.ru.html?cvsroot=www&r1=1.1410&r2=1.1411
http://web.cvs.savannah.gnu.org/viewcvs/www/fun/humor.ru.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/fun/po/humor.ru-en.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/fun/po/humor.ru.po?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/po/planetfeeds.ru.po?cvsroot=www&r1=1.2089&r2=1.2090
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.ru.html?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-edtech.ru.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.ru.html?cvsroot=www&r1=1.320&r2=1.321
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.ru.html?cvsroot=www&r1=1.262&r2=1.263
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.ru-en.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.ru.po?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.397&r2=1.398
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.579&r2=1.580
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.701&r2=1.702
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.397&r2=1.398
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.405&r2=1.406
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-edtech.ru-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-edtech.ru.po?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.398&r2=1.399
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.397&r2=1.398
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.396&r2=1.397
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.240&r2=1.241
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.432&r2=1.433
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.289&r2=1.290
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.711&r2=1.712
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.304&r2=1.305
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.444&r2=1.445
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.322&r2=1.323
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.425&r2=1.426
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.364&r2=1.365
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pt-br-diff.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pt-br.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru-en.html?cvsroot=www&r1=1.298&r2=1.299
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.782&r2=1.783
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru-en.html?cvsroot=www&r1=1.260&r2=1.261
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.618&r2=1.619
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.484&r2=1.485
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.831&r2=1.832
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.291&r2=1.292
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.295&r2=1.296
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.397&r2=1.398
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.ru.html?cvsroot=www&r1=1.2427&r2=1.2428
http://web.cvs.savannah.gnu.org/viewcvs/www/software/po/recent-releases-include.ru.po?cvsroot=www&r1=1.3436&r2=1.3437
Patches:
Index: planetfeeds.ru.html
===================================================================
RCS file: /web/www/www/planetfeeds.ru.html,v
retrieving revision 1.1410
retrieving revision 1.1411
diff -u -b -r1.1410 -r1.1411
--- planetfeeds.ru.html 2 Jun 2022 05:42:26 -0000 1.1410
+++ planetfeeds.ru.html 4 Jun 2022 17:03:08 -0000 1.1411
@@ -6,7 +6,7 @@
value="<a
href='http://www.fsf.org/blogs/community/may-gnu-spotlight-with-amin-bandali-eleven-new-gnu-releases'>"
-->
<!--#echo
encoding="none" var="link" -->
-May GNU Spotlight with Amin Bandali: eleven new GNU releases!<!--#echo
encoding="none"
+ÐайÑкий пÑожекÑÐ¾Ñ GNU Ñ Ðмином
Ðандали — 11 новÑÑ
вÑпÑÑков GNU!<!--#echo
encoding="none"
var="a_close" -->
<!-- TRANSLATORS:
http://www.fsf.org/blogs/community/may-gnu-spotlight-with-amin-bandali-eleven-new-gnu-releases
-->
@@ -16,22 +16,21 @@
value="<a href='http://savannah.gnu.org/forum/forum.php?forum_id=10193'>" -->
<!--#echo
encoding="none" var="link" -->
-New Maintainer<!--#echo encoding="none"
+ÐовÑй ÑопÑовождаÑÑий<!--#echo encoding="none"
var="a_close" -->
<!-- TRANSLATORS:
http://savannah.gnu.org/forum/forum.php?forum_id=10193 -->
-: Note that a new maintainer, Kjharcombe, has recently been put in place. We
-are hoping to be able to continue development with this package.</p>
+: Ðнимание, недавно назнаÑен новÑÑ
ÑопÑовожадÑÑий, Kjharcombe...</p>
<p>
<!--#set var="link"
value="<a href='http://savannah.gnu.org/forum/forum.php?forum_id=10192'>" -->
<!--#echo
encoding="none" var="link" -->
-PSPP 1.6.0 has been released.<!--#echo encoding="none"
+ÐÑл вÑпÑÑен PSPP 1.6.0<!--#echo encoding="none"
var="a_close" -->
<!-- TRANSLATORS:
http://savannah.gnu.org/forum/forum.php?forum_id=10192 -->
-: I'm very pleased to announce the release of a new version of GNU
-PSPP. PSPP is a program for statistical analysis of sampled data. It is a
-free replacement...
+Я Ñ Ð±Ð¾Ð»ÑÑим ÑдоволÑÑÑвием обÑÑвлÑÑ Ð¾
вÑпÑÑке новой веÑÑии GNU
+PSPP. PSPP — пÑогÑамма ÑÑаÑиÑÑиÑеÑкого
анализа ÑкÑпеÑименÑалÑнÑÑ
+даннÑÑ
...
</p>
Index: fun/humor.ru.html
===================================================================
RCS file: /web/www/www/fun/humor.ru.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- fun/humor.ru.html 7 Aug 2021 06:31:41 -0000 1.18
+++ fun/humor.ru.html 4 Jun 2022 17:03:08 -0000 1.19
@@ -79,7 +79,9 @@
<li><a href="/fun/jokes/software.terms.html">ÐомпÑÑÑеÑнÑе
ÑеÑминÑ</a></li>
<li><a href="/fun/jokes/ubuntu.html">Ubuntu</a></li>
<li><a href="/fun/jokes/unix.errors.html">СообÑÐµÐ½Ð¸Ñ Ð¾Ð±
оÑибкаÑ
в Unix</a></li>
- <li><a href="https://twitter.com/1990sLinuxUser">Ð®Ð¼Ð¾Ñ Ð¸Ð·
ТвиÑÑеÑа</a></li>
+ <li><a
+href="https://web.archive.org/web/20110411021200/https://twitter.com/1990sLinuxUser">ЮмоÑ
+из ТвиÑÑеÑа</a></li>
</ul>
<h3 id="Documentation">ÐокÑменÑаÑиÑ</h3>
@@ -273,8 +275,8 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 1999-2021 Richard M. Stallman<br />Copyright © 2015,
-2018, 2020, 2021 Free Software Foundation, Inc. (translation)</p>
+<p>Copyright © 1999-2022 Richard M. Stallman<br />Copyright © 2015,
+2018, 2020, 2021, 2022 Free Software Foundation, Inc. (translation)</p>
<p>ÐÑо пÑоизведение доÑÑÑпно по <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/deed.ru">лиÑензии
@@ -294,7 +296,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2021/08/07 06:31:41 $
+$Date: 2022/06/04 17:03:08 $
<!-- timestamp end -->
</p>
Index: fun/po/humor.ru-en.html
===================================================================
RCS file: /web/www/www/fun/po/humor.ru-en.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- fun/po/humor.ru-en.html 7 Aug 2021 06:31:42 -0000 1.17
+++ fun/po/humor.ru-en.html 4 Jun 2022 17:03:08 -0000 1.18
@@ -78,7 +78,8 @@
<li><a href="/fun/jokes/software.terms.html">Software Terms</a></li>
<li><a href="/fun/jokes/ubuntu.html">Ubuntu</a></li>
<li><a href="/fun/jokes/unix.errors.html">Unix Error Messages</a></li>
- <li><a href="https://twitter.com/1990sLinuxUser">Some humor via
Twitter</a></li>
+ <li><a
href="https://web.archive.org/web/20110411021200/https://twitter.com/1990sLinuxUser">
+ Some humor via Twitter</a></li>
</ul>
<h3 id="Documentation">Documentation</h3>
@@ -273,7 +274,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 1999-2021 Richard M. Stallman</p>
+<p>Copyright © 1999-2022 Richard M. Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -283,7 +284,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/08/07 06:31:42 $
+$Date: 2022/06/04 17:03:08 $
<!-- timestamp end -->
</p>
</div>
Index: fun/po/humor.ru.po
===================================================================
RCS file: /web/www/www/fun/po/humor.ru.po,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- fun/po/humor.ru.po 4 Jun 2022 16:26:28 -0000 1.33
+++ fun/po/humor.ru.po 4 Jun 2022 17:03:08 -0000 1.34
@@ -16,7 +16,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2022-06-04 09:27+0000\n"
#. type: Content of: <title>
msgid "Laugh along with GNU - GNU Project - Free Software Foundation"
@@ -243,15 +242,11 @@
"<a href=\"/fun/jokes/unix.errors.html\">СообÑÐµÐ½Ð¸Ñ Ð¾Ð± оÑибкаÑ
в Unix</a>"
#. type: Content of: <div><ul><li>
-# | <a [-href=\"https://twitter.com/1990sLinuxUser\">Some-]
-# |
{+href=\"https://web.archive.org/web/20110411021200/https://twitter.com/1990sLinuxUser\">
-# | Some+} humor via Twitter</a>
-#| msgid ""
-#| "<a href=\"https://twitter.com/1990sLinuxUser\">Some humor via Twitter</a>"
msgid ""
"<a href=\"https://web.archive.org/web/20110411021200/https://twitter."
"com/1990sLinuxUser\"> Some humor via Twitter</a>"
-msgstr "<a href=\"https://web.archive.org/web/20110411021200/https://twitter."
+msgstr ""
+"<a href=\"https://web.archive.org/web/20110411021200/https://twitter."
"com/1990sLinuxUser\">Ð®Ð¼Ð¾Ñ Ð¸Ð· ТвиÑÑеÑа</a>"
#. type: Content of: <div><h3>
Index: po/planetfeeds.ru.po
===================================================================
RCS file: /web/www/www/po/planetfeeds.ru.po,v
retrieving revision 1.2089
retrieving revision 1.2090
diff -u -b -r1.2089 -r1.2090
--- po/planetfeeds.ru.po 4 Jun 2022 16:26:29 -0000 1.2089
+++ po/planetfeeds.ru.po 4 Jun 2022 17:03:08 -0000 1.2090
@@ -14,12 +14,8 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2022-06-02 05:35+0000\n"
#. type: Content of: <p>
-# | [-April-]{+May+} GNU Spotlight with Amin Bandali: [-Twenty-] {+eleven+}
-# | new GNU releases!
-#| msgid "April GNU Spotlight with Amin Bandali: Twenty new GNU releases!"
msgid "May GNU Spotlight with Amin Bandali: eleven new GNU releases!"
msgstr ""
"ÐайÑкий пÑожекÑÐ¾Ñ GNU Ñ Ðмином
Ðандали — 11 новÑÑ
вÑпÑÑков GNU!"
@@ -34,25 +30,15 @@
msgid ""
": Note that a new maintainer, Kjharcombe, has recently been put in place. We "
"are hoping to be able to continue development with this package."
-msgstr ""
-": Ðнимание, недавно назнаÑен новÑÑ
ÑопÑовожадÑÑий, Kjharcombe..."
+msgstr ": Ðнимание, недавно назнаÑен новÑÑ
ÑопÑовожадÑÑий, Kjharcombe..."
#. type: Content of: <p>
-# | PSPP 1.[-4-]{+6+}.0 has been released{+.+}
-#| msgid "PSPP 1.4.0 has been released"
msgid "PSPP 1.6.0 has been released."
msgstr "ÐÑл вÑпÑÑен PSPP 1.6.0"
#. TRANSLATORS:
#. http://savannah.gnu.org/forum/forum.php?forum_id=10192
#. type: Content of: <p>
-# | : I'm very pleased to announce the release of a new version of GNU
-# | PSPP. PSPP is a program for statistical analysis of sampled data. It is a
-# | free [-replacement f...-] {+replacement...+}
-#| msgid ""
-#| ": I'm very pleased to announce the release of a new version of GNU "
-#| "PSPP. PSPP is a program for statistical analysis of sampled data. It is a "
-#| "free replacement f..."
msgid ""
": I'm very pleased to announce the release of a new version of GNU PSPP. "
"PSPP is a program for statistical analysis of sampled data. It is a free "
Index: proprietary/all.ru.html
===================================================================
RCS file: /web/www/www/proprietary/all.ru.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary/all.ru.html 11 May 2022 16:01:46 -0000 1.52
+++ proprietary/all.ru.html 4 Jun 2022 17:03:10 -0000 1.53
@@ -49,6 +49,21 @@
<div class="column-limit" id="all-malware"></div>
<ul class="blurbs">
+<!--#set var='ADD' value='2022-06-04' -->
+<!--#set var='PUB' value='2022-05-24' -->
+<li><small class='date-tag'>Ðобавлено: <!--#echo encoding='none'
var='ADD' -->
+ — ÐоÑледнÑÑ ÑÑÑлка: <!--#echo encoding='none' var='PUB'
-->
+</small>
+ <p>ÐбÑемиÑовое ÑаÑÑледование показало,
ÑÑо болÑÑинÑÑво пÑиложений,
+ÑекомендованнÑÑ
оÑделами обÑÐ°Ð·Ð¾Ð²Ð°Ð½Ð¸Ñ Ð´Ð»Ñ
Ñдаленного обÑÑÐµÐ½Ð¸Ñ Ð²Ð¾ вÑемÑ
+пандемии COVID-19, <a
+href="https://web.archive.org/web/20220525011540/https://www.washingtonpost.com/technology/2022/05/24/remote-school-app-tracking-privacy/">оÑÑлеживаÑÑ
+и ÑобиÑаÑÑ Ð¿ÐµÑÑоналÑнÑе даннÑе деÑей, даже
не доÑÑигÑиÑ
пÑÑи леÑ</a>. ÐÑи
+пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¸ иÑ
ÑайÑÑ Ð²ÑÑÑлаÑÑ ÑобÑаннÑÑ
инÑоÑмаÑÐ¸Ñ Ð³Ð¸Ð³Ð°Ð½Ñам ÑекламÑ, Ñаким
+как Facebook и Google, и вÑе-Ñаки иÑ
пÑименÑÑÑ Ð²
клаÑÑаÑ
даже поÑле
+Ð²Ð¾Ð·Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ Ð·Ð°Ð½ÑÑий в ÑколаÑ
.</p>
+ </li>
+
<!--#set var='ADD' value='2022-05-10' -->
<!--#set var='PUB' value='2022-04-28' -->
<li><small class='date-tag'>Ðобавлено: <!--#echo encoding='none'
var='ADD' -->
@@ -3674,7 +3689,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2022/05/11 16:01:46 $
+$Date: 2022/06/04 17:03:10 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-edtech.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-edtech.ru.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/malware-edtech.ru.html 5 May 2022 07:38:36 -0000 1.8
+++ proprietary/malware-edtech.ru.html 4 Jun 2022 17:03:10 -0000 1.9
@@ -83,6 +83,22 @@
<div class="column-limit" id="malware-edtech"></div>
<ul class="blurbs">
+ <li id="M202205240">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2022-05</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p>ÐбÑемиÑовое ÑаÑÑледование показало, ÑÑо
болÑÑинÑÑво пÑиложений,
+ÑекомендованнÑÑ
оÑделами обÑÐ°Ð·Ð¾Ð²Ð°Ð½Ð¸Ñ Ð´Ð»Ñ
Ñдаленного обÑÑÐµÐ½Ð¸Ñ Ð²Ð¾ вÑемÑ
+пандемии COVID-19, <a
+href="https://web.archive.org/web/20220525011540/https://www.washingtonpost.com/technology/2022/05/24/remote-school-app-tracking-privacy/">оÑÑлеживаÑÑ
+и ÑобиÑаÑÑ Ð¿ÐµÑÑоналÑнÑе даннÑе деÑей, даже
не доÑÑигÑиÑ
пÑÑи леÑ</a>. ÐÑи
+пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¸ иÑ
ÑайÑÑ Ð²ÑÑÑлаÑÑ ÑобÑаннÑÑ
инÑоÑмаÑÐ¸Ñ Ð³Ð¸Ð³Ð°Ð½Ñам ÑекламÑ, Ñаким
+как Facebook и Google, и вÑе-Ñаки иÑ
пÑименÑÑÑ Ð²
клаÑÑаÑ
даже поÑле
+Ð²Ð¾Ð·Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ Ð·Ð°Ð½ÑÑий в ÑколаÑ
.</p>
+ </li>
+
<li id="M202203010">
<!--#set var="DATE" value='<small class="date-tag">
@@ -316,7 +332,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2022/05/05 07:38:36 $
+$Date: 2022/06/04 17:03:10 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-surveillance.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.ru.html,v
retrieving revision 1.320
retrieving revision 1.321
diff -u -b -r1.320 -r1.321
--- proprietary/proprietary-surveillance.ru.html 11 May 2022 16:01:46
-0000 1.320
+++ proprietary/proprietary-surveillance.ru.html 4 Jun 2022 17:03:10
-0000 1.321
@@ -1346,6 +1346,24 @@
</div>
<div style="clear: left;"></div>
+<ul class="blurbs">
+ <li id="M202205240">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2022-05</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p>ÐбÑемиÑовое ÑаÑÑледование показало, ÑÑо
болÑÑинÑÑво пÑиложений,
+ÑекомендованнÑÑ
оÑделами обÑÐ°Ð·Ð¾Ð²Ð°Ð½Ð¸Ñ Ð´Ð»Ñ
Ñдаленного обÑÑÐµÐ½Ð¸Ñ Ð²Ð¾ вÑемÑ
+пандемии COVID-19, <a
+href="https://web.archive.org/web/20220525011540/https://www.washingtonpost.com/technology/2022/05/24/remote-school-app-tracking-privacy/">оÑÑлеживаÑÑ
+и ÑобиÑаÑÑ Ð¿ÐµÑÑоналÑнÑе даннÑе деÑей, даже
не доÑÑигÑиÑ
пÑÑи леÑ</a>. ÐÑи
+пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¸ иÑ
ÑайÑÑ Ð²ÑÑÑлаÑÑ ÑобÑаннÑÑ
инÑоÑмаÑÐ¸Ñ Ð³Ð¸Ð³Ð°Ð½Ñам ÑекламÑ, Ñаким
+как Facebook и Google, и вÑе-Ñаки иÑ
пÑименÑÑÑ Ð²
клаÑÑаÑ
даже поÑле
+Ð²Ð¾Ð·Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ Ð·Ð°Ð½ÑÑий в ÑколаÑ
.</p>
+ </li>
+</ul>
+
<div class="big-subsection">
<h4 id="SpywareInDesktopApps">ÐÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°ÑÑолÑнÑÑ
компÑÑÑеÑов</h4>
<span class="anchor-reference-id">(<a
@@ -4523,7 +4541,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2022/05/11 16:01:46 $
+$Date: 2022/06/04 17:03:10 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.ru.html,v
retrieving revision 1.262
retrieving revision 1.263
diff -u -b -r1.262 -r1.263
--- proprietary/proprietary.ru.html 11 May 2022 16:01:47 -0000 1.262
+++ proprietary/proprietary.ru.html 4 Jun 2022 17:03:10 -0000 1.263
@@ -204,6 +204,22 @@
<h3 id="latest">ÐоÑледние добавлениÑ</h3>
<ul class="blurbs">
+ <li id="M202205240">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2022-05</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p>ÐбÑемиÑовое ÑаÑÑледование показало, ÑÑо
болÑÑинÑÑво пÑиложений,
+ÑекомендованнÑÑ
оÑделами обÑÐ°Ð·Ð¾Ð²Ð°Ð½Ð¸Ñ Ð´Ð»Ñ
Ñдаленного обÑÑÐµÐ½Ð¸Ñ Ð²Ð¾ вÑемÑ
+пандемии COVID-19, <a
+href="https://web.archive.org/web/20220525011540/https://www.washingtonpost.com/technology/2022/05/24/remote-school-app-tracking-privacy/">оÑÑлеживаÑÑ
+и ÑобиÑаÑÑ Ð¿ÐµÑÑоналÑнÑе даннÑе деÑей, даже
не доÑÑигÑиÑ
пÑÑи леÑ</a>. ÐÑи
+пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¸ иÑ
ÑайÑÑ Ð²ÑÑÑлаÑÑ ÑобÑаннÑÑ
инÑоÑмаÑÐ¸Ñ Ð³Ð¸Ð³Ð°Ð½Ñам ÑекламÑ, Ñаким
+как Facebook и Google, и вÑе-Ñаки иÑ
пÑименÑÑÑ Ð²
клаÑÑаÑ
даже поÑле
+Ð²Ð¾Ð·Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ Ð·Ð°Ð½ÑÑий в ÑколаÑ
.</p>
+ </li>
+
<li id="M202204280">
<!--#set var="DATE" value='<small class="date-tag">
@@ -269,17 +285,6 @@
href="/education/educational-malware-app-along.html#content">ÐбÑазоваÑелÑное
вÑедоноÑное пÑиложение Along</a></p>
</li>
-
- <li id="M202203210">
-
- <!--#set var="DATE" value='<small class="date-tag">
-2022-03</small>'
- -->
-<!--#echo encoding="none" var="DATE" -->
-<p>Apple не Ð´Ð°ÐµÑ Ð»ÑдÑм обновлÑÑÑ Ð°Ð¿Ð¿Ð°ÑаÑÑÑÑ Ð²
иÑ
компÑÑÑеÑаÑ
Mac, <a
-href="https://www.theverge.com/2022/3/21/22989226/apple-mac-studios-removable-ssd-blocked-software-replacement">налагаÑ
-ÑиÑÑовое ÑпÑавление огÑаниÑениÑми на
ÑÑÑÑойÑÑва SSD</a>.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">Ðалее...</a></p>
@@ -361,7 +366,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2022/05/11 16:01:47 $
+$Date: 2022/06/04 17:03:10 $
<!-- timestamp end -->
</p>
Index: proprietary/po/all.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/all.ru-en.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary/po/all.ru-en.html 11 May 2022 16:01:47 -0000 1.55
+++ proprietary/po/all.ru-en.html 4 Jun 2022 17:03:10 -0000 1.56
@@ -42,6 +42,18 @@
<div class="column-limit" id="all-malware"></div>
<ul class="blurbs">
+<!--#set var='ADD' value='2022-06-04' --><!--#set var='PUB' value='2022-05-24'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
+ <p>A worldwide investigation found that
+ most of the applications that school districts
+ recommended for remote education during the COVID-19 pandemic <a
+
href="https://web.archive.org/web/20220525011540/https://www.washingtonpost.com/technology/2022/05/24/remote-school-app-tracking-privacy/">track
+ and collect personal data from children as young as below the age of
+ five</a>. These applications, and their websites, send the collected
+ information to ad giants such as Facebook and Goodle, and they are
+ still being used in the classrooms even after some of the schools
+ reopened.</p>
+ </li>
+
<!--#set var='ADD' value='2022-05-10' --><!--#set var='PUB' value='2022-04-28'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p>The US government <a
href="https://themarkup.org/pixel-hunt/2022/04/28/applied-for-student-aid-online-facebook-saw-you">sent
@@ -2698,7 +2710,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/05/11 16:01:47 $
+$Date: 2022/06/04 17:03:10 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/all.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.ru.po,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- proprietary/po/all.ru.po 4 Jun 2022 15:02:48 -0000 1.125
+++ proprietary/po/all.ru.po 4 Jun 2022 17:03:10 -0000 1.126
@@ -17,7 +17,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2022-06-04 14:26+0000\n"
#. type: Content of: <title>
msgid ""
@@ -95,6 +94,14 @@
"giants such as Facebook and Goodle, and they are still being used in the "
"classrooms even after some of the schools reopened."
msgstr ""
+"ÐбÑемиÑовое ÑаÑÑледование показало, ÑÑо
болÑÑинÑÑво пÑиложений, "
+"ÑекомендованнÑÑ
оÑделами обÑÐ°Ð·Ð¾Ð²Ð°Ð½Ð¸Ñ Ð´Ð»Ñ
Ñдаленного обÑÑÐµÐ½Ð¸Ñ Ð²Ð¾ вÑÐµÐ¼Ñ "
+"пандемии COVID-19, <a
href=\"https://web.archive.org/web/20220525011540/"
+"https://www.washingtonpost.com/technology/2022/05/24/remote-school-app-"
+"tracking-privacy/\">оÑÑлеживаÑÑ Ð¸ ÑобиÑаÑÑ
пеÑÑоналÑнÑе даннÑе деÑей, даже "
+"не доÑÑигÑиÑ
пÑÑи леÑ</a>. ÐÑи пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¸
иÑ
ÑайÑÑ Ð²ÑÑÑлаÑÑ ÑобÑаннÑÑ "
+"инÑоÑмаÑÐ¸Ñ Ð³Ð¸Ð³Ð°Ð½Ñам ÑекламÑ, Ñаким как
Facebook и Google, и вÑе-Ñаки иÑ
"
+"пÑименÑÑÑ Ð² клаÑÑаÑ
даже поÑле
Ð²Ð¾Ð·Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ Ð·Ð°Ð½ÑÑий в ÑколаÑ
."
#. type: Content of: <div><ul><li><p>
msgid ""
Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.397
retrieving revision 1.398
diff -u -b -r1.397 -r1.398
--- proprietary/po/de.po 4 Jun 2022 15:32:14 -0000 1.397
+++ proprietary/po/de.po 4 Jun 2022 17:03:10 -0000 1.398
@@ -12990,14 +12990,6 @@
#. type: Content of: <div><div><div><ul><li>
# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
-# | {+href=\"#SpywareInAllApps\">All Apps</a>+}
-#, fuzzy
-#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
-msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
-msgstr "<a href=\"#SpywareInMobileApps\">⦠in Anwendungssoftware</a>"
-
-#. type: Content of: <div><div><div><ul><li>
-# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
# | {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
#, fuzzy
#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
@@ -13466,23 +13458,6 @@
msgstr " "
#. type: Content of: <div><div><div><h4>
-msgid "All Apps"
-msgstr ""
-
-#. type: Content of: <div><div><div>
-# | <span class=\"anchor-reference-id\">(<a
-# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
-# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
-#, fuzzy
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
-#| "\">#SpywareInMobileApps</a>)</span>"
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
-"\">#SpywareInAllApps</a>)</span>"
-msgstr " "
-
-#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr ""
@@ -17202,6 +17177,20 @@
"<a href=\"/proprietary/malware-microsoft\">Schadsoftware von Microsoft</a>"
#, fuzzy
+#~| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+#~ msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+#~ msgstr "<a href=\"#SpywareInMobileApps\">⦠in Anwendungssoftware</a>"
+
+#, fuzzy
+#~| msgid ""
+#~| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#~| "\">#SpywareInMobileApps</a>)</span>"
+#~ msgid ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+#~ "\">#SpywareInAllApps</a>)</span>"
+#~ msgstr " "
+
+#, fuzzy
#~| msgid "<a href=\"/proprietary/malware-amazon.html\">Amazon Malware</a>"
#~ msgid "<a href=\"/proprietary/malware-edtech.html\">Ed Tech</a>"
#~ msgstr ""
Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.579
retrieving revision 1.580
diff -u -b -r1.579 -r1.580
--- proprietary/po/es.po 4 Jun 2022 15:32:14 -0000 1.579
+++ proprietary/po/es.po 4 Jun 2022 17:03:10 -0000 1.580
@@ -11531,14 +11531,6 @@
"<a href=\"#SpywareInApplications\">Código espÃa en las aplicaciones</a>"
#. type: Content of: <div><div><div><ul><li>
-# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
-# | {+href=\"#SpywareInAllApps\">All+} Apps</a>
-#, fuzzy
-#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
-msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
-msgstr "<a href=\"#SpywareInMobileApps\">Aplicaciones para móviles</a>"
-
-#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr "<a href=\"#SpywareInDesktopApps\">Aplicaciones de escritorio</a>"
@@ -11890,28 +11882,6 @@
"\">#SpywareInApplications</a>)</span>"
#. type: Content of: <div><div><div><h4>
-# | [-Mobile-]{+All+} Apps
-#, fuzzy
-#| msgid "Mobile Apps"
-msgid "All Apps"
-msgstr "Aplicaciones para móviles"
-
-#. type: Content of: <div><div><div>
-# | <span class=\"anchor-reference-id\">(<a
-# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
-# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
-#, fuzzy
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
-#| "\">#SpywareInMobileApps</a>)</span>"
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
-"\">#SpywareInAllApps</a>)</span>"
-msgstr ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
-"\">#SpywareInMobileApps</a>)</span>"
-
-#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr "Aplicaciones de escritorio"
@@ -14352,3 +14322,24 @@
#. type: Content of: <div><div><dl><dd><ul><li>
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+
+#, fuzzy
+#~| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+#~ msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+#~ msgstr "<a href=\"#SpywareInMobileApps\">Aplicaciones para móviles</a>"
+
+#, fuzzy
+#~| msgid "Mobile Apps"
+#~ msgid "All Apps"
+#~ msgstr "Aplicaciones para móviles"
+
+#, fuzzy
+#~| msgid ""
+#~| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#~| "\">#SpywareInMobileApps</a>)</span>"
+#~ msgid ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+#~ "\">#SpywareInAllApps</a>)</span>"
+#~ msgstr ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#~ "\">#SpywareInMobileApps</a>)</span>"
Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.701
retrieving revision 1.702
diff -u -b -r1.701 -r1.702
--- proprietary/po/fr.po 4 Jun 2022 15:32:15 -0000 1.701
+++ proprietary/po/fr.po 4 Jun 2022 17:03:11 -0000 1.702
@@ -11545,14 +11545,6 @@
msgstr "<a href=\"#SpywareInApplications\">Espions dans les applications</a>"
#. type: Content of: <div><div><div><ul><li>
-# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
-# | {+href=\"#SpywareInAllApps\">All+} Apps</a>
-#, fuzzy
-#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
-msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
-msgstr "<a href=\"#SpywareInMobileApps\">Sur mobile</a>"
-
-#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr "<a href=\"#SpywareInDesktopApps\">Sur ordinateur de bureau</a>"
@@ -11904,28 +11896,6 @@
"\">#SpywareInApplications</a>)</span>"
#. type: Content of: <div><div><div><h4>
-# | [-Mobile-]{+All+} Apps
-#, fuzzy
-#| msgid "Mobile Apps"
-msgid "All Apps"
-msgstr "Sur mobile"
-
-#. type: Content of: <div><div><div>
-# | <span class=\"anchor-reference-id\">(<a
-# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
-# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
-#, fuzzy
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
-#| "\">#SpywareInMobileApps</a>)</span>"
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
-"\">#SpywareInAllApps</a>)</span>"
-msgstr ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
-"\">#SpywareInMobileApps</a>)</span>"
-
-#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr "Sur ordinateur de bureau"
@@ -14372,3 +14342,24 @@
#. type: Content of: <div><div><dl><dd><ul><li>
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+
+#, fuzzy
+#~| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+#~ msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+#~ msgstr "<a href=\"#SpywareInMobileApps\">Sur mobile</a>"
+
+#, fuzzy
+#~| msgid "Mobile Apps"
+#~ msgid "All Apps"
+#~ msgstr "Sur mobile"
+
+#, fuzzy
+#~| msgid ""
+#~| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#~| "\">#SpywareInMobileApps</a>)</span>"
+#~ msgid ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+#~ "\">#SpywareInAllApps</a>)</span>"
+#~ msgstr ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#~ "\">#SpywareInMobileApps</a>)</span>"
Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.397
retrieving revision 1.398
diff -u -b -r1.397 -r1.398
--- proprietary/po/it.po 4 Jun 2022 15:32:15 -0000 1.397
+++ proprietary/po/it.po 4 Jun 2022 17:03:11 -0000 1.398
@@ -11874,14 +11874,6 @@
#. type: Content of: <div><div><div><ul><li>
# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
-# | {+href=\"#SpywareInAllApps\">All Apps</a>+}
-#, fuzzy
-#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
-msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
-msgstr "<a href=\"#SpywareInMobileApps\">Spyware in applicazioni mobili</a>"
-
-#. type: Content of: <div><div><div><ul><li>
-# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
# | {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
#, fuzzy
#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
@@ -12345,25 +12337,6 @@
"\">#SpywareIniThings</a>)</span>"
#. type: Content of: <div><div><div><h4>
-msgid "All Apps"
-msgstr ""
-
-#. type: Content of: <div><div><div>
-# | <span class=\"anchor-reference-id\">(<a
-# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
-# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
-#, fuzzy
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
-#| "\">#SpywareInMobileApps</a>)</span>"
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
-"\">#SpywareInAllApps</a>)</span>"
-msgstr ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
-"\">#SpywareInMobileApps</a>)</span>"
-
-#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr ""
@@ -15739,6 +15712,22 @@
"<a href=\"/proprietary/malware-microsoft.html\">Malware di Microsoft</a>"
#, fuzzy
+#~| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+#~ msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+#~ msgstr "<a href=\"#SpywareInMobileApps\">Spyware in applicazioni mobili</a>"
+
+#, fuzzy
+#~| msgid ""
+#~| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#~| "\">#SpywareInMobileApps</a>)</span>"
+#~ msgid ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+#~ "\">#SpywareInAllApps</a>)</span>"
+#~ msgstr ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#~ "\">#SpywareInMobileApps</a>)</span>"
+
+#, fuzzy
#~| msgid "<a href=\"/proprietary/malware-amazon.html\">Amazon Malware</a>"
#~ msgid "<a href=\"/proprietary/malware-edtech.html\">Ed Tech</a>"
#~ msgstr "<a href=\"/proprietary/malware-amazon.html\">Malware di Amazon</a>"
Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.405
retrieving revision 1.406
diff -u -b -r1.405 -r1.406
--- proprietary/po/ja.po 4 Jun 2022 15:32:16 -0000 1.405
+++ proprietary/po/ja.po 4 Jun 2022 17:03:11 -0000 1.406
@@ -9782,12 +9782,6 @@
msgstr "<a href=\"#SpywareInApplications\">ã¢ããªã®ã¹ãã¤ã¦ã§ã¢</a>"
#. type: Content of: <div><div><div><ul><li>
-#, fuzzy
-#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
-msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
-msgstr "<a
href=\"#SpywareInMobileApps\">ã¢ãã¤ã«ã»ã¢ããªã®ã¹ãã¤ã¦ã§ã¢</a>"
-
-#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr ""
@@ -10171,24 +10165,6 @@
"\">#SpywareInApplications</a>)</span>"
#. type: Content of: <div><div><div><h4>
-#, fuzzy
-#| msgid "Spyware in Mobile Applications"
-msgid "All Apps"
-msgstr "ã¢ãã¤ã«ã»ã¢ããªã®ã¹ãã¤ã¦ã§ã¢"
-
-#. type: Content of: <div><div><div>
-#, fuzzy
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
-#| "\">#SpywareInMobileApps</a>)</span>"
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
-"\">#SpywareInAllApps</a>)</span>"
-msgstr ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
-"\">#SpywareInMobileApps</a>)</span>"
-
-#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr ""
@@ -12680,6 +12656,27 @@
msgstr "<a
href=\"/proprietary/malware-microsoft.html\">ãã¤ã¯ãã½ãã</a>"
#, fuzzy
+#~| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+#~ msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+#~ msgstr "<a
href=\"#SpywareInMobileApps\">ã¢ãã¤ã«ã»ã¢ããªã®ã¹ãã¤ã¦ã§ã¢</a>"
+
+#, fuzzy
+#~| msgid "Spyware in Mobile Applications"
+#~ msgid "All Apps"
+#~ msgstr "ã¢ãã¤ã«ã»ã¢ããªã®ã¹ãã¤ã¦ã§ã¢"
+
+#, fuzzy
+#~| msgid ""
+#~| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#~| "\">#SpywareInMobileApps</a>)</span>"
+#~ msgid ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+#~ "\">#SpywareInAllApps</a>)</span>"
+#~ msgstr ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#~ "\">#SpywareInMobileApps</a>)</span>"
+
+#, fuzzy
#~| msgid "<a href=\"/proprietary/malware-amazon.html\">Amazon</a>"
#~ msgid "<a href=\"/proprietary/malware-edtech.html\">Ed Tech</a>"
#~ msgstr "<a href=\"/proprietary/malware-amazon.html\">ã¢ãã¾ã³</a>"
Index: proprietary/po/malware-edtech.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-edtech.ru-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/po/malware-edtech.ru-en.html 5 May 2022 07:38:36 -0000
1.8
+++ proprietary/po/malware-edtech.ru-en.html 4 Jun 2022 17:03:13 -0000
1.9
@@ -78,6 +78,20 @@
<div class="column-limit" id="malware-edtech"></div>
<ul class="blurbs">
+ <li id="M202205240">
+ <!--#set var="DATE" value='<small class="date-tag">2022-05</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A worldwide investigation found that
+ most of the applications that school districts
+ recommended for remote education during the COVID-19 pandemic <a
+
href="https://web.archive.org/web/20220525011540/https://www.washingtonpost.com/technology/2022/05/24/remote-school-app-tracking-privacy/">track
+ and collect personal data from children as young as below the age of
+ five</a>. These applications, and their websites, send the collected
+ information to ad giants such as Facebook and Goodle, and they are
+ still being used in the classrooms even after some of the schools
+ reopened.</p>
+ </li>
+
<li id="M202203010">
<!--#set var="DATE" value='<small class="date-tag">2022-03</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -262,7 +276,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/05/05 07:38:36 $
+$Date: 2022/06/04 17:03:13 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-edtech.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-edtech.ru.po,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary/po/malware-edtech.ru.po 4 Jun 2022 15:02:50 -0000 1.19
+++ proprietary/po/malware-edtech.ru.po 4 Jun 2022 17:03:13 -0000 1.20
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2022-06-04 14:26+0000\n"
#. type: Content of: <title>
msgid ""
@@ -147,6 +146,14 @@
"giants such as Facebook and Goodle, and they are still being used in the "
"classrooms even after some of the schools reopened."
msgstr ""
+"ÐбÑемиÑовое ÑаÑÑледование показало, ÑÑо
болÑÑинÑÑво пÑиложений, "
+"ÑекомендованнÑÑ
оÑделами обÑÐ°Ð·Ð¾Ð²Ð°Ð½Ð¸Ñ Ð´Ð»Ñ
Ñдаленного обÑÑÐµÐ½Ð¸Ñ Ð²Ð¾ вÑÐµÐ¼Ñ "
+"пандемии COVID-19, <a
href=\"https://web.archive.org/web/20220525011540/"
+"https://www.washingtonpost.com/technology/2022/05/24/remote-school-app-"
+"tracking-privacy/\">оÑÑлеживаÑÑ Ð¸ ÑобиÑаÑÑ
пеÑÑоналÑнÑе даннÑе деÑей, даже "
+"не доÑÑигÑиÑ
пÑÑи леÑ</a>. ÐÑи пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¸
иÑ
ÑайÑÑ Ð²ÑÑÑлаÑÑ ÑобÑаннÑÑ "
+"инÑоÑмаÑÐ¸Ñ Ð³Ð¸Ð³Ð°Ð½Ñам ÑекламÑ, Ñаким как
Facebook и Google, и вÑе-Ñаки иÑ
"
+"пÑименÑÑÑ Ð² клаÑÑаÑ
даже поÑле
Ð²Ð¾Ð·Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ Ð·Ð°Ð½ÑÑий в ÑколаÑ
."
#. type: Content of: <div><div><ul><li><p>
msgid ""
Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.398
retrieving revision 1.399
diff -u -b -r1.398 -r1.399
--- proprietary/po/nl.po 4 Jun 2022 15:32:16 -0000 1.398
+++ proprietary/po/nl.po 4 Jun 2022 17:03:13 -0000 1.399
@@ -8749,18 +8749,6 @@
#. type: Content of: <div><div><div><ul><li>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
-# | devices</a>-] {+href=\"#SpywareInAllApps\">All Apps</a>+}
-#, fuzzy
-#| msgid ""
-#| "<a href=\"/proprietary/malware-mobiles.html\">Malware in mobile devices</"
-#| "a>"
-msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
-msgstr ""
-"<a href=\"/proprietary/malware-mobiles.html\">Malware in mobiele apparaten</"
-"a>"
-
-#. type: Content of: <div><div><div><ul><li>
-# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
#, fuzzy
#| msgid ""
@@ -9105,16 +9093,6 @@
msgstr ""
#. type: Content of: <div><div><div><h4>
-msgid "All Apps"
-msgstr ""
-
-#. type: Content of: <div><div><div>
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
-"\">#SpywareInAllApps</a>)</span>"
-msgstr ""
-
-#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr ""
@@ -11341,6 +11319,15 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html\">Microsoft-malware</a>"
#, fuzzy
+#~| msgid ""
+#~| "<a href=\"/proprietary/malware-mobiles.html\">Malware in mobile devices</"
+#~| "a>"
+#~ msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+#~ msgstr ""
+#~ "<a href=\"/proprietary/malware-mobiles.html\">Malware in mobiele "
+#~ "apparaten</a>"
+
+#, fuzzy
#~| msgid "<a href=\"/proprietary/malware-amazon.html\">Amazon</a>"
#~ msgid "<a href=\"/proprietary/malware-edtech.html\">Ed Tech</a>"
#~ msgstr "<a href=\"/proprietary/malware-amazon.html\">Amazon</a>"
Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.397
retrieving revision 1.398
diff -u -b -r1.397 -r1.398
--- proprietary/po/pl.po 4 Jun 2022 15:32:16 -0000 1.397
+++ proprietary/po/pl.po 4 Jun 2022 17:03:13 -0000 1.398
@@ -8014,17 +8014,6 @@
#. type: Content of: <div><div><div><ul><li>
# | <a [-href=\"/philosophy/malware-mobiles.html\">Malware in mobile
-# | devices</a>-] {+href=\"#SpywareInAllApps\">All Apps</a>+}
-#, fuzzy
-#| msgid ""
-#| "<a href=\"/philosophy/malware-mobiles.html\">Malware in mobile devices</a>"
-msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
-msgstr ""
-"<a href=\"/philosophy/malware-mobiles.html\">Malware w urzÄ
dzeniach "
-"mobilnych</a>"
-
-#. type: Content of: <div><div><div><ul><li>
-# | <a [-href=\"/philosophy/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
#, fuzzy
#| msgid ""
@@ -8357,16 +8346,6 @@
msgstr ""
#. type: Content of: <div><div><div><h4>
-msgid "All Apps"
-msgstr ""
-
-#. type: Content of: <div><div><div>
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
-"\">#SpywareInAllApps</a>)</span>"
-msgstr ""
-
-#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr ""
@@ -10724,6 +10703,15 @@
msgstr "<a href=\"/philosophy/malware-microsoft.html\">Malware Microsoftu</a>"
#, fuzzy
+#~| msgid ""
+#~| "<a href=\"/philosophy/malware-mobiles.html\">Malware in mobile devices</"
+#~| "a>"
+#~ msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+#~ msgstr ""
+#~ "<a href=\"/philosophy/malware-mobiles.html\">Malware w urzÄ
dzeniach "
+#~ "mobilnych</a>"
+
+#, fuzzy
#~| msgid "<a href=\"/philosophy/malware-apple.html\">Apple Malware</a>"
#~ msgid "<a href=\"/proprietary/malware-edtech.html\">Ed Tech</a>"
#~ msgstr "<a href=\"/philosophy/malware-apple.html\">Malware Apple'a</a>"
Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.396
retrieving revision 1.397
diff -u -b -r1.396 -r1.397
--- proprietary/po/pot 4 Jun 2022 15:32:17 -0000 1.396
+++ proprietary/po/pot 4 Jun 2022 17:03:15 -0000 1.397
@@ -7602,10 +7602,6 @@
msgstr ""
#. type: Content of: <div><div><div><ul><li>
-msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
-msgstr ""
-
-#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr ""
@@ -7890,16 +7886,6 @@
msgstr ""
#. type: Content of: <div><div><div><h4>
-msgid "All Apps"
-msgstr ""
-
-#. type: Content of: <div><div><div>
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
-"\">#SpywareInAllApps</a>)</span>"
-msgstr ""
-
-#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr ""
Index: proprietary/po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.240
retrieving revision 1.241
diff -u -b -r1.240 -r1.241
--- proprietary/po/proprietary-surveillance.de-diff.html 4 Jun 2022
15:32:17 -0000 1.240
+++ proprietary/po/proprietary-surveillance.de-diff.html 4 Jun 2022
17:03:16 -0000 1.241
@@ -149,16 +149,15 @@
<ul></em></ins></span>
<li><a <span
class="removed"><del><strong>href="#SpywareInToys">Spyware in
Toys</a></li>
</ul>
- </li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInAllApps">All
Apps</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareOnSmartWatches">Spyware on Smart
Watches</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInDesktopApps">Desktop
Apps</a></li></em></ins></span>
+ </li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInDesktopApps">Desktop
Apps</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareOnSmartWatches">Spyware on Smart
Watches</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInMobileApps">Mobile
Apps</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="#SpywareAtLowLevel">Spyware at Low
Level</a>
- <ul></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInMobileApps">Mobile
Apps</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareInBIOS">Spyware in
BIOS</a></li>
+ <ul></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInSkype">Skype</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareInBIOS">Spyware in
BIOS</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInGames">Games</a></li></em></ins></span>
</ul>
- </li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInSkype">Skype</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareAtWork">Spyware at
Work</a></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInGames">Games</a></li>
- </ul>
- <h4><a href="#SpywareInEquipment">Spyware in Connected
Equipment</a></h4></em></ins></span>
+ <span class="removed"><del><strong></li>
+ <li><a href="#SpywareAtWork">Spyware at
Work</a></strong></del></span>
+ <span class="inserted"><ins><em><h4><a
href="#SpywareInEquipment">Spyware in Connected
Equipment</a></h4></em></ins></span>
<ul>
<li><a <span
class="removed"><del><strong>href="#SpywareInSkype">Spyware in
Skype</a></li>
</ul>
@@ -742,7 +741,7 @@
<li id="M202101080">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>As</em></ins></span> of <span class="inserted"><ins><em>2021,
WhatsApp (one of Facebook's subsidiaries) is <a
+ <p>As of 2021, WhatsApp (one</em></ins></span> of <span
class="inserted"><ins><em>Facebook's subsidiaries) is <a
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/">forcing
its</em></ins></span> users <span class="removed"><del><strong>may be
unawarely subject</strong></del></span> to <span
class="removed"><del><strong>poor security guarantees and abusive practices
inflicted by
VPN apps.”</p>
@@ -1523,11 +1522,6 @@
</div>
<div style="clear: left;"></div>
-<div class="big-subsection">
- <h4 id="SpywareInAllApps">All Apps</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInAllApps">#SpywareInAllApps</a>)</span>
-</div>
-
<ul class="blurbs">
<li id="M202205240">
<!--#set var="DATE" value='<small
class="date-tag">2022-05</small>'
@@ -2357,12 +2351,12 @@
GNU/Linux; also, a “clean” Windows install is not really
clean since <a href="/proprietary/malware-microsoft.html">Microsoft
puts</strong></del></span> <span class="inserted"><ins><em>intend to make
these apps spy; on the contrary, it
- worked in various ways to prevent that, and deleted these apps after
+ worked</em></ins></span> in <span class="inserted"><ins><em>various ways
to prevent that, and deleted these apps after
discovering what they did. So we cannot blame Google specifically
for the snooping of these apps.</p>
<p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares</em></ins></span> in <span class="inserted"><ins><em>the
responsibility for the injustice of their being
+ therefore shares in the responsibility for the injustice of their being
nonfree. It also distributes</em></ins></span> its own <span
class="removed"><del><strong>malware</a>.
</p></li>
</ul>
@@ -2601,20 +2595,20 @@
five tracking libraries. Developers of</em></ins></span> this <span
class="removed"><del><strong>code snoops on
readers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>app have confirmed that
the non-premium version of the app does JavaScript injection for
tracking the user and displaying ads.</dd>
- </dl></em></ins></span>
+ </dl>
</li>
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201609210">
+ <li id="M201609210">
<!--#set var="DATE" value='<small
class="date-tag">2016-09</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Google's new voice messaging app <a
href="https://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
+ all conversations</a>.</p></em></ins></span>
</li>
- <li id="M201606050">
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201606050">
<!--#set var="DATE" value='<small
class="date-tag">2016-06</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Facebook's new Magic Photo app <a
@@ -3418,16 +3412,16 @@
<span class="inserted"><ins><em><li id="M201711100">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-surveillance">audio
+ <p>A remote-control sex toy was found to make <a
+
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-surveillance">audio
recordings of the conversation between two users</a>.</p>
</li>
<li id="M201703140">
<!--#set var="DATE" value='<small
class="date-tag">2017-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A computerized vibrator <a
-
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
was snooping on its</em></ins></span> users <span
class="removed"><del><strong>identify themselves</strong></del></span> <span
class="inserted"><ins><em>through the proprietary control
app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
@@ -3904,7 +3898,7 @@
phones. <em>All</em> such data collection should be
forbidden.</p>
<p>But if you really want to be safe, we must make sure the car's
- hardware cannot collect any of that data, or</em></ins></span> that <span
class="inserted"><ins><em>the software
+ hardware cannot collect any of</em></ins></span> that <span
class="inserted"><ins><em>data, or that the software
is free so we know it won't collect any of that data.</p>
</li>
@@ -3986,8 +3980,8 @@
<ul class="blurbs">
<li id="M202008182">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Oculus headsets <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+ <span class="inserted"><ins><em><p>Oculus headsets <a
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
users to identify themselves to Facebook</a>. This will give Facebook
free rein to pervasively snoop on Oculus users.</p>
@@ -3995,8 +3989,8 @@
<li id="M201612230">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
- <span class="inserted"><ins><em><p>VR equipment, measuring every
slight motion,
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>VR equipment, measuring every slight motion,
creates the potential for the most intimate
surveillance ever. All it takes to make this potential real <a
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
@@ -4655,7 +4649,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/06/04 15:32:17 $
+$Date: 2022/06/04 17:03:16 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.432
retrieving revision 1.433
diff -u -b -r1.432 -r1.433
--- proprietary/po/proprietary-surveillance.de.po 4 Jun 2022 15:32:18
-0000 1.432
+++ proprietary/po/proprietary-surveillance.de.po 4 Jun 2022 17:03:17
-0000 1.433
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2022-06-04 15:25+0000\n"
+"POT-Creation-Date: 2022-06-04 16:56+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -270,14 +270,6 @@
#. type: Content of: <div><div><div><ul><li>
# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
-# | {+href=\"#SpywareInAllApps\">All Apps</a>+}
-#, fuzzy
-#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
-msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
-msgstr "<a href=\"#SpywareInMobileApps\">⦠in Anwendungssoftware</a>"
-
-#. type: Content of: <div><div><div><ul><li>
-# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
# | {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
#, fuzzy
#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
@@ -2460,23 +2452,6 @@
"\">#SpywareInApplications</a>)</span>"
msgstr " "
-#. type: Content of: <div><div><div><h4>
-msgid "All Apps"
-msgstr ""
-
-#. type: Content of: <div><div><div>
-# | <span class=\"anchor-reference-id\">(<a
-# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
-# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
-#, fuzzy
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
-#| "\">#SpywareInMobileApps</a>)</span>"
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
-"\">#SpywareInAllApps</a>)</span>"
-msgstr " "
-
#. type: Content of: <div><div><ul><li><p>
msgid ""
"A worldwide investigation found that most of the applications that school "
@@ -6998,6 +6973,20 @@
msgid "Updated:"
msgstr "Letzte Ãnderung:"
+#, fuzzy
+#~| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+#~ msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+#~ msgstr "<a href=\"#SpywareInMobileApps\">⦠in Anwendungssoftware</a>"
+
+#, fuzzy
+#~| msgid ""
+#~| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#~| "\">#SpywareInMobileApps</a>)</span>"
+#~ msgid ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+#~ "\">#SpywareInAllApps</a>)</span>"
+#~ msgstr " "
+
#~ msgid ""
#~ "We can suppose Microsoft look at users' files for the US government on "
#~ "demand, though the “privacy policy” does not explicit say so. "
Index: proprietary/po/proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.289
retrieving revision 1.290
diff -u -b -r1.289 -r1.290
--- proprietary/po/proprietary-surveillance.es.po 4 Jun 2022 15:32:19
-0000 1.289
+++ proprietary/po/proprietary-surveillance.es.po 4 Jun 2022 17:03:17
-0000 1.290
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-06-04 15:25+0000\n"
+"POT-Creation-Date: 2022-06-04 16:56+0000\n"
"PO-Revision-Date: 2022-04-19 00:42+0200\n"
"Last-Translator: Dora Scilipoti <dora AT gnu DOT org>\n"
"Language-Team: Spanish\n"
@@ -204,14 +204,6 @@
"<a href=\"#SpywareInApplications\">Código espÃa en las aplicaciones</a>"
#. type: Content of: <div><div><div><ul><li>
-# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
-# | {+href=\"#SpywareInAllApps\">All+} Apps</a>
-#, fuzzy
-#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
-msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
-msgstr "<a href=\"#SpywareInMobileApps\">Aplicaciones para móviles</a>"
-
-#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr "<a href=\"#SpywareInDesktopApps\">Aplicaciones de escritorio</a>"
@@ -1797,28 +1789,6 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInApplications"
"\">#SpywareInApplications</a>)</span>"
-#. type: Content of: <div><div><div><h4>
-# | [-Mobile-]{+All+} Apps
-#, fuzzy
-#| msgid "Mobile Apps"
-msgid "All Apps"
-msgstr "Aplicaciones para móviles"
-
-#. type: Content of: <div><div><div>
-# | <span class=\"anchor-reference-id\">(<a
-# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
-# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
-#, fuzzy
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
-#| "\">#SpywareInMobileApps</a>)</span>"
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
-"\">#SpywareInAllApps</a>)</span>"
-msgstr ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
-"\">#SpywareInMobileApps</a>)</span>"
-
#. type: Content of: <div><div><ul><li><p>
msgid ""
"A worldwide investigation found that most of the applications that school "
@@ -5950,3 +5920,24 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima actualización:"
+
+#, fuzzy
+#~| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+#~ msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+#~ msgstr "<a href=\"#SpywareInMobileApps\">Aplicaciones para móviles</a>"
+
+#, fuzzy
+#~| msgid "Mobile Apps"
+#~ msgid "All Apps"
+#~ msgstr "Aplicaciones para móviles"
+
+#, fuzzy
+#~| msgid ""
+#~| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#~| "\">#SpywareInMobileApps</a>)</span>"
+#~ msgid ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+#~ "\">#SpywareInAllApps</a>)</span>"
+#~ msgstr ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#~ "\">#SpywareInMobileApps</a>)</span>"
Index: proprietary/po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.711
retrieving revision 1.712
diff -u -b -r1.711 -r1.712
--- proprietary/po/proprietary-surveillance.fr.po 4 Jun 2022 15:32:19
-0000 1.711
+++ proprietary/po/proprietary-surveillance.fr.po 4 Jun 2022 17:03:17
-0000 1.712
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-06-04 15:25+0000\n"
+"POT-Creation-Date: 2022-06-04 16:56+0000\n"
"PO-Revision-Date: 2022-05-11 12:31+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -195,14 +195,6 @@
msgstr "<a href=\"#SpywareInApplications\">Espions dans les applications</a>"
#. type: Content of: <div><div><div><ul><li>
-# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
-# | {+href=\"#SpywareInAllApps\">All+} Apps</a>
-#, fuzzy
-#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
-msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
-msgstr "<a href=\"#SpywareInMobileApps\">Sur mobile</a>"
-
-#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr "<a href=\"#SpywareInDesktopApps\">Sur ordinateur de bureau</a>"
@@ -1791,28 +1783,6 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInApplications"
"\">#SpywareInApplications</a>)</span>"
-#. type: Content of: <div><div><div><h4>
-# | [-Mobile-]{+All+} Apps
-#, fuzzy
-#| msgid "Mobile Apps"
-msgid "All Apps"
-msgstr "Sur mobile"
-
-#. type: Content of: <div><div><div>
-# | <span class=\"anchor-reference-id\">(<a
-# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
-# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
-#, fuzzy
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
-#| "\">#SpywareInMobileApps</a>)</span>"
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
-"\">#SpywareInAllApps</a>)</span>"
-msgstr ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
-"\">#SpywareInMobileApps</a>)</span>"
-
#. type: Content of: <div><div><ul><li><p>
msgid ""
"A worldwide investigation found that most of the applications that school "
@@ -5959,3 +5929,24 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#, fuzzy
+#~| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+#~ msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+#~ msgstr "<a href=\"#SpywareInMobileApps\">Sur mobile</a>"
+
+#, fuzzy
+#~| msgid "Mobile Apps"
+#~ msgid "All Apps"
+#~ msgstr "Sur mobile"
+
+#, fuzzy
+#~| msgid ""
+#~| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#~| "\">#SpywareInMobileApps</a>)</span>"
+#~ msgid ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+#~ "\">#SpywareInAllApps</a>)</span>"
+#~ msgstr ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#~ "\">#SpywareInMobileApps</a>)</span>"
Index: proprietary/po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.304
retrieving revision 1.305
diff -u -b -r1.304 -r1.305
--- proprietary/po/proprietary-surveillance.it-diff.html 4 Jun 2022
15:32:20 -0000 1.304
+++ proprietary/po/proprietary-surveillance.it-diff.html 4 Jun 2022
17:03:17 -0000 1.305
@@ -141,13 +141,12 @@
<span class="inserted"><ins><em><h4><a</em></ins></span>
href="#SpywareOnMobiles">Spyware on <span
class="removed"><del><strong>Mobiles</a></strong></del></span> <span
class="inserted"><ins><em>Mobiles</a></h4></em></ins></span>
<ul>
<li><a <span
class="removed"><del><strong>href="#SpywareIniThings">Spyware in
iThings</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInTelephones">All
“Smart” Phones</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareInTelephones">Spyware
in</strong></del></span> <span
class="inserted"><ins><em>href="#SpywareIniThings">iThings</a></li>
- <li><a href="#SpywareInAndroid">Android</em></ins></span>
Telephones</a></li>
- <li><a <span
class="removed"><del><strong>href="#SpywareInMobileApps">Spyware</strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">E-Readers</a></li>
+ <li><a <span
class="removed"><del><strong>href="#SpywareInTelephones">Spyware in
Telephones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareIniThings">iThings</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareInMobileApps">Spyware in Mobile
Applications</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInAndroid">Android
Telephones</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareInGames">Spyware</strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">E-Readers</a></li>
</ul>
- <h4><a href="#SpywareInApplications">Spyware</em></ins></span>
in <span class="removed"><del><strong>Mobile
Applications</a></li></strong></del></span> <span
class="inserted"><ins><em>Applications</a></h4>
+ <h4><a href="#SpywareInApplications">Spyware</em></ins></span>
in <span
class="removed"><del><strong>Games</a></li></strong></del></span>
<span class="inserted"><ins><em>Applications</a></h4>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareInGames">Spyware in
Games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInAllApps">All
Apps</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="#SpywareInToys">Spyware in
Toys</a></li>
</ul>
</li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInDesktopApps">Desktop
Apps</a></li></em></ins></span>
@@ -1410,19 +1409,14 @@
</div>
<div style="clear: left;"></div>
-<div class="big-subsection">
- <h4 id="SpywareInAllApps">All Apps</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInAllApps">#SpywareInAllApps</a>)</span>
-</div>
-
<ul class="blurbs">
<li id="M202205240">
<!--#set var="DATE" value='<small
class="date-tag">2022-05</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>A worldwide investigation found</em></ins></span> that <span
class="removed"><del><strong>it will</a>
pre-install on some</strong></del></span>
- <span class="inserted"><ins><em>most</em></ins></span> of <span
class="removed"><del><strong>its phones. The app will give
Verizon</strong></del></span> the <span class="removed"><del><strong>same
- information about the users' searches</strong></del></span> <span
class="inserted"><ins><em>applications</em></ins></span> that <span
class="removed"><del><strong>Google normally gets when
+ <span class="inserted"><ins><em>most</em></ins></span> of <span
class="removed"><del><strong>its phones. The app will give Verizon the same
+ information about</strong></del></span> the <span
class="removed"><del><strong>users' searches</strong></del></span> <span
class="inserted"><ins><em>applications</em></ins></span> that <span
class="removed"><del><strong>Google normally gets when
they use its search engine.</p>
<p>Currently,</strong></del></span> <span
class="inserted"><ins><em>school districts
@@ -1873,11 +1867,10 @@
<p>The company</strong></del></span> <span
class="inserted"><ins><em>own pregnancy choices. Don't use
these apps, even if someone offers you a reward to do so. A
- free-software app</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em>does more or less</em></ins></span> the <span
class="removed"><del><strong>vibrator
- <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots</strong></del></span> <span
class="inserted"><ins><em>same thing without
- spying on you is available from <a
- href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
+ free-software app</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em>does more or less</em></ins></span> the <span
class="removed"><del><strong>vibrator</strong></del></span> <span
class="inserted"><ins><em>same thing without
+ spying on you is available from</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,
and <a
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
a new one is being developed</a>.</p>
</li>
@@ -2950,8 +2943,8 @@
<li id="M201901070">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p>Vizio <span class="inserted"><ins><em>TVs <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Vizio TVs <a
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
collect “whatever the TV sees,”</a> in the own words of
the company's
CTO, and this data is sold to third parties. This is in return for
@@ -2964,7 +2957,7 @@
and there is no guarantee that all future updates will leave the
settings unchanged.</p>
- <p>If you already own a Vizio</em></ins></span> “smart”
<span class="inserted"><ins><em>TV (or any “smart” TV, for that
+ <p>If you already own a Vizio “smart” TV (or any
“smart” TV, for that
matter), the easiest way to make sure it isn't spying on you is
to disconnect it from the Internet, and use a terrestrial antenna
instead. Unfortunately, this is not always possible. Another option,
@@ -2983,16 +2976,16 @@
<p>We link to the article for the facts it presents. It
is too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix
app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ moral weakness of surrendering to Netflix. The Netflix app <a
+ href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
<li id="M201702060">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Vizio “smart” <a
-
href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs</em></ins></span>
+ --><!--#echo encoding="none" var="DATE" --></em></ins></span>
+ <p>Vizio “smart” <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs</em></ins></span>
report everything that is viewed on them, and not just broadcasts and
cable</a>. Even if the image is coming from the user's own computer,
the TV reports what it is. The existence of a way to disable the
@@ -3079,20 +3072,20 @@
watching</strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
snoops on what programs people watch,</em></ins></span> and <span
class="removed"><del><strong>listening all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>even what they wanted to
- record</a>.</p></em></ins></span>
+ record</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>The</strong></del></span>
- <span class="inserted"><ins><em><li id="M201504300">
+ <li id="M201504300">
<!--#set var="DATE" value='<small
class="date-tag">2015-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio <a
href="https://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
used a firmware “upgrade” to make its TVs snoop on what
- users watch</a>. The TVs did not do that when first sold.</p>
+ users watch</a>. The TVs did not do that when first
sold.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>The</strong></del></span>
- <li id="M201502090">
+ <span class="inserted"><ins><em><li id="M201502090">
<!--#set var="DATE" value='<small
class="date-tag">2015-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The</em></ins></span> Samsung “Smart” TV <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits</strong></del></span>
@@ -3808,8 +3801,8 @@
<ul class="blurbs">
<li id="M202008182">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
- <span class="inserted"><ins><em><p>Oculus headsets <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Oculus headsets <a
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
users to identify themselves to Facebook</a>. This will give Facebook
free rein to pervasively snoop on Oculus users.</p>
@@ -3817,8 +3810,8 @@
<li id="M201612230">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>VR equipment, measuring every slight motion,
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+ <span class="inserted"><ins><em><p>VR equipment, measuring every
slight motion,
creates the potential for the most intimate
surveillance ever. All it takes to make this potential real <a
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
@@ -4010,8 +4003,8 @@
<li id="M201807190">
<!--#set var="DATE" value='<small
class="date-tag">2018-07</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
- <span class="inserted"><ins><em><p>British Airways used <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
JavaScript on its web site to give other companies personal data on
its customers</a>.</p>
@@ -4027,8 +4020,8 @@
<li id="M201711150">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Some websites send
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+ <span class="inserted"><ins><em><p>Some websites send
JavaScript code to collect all the user's input, <a
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
can then be used to reproduce the whole session</a>.</p>
@@ -4454,7 +4447,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/06/04 15:32:20 $
+$Date: 2022/06/04 17:03:17 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.444
retrieving revision 1.445
diff -u -b -r1.444 -r1.445
--- proprietary/po/proprietary-surveillance.it.po 4 Jun 2022 15:32:21
-0000 1.444
+++ proprietary/po/proprietary-surveillance.it.po 4 Jun 2022 17:03:18
-0000 1.445
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-06-04 15:25+0000\n"
+"POT-Creation-Date: 2022-06-04 16:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -261,14 +261,6 @@
#. type: Content of: <div><div><div><ul><li>
# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
-# | {+href=\"#SpywareInAllApps\">All Apps</a>+}
-#, fuzzy
-#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
-msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
-msgstr "<a href=\"#SpywareInMobileApps\">Spyware in applicazioni mobili</a>"
-
-#. type: Content of: <div><div><div><ul><li>
-# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
# | {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
#, fuzzy
#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
@@ -2339,25 +2331,6 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareIniThings"
"\">#SpywareIniThings</a>)</span>"
-#. type: Content of: <div><div><div><h4>
-msgid "All Apps"
-msgstr ""
-
-#. type: Content of: <div><div><div>
-# | <span class=\"anchor-reference-id\">(<a
-# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
-# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
-#, fuzzy
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
-#| "\">#SpywareInMobileApps</a>)</span>"
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
-"\">#SpywareInAllApps</a>)</span>"
-msgstr ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
-"\">#SpywareInMobileApps</a>)</span>"
-
#. type: Content of: <div><div><ul><li><p>
msgid ""
"A worldwide investigation found that most of the applications that school "
@@ -6393,6 +6366,22 @@
msgid "Updated:"
msgstr "Ultimo aggiornamento:"
+#, fuzzy
+#~| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+#~ msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+#~ msgstr "<a href=\"#SpywareInMobileApps\">Spyware in applicazioni mobili</a>"
+
+#, fuzzy
+#~| msgid ""
+#~| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#~| "\">#SpywareInMobileApps</a>)</span>"
+#~ msgid ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+#~ "\">#SpywareInAllApps</a>)</span>"
+#~ msgstr ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#~ "\">#SpywareInMobileApps</a>)</span>"
+
#~ msgid ""
#~ "We can suppose Microsoft look at users' files for the US government on "
#~ "demand, though the “privacy policy” does not explicit say so. "
Index: proprietary/po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.322
retrieving revision 1.323
diff -u -b -r1.322 -r1.323
--- proprietary/po/proprietary-surveillance.ja-diff.html 4 Jun 2022
15:32:21 -0000 1.322
+++ proprietary/po/proprietary-surveillance.ja-diff.html 4 Jun 2022
17:03:19 -0000 1.323
@@ -141,13 +141,12 @@
<span class="inserted"><ins><em><h4><a</em></ins></span>
href="#SpywareOnMobiles">Spyware on <span
class="removed"><del><strong>Mobiles</a></strong></del></span> <span
class="inserted"><ins><em>Mobiles</a></h4></em></ins></span>
<ul>
<li><a <span
class="removed"><del><strong>href="#SpywareIniThings">Spyware in
iThings</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInTelephones">All
“Smart” Phones</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareInTelephones">Spyware
in</strong></del></span> <span
class="inserted"><ins><em>href="#SpywareIniThings">iThings</a></li>
- <li><a href="#SpywareInAndroid">Android</em></ins></span>
Telephones</a></li>
- <li><a <span
class="removed"><del><strong>href="#SpywareInMobileApps">Spyware</strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">E-Readers</a></li>
+ <li><a <span
class="removed"><del><strong>href="#SpywareInTelephones">Spyware in
Telephones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareIniThings">iThings</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareInMobileApps">Spyware in Mobile
Applications</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInAndroid">Android
Telephones</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareInGames">Spyware</strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">E-Readers</a></li>
</ul>
- <h4><a href="#SpywareInApplications">Spyware</em></ins></span>
in <span class="removed"><del><strong>Mobile
Applications</a></li></strong></del></span> <span
class="inserted"><ins><em>Applications</a></h4>
+ <h4><a href="#SpywareInApplications">Spyware</em></ins></span>
in <span
class="removed"><del><strong>Games</a></li></strong></del></span>
<span class="inserted"><ins><em>Applications</a></h4>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareInGames">Spyware in
Games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInAllApps">All
Apps</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="#SpywareInToys">Spyware in
Toys</a></li>
</ul>
</li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInDesktopApps">Desktop
Apps</a></li></em></ins></span>
@@ -188,15 +187,15 @@
<li><a <span
class="removed"><del><strong>href="#SpywareEverywhere">Spyware
Everywhere</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInJavaScript">JavaScript</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="#SpywareInVR">Spyware In
VR</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInFlash">Flash</a></li></em></ins></span>
</ul>
-<span class="removed"><del><strong></div></strong></del></span>
<span class="inserted"><ins><em><h4><a
href="#SpywareInNetworks">Spyware in
Networks</a></h4></em></ins></span>
</div>
-<div <span class="removed"><del><strong>style="clear: left;"></div>
+<span class="removed"><del><strong></div>
+<div style="clear: left;"></div>
-<!-- #Introduction -->
+<!-- #Introduction --></strong></del></span>
-<div</strong></del></span> class="big-section">
+<div class="big-section">
<h3 id="Introduction">Introduction</h3>
</div>
<div style="clear: left;"></div>
@@ -1151,15 +1150,15 @@
<p>Facebook's app got “consent” to <a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
upload call logs automatically</em></ins></span> from <span
class="inserted"><ins><em>Android phones</a> while disguising
- what</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call,</strong></del></span> <span
class="inserted"><ins><em>“consent” was for.</p>
+ what the “consent” was for.</p>
</li>
<li id="M201811230">
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>An Android phone was observed to track</em></ins></span> location
<span class="inserted"><ins><em>even while
- in airplane mode. It didn't send the location data while in
+ <p>An Android phone was observed to track location even while
+ in airplane mode. It didn't send</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call,</strong></del></span> location <span
class="inserted"><ins><em>data while in
airplane mode. Instead, <a
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
it saved up the data,</em></ins></span> and <span
class="removed"><del><strong>web
@@ -1238,149 +1237,55 @@
</li>
<span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
- remote command and users cannot stop them:
- <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable phones
- to have GPS.)</p>
- </li>
-
- <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span>
+ remote command and users cannot stop them:</strong></del></span>
<span class="inserted"><ins><em><li id="M201307280">
<!--#set var="DATE" value='<small
class="date-tag">2013-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Spyware</em></ins></span> is <span
class="removed"><del><strong>to restrict
- the</strong></del></span> <span class="inserted"><ins><em>present in
some Android devices when they are
+ <p>Spyware is present in some Android devices when they are
sold. Some Motorola phones, made when this company was owned
- by Google,</em></ins></span> use <span class="inserted"><ins><em>a
modified version</em></ins></span> of <span class="removed"><del><strong>data
on the user's computer, but it does surveillance
- too:</strong></del></span> <span class="inserted"><ins><em>Android
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries</strong></del></span>
+ by Google, use a modified version of Android that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable
phones</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal data</em></ins></span> to <span
class="removed"><del><strong>get the user's list of other people's phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p></em></ins></span>
+ sends personal data</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p></em></ins></span>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
-</div>
-<ul>
-
- <li><p>The Uber app tracks</strong></del></span>
+ <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose</strong></del></span>
<span class="inserted"><ins><em><li id="M201307250">
<!--#set var="DATE" value='<small
class="date-tag">2013-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
-
- <p>This example illustrates how “getting the user's
consent”</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens</em></ins></span> for <span
class="removed"><del><strong>surveillance is inadequate as a protection against
massive
- surveillance.</p>
- </li>
-
- <li><p>Google's new</strong></del></span> voice <span
class="removed"><del><strong>messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs</strong></del></span>
all <span class="removed"><del><strong>conversations</a>.</p>
- </li>
-
- <li><p>Apps that include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also on what users post on various sites
- such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>the time</a>.</p></em></ins></span>
+ <p>A Motorola phone <a
+
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all the time</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201302150">
+ <li id="M201302150">
<!--#set var="DATE" value='<small
class="date-tag">2013-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google Play intentionally sends</em></ins></span> app <span
class="inserted"><ins><em>developers</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known faces</a>,
- and suggests you to share the picture you take according to who
- is in the frame.</p>
-
- <p>This spyware feature seems to require online access to some
- known-faces database, which means the pictures are likely to be
- sent across</strong></del></span>
- <span
class="inserted"><ins><em>href="https://gadgets360.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
- the <span class="removed"><del><strong>wire to Facebook's servers and
face-recognition
- algorithms.</p>
-
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>personal details</em></ins></span> of <span
class="removed"><del><strong>Facebook users' pictures are private
- anymore, even if</strong></del></span> <span
class="inserted"><ins><em>users that install</em></ins></span> the <span
class="removed"><del><strong>user didn't “upload” them
to</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
-
- <p>Merely asking</em></ins></span> the <span
class="removed"><del><strong>service.</p>
- </li>
-
- <li><p>Like most “music screaming” disservices,
Spotify
- is based on proprietary malware (DRM and snooping). In August
- 2015 it <a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded</strong></del></span> <span
class="inserted"><ins><em>“consent” of</em></ins></span> users
<span class="removed"><del><strong>submit to increased snooping</a>, and
some
- are starting to realize that it</strong></del></span> is <span
class="removed"><del><strong>nasty.</p>
-
- <p>This article shows the <a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way</strong></del></span>
<span class="inserted"><ins><em>not enough</em></ins></span> to <span
class="removed"><del><strong>“serve”</strong></del></span>
- <span class="inserted"><ins><em>legitimize actions like this. At this
point, most</em></ins></span> users <span
class="removed"><del><strong>better</a>—never mind
- whether they want that. This is a typical example of
- the attitude of the proprietary software industry towards
- those they</strong></del></span> have <span
class="removed"><del><strong>subjugated.</p>
-
- <p>Out, out, damned Spotify!</p>
- </li>
- <li><p>Many proprietary apps for mobile devices report which
other
- apps</strong></del></span> <span class="inserted"><ins><em>stopped
- reading</em></ins></span> the <span class="removed"><del><strong>user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible</strong></del></span>
<span class="inserted"><ins><em>“Terms</em></ins></span> and
- <span class="removed"><del><strong>optional</a>. Not as bad
as</strong></del></span> <span class="inserted"><ins><em>Conditions” that
spell out</em></ins></span> what
- <span class="inserted"><ins><em>they are “consenting” to.
Google should clearly and
- honestly identify</em></ins></span> the <span
class="removed"><del><strong>others do.</p>
- </li>
-
- <li><p>FTC says most mobile apps for children don't respect
privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
- </li>
-
- <li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop</strong></del></span> <span
class="inserted"><ins><em>information it collects</em></ins></span> on <span
class="removed"><del><strong>the user</a>. This is</strong></del></span>
<span class="inserted"><ins><em>users, instead of
- hiding it</em></ins></span> in <span
class="removed"><del><strong>addition</strong></del></span> <span
class="inserted"><ins><em>an obscurely worded EULA.</p>
-
- <p>However,</em></ins></span> to
- <span class="removed"><del><strong>the snooping done by the phone
company,</strong></del></span> <span class="inserted"><ins><em>truly protect
people's privacy, we must prevent Google</em></ins></span>
- and <span class="removed"><del><strong>perhaps by the OS in the
- phone.</p>
-
- <p>Don't be distracted by the question of whether the app
developers get
- users to say “I agree”. That is no excuse for
malware.</p>
- </li>
-
- <li><p>The Brightest Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p>
-
- <p>The FTC criticized</strong></del></span> <span
class="inserted"><ins><em>other companies from getting</em></ins></span> this
<span class="removed"><del><strong>app because it asked the user to
- approve sending</strong></del></span> personal <span
class="removed"><del><strong>data to the app developer but did not
- ask about sending it to other companies. This shows the
- weakness of</strong></del></span> <span
class="inserted"><ins><em>information in</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should</strong></del></span>
- <span class="inserted"><ins><em>first place!</p>
+ <p>Google Play intentionally sends app developers <a
+
href="https://gadgets360.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+ the personal details of users that install the app</a>.</p>
+
+ <p>Merely asking the “consent” of
users</em></ins></span> is <span class="inserted"><ins><em>not
enough</em></ins></span> to <span
class="removed"><del><strong>restrict</strong></del></span>
+ <span class="inserted"><ins><em>legitimize actions like this. At this
point, most users have stopped
+ reading</em></ins></span> the <span class="removed"><del><strong>use of
data on</strong></del></span> <span class="inserted"><ins><em>“Terms and
Conditions” that spell out what
+ they are “consenting” to. Google should clearly and
+ honestly identify</em></ins></span> the <span
class="removed"><del><strong>user's computer, but</strong></del></span> <span
class="inserted"><ins><em>information</em></ins></span> it <span
class="removed"><del><strong>does surveillance
+ too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"></strong></del></span>
<span class="inserted"><ins><em>collects on users, instead of
+ hiding</em></ins></span> it <span
class="removed"><del><strong>tries</strong></del></span> <span
class="inserted"><ins><em>in an obscurely worded EULA.</p>
+
+ <p>However,</em></ins></span> to <span
class="removed"><del><strong>get the user's list of other</strong></del></span>
<span class="inserted"><ins><em>truly protect</em></ins></span> people's <span
class="removed"><del><strong>phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>privacy, we must prevent Google
+ and other companies from getting this personal information in the
+ first place!</p>
</li>
<li id="M201111170">
<!--#set var="DATE" value='<small
class="date-tag">2011-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some manufacturers add</em></ins></span> a <span
class="removed"><del><strong>flashlight
- app send any information to anyone? A free software flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Some manufacturers add a <a
href="https://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
hidden general surveillance package such as Carrier
IQ</a>.</p></em></ins></span>
</li>
@@ -1388,298 +1293,223 @@
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInGames">Spyware in
Games</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInGames">#SpywareInGames</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
- <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves</strong></del></span>
+
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201603080">
<!--#set var="DATE" value='<small
class="date-tag">2016-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>E-books can contain JavaScript code,</em></ins></span> and <span
class="removed"><del><strong>then sends personal data about them to
- nVidia servers</a>.</p>
- </li>
+ <p>E-books can contain JavaScript code,</em></ins></span> and <span
class="removed"><del><strong>after the ride</a>.</p>
- <li><p>Angry Birds</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and the NSA takes advantage to spy through it
too</a>.
- Here's information</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops</em></ins></span> on
- <span class="removed"><del><strong><a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>readers</a>.</p></em></ins></span>
+ <p>This example illustrates how “getting the user's
consent”
+ for surveillance is inadequate as a protection against massive
+ surveillance.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
+ <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
+ </li>
-<ul>
+ <li><p>Apps that include</strong></del></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users
post</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops</em></ins></span> on <span
class="removed"><del><strong>various sites
+ such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>readers</a>.</p></em></ins></span>
+ </li>
- <li><p>A company that makes internet-controlled
vibrators</strong></del></span>
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
<span class="inserted"><ins><em><li id="M201410080">
<!--#set var="DATE" value='<small
class="date-tag">2014-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Adobe made “Digital Editions,”
- the e-reader used by most US libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
- being sued for collecting</strong></del></span>
+ the e-reader used by most US libraries,</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known faces</a>,
+ and suggests you</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send</em></ins></span> lots of <span class="removed"><del><strong>personal
information about how
- people use it</a>.</p>
-
- <p>The company's statement that it anonymizes the data may be
- true, but it doesn't really matter. If it sells
the</strong></del></span> data to <span class="removed"><del><strong>a
- data broker, the data broker can figure out who the user is.</p>
+ send lots of data</em></ins></span> to <span
class="removed"><del><strong>share the picture you take
according</strong></del></span> <span
class="inserted"><ins><em>Adobe</a>. Adobe's “excuse”: it's
+ needed</em></ins></span> to <span class="removed"><del><strong>who
+ is</strong></del></span> <span class="inserted"><ins><em>check
DRM!</p>
</li>
- <li><p>A computerized
- vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops
- on its users through the proprietary control app</a>.</p>
-
- <p>The app reports the temperature of the vibrator minute by
- minute (thus, indirectly, whether it is surrounded by a person's
- body), and the vibration frequency.</p>
-
- <p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about
- their products, rather than free software which users
can</strong></del></span> <span class="inserted"><ins><em>Adobe</a>.
Adobe's “excuse”: it's
- needed to</em></ins></span> check
- <span class="removed"><del><strong>and
change.</p></strong></del></span> <span
class="inserted"><ins><em>DRM!</p></em></ins></span>
- </li>
- <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201212030">
+ <li id="M201212030">
<!--#set var="DATE" value='<small
class="date-tag">2012-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Spyware in many e-readers—not only the
Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults.</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
- report even which page the user reads at what
time</a>.</p></em></ins></span>
- </li>
-</ul>
+ <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>many
e-readers—not only</em></ins></span> the <span
class="removed"><del><strong>frame.</p>
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means the pictures are likely to be
+ sent across the wire to Facebook's servers and face-recognition
+ algorithms.</p>
-<span class="removed"><del><strong><!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
+ <p>If so, none of Facebook users' pictures are private
+ anymore,</strong></del></span> <span class="inserted"><ins><em>Kindle:
<a
+ href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
+ report</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>which page</em></ins></span> the user <span
class="removed"><del><strong>didn't “upload” them to the
service.</p></strong></del></span> <span class="inserted"><ins><em>reads
at what time</a>.</p></em></ins></span>
+ </li>
+
+ <span
class="removed"><del><strong><li><p>Like</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-section">
- <h3 <span class="removed"><del><strong>id="SpywareAtLowLevel">Spyware
at Low Level</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInApplications">Spyware in
Applications</h3></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInApplications">#SpywareInApplications</a>)</span></em></ins></span>
+ <h3 id="SpywareInApplications">Spyware in Applications</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareInApplications">#SpywareInApplications</a>)</span>
</div>
<div style="clear: left;"></div>
-<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInAllApps">All
Apps</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInAllApps">#SpywareInAllApps</a>)</span></em></ins></span>
-</div>
-
-<span class="removed"><del><strong><ul>
-<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202205240">
<!--#set var="DATE" value='<small
class="date-tag">2022-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A worldwide investigation found</em></ins></span> that
- <span class="inserted"><ins><em>most of</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a “clean” Windows install is not really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows</strong></del></span> <span
class="inserted"><ins><em>applications that school districts
- recommended for remote education during the COVID-19
pandemic</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
+ <p>A worldwide investigation found that</em></ins></span>
+ most <span class="removed"><del><strong>“music screaming”
disservices, Spotify
+ is based on proprietary malware (DRM and snooping). In August
+ 2015 it <a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased snooping</a>, and some
+ are starting to realize</strong></del></span> <span
class="inserted"><ins><em>of the applications</em></ins></span> that <span
class="removed"><del><strong>it is nasty.</p>
- <p>Specifically, it can</strong></del></span>
+ <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>school districts
+ recommended for remote education during</em></ins></span> the <span
class="inserted"><ins><em>COVID-19 pandemic</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20220525011540/https://www.washingtonpost.com/technology/2022/05/24/remote-school-app-tracking-privacy/">track
- and</em></ins></span> collect <span class="inserted"><ins><em>personal
data from children as young as below</em></ins></span> the <span
class="removed"><del><strong>emails of members</strong></del></span> <span
class="inserted"><ins><em>age</em></ins></span> of <span
class="removed"><del><strong>Parliament
- this way, because</strong></del></span>
- <span class="inserted"><ins><em>five</a>. These applications, and
their websites, send the collected
- information to ad giants such as Facebook and Goodle,
and</em></ins></span> they <span class="removed"><del><strong>pass it through
Microsoft.</p></li>
+ and collect personal data from children</em></ins></span> as <span
class="removed"><del><strong>a way</strong></del></span> <span
class="inserted"><ins><em>young as below the age of
+ five</a>. These applications, and their websites, send the collected
+ information</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
+ whether</strong></del></span> <span class="inserted"><ins><em>ad giants
such as Facebook and Goodle, and</em></ins></span> they <span
class="removed"><del><strong>want that. This is a typical example
of</strong></del></span> <span class="inserted"><ins><em>are
+ still being used in</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>classrooms even after some</em></ins></span> of the
<span class="removed"><del><strong>proprietary software industry towards
+ those they have subjugated.</p>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>are
- still being used</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>the classrooms even after some of the schools
+ <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>schools
reopened.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other
+ apps the user has
+ installed.</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDesktopApps">Desktop
Apps</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span></em></ins></span>
+ <h4 id="SpywareInDesktopApps">Desktop Apps</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Spyware in Skype:</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202011260">
<!--#set var="DATE" value='<small
class="date-tag">2020-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft's Office 365 suite enables employers</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.</strong></del></span>
+ <p>Microsoft's Office 365 suite enables employers</em></ins></span>
<a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance">to
- snoop on each employee</a>. After
- a public outburst,</em></ins></span> Microsoft <span
class="removed"><del><strong>changed Skype</strong></del></span> <span
class="inserted"><ins><em>stated that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></strong></del></span>
+ snoop on each employee</a>. After</em></ins></span>
+ a <span class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>public outburst, Microsoft stated</em></ins></span>
that <span class="removed"><del><strong>at least is visible and
+ optional</a>. Not as bad as what the others do.</p>
+ </li>
+
+ <li><p>FTC says most mobile apps for children don't respect
privacy:</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance">it
would remove this capability</a>. Let's hope
so.</p></em></ins></span>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareOnTheRoad</strong></del></span>
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
<span class="inserted"><ins><em><li id="M201912190">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>Some Avast and AVG extensions
- for Firefox and Chrome were found</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome">
- snoop</em></ins></span> on <span class="removed"><del><strong>top under
each subsection</strong></del></span> <span class="inserted"><ins><em>users'
detailed browsing habits</a>. Mozilla and Google
- removed the problematic extensions from their stores, but this shows
- once more how unsafe nonfree software can be. Tools that are supposed
- to protect a proprietary system are, instead, infecting it with
- additional malware (the system itself being the original
malware).</p>
- </li>
-
- <li id="M201811020">
- <!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Some Avast and AVG extensions
+ for Firefox and Chrome were found to</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"></em></ins></span>
+ snoop on <span class="removed"><del><strong>the user</a>. This is in
addition to
+ the snooping done by the phone company,</strong></del></span> <span
class="inserted"><ins><em>users' detailed browsing habits</a>.
Mozilla</em></ins></span> and <span class="removed"><del><strong>perhaps by the
OS in the
+ phone.</p>
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on</strong></del></span>
- <span class="inserted"><ins><em><p>Foundry's graphics software <a
-
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information to identify who is running
it</a>.</em></ins></span> The <span
class="removed"><del><strong>Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ <p>Don't be distracted by the question of
whether</strong></del></span> <span class="inserted"><ins><em>Google
+ removed</em></ins></span> the <span class="removed"><del><strong>app
developers get
+ users</strong></del></span> <span class="inserted"><ins><em>problematic
extensions from their stores, but this shows
+ once more how unsafe nonfree software can be. Tools that are
supposed</em></ins></span>
+ to <span class="removed"><del><strong>say “I agree”. That is
no excuse for malware.</p></strong></del></span> <span
class="inserted"><ins><em>protect a proprietary system are, instead, infecting
it with
+ additional malware (the system itself being the original
malware).</p></em></ins></span>
+ </li>
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
-<ul>
- <li></strong></del></span> <span class="inserted"><ins><em>result is
+ <span class="inserted"><ins><em><li id="M201811020">
+ <!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Foundry's graphics software</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information to identify who is running it</a>. The result is
often a legal threat demanding a lot of money.</p></em></ins></span>
- <p>The <span class="removed"><del><strong>Nest Cam
“smart” camera</strong></del></span> <span
class="inserted"><ins><em>fact that this</em></ins></span> is <span
class="removed"><del><strong><a
- href="http://www.bbc.com/news/technology-34922712">always
- watching</a>,</strong></del></span> <span
class="inserted"><ins><em>used for repression of forbidden sharing
- makes it</em></ins></span> even <span
class="removed"><del><strong>when</strong></del></span> <span
class="inserted"><ins><em>more vicious.</p>
+ <p>The <span class="removed"><del><strong>FTC
criticized</strong></del></span> <span class="inserted"><ins><em>fact
that</em></ins></span> this <span class="removed"><del><strong>app
because</strong></del></span> <span class="inserted"><ins><em>is used for
repression of forbidden sharing
+ makes</em></ins></span> it <span class="removed"><del><strong>asked the
user to
+ approve sending personal data to the app developer but
did</strong></del></span> <span class="inserted"><ins><em>even more
vicious.</p>
<p>This illustrates that making unauthorized copies of nonfree
software
- is not a cure for</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>injustice of nonfree software. It may avoid
- paying for</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using</strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot make</em></ins></span> it
<span class="removed"><del><strong>to outsmart
- you.</p></strong></del></span> <span
class="inserted"><ins><em>less nasty.</p></em></ins></span>
+ is</em></ins></span> not
+ <span class="removed"><del><strong>ask about sending it to other
companies. This shows</strong></del></span> <span class="inserted"><ins><em>a
cure for</em></ins></span> the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="inserted"><ins><em>nonfree software. It may avoid
+ paying for</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should a flashlight
+ app send any information to anyone? A free software flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot make it less
nasty.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInMobileApps">Mobile
Apps</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInGames">Spyware in
Games</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInMobileApps">Mobile
Apps</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInGames">#SpywareInGames</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
- <li><p>E-books can contain Javascript code,
- and</strong></del></span>
+ <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202204040">
<!--#set var="DATE" value='<small
class="date-tag">2022-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>New Amazon worker chat app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
- </li>
-
- <li><p>Spyware in many e-readers—not
only</strong></del></span>
+ <p>New Amazon worker chat app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves</strong></del></span>
<span
class="inserted"><ins><em>href="https://theintercept.com/2022/04/04/amazon-union-living-wage-restrooms-chat-app/">would
ban specific words Amazon doesn't like</a>, such as
- “union”, “restrooms”, and “pay
- raise”. If</em></ins></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span> <span
class="inserted"><ins><em>app was free, workers could modify</em></ins></span>
the <span class="removed"><del><strong>user reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>program
+ “union”, “restrooms”,</em></ins></span> and <span
class="removed"><del><strong>then sends personal data about them to
+ nVidia servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>“pay
+ raise”. If the app was free, workers could modify the program
so it acts as they wish, not how Amazon wants
it.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used</strong></del></span>
+ <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
<span class="inserted"><ins><em><li id="M202203010">
<!--#set var="DATE" value='<small
class="date-tag">2022-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The nonfree app “Along,”
- developed</em></ins></span> by <span class="removed"><del><strong>most US
libraries,</strong></del></span> <span class="inserted"><ins><em>a company
controlled by Zuckerberg,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data</strong></del></span>
+ developed by a company controlled by Zuckerberg,</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies,</strong></del></span>
<span
class="inserted"><ins><em>href="https://kappanonline.org/dont-go-along-with-corporate-schemes-to-gather-up-student-data/">
- leads students</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
- needed</strong></del></span> <span
class="inserted"><ins><em>reveal</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
-
-<ul>
-<li><p>Computerized cars with nonfree
software</strong></del></span> <span class="inserted"><ins><em>their teacher
personal information</a>
- about themselves and their families. Conversations</em></ins></span> are
- <span class="removed"><del><strong><a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p>
- </li>
-
- <li><p>The Nissan Leaf has a built-in cell phone modem which
allows
- effectively
- anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely</strong></del></span> <span
class="inserted"><ins><em>recorded</em></ins></span>
- and <span class="removed"><del><strong>make changes in various
- settings</a>.</p>
-
- <p>That's easy to do because the system has no authentication when
- accessed through the modem. However, even if it asked for
- authentication, you couldn't be confident that Nissan has no
- access. The software in the car is
- proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from its users</a>.</p>
-
- <p>Even if no one connects to the car remotely, the cell phone
- modem enables</strong></del></span> the <span
class="removed"><del><strong>phone company</strong></del></span> <span
class="inserted"><ins><em>collected data sent</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>company, which grants itself</em></ins></span> the
<span class="removed"><del><strong>time; it is possible</strong></del></span>
- <span class="inserted"><ins><em>right</em></ins></span> to <span
class="removed"><del><strong>physically remove the cell phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>sell it. See also <a
-
href="/education/educational-malware-app-along.html#content">Educational
Malware App “Along”</a>.</p>
+ leads students to reveal to their teacher personal information</a>
+ about themselves and their families. Conversations are
recorded</em></ins></span>
+ and the <span class="removed"><del><strong>NSA takes
advantage</strong></del></span> <span class="inserted"><ins><em>collected data
sent</em></ins></span> to <span class="removed"><del><strong>spy through it
too</a>.
+ Here's information on</strong></del></span> <span
class="inserted"><ins><em>the company, which grants itself the
+ right to sell it. See also</em></ins></span> <a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More</strong></del></span>
+ <span
class="inserted"><ins><em>href="/education/educational-malware-app-along.html#content">Educational
Malware App “Along”</a>.</p>
</li>
<li id="M202201270">
@@ -1687,34 +1517,31 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The data broker X-Mode <a
href="https://themarkup.org/privacy/2022/01/27/gay-bi-dating-app-muslim-prayer-apps-sold-data-on-peoples-location-to-a-controversial-data-broker">bought
- location data about 20,000 people collected by around 100 different
+ location data</em></ins></span> about <span
class="removed"><del><strong>NSA app
spying</a>.</p></strong></del></span> <span
class="inserted"><ins><em>20,000 people collected by around 100 different
malicious apps</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
- <span class="removed"><del><strong><li><p>Proprietary
software</strong></del></span>
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware</strong></del></span>
<span class="inserted"><ins><em><li id="M202111090">
<!--#set var="DATE" value='<small
class="date-tag">2021-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A building</em></ins></span> in <span
class="removed"><del><strong>cars</strong></del></span> <span
class="inserted"><ins><em>LA, with a supermarket in it,</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available</strong></del></span>
+ <p>A building</em></ins></span> in <span
class="removed"><del><strong>Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
+
+<ul>
+
+ <li><p>A company that makes internet-controlled
vibrators</strong></del></span> <span class="inserted"><ins><em>LA, with a
supermarket in it,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
+ being sued</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.latimes.com/business/story/2021-11-09/column-trader-joes-parking-app">demands
- customers load a particular app</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance
companies,</strong></del></span> <span class="inserted"><ins><em>pay for
parking in the parking
- lot</a>,</em></ins></span> and
- <span class="removed"><del><strong>others.</p>
-
- <p>The case</strong></del></span> <span
class="inserted"><ins><em>accept pervasive surveillance. They also have the
- option</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span class="inserted"><ins><em>entering their
license plate numbers</em></ins></span> in <span
class="removed"><del><strong>this article, is not
- really</strong></del></span> a <span class="removed"><del><strong>matter
of proprietary surveillance. These systems are</strong></del></span> <span
class="inserted"><ins><em>kiosk. That is</em></ins></span>
- an
- <span class="removed"><del><strong>intolerable invasion of privacy, and
should be replaced with anonymous
- payment systems, but the invasion isn't done by malware. The other
- cases mentioned are done by proprietary malware in the
car.</p></li>
-
- <li><p>Tesla cars allow the company to extract data remotely and
- determine the car's location at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>injustice, too.</p>
+ customers load a particular app to pay</em></ins></span> for <span
class="removed"><del><strong>collecting lots</strong></del></span> <span
class="inserted"><ins><em>parking in the parking
+ lot</a>, and accept pervasive surveillance. They also have the
+ option</em></ins></span> of <span
class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>entering their license plate numbers in a kiosk. That
is
+ an injustice, too.</p>
</li>
<li id="M202106030">
@@ -1722,46 +1549,25 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/">TikTok
- apps collect biometric identifiers</em></ins></span> and <span
class="removed"><del><strong>c.</a>).</strong></del></span> <span
class="inserted"><ins><em>biometric information from
- users' smartphones</a>.</em></ins></span> The company <span
class="removed"><del><strong>says</strong></del></span> <span
class="inserted"><ins><em>behind</em></ins></span> it <span
class="removed"><del><strong>doesn't
- store this information, but if the state orders</strong></del></span>
<span class="inserted"><ins><em>does whatever</em></ins></span> it <span
class="removed"><del><strong>to get the data</strong></del></span> <span
class="inserted"><ins><em>wants</em></ins></span>
- and <span class="removed"><del><strong>hand</strong></del></span> <span
class="inserted"><ins><em>collects whatever data</em></ins></span> it <span
class="removed"><del><strong>over, the state can store
it.</p></strong></del></span> <span
class="inserted"><ins><em>can.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
-
+ apps collect biometric identifiers and biometric</em></ins></span>
information <span class="removed"><del><strong>about how
+ people use it</a>.</p>
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure to place new items on top under each
subsection</strong></del></span>
+ <p>The company's statement that</strong></del></span> <span
class="inserted"><ins><em>from
+ users' smartphones</a>. The company behind</em></ins></span> it
<span class="removed"><del><strong>anonymizes the data may be
+ true, but</strong></del></span> <span class="inserted"><ins><em>does
whatever</em></ins></span> it <span class="removed"><del><strong>doesn't really
matter. If</strong></del></span> <span class="inserted"><ins><em>wants
+ and collects whatever data</em></ins></span> it <span
class="removed"><del><strong>sells the</strong></del></span> <span
class="inserted"><ins><em>can.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M202104060">
+ <li id="M202104060">
<!--#set var="DATE" value='<small
class="date-tag">2021-04</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span>
- <span class="inserted"><ins><em><p>The <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The <a
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/">WeddingWire
- app saves people's wedding photos forever and hands over
data</em></ins></span>
- to <span class="removed"><del><strong>spy on</strong></del></span> <span
class="inserted"><ins><em>others</a>, giving users no control
over</em></ins></span> their <span
class="removed"><del><strong>renters</a>.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
-</div>
-
-<p>Emo Phillips made a joke:</strong></del></span> <span
class="inserted"><ins><em>personal
- information/data.</em></ins></span> The <span
class="removed"><del><strong>other day a woman came up</strong></del></span>
<span class="inserted"><ins><em>app also sometimes shows old photos and
- memories</em></ins></span> to <span
class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>users, without giving them any control over this
+ app saves people's wedding photos forever and hands over</em></ins></span>
data
+ to <span class="removed"><del><strong>a
+ data broker,</strong></del></span> <span
class="inserted"><ins><em>others</a>, giving users no control over their
personal
+ information/data. The app also sometimes shows old photos and
+ memories to users, without giving them any control over this
either.</p>
</li>
@@ -1771,170 +1577,232 @@
<p>Many cr…apps, developed by various
companies for various organizations, do <a
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth">
- location tracking unknown to those companies</em></ins></span> and
-<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I
-don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>those
- organizations</a>. It's actually some widely used libraries that
do</em></ins></span>
- the <span class="removed"><del><strong>other way.”
Evidently</strong></del></span> <span
class="inserted"><ins><em>tracking.</p>
+ location tracking unknown to those companies and those
+ organizations</a>. It's actually some widely used libraries that do
+ the tracking.</p>
- <p>What's unusual here is</em></ins></span> that <span
class="removed"><del><strong>was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li><p>More or less all “smart” TVs <a href="
-
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>proprietary software developer A tricks
+ <p>What's unusual here is that proprietary software developer A
tricks
proprietary software developers B1 … B50 into making platforms for
- A to mistreat the end user.</p>
+ A to mistreat</em></ins></span> the <span class="inserted"><ins><em>end
user.</p>
</li>
<li id="M202003260">
<!--#set var="DATE" value='<small
class="date-tag">2020-03</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p>The <span class="removed"><del><strong>report was
as</strong></del></span> <span class="inserted"><ins><em>Apple iOS
version</em></ins></span> of <span class="removed"><del><strong>2014, but we
don't expect this has got better.</p>
-
- <p>This shows that laws requiring products to
get</strong></del></span> <span class="inserted"><ins><em>Zoom <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The Apple iOS version of Zoom <a
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account">is
- sending</em></ins></span> users' <span class="removed"><del><strong>formal
- consent before collecting personal</strong></del></span> data <span
class="removed"><del><strong>are totally inadequate.
- And what happens if a user declines consent? Probably the TV
- will say, “Without your consent to tracking, the TV will
- not work.”</p>
-
- <p>Proper laws would say that TVs are not
allowed</strong></del></span> to <span class="removed"><del><strong>report
what</strong></del></span> <span class="inserted"><ins><em>Facebook</a>
even if</em></ins></span> the user <span class="removed"><del><strong>watches
— no exceptions!</p>
- </li>
- <li><p>Vizio goes</strong></del></span> <span
class="inserted"><ins><em>doesn't have</em></ins></span>
- a <span class="removed"><del><strong>step further than other TV
manufacturers in spying</strong></del></span> <span
class="inserted"><ins><em>Facebook account. According to the article, Zoom and
Facebook
- don't even mention this surveillance</em></ins></span> on their <span
class="removed"><del><strong>users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so that advertisers can track you
- across devices.</p>
-
- <p>It is possible to turn</strong></del></span> <span
class="inserted"><ins><em>privacy policy page,
- making</em></ins></span> this <span class="removed"><del><strong>off, but
having it enabled by default
- is</strong></del></span> an <span class="removed"><del><strong>injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>obvious violation of people's privacy even in their
+ sending users'</em></ins></span> data <span
class="removed"><del><strong>broker can figure out who</strong></del></span>
<span class="inserted"><ins><em>to Facebook</a> even if</em></ins></span>
the user <span class="removed"><del><strong>is.</p></strong></del></span>
<span class="inserted"><ins><em>doesn't have
+ a Facebook account. According to the article, Zoom and Facebook
+ don't even mention this surveillance on their privacy policy page,
+ making this an obvious violation of people's privacy even in their
own terms.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to</strong></del></span>
+ <span class="removed"><del><strong><li><p>A computerized
+ vibrator</strong></del></span>
<span class="inserted"><ins><em><li id="M202003010">
<!--#set var="DATE" value='<small
class="date-tag">2020-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The Alipay Health Code app
- estimates whether</em></ins></span> the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span class="inserted"><ins><em>user has
Covid-19 and <a
-
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
- tells</em></ins></span> the <span class="removed"><del><strong>company
already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>cops directly</a>.</p>
+ estimates whether the user has Covid-19 and</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops
+ on its users through</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
+ tells</em></ins></span> the <span class="removed"><del><strong>proprietary
control app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>cops directly</a>.</p>
</li>
<li id="M202001290">
<!--#set var="DATE" value='<small
class="date-tag">2020-01</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The Amazon Ring app does</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all users to
- new combined</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"></em></ins></span>
- surveillance <span class="removed"><del><strong>by
default.</p></li>
- <li><p>Some web and TV advertisements play inaudible sounds to be
- picked up by proprietary malware running on</strong></del></span> <span
class="inserted"><ins><em>for</em></ins></span> other <span
class="removed"><del><strong>devices in
- range so</strong></del></span> <span
class="inserted"><ins><em>companies</em></ins></span> as <span
class="removed"><del><strong>to determine that they are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads with Web activity, and
- other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>well as for
Amazon</a>.</p></em></ins></span>
+ --><!--#echo encoding="none" var="DATE" --></em></ins></span>
+ <p>The <span class="inserted"><ins><em>Amazon Ring</em></ins></span>
app <span class="removed"><del><strong>reports</strong></del></span> <span
class="inserted"><ins><em>does <a
+
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
+ surveillance for other companies as well as for Amazon</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and
- <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people are watching</a>,
- even if it isn't</strong></del></span>
- <span class="inserted"><ins><em><li id="M201912220">
+ <li id="M201912220">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The ToToc messaging app seems to be</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p>
- </li>
- <li><p>The Amazon “Smart” TV</strong></del></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching and listening all</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
- spying tool for</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
- </li>
- <li><p>The Samsung “Smart” TV
- <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span> <span
class="inserted"><ins><em>government of</em></ins></span> the <span
class="removed"><del><strong>internet to another
- company, Nuance</a>. Nuance can save it</strong></del></span> <span
class="inserted"><ins><em>United Arab Emirates</a>.
- Any nonfree program could be doing this,</em></ins></span> and <span
class="removed"><del><strong>would then have to
- give it to the US or some other government.</p>
- <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>a good
- reason</em></ins></span> to <span class="removed"><del><strong>be trusted
unless it is done
- by</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> free software <span
class="inserted"><ins><em>instead.</p>
+ <p>The ToToc messaging app seems to be a <a
+
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
+ spying tool for</em></ins></span> the <span
class="removed"><del><strong>temperature</strong></del></span> <span
class="inserted"><ins><em>government</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute by
+ minute (thus, indirectly, whether it is surrounded by a person's
+ body),</strong></del></span> <span class="inserted"><ins><em>United Arab
Emirates</a>.
+ Any nonfree program could be doing this,</em></ins></span> and <span
class="removed"><del><strong>the vibration frequency.</p>
+
+ <p>Note the totally inadequate proposed
response:</strong></del></span> <span class="inserted"><ins><em>that
is</em></ins></span> a <span class="removed"><del><strong>labeling
+ standard with which manufacturers would make statements about
+ their products, rather than</strong></del></span> <span
class="inserted"><ins><em>good
+ reason to use</em></ins></span> free software <span
class="removed"><del><strong>which users can check
+ and change.</p></strong></del></span> <span
class="inserted"><ins><em>instead.</p>
- <p><small>Note: this article uses the word
“free”</em></ins></span> in <span class="removed"><del><strong>your
own computer.</p></strong></del></span>
- <span class="inserted"><ins><em>the sense of
“gratis.”</small></p></em></ins></span>
+ <p><small>Note: this article uses the word “free”
in
+ the sense of
“gratis.”</small></p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Spyware
in</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
<span class="inserted"><ins><em><li id="M201912090">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>iMonsters and Android phones,
- when used for work, give employers powerful</em></ins></span> <a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports what the user
watches,</strong></del></span>
+ when used for work, give employers powerful</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
- snooping</em></ins></span> and <span class="inserted"><ins><em>sabotage
capabilities</a> if they install their own
- software on</em></ins></span> the <span
class="removed"><del><strong>switch</strong></del></span> <span
class="inserted"><ins><em>device. Many employers demand</em></ins></span> to
<span class="removed"><del><strong>turn this off has no effect. (The fact that
the
- transmission reports a 404 error really means
nothing;</strong></del></span> <span class="inserted"><ins><em>do this.
For</em></ins></span> the <span
class="removed"><del><strong>server</strong></del></span>
- <span class="inserted"><ins><em>employee, this is simply nonfree software,
as fundamentally unjust
- and as dangerous as any other nonfree software.</p>
+ snooping and sabotage capabilities</a> if they install their own
+ software</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>the device. Many employers demand to do this. For
the
+ employee, this is simply nonfree software, as fundamentally
unjust</em></ins></span>
+ and <span
class="removed"><del><strong>adults.</a>.</p></strong></del></span>
<span class="inserted"><ins><em>as dangerous as any other nonfree
software.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<!-- #SpywareAtLowLevel</strong></del></span>
- <li id="M201910130">
+ <span class="inserted"><ins><em><li id="M201910130">
<!--#set var="DATE" value='<small
class="date-tag">2019-10</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The Chinese Communist Party's “Study
- the Great Nation” app requires users to grant it <a
-
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>The Chinese Communist Party's
“Study
+ the Great Nation” app requires users</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p></strong></del></span> <span
class="inserted"><ins><em>grant it</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
access to the phone's microphone, photos, text messages, contacts, and
- internet history</a>, and the Android version was found to contain a
- back-door allowing developers to run any code they wish in the users'
+ internet history</a>,</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows installs.
+Note that</strong></del></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>Android
version was found to contain</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows
install</strong></del></span>
+ <span class="inserted"><ins><em>back-door allowing developers to run any
code they wish in the users'
phone, as “superusers.” Downloading and using this
- app is mandatory at some workplaces.</p>
+ app</em></ins></span> is <span class="removed"><del><strong>not really
+clean since</strong></del></span> <span class="inserted"><ins><em>mandatory at
some workplaces.</p>
- <p>Note: The <a
-
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ <p>Note: The</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
Washington Post version of the article</a> (partly obfuscated, but
- readable after copy-pasting in a text editor) includes a clarification
- saying that the tests were only performed on the Android version
- of the app, and that, according to Apple, “this kind of
- ‘superuser’ surveillance</em></ins></span> could <span
class="removed"><del><strong>save</strong></del></span> <span
class="inserted"><ins><em>not be conducted on
- Apple's operating system.”</p>
+ readable after copy-pasting</em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure to place new items</strong></del></span> <span
class="inserted"><ins><em>a text editor) includes a clarification
+ saying that the tests were only performed</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect</strong></del></span> the <span
class="removed"><del><strong>emails of members</strong></del></span> <span
class="inserted"><ins><em>Android version</em></ins></span>
+ of <span class="removed"><del><strong>Parliament
+ this way, because they pass it through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype
+ <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
+ </li>
+</ul>
+
+
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>the app, and that, according</em></ins></span> to
<span class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>Apple, “this kind of
+ ‘superuser’ surveillance could not be
conducted</em></ins></span> on <span class="removed"><del><strong>top under
each subsection</strong></del></span>
+ <span class="inserted"><ins><em>Apple's operating system.”</p>
</li>
<li id="M201909091">
<!--#set var="DATE" value='<small
class="date-tag">2019-09</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The Facebook app <a
-
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks users even when it is turned off</a>, after tricking them
- into giving the app broad permissions in order to use one of its
- functionalities.</p>
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li></strong></del></span>
+ <p>The <span class="removed"><del><strong>Nest Cam
“smart” camera is</strong></del></span> <span
class="inserted"><ins><em>Facebook app</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
+ tracks users</em></ins></span> even when <span
class="removed"><del><strong>the “owner”
switches</strong></del></span> it <span
class="removed"><del><strong>“off.”</p>
+ <p>A “smart” device means the
manufacturer</strong></del></span> is <span class="removed"><del><strong>using
it</strong></del></span> <span class="inserted"><ins><em>turned off</a>,
after tricking them
+ into giving the app broad permissions in order</em></ins></span> to <span
class="removed"><del><strong>outsmart
+ you.</p></strong></del></span> <span class="inserted"><ins><em>use
one of its
+ functionalities.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul>
+ <li><p>E-books can contain Javascript code,</strong></del></span>
- <li id="M201909090">
+ <span class="inserted"><ins><em><li id="M201909090">
<!--#set var="DATE" value='<small
class="date-tag">2019-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some nonfree period-tracking apps including MIA Fem and Maya <a
-
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
- send intimate details of users' lives to Facebook</a>.</p>
+ <p>Some nonfree period-tracking apps including MIA
Fem</em></ins></span> and <span
class="inserted"><ins><em>Maya</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
+ send intimate details of users' lives to
Facebook</a>.</p></em></ins></span>
</li>
- <li id="M201909060">
+ <span class="removed"><del><strong><li><p>Spyware in many
e-readers—not only</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201909060">
<!--#set var="DATE" value='<small
class="date-tag">2019-09</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Keeping track of who downloads a proprietary
program is a form of surveillance. There is a
proprietary program for adjusting a certain telescopic rifle sight. <a
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
- A US prosecutor has demanded the list of all the 10,000 or more people
+ A US prosecutor has demanded</em></ins></span> the
+ <span class="removed"><del><strong>Kindle:</strong></del></span> <span
class="inserted"><ins><em>list of all the 10,000 or more people
who have installed it</a>.</p>
<p>With a free program there would not be a list of who has installed
@@ -1944,86 +1812,115 @@
<li id="M201907081">
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many unscrupulous mobile-app developers keep finding ways to <a
-
href="https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ <p>Many unscrupulous mobile-app developers keep finding ways
to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
bypass user's settings</a>, regulations, and privacy-enhancing
features
- of the operating system, in order to gather as much private data as
- they possibly can.</p>
+ of the operating system, in order to gather as much private data
as</em></ins></span>
+ they <span class="removed"><del><strong>report even which
page</strong></del></span> <span class="inserted"><ins><em>possibly
can.</p>
<p>Thus, we can't trust rules against spying. What we can trust is
- having control over the software we run.</p>
+ having control over</em></ins></span> the <span
class="removed"><del><strong>user reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>software we run.</p></em></ins></span>
</li>
- <li id="M201907080">
+ <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,”</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201907080">
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many Android apps can track
- users' movements even when the user says <a
-
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow them access to locations</a>.</p>
+ users' movements even when</em></ins></span> the <span
class="removed"><del><strong>e-reader used
+ by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>user says</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
+ needed</strong></del></span> <span class="inserted"><ins><em>allow them
access</em></ins></span> to <span class="removed"><del><strong>check
DRM!</p>
+ </li>
+</ul>
- <p>This involves an apparently unintentional weakness in Android,
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware</strong></del></span> <span
class="inserted"><ins><em>locations</a>.</p>
+
+ <p>This involves an apparently unintentional
weakness</em></ins></span> in <span
class="removed"><del><strong>Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul>
+<li><p>Computerized cars with nonfree software
are</strong></del></span> <span class="inserted"><ins><em>Android,
exploited intentionally by malicious apps.</p>
</li>
<li id="M201905300">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Femm “fertility” app is secretly a <a
-
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
+ <p>The Femm “fertility” app is secretly
a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
<p>It snoops on users, too, as you must expect from nonfree
- programs.</p>
+ programs.</p></em></ins></span>
</li>
- <li id="M201905060">
+ <span class="removed"><del><strong><li><p>The Nissan Leaf
has</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905060">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>BlizzCon 2019 imposed a <a
+ <p>BlizzCon 2019 imposed</em></ins></span> a <span
class="removed"><del><strong>built-in cell</strong></del></span> <span
class="inserted"><ins><em><a
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement to run a proprietary phone app</a> to be allowed into
+ requirement to run a proprietary</em></ins></span> phone <span
class="removed"><del><strong>modem which allows
+ effectively
+ anyone</strong></del></span> <span class="inserted"><ins><em>app</a>
to be allowed into
the event.</p>
- <p>This app is a spyware</em></ins></span> that <span
class="inserted"><ins><em>can snoop on a lot of
- sensitive data, including user's location and contact list, and has <a
-
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ <p>This app is a spyware that can snoop on a lot of
+ sensitive data, including user's location and contact list, and
has</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
near-complete control</a> over the phone.</p>
</li>
<li id="M201904131">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
-
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>. Even though
the</em></ins></span>
- data <span class="removed"><del><strong>anyway.)</p>
+ <p>Data collected by menstrual</em></ins></span> and <span
class="removed"><del><strong>make changes in various
+ settings</a>.</p>
- <p>Even worse,</strong></del></span> <span
class="inserted"><ins><em>is “anonymized and
aggregated,”</em></ins></span> it <span class="inserted"><ins><em>can
easily be
- traced back to the woman who uses the app.</p>
+ <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>pregnancy monitoring apps is often <a
+
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
+ available</em></ins></span> to <span class="removed"><del><strong>do
because</strong></del></span> <span class="inserted"><ins><em>employers and
insurance companies</a>. Even though</em></ins></span> the <span
class="removed"><del><strong>system has no authentication when
+ accessed through</strong></del></span>
+ <span class="inserted"><ins><em>data is “anonymized and
aggregated,” it can easily be
+ traced back to</em></ins></span> the <span
class="removed"><del><strong>modem. However,</strong></del></span> <span
class="inserted"><ins><em>woman who uses the app.</p>
<p>This has harmful implications for women's rights to equal
employment
and freedom to make their own pregnancy choices. Don't use
- these apps, even if someone offers you a reward to do so. A
- free-software app that does more or less the same thing without
- spying on you is available from</em></ins></span> <a <span
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops</strong></del></span>
- <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,
and <a
+ these apps,</em></ins></span> even if <span
class="removed"><del><strong>it asked for
+ authentication,</strong></del></span> <span
class="inserted"><ins><em>someone offers</em></ins></span> you <span
class="removed"><del><strong>couldn't be confident</strong></del></span> <span
class="inserted"><ins><em>a reward to do so. A
+ free-software app</em></ins></span> that <span
class="removed"><del><strong>Nissan has no
+ access. The software in</strong></del></span> <span
class="inserted"><ins><em>does more or less</em></ins></span> the <span
class="removed"><del><strong>car</strong></del></span> <span
class="inserted"><ins><em>same thing without
+ spying on you</em></ins></span> is
+ <span class="removed"><del><strong>proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith</strong></del></span> <span
class="inserted"><ins><em>available</em></ins></span> from <span
class="removed"><del><strong>its users</a>.</p>
+
+ <p>Even if no</strong></del></span> <span
class="inserted"><ins><em><a
+ href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
- a new one is being developed</a>.</p>
+ a new</em></ins></span> one <span class="removed"><del><strong>connects
to</strong></del></span> <span class="inserted"><ins><em>is being
developed</a>.</p>
</li>
<li id="M201904130">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google tracks the movements of Android phones and iPhones
+ <p>Google tracks</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>movements of Android phones and iPhones
running Google apps, and sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves the data for years</a>.</p>
+ saves</em></ins></span> the <span class="removed"><del><strong>cell phone
+ modem enables</strong></del></span> <span class="inserted"><ins><em>data
for years</a>.</p>
- <p>Nonfree software in the phone has to be responsible for sending
- the location data to Google.</p>
+ <p>Nonfree software in</em></ins></span> the phone <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>has</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>be responsible for sending</em></ins></span>
+ the <span class="removed"><del><strong>car's movements
all</strong></del></span> <span class="inserted"><ins><em>location data to
Google.</p>
</li>
<li id="M201903251">
@@ -2032,18 +1929,26 @@
<p>Many Android phones come with a huge number of <a
href="https://web.archive.org/web/20190326145122/https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
preinstalled nonfree apps that have access to sensitive data without
- users' knowledge</a>. These hidden apps may either call home with
- the data, or pass it</em></ins></span> on <span
class="inserted"><ins><em>to user-installed apps that have access to
- the network but no direct access to the data. This results in massive
- surveillance on which the user has absolutely no control.</p>
+ users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
+ the <span class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>data, or pass</em></ins></span> it <span
class="removed"><del><strong>is possible</strong></del></span> <span
class="inserted"><ins><em>on to user-installed apps that have
access</em></ins></span> to <span class="removed"><del><strong>physically
remove</strong></del></span>
+ the <span class="removed"><del><strong>cell phone modem
+ though.</p>
+ </li>
+
+ <li><p>Proprietary software</strong></del></span> <span
class="inserted"><ins><em>network but no direct access to the data. This
results</em></ins></span> in <span class="removed"><del><strong>cars
+ <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,</strong></del></span> <span
class="inserted"><ins><em>massive
+ surveillance on</em></ins></span> which <span
class="inserted"><ins><em>the user has absolutely no control.</p>
</li>
<li id="M201903211">
<!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The MoviePass dis-service <a
-
href="https://www.cnet.com/culture/entertainment/moviepass-founder-wants-to-use-facial-recognition-to-score-you-free-movies/">
- is planning to use face recognition to track people's eyes</a>
+
href="https://www.cnet.com/culture/entertainment/moviepass-founder-wants-to-use-facial-recognition-to-score-you-free-movies/"></em></ins></span>
+ is <span class="removed"><del><strong>made available</strong></del></span>
<span class="inserted"><ins><em>planning</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
+ others.</p>
+
+ <p>The case</strong></del></span> <span
class="inserted"><ins><em>use face recognition to track people's eyes</a>
to make sure they won't put their phones down or look away during
ads—and trackers.</p>
</li>
@@ -2051,50 +1956,50 @@
<li id="M201903201">
<!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A study of 24 “health” apps found that 19 of them
<a
+ <p>A study</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span class="inserted"><ins><em>24
“health” apps found that 19 of them <a
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
send sensitive personal data to third parties</a>, which can use it
- for invasive advertising or discriminating against people in poor
+ for invasive advertising or discriminating against
people</em></ins></span> in <span class="removed"><del><strong>this
article,</strong></del></span> <span class="inserted"><ins><em>poor
medical condition.</p>
<p>Whenever user “consent” is sought, it is buried in
lengthy terms of service that are difficult to understand. In any case,
- “consent” is not sufficient to legitimize snooping.</p>
+ “consent”</em></ins></span> is not
+ <span class="removed"><del><strong>really</strong></del></span> <span
class="inserted"><ins><em>sufficient to legitimize snooping.</p>
</li>
<li id="M201902230">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Facebook offered a convenient proprietary
- library for building mobile apps, which also <a
+ <p>Facebook offered</em></ins></span> a <span
class="removed"><del><strong>matter of</strong></del></span> <span
class="inserted"><ins><em>convenient</em></ins></span> proprietary <span
class="removed"><del><strong>surveillance. These systems are an
+ intolerable invasion of privacy,</strong></del></span>
+ <span class="inserted"><ins><em>library for building mobile apps, which
also <a
href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
sent personal data to Facebook</a>. Lots of companies built apps that
way and released them, apparently not realizing that all the personal
data they collected would go to Facebook as well.</p>
<p>It shows that no one can trust a nonfree program, not even the
- developers of</em></ins></span> other <span
class="removed"><del><strong>devices</strong></del></span> <span
class="inserted"><ins><em>nonfree programs.</p>
+ developers of other nonfree programs.</p>
</li>
<li id="M201902140">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The AppCensus database gives information</em></ins></span> on
<span class="inserted"><ins><em><a
+ <p>The AppCensus database gives information on <a
href="https://www.appcensus.io/"> how Android apps use and
misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span class="removed"><del><strong>user's local
network.</a></p>
-
- <p>LG later said</strong></del></span> <span
class="inserted"><ins><em><a
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies, and <a
+ Advertising ID</a> to other companies,</em></ins></span> and <span
class="inserted"><ins><em><a
href="https://blog.appcensus.io/2019/02/14/ad-ids-behaving-badly/">
18,000 (23% of the total) link this ID to hardware identifiers</a>,
so that users cannot escape tracking by resetting it.</p>
<p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But</em></ins></span> it <span
class="removed"><del><strong>had installed</strong></del></span> <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
+ Google's policies. But it seems that Google wasn't aware of it,
and, once informed, was in no hurry to take action. This proves
- that the policies of</em></ins></span> a <span
class="removed"><del><strong>patch</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
+ that the policies of a development platform are ineffective at
preventing nonfree software developers from including malware in
their programs.</p>
</li>
@@ -2110,8 +2015,8 @@
<li id="M201902041.1">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>stop
this,</strong></del></span>
- <span class="inserted"><ins><em>be on Google Play had one or more
malicious functionalities, such as <a
+ <p>Twenty nine “beauty camera” apps that used to
+ be on Google Play had one or more malicious functionalities, such as <a
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
stealing users' photos</a> instead of “beautifying” them,
pushing unwanted and often malicious ads on users, and redirecting
@@ -2119,8 +2024,8 @@
the user interface of most of them was designed to make uninstallation
difficult.</p>
- <p>Users should of course uninstall these dangerous apps if they
- haven't yet,</em></ins></span> but <span class="removed"><del><strong>any
product</strong></del></span> <span class="inserted"><ins><em>they should also
stay away from nonfree apps in
+ <p>Users</em></ins></span> should <span class="inserted"><ins><em>of
course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree apps in
general. <em>All</em> nonfree apps carry a potential risk
because
there is no easy way of knowing what they really do.</p>
</li>
@@ -2133,10 +2038,8 @@
href="https://www.top10vpn.com/research/free-vpn-investigations/risk-index/">
25% fail to protect their users' privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
- source code—often used for invasive
advertising—that</em></ins></span> could
- <span class="inserted"><ins><em>potentially also be used
to</em></ins></span> spy <span class="removed"><del><strong>this way.</p>
-
- <p>Meanwhile, LG TVs</strong></del></span> <span
class="inserted"><ins><em>on users. Other technical flaws were
+ source code—often used for invasive advertising—that could
+ potentially also</em></ins></span> be <span
class="removed"><del><strong>replaced</strong></del></span> <span
class="inserted"><ins><em>used to spy on users. Other technical flaws were
found as well.</p>
<p>Moreover, a previous investigation had found that <a
@@ -2151,11 +2054,12 @@
<li id="M201901050">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Weather Channel app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ <p>The Weather Channel app <a
+
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
stored users' locations to the company's server</a>. The company is
- being sued, demanding that it notify the users of what it
will</em></ins></span> do <span
class="removed"><del><strong>lots</strong></del></span>
- <span class="inserted"><ins><em>with the data.</p>
+ being sued, demanding that it notify the users of what it will
do</em></ins></span>
+ with <span class="removed"><del><strong>anonymous
+ payment systems,</strong></del></span> <span
class="inserted"><ins><em>the data.</p>
<p>We think that lawsuit is about a side issue. What the company does
with the data is a secondary issue. The principal wrong here is that
@@ -2170,7 +2074,7 @@
<li id="M201812290">
<!--#set var="DATE" value='<small
class="date-tag">2018-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Around 40%</em></ins></span> of <span
class="inserted"><ins><em>gratis Android apps <a
+ <p>Around 40% of gratis Android apps <a
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
report on the user's actions to Facebook</a>.</p>
@@ -2178,9 +2082,9 @@
Facebook can correlate the data it obtains from the same machine via
various apps. Some of them send Facebook detailed information about
the user's activities in the app; others only say that the user is
- using that app, but that alone is often quite informative.</p>
+ using that app,</em></ins></span> but <span class="inserted"><ins><em>that
alone is often quite informative.</p>
- <p>This</em></ins></span> spying <span
class="removed"><del><strong>anyway</a>.</p></strong></del></span>
<span class="inserted"><ins><em>occurs regardless of whether the user has a
Facebook
+ <p>This spying occurs regardless of whether</em></ins></span> the
<span class="removed"><del><strong>invasion isn't done</strong></del></span>
<span class="inserted"><ins><em>user has a Facebook
account.</p>
</li>
@@ -2201,7 +2105,7 @@
tracking”</a>.</p>
<p>There are other ways to turn off the other kinds of location
- tracking, but most users will be tricked by the misleading
control.</p>
+ tracking, but most users will be tricked</em></ins></span> by <span
class="removed"><del><strong>malware.</strong></del></span> <span
class="inserted"><ins><em>the misleading control.</p>
</li>
<li id="M201806110">
@@ -2229,7 +2133,8 @@
and collect information about its users</a>. 40% of the apps were
found to insecurely snitch on its users. Furthermore, they could
detect only some methods of snooping, in these proprietary apps whose
- source code they cannot look at. The other apps might be snooping
+ source code they cannot look at.</em></ins></span> The other
+ <span class="removed"><del><strong>cases mentioned</strong></del></span>
<span class="inserted"><ins><em>apps might be snooping
in other ways.</p>
<p>This is evidence that proprietary apps generally work against
@@ -2272,13 +2177,12 @@
<p>Spotify app <a
href="https://www.sec.gov/Archives/edgar/data/1639920/000119312518063434/d494294df1.htm">harvests
users' data to personally identify and know people</a> through music,
- their mood, mindset, activities, and tastes. There are over 150
+ their mood, mindset, activities, and tastes. There</em></ins></span> are
<span class="inserted"><ins><em>over 150
billion events logged daily on the program which contains users'
- data and personal information.</p></em></ins></span>
+ data and personal information.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201711240">
+ <li id="M201711240">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Tracking software in popular Android apps
@@ -2290,9 +2194,9 @@
<li id="M201709020">
<!--#set var="DATE" value='<small
class="date-tag">2017-09</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p><a <span
class="removed"><del><strong>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable</strong></del></span>
- <span
class="inserted"><ins><em>href="https://old.reddit.com/r/Instagram/comments/6xkhi8/ig_suddenly_asking_for_phone_number_not_visible/">Instagram
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://old.reddit.com/r/Instagram/comments/6xkhi8/ig_suddenly_asking_for_phone_number_not_visible/">Instagram
is forcing users to give away their phone numbers</a> and won't let
people continue using the app if they refuse.</p>
</li>
@@ -2328,7 +2232,7 @@
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google have done a better job of preventing apps from
+ <p>Could Google have</em></ins></span> done <span
class="inserted"><ins><em>a better job of preventing apps from
cheating? There is no systematic way for Google, or Android users,
to inspect executable proprietary apps to see what they do.</p>
@@ -2359,10 +2263,10 @@
<li id="M201705040">
<!--#set var="DATE" value='<small
class="date-tag">2017-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A study found 234 Android apps that track users by <a
+ <p>A study found 234 Android apps that track users</em></ins></span>
by <span class="inserted"><ins><em><a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by</em></ins></span>
TV <span class="removed"><del><strong>snoops</strong></del></span>
- <span class="inserted"><ins><em>programs</a>.</p>
+ to ultrasound from beacons placed in stores or played by TV
+ programs</a>.</p>
</li>
<li id="M201704260">
@@ -2403,7 +2307,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
pre-install
+ announced an opt-in</em></ins></span> proprietary <span
class="removed"><del><strong>malware</strong></del></span> <span
class="inserted"><ins><em>search app that it will</a> pre-install
on some of its phones. The app will give Verizon the same information
about the users' searches that Google normally gets when they use
its search engine.</p>
@@ -2498,11 +2402,13 @@
<p>Facebook's new Magic Photo app <a
href="https://www.theregister.com/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections for known faces</a>,
- and suggests you circulate the picture you take according to who is
- in the frame.</p>
+ and suggests you circulate the picture you take according to who
is</em></ins></span>
+ in the <span class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>frame.</p>
<p>This spyware feature seems to require online access to some
- known-faces database, which means the pictures are likely to be
+ known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>pictures are likely</em></ins></span> to <span
class="removed"><del><strong>extract</strong></del></span> <span
class="inserted"><ins><em>be
sent across the wire to Facebook's servers and face-recognition
algorithms.</p>
@@ -2515,7 +2421,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Facebook's app listens all the time, <a
href="https://www.independent.co.uk/tech/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
- snoop</em></ins></span> on what <span
class="removed"><del><strong>programs</strong></del></span> people <span
class="removed"><del><strong>watch,</strong></del></span> <span
class="inserted"><ins><em>are listening to or watching</a>. In addition,
+ snoop on what people are listening to or watching</a>. In addition,
it may be analyzing people's conversations to serve them with targeted
advertisements.</p>
</li>
@@ -2525,7 +2431,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A pregnancy test controller application not only can <a
href="https://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts of data in the phone,</em></ins></span> and <span
class="removed"><del><strong>even</strong></del></span> <span
class="inserted"><ins><em>in server accounts,
+ spy on many sorts of</em></ins></span> data <span
class="removed"><del><strong>remotely</strong></del></span> <span
class="inserted"><ins><em>in the phone,</em></ins></span> and
+ <span class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>in server accounts,
it can alter them too</a>.</p>
</li>
@@ -2543,7 +2450,7 @@
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>“Cryptic communication,”
- unrelated to the app's functionality, was <a
+ unrelated to</em></ins></span> the <span
class="removed"><del><strong>car's</strong></del></span> <span
class="inserted"><ins><em>app's functionality, was <a
href="https://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
found in the 500 most popular gratis Android apps</a>.</p>
@@ -2553,7 +2460,7 @@
<p>The article takes for granted that the usual analytics tools are
legitimate, but is that valid? Software developers have no right to
- analyze</em></ins></span> what <span class="inserted"><ins><em>users are
doing or how. “Analytics” tools
+ analyze what users are doing or how. “Analytics” tools
that snoop are just as wrong as any other snooping.</p>
</li>
@@ -2562,7 +2469,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>More than 73% and 47% of mobile applications, for Android and iOS
respectively <a href="https://techscience.org/a/2015103001/">hand
over
- personal, behavioral and location information</a> of their users to
+ personal, behavioral and</em></ins></span> location <span
class="inserted"><ins><em>information</a> of their users to
third parties.</p>
</li>
@@ -2577,23 +2484,18 @@
<p>This article shows the <a
href="https://www.theregister.com/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that</em></ins></span> they <span
class="removed"><del><strong>wanted</strong></del></span> <span
class="inserted"><ins><em>present snooping as a way</em></ins></span> to <span
class="removed"><del><strong>record.</a></p></strong></del></span>
<span class="inserted"><ins><em>“serve”
+ twisted ways that they present snooping as a way to “serve”
users better</a>—never mind whether they want that. This is a
typical example of the attitude of the proprietary software industry
towards those they have subjugated.</p>
- <p>Out, out, damned Spotify!</p></em></ins></span>
+ <p>Out, out, damned Spotify!</p>
</li>
-<span class="removed"><del><strong></ul>
-<!-- #SpywareAtPlay</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201506264">
+ <li id="M201506264">
<!--#set var="DATE" value='<small
class="date-tag">2015-06</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareAtPlay">Spyware</strong></del></span>
- <span class="inserted"><ins><em><p><a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf">
A study in 2015</a> found that 90% of the top-ranked gratis
proprietary
Android apps contained recognizable tracking libraries. For the paid
@@ -2635,7 +2537,7 @@
<p>Many proprietary apps for mobile devices
report which other apps the user has installed. <a
href="https://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that</em></ins></span> at <span
class="removed"><del><strong>Play</h3></strong></del></span> <span
class="inserted"><ins><em>least is visible and optional</a>. Not
+ is doing this in a way that</em></ins></span> at <span
class="inserted"><ins><em>least is visible and optional</a>. Not
as bad as what the others do.</p>
</li>
@@ -2668,26 +2570,27 @@
approve sending personal data to the app developer but did not ask
about sending it to other companies. This shows the weakness of
the reject-it-if-you-dislike-snooping “solution” to
- surveillance: why should a flashlight app send any information to
+ surveillance: why should a flashlight app send</em></ins></span> any <span
class="removed"><del><strong>time. (See</strong></del></span> <span
class="inserted"><ins><em>information to
anyone? A free software flashlight app would not.</p>
</li>
<li id="M201212100">
<!--#set var="DATE" value='<small
class="date-tag">2012-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>FTC says most mobile apps for children don't respect privacy:
<a
-
href="https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+ <p>FTC says most mobile apps for children don't respect
privacy:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInSkype">Skype</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtPlay">#SpywareAtPlay</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInSkype">#SpywareInSkype</a>)</span></em></ins></span>
+ <h4 id="SpywareInSkype">Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
</div>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201908151">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -2707,13 +2610,10 @@
href="https://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
specifically for spying</a>.</p>
</li>
-</ul></em></ins></span>
-
+</ul>
-<div <span class="removed"><del><strong>style="clear: left;"></div>
-<ul>
- <li><p>Many</strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+<div class="big-subsection">
<h4 id="SpywareInGames">Games</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
</div>
@@ -2726,14 +2626,15 @@
surveillance on the game of Minecraft by <a
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
every player to open an account on Microsoft's network</a>. Microsoft
- has bought the game and will merge all accounts into its network,
+ has bought the game</em></ins></span> and <span
class="removed"><del><strong>c.</a>).</strong></del></span> <span
class="inserted"><ins><em>will merge all accounts into its network,
which will give them access to people's data.</p>
<p>Minecraft players <a
href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
- instead. The essential advantage of Minetest is that it is free
- software, meaning it respects the user's computer freedom. As a bonus,
- it offers more options.</p>
+ instead.</em></ins></span> The <span class="removed"><del><strong>company
says</strong></del></span> <span class="inserted"><ins><em>essential advantage
of Minetest is that</em></ins></span> it <span
class="removed"><del><strong>doesn't
+ store this information, but if</strong></del></span> <span
class="inserted"><ins><em>is free
+ software, meaning it respects</em></ins></span> the <span
class="removed"><del><strong>state orders</strong></del></span> <span
class="inserted"><ins><em>user's computer freedom. As a bonus,</em></ins></span>
+ it <span class="inserted"><ins><em>offers more options.</p>
</li>
<li id="M201908210">
@@ -2741,7 +2642,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Microsoft recorded users of Xboxes and had <a
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
- human workers listen to the recordings</a>.</p>
+ human workers listen</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> the <span
class="inserted"><ins><em>recordings</a>.</p>
<p>Morally, we see no difference between having human workers listen
and
having speech-recognition systems listen. Both intrude on
privacy.</p>
@@ -2753,14 +2654,14 @@
<p>Red Shell is a spyware that
is found in many proprietary games. It <a
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data on users' computers and sends it to third
parties</a>.</p>
+ tracks</em></ins></span> data <span class="inserted"><ins><em>on users'
computers</em></ins></span> and <span
class="removed"><del><strong>hand</strong></del></span> <span
class="inserted"><ins><em>sends</em></ins></span> it <span
class="removed"><del><strong>over,</strong></del></span> <span
class="inserted"><ins><em>to third parties</a>.</p>
</li>
<li id="M201804144">
<!--#set var="DATE" value='<small
class="date-tag">2018-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>ArenaNet surreptitiously installed a spyware
- program along with an update to the massive
+ program along with an update to</em></ins></span> the <span
class="removed"><del><strong>state</strong></del></span> <span
class="inserted"><ins><em>massive
multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
href="https://techraptor.net/gaming/news/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
to snoop on all open processes running on its user's
computer</a>.</p>
@@ -2769,8 +2670,8 @@
<li id="M201711070">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The driver for a certain gaming keyboard</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
+ <p>The driver for a certain gaming keyboard <a
+
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information to China</a>.</p>
</li>
@@ -2778,22 +2679,19 @@
<!--#set var="DATE" value='<small
class="date-tag">2015-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many <a
-
href="https://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html"></em></ins></span>
+
href="https://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html">
video game consoles snoop on their users and report to the
- <span class="removed"><del><strong>internet</a>—
even</strong></del></span>
- <span
class="inserted"><ins><em>internet</a>—even</em></ins></span> what
their users weigh.</p>
+ internet</a>—even what their users weigh.</p>
<p>A game console is a computer, and you can't trust a computer with
a nonfree operating system.</p>
</li>
- <span
class="removed"><del><strong><li><p>Modern</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201509160">
+ <li id="M201509160">
<!--#set var="DATE" value='<small
class="date-tag">2015-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Modern</em></ins></span> gratis game cr…apps <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"></em></ins></span>
+ <p>Modern gratis game cr…apps <a
+
href="https://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
collect a wide range of data about their users and their users'
friends and associates</a>.</p>
@@ -2802,20 +2700,25 @@
companies.</p>
<p>They use this data to manipulate people to buy things, and hunt
for
- “whales” who can be led to spend a lot of money. They also
+ “whales” who</em></ins></span> can <span
class="removed"><del><strong>store it.</p></strong></del></span> <span
class="inserted"><ins><em>be led to spend a lot of money. They also
use a back door to manipulate the game play for specific players.</p>
<p>While the article describes gratis games, games that cost money
- can use the same tactics.</p>
+ can use the same tactics.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<!-- #SpywareAtHome</strong></del></span>
<span class="inserted"><ins><em><li id="M201401280">
<!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Angry Birds <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>Angry Birds <a
href="https://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and the NSA takes advantage
- to spy through it too</a>. Here's information on <a
+ spies for companies, and the NSA takes advantage</em></ins></span>
+ to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>spy through it
too</a>. Here's information</em></ins></span> on <span
class="removed"><del><strong>top under each subsection</strong></del></span>
<span class="inserted"><ins><em><a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
@@ -2826,27 +2729,29 @@
<li id="M200510200">
<!--#set var="DATE" value='<small
class="date-tag">2005-10</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Blizzard Warden is a hidden
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+ <span class="inserted"><ins><em><p>Blizzard Warden is a hidden
“cheating-prevention” program that <a
href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
spies on every process running on a gamer's computer and sniffs a
good deal of personal data</a>, including lots of activities which
have nothing to do with cheating.</p>
- </li></em></ins></span>
-</ul>
-
-<span class="removed"><del><strong><!--
#SpywareOnTheWeb</strong></del></span>
+ </li>
+</ul></em></ins></span>
-<span class="inserted"><ins><em><div class="big-section">
- <h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
+<div class="big-section">
+ <h3 <span class="removed"><del><strong>id="SpywareAtHome">Spyware at
Home</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInEquipment">Spyware in Connected
Equipment</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtHome">#SpywareAtHome</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
</div>
<div style="clear: left;"></div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202101050">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -2854,7 +2759,7 @@
href="https://foundation.mozilla.org/en/privacynotincluded/">“Privacy
Not Included”</a> list <a
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
- designed to snoop on users</a> even if they meet
+ designed</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>users</a> even if they meet
Mozilla's “Minimum Security Standards.” Insecure
design of the program running on some of these devices <a
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes
@@ -2864,21 +2769,21 @@
<li id="M201708280">
<!--#set var="DATE" value='<small
class="date-tag">2017-08</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
- <span class="inserted"><ins><em><p>The bad security in many Internet
of Stings devices allows <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The bad security in many Internet of Stings devices allows <a
href="https://www.techdirt.com/2017/08/28/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you/">ISPs
to snoop on the people that use them</a>.</p>
<p>Don't be a sucker—reject all the stings.</p>
<p><small>(It is unfortunate that the article uses the term
<a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p>
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInTVSets">TV Sets</h4>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV</strong></del></span> <span
class="inserted"><ins><em>id="SpywareInTVSets">TV</em></ins></span>
Sets</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
@@ -2887,14 +2792,22 @@
don't know. You can't see out the other way.” Evidently that was
before Amazon “smart” TVs.</p>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>More or less all “smart”
TVs</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202201290">
<!--#set var="DATE" value='<small
class="date-tag">2022-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>“Smart” TV producers <a
-
href="https://www.theguardian.com/technology/2022/jan/29/what-your-smart-tv-knows-about-you-and-how-to-stop-it-harvesting-data">are
- spying on people using various methods</a>, and harvest their
- data. They are collecting audio, video, and TV usage data to profile
+ <p>“Smart” TV producers</em></ins></span> <a <span
class="removed"><del><strong>href="
+
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2022/jan/29/what-your-smart-tv-knows-about-you-and-how-to-stop-it-harvesting-data">are
+ spying</em></ins></span> on <span class="inserted"><ins><em>people using
various methods</a>, and harvest</em></ins></span> their <span
class="removed"><del><strong>users</a>.</p>
+
+ <p>The report was as of 2014, but we don't expect this has got
better.</p>
+
+ <p>This shows</strong></del></span>
+ <span class="inserted"><ins><em>data. They are collecting audio, video,
and TV usage data to profile
people.</p>
</li>
@@ -2902,21 +2815,23 @@
<!--#set var="DATE" value='<small
class="date-tag">2020-10</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>TV manufacturers are turning to produce only
- “Smart” TV sets (which include spyware) that <a
+ “Smart” TV sets (which include spyware)</em></ins></span> that
<span class="removed"><del><strong>laws requiring
products</strong></del></span> <span class="inserted"><ins><em><a
href="https://frame.work/blog/in-defense-of-dumb-tvs">it's now very
- hard to find a TV that doesn't spy on you</a>.</p>
+ hard</em></ins></span> to <span class="removed"><del><strong>get users'
formal
+ consent before collecting</strong></del></span> <span
class="inserted"><ins><em>find a TV that doesn't spy on you</a>.</p>
<p>It appears that those manufacturers business model is not to
produce
- TV and sell them for money, but to collect your personal data and
+ TV and sell them for money, but to collect your</em></ins></span> personal
data <span class="inserted"><ins><em>and
(possibly) hand over them to others for benefit.</p>
</li>
<li id="M202006250">
<!--#set var="DATE" value='<small
class="date-tag">2020-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>TV manufacturers are able to <a
+ <p>TV manufacturers</em></ins></span> are <span
class="removed"><del><strong>totally inadequate.
+ And</strong></del></span> <span class="inserted"><ins><em>able to <a
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop
- every second of what the user is watching</a>. This is illegal due to
+ every second of</em></ins></span> what <span
class="removed"><del><strong>happens if a</strong></del></span> <span
class="inserted"><ins><em>the</em></ins></span> user <span
class="removed"><del><strong>declines consent? Probably</strong></del></span>
<span class="inserted"><ins><em>is watching</a>. This is illegal due to
the Video Privacy Protection Act of 1988, but they're circumventing
it through EULAs.</p>
</li>
@@ -2926,21 +2841,25 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio TVs <a
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever the TV sees,”</a> in the own words of
the company's
- CTO, and this data is sold to third parties. This is in return for
+ collect “whatever</em></ins></span> the TV
+ <span class="removed"><del><strong>will say, “Without your
consent</strong></del></span> <span
class="inserted"><ins><em>sees,”</a> in the own words of the
company's
+ CTO, and this data is sold</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>third parties. This is in return for
“better service” (meaning more intrusive ads?) and slightly
lower retail prices.</p>
<p>What is supposed to make this spying acceptable, according to him,
- is that it is opt-in in newer models. But since the Vizio software is
+ is that it is opt-in in newer models. But since</em></ins></span> the
<span class="removed"><del><strong>TV</strong></del></span> <span
class="inserted"><ins><em>Vizio software is
nonfree, we don't know what is actually happening behind the scenes,
- and there is no guarantee that all future updates will leave the
+ and there is no guarantee that all future updates</em></ins></span> will
+ <span class="removed"><del><strong>not work.”</p>
+
+ <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>leave the
settings unchanged.</p>
- <p>If you already own a Vizio “smart” TV (or any
“smart” TV, for that
- matter), the easiest way to make sure it isn't spying on you is
+ <p>If you already own a Vizio “smart” TV (or any
“smart” TV, for</em></ins></span> that <span
class="removed"><del><strong>TVs are</strong></del></span>
+ <span class="inserted"><ins><em>matter), the easiest way to make sure it
isn't spying on you is
to disconnect it from the Internet, and use a terrestrial antenna
- instead. Unfortunately, this is not always possible. Another option,
+ instead. Unfortunately, this is</em></ins></span> not <span
class="removed"><del><strong>allowed</strong></del></span> <span
class="inserted"><ins><em>always possible. Another option,
if you are technically oriented, is to get your own router (which can
be an old computer running completely free software), and set up a
firewall to block connections to Vizio's servers. Or, as a last resort,
@@ -2956,7 +2875,7 @@
<p>We link to the article for the facts it presents. It
is too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix app <a
+ moral weakness of surrendering</em></ins></span> to <span
class="inserted"><ins><em>Netflix. The Netflix app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
@@ -2965,15 +2884,16 @@
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio “smart” <a
-
href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts and
+
href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs</em></ins></span>
+ report <span class="inserted"><ins><em>everything that is viewed on them,
and not just broadcasts and
cable</a>. Even if the image is coming from the user's own computer,
- the TV reports what it is. The existence of a way to disable the
- surveillance, even if it were not hidden as it was in these TVs,
- does not legitimize the surveillance.</p>
+ the TV reports</em></ins></span> what <span class="inserted"><ins><em>it
is. The existence of a way to disable</em></ins></span> the <span
class="removed"><del><strong>user watches — no
exceptions!</p></strong></del></span>
+ <span class="inserted"><ins><em>surveillance, even if it were not hidden
as it was in these TVs,
+ does not legitimize the surveillance.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Vizio</strong></del></span>
- <li id="M201511130">
+ <span class="inserted"><ins><em><li id="M201511130">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Some web and TV advertisements play inaudible
@@ -2988,9 +2908,9 @@
<li id="M201511060">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio goes a step further than other TV
- manufacturers in spying on their users: their <a
-
href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ <p>Vizio</em></ins></span> goes a step further than other TV
+ manufacturers in spying on their users: their <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"></em></ins></span>
“smart” TVs analyze your viewing habits in detail and
link them your IP address</a> so that advertisers can track you
across devices.</p>
@@ -2999,33 +2919,44 @@
is an injustice already.</p>
</li>
- <li id="M201511020">
+ <span
class="removed"><del><strong><li><p>Tivo's</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511020">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tivo's alliance with Viacom adds 2.3 million households
+ <p>Tivo's</em></ins></span> alliance with Viacom adds 2.3 million
households
to the 600 millions social media profiles the company
already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can now <a
-
href="https://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
- correlate TV advertisement with online purchases</a>, exposing all
- users to new combined surveillance by default.</p>
+ information with online social media participation, Tivo can now <a
<span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ correlate</em></ins></span> TV advertisement with online
purchases</a>, exposing all
+ users to new combined surveillance by <span
class="removed"><del><strong>default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible sounds to be
+ picked up by proprietary malware running on other devices in
+ range so as to determine that they are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads with Web activity, and
+ other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>default.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Vizio</strong></del></span>
- <li id="M201507240">
+ <span class="inserted"><ins><em><li id="M201507240">
<!--#set var="DATE" value='<small
class="date-tag">2015-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Vizio “smart” TVs recognize and <a
-
href="https://www.engadget.com/2015-07-24-vizio-ipo-inscape-acr.html">track
+ <p>Vizio</em></ins></span> “smart” TVs recognize and
<a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.engadget.com/2015-07-24-vizio-ipo-inscape-acr.html">track</em></ins></span>
what people are watching</a>, even if it isn't a TV
channel.</p>
</li>
+ <span class="removed"><del><strong><li><p>The Amazon
“Smart”</strong></del></span>
- <li id="M201505290">
+ <span class="inserted"><ins><em><li id="M201505290">
<!--#set var="DATE" value='<small
class="date-tag">2015-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Verizon cable TV <a
-
href="https://arstechnica.com/information-technology/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch, and even what they wanted to
+ <p>Verizon cable</em></ins></span> TV <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops on what programs people watch,</em></ins></span> and <span
class="removed"><del><strong>listening all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>even what they wanted to
record</a>.</p>
</li>
@@ -3035,32 +2966,34 @@
<p>Vizio <a
href="https://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
used a firmware “upgrade” to make its TVs snoop on what
- users watch</a>. The TVs did not do that when first sold.</p>
+ users watch</a>. The TVs did not do that when first
sold.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>The</strong></del></span>
- <li id="M201502090">
+ <span class="inserted"><ins><em><li id="M201502090">
<!--#set var="DATE" value='<small
class="date-tag">2015-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Samsung “Smart” TV <a
-
href="https://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on the internet to another company,
Nuance</a>.
+ <p>The</em></ins></span> Samsung “Smart” TV <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits</em></ins></span> users' voice on the internet to another
company, Nuance</a>.
Nuance can save it and would then have to give it to the US or some
other government.</p>
<p>Speech recognition is not to be trusted unless it is done by free
software in your own computer.</p>
- <p>In its privacy policy, Samsung explicitly confirms that <a
+ <span class="inserted"><ins><em><p>In its privacy policy, Samsung
explicitly confirms that <a
href="https://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
data containing sensitive information will be transmitted to third
- parties</a>.</p>
+ parties</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Spyware
in</strong></del></span>
- <li id="M201411090">
+ <span class="inserted"><ins><em><li id="M201411090">
<!--#set var="DATE" value='<small
class="date-tag">2014-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Amazon “Smart” TV is <a
-
href="https://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ <p>The Amazon “Smart” TV is</em></ins></span> <a
<span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
snooping all the time</a>.</p>
</li>
@@ -3087,53 +3020,62 @@
<li id="M201405200">
<!--#set var="DATE" value='<small
class="date-tag">2014-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Spyware in LG “smart” TVs <a
-
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ <p>Spyware in</em></ins></span> LG “smart” <span
class="removed"><del><strong>TVs</a></strong></del></span> <span
class="inserted"><ins><em>TVs <a
+
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"></em></ins></span>
reports what the user watches, and the switch to turn this off has
- no effect</a>. (The fact that the transmission reports a 404 error
+ no <span class="removed"><del><strong>effect.</strong></del></span> <span
class="inserted"><ins><em>effect</a>.</em></ins></span> (The fact that
the transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
- <p>Even worse, it <a
-
href="https://rrrrambles.wordpress.com/2013/11/21/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network</a>.</p>
+ <p>Even worse, it <a <span
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://rrrrambles.wordpress.com/2013/11/21/lg-tv-logging-filenames-from-network-folders/"></em></ins></span>
+ snoops on other devices on the user's local <span
class="removed"><del><strong>network.</a></p></strong></del></span>
<span class="inserted"><ins><em>network</a>.</p></em></ins></span>
<p>LG later said it had installed a patch to stop this, but any
product could spy this way.</p>
- <p>Meanwhile, LG TVs <a
-
href="https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/">
+ <p>Meanwhile, LG TVs <a <span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/"></em></ins></span>
do lots of spying anyway</a>.</p>
</li>
+ <span class="removed"><del><strong><li>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops</strong></del></span>
- <li id="M201212170">
+ <span class="inserted"><ins><em><li id="M201212170">
<!--#set var="DATE" value='<small
class="date-tag">2012-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a “smart”
TV</a>
- and use its camera to watch the people who are watching TV.</p>
+ Crackers found a way to break security</em></ins></span> on <span
class="removed"><del><strong>what programs people watch,</strong></del></span>
<span class="inserted"><ins><em>a “smart”
TV</a></em></ins></span>
+ and <span class="removed"><del><strong>even what they
wanted</strong></del></span> <span class="inserted"><ins><em>use its
camera</em></ins></span> to <span
class="removed"><del><strong>record.</a></p></strong></del></span>
<span class="inserted"><ins><em>watch the people who are watching
TV.</p></em></ins></span>
</li>
</ul>
+<span class="removed"><del><strong><!-- #SpywareAtPlay
--></strong></del></span>
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareAtPlay">Spyware at
Play</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtPlay">#SpywareAtPlay</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear: left;"></div>
-<ul class="blurbs">
+<ul>
+ <li><p>Many</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201901100">
<!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Amazon Ring “security” devices <a
-
href="https://www.engadget.com/2019-01-10-ring-gave-employees-access-customer-video-feeds.html">
- send the video they capture to Amazon servers</a>, which save it
+ <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.engadget.com/2019-01-10-ring-gave-employees-access-customer-video-feeds.html">
+ send the</em></ins></span> video <span class="removed"><del><strong>game
consoles snoop</strong></del></span> <span class="inserted"><ins><em>they
capture to Amazon servers</a>, which save it
long-term.</p>
<p>In many cases, the video shows everyone that comes near, or merely
passes by, the user's front door.</p>
- <p>The article focuses on how Ring used to let individual employees
look
+ <p>The article focuses</em></ins></span> on <span
class="removed"><del><strong>their users and report</strong></del></span> <span
class="inserted"><ins><em>how Ring used to let individual employees look
at the videos freely. It appears Amazon has tried to prevent that
secondary abuse, but the primary abuse—that Amazon gets the
video—Amazon expects society to surrender to.</p>
@@ -3149,7 +3091,8 @@
name!</p>
<p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not to look at what's in the videos. That's not
+ manufacturers promise not</em></ins></span> to <span
class="inserted"><ins><em>look at what's in</em></ins></span> the
+ <span
class="removed"><del><strong>internet</a>—</strong></del></span>
<span class="inserted"><ins><em>videos. That's not
security for your home. Security means making sure they don't get to
see through your camera.</p>
</li>
@@ -3166,10 +3109,10 @@
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The Nest Cam “smart” camera is <a
- href="https://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when the “owner” switches it “off.”</p>
+ href="https://www.bbc.com/news/technology-34922712">always
watching</a>,</em></ins></span>
+ even <span class="removed"><del><strong>what their users
weigh.</p></strong></del></span> <span class="inserted"><ins><em>when the
“owner” switches it “off.”</p></em></ins></span>
- <p>A “smart” device means the manufacturer is using it
+ <p>A <span class="removed"><del><strong>game
console</strong></del></span> <span
class="inserted"><ins><em>“smart” device means the
manufacturer</em></ins></span> is <span class="inserted"><ins><em>using it
to outsmart you.</p>
</li>
</ul>
@@ -3184,7 +3127,7 @@
<li id="M201711244">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Furby Connect has a <a
+ <p>The Furby Connect has</em></ins></span> a <span
class="removed"><del><strong>computer,</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.contextis.com/en/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
universal back door</a>. If the product as shipped doesn't act as a
listening device, remote changes to the code could surely convert it
@@ -3212,8 +3155,8 @@
<p>Note the totally inadequate proposed response: a labeling
standard with which manufacturers would make statements about their
- products, rather than free software which users could have checked
- and changed.</p>
+ products, rather than free software which users could have
checked</em></ins></span>
+ and <span class="removed"><del><strong>you can't
trust</strong></del></span> <span class="inserted"><ins><em>changed.</p>
<p>The company that made the vibrator <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
@@ -3221,7 +3164,7 @@
used it</a>.</p>
<p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the data to a data
+ true, but it doesn't really matter. If it had sold the data
to</em></ins></span> a <span
class="removed"><del><strong>computer</strong></del></span> <span
class="inserted"><ins><em>data
broker, the data broker would have been able to figure out who the
user was.</p>
@@ -3234,11 +3177,11 @@
<li id="M201702280">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>“CloudPets” toys with microphones <a
+ <p>“CloudPets” toys</em></ins></span> with <span
class="inserted"><ins><em>microphones <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
leak childrens' conversations to the manufacturer</a>. Guess what?
<a
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a> collected by the
+ Crackers found</em></ins></span> a <span class="inserted"><ins><em>way to
access the data</a> collected by the
manufacturer's snooping.</p>
<p>That the manufacturer and the FBI could listen to these
@@ -3294,27 +3237,33 @@
<li id="M202009270">
<!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many employers are using nonfree
- software, including videoconference software, to <a
+ <p>Many employers are using</em></ins></span> nonfree <span
class="removed"><del><strong>operating system.</p></strong></del></span>
+ <span class="inserted"><ins><em>software, including videoconference
software, to <a
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance">
surveil and monitor staff working at home</a>. If the program reports
whether you are “active,” that is in effect a malicious
- surveillance feature.</p>
+ surveillance feature.</p></em></ins></span>
</li>
- <li id="M202008030">
+ <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202008030">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google Nest <a
-
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
- is taking over ADT</a>. Google sent out a software
- update to its speaker devices using their back door <a
+ <p>Google Nest</em></ins></span> <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/">
+ is taking over ADT</a>. Google sent out</em></ins></span> a <span
class="removed"><del><strong>wide range of data about</strong></del></span>
<span class="inserted"><ins><em>software
+ update to its speaker devices using</em></ins></span> their <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>back door <a
href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that
- listens for things like smoke alarms</a> and then notifies your phone
+ listens for things like smoke alarms</a></em></ins></span> and <span
class="inserted"><ins><em>then notifies your phone
that an alarm is happening. This means the devices now listen for more
- than just their wake words. Google says the software update was sent
- out prematurely and on accident and Google was planning on disclosing
- this new feature and offering it to customers who pay for it.</p>
+ than just</em></ins></span> their <span
class="removed"><del><strong>users'
+ friends</strong></del></span> <span class="inserted"><ins><em>wake
words. Google says the software update was sent
+ out prematurely</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
+
+ <p>Even nastier, they do</strong></del></span> <span
class="inserted"><ins><em>on accident and Google was planning on disclosing
+ this new feature and offering</em></ins></span> it <span
class="inserted"><ins><em>to customers who pay for it.</p>
</li>
<li id="M202006300">
@@ -3338,8 +3287,8 @@
<p>Internet-tethered Amazon Ring had
a security vulnerability that enabled attackers to <a
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
- access the user's wifi password</a>, and snoop on the household
- through connected surveillance devices.</p>
+ access the user's wifi password</a>, and snoop on the
household</em></ins></span>
+ through <span class="removed"><del><strong>ad
networks</strong></del></span> <span class="inserted"><ins><em>connected
surveillance devices.</p>
<p>Knowledge of the wifi password would not be sufficient to carry
out any significant surveillance if the devices implemented proper
@@ -3362,7 +3311,7 @@
<p>Rather than trying to better control the use of recordings, Google
should not record or listen to the person's voice. It should only
- get commands that the user wants to send to some Google service.</p>
+ get commands</em></ins></span> that <span
class="removed"><del><strong>merge</strong></del></span> the <span
class="inserted"><ins><em>user wants to send to some Google service.</p>
</li>
<li id="M201905061">
@@ -3373,17 +3322,20 @@
recordings made without a legitimate prompt), and sends
it to Amazon's servers, which store it indefinitely. Even
worse, Amazon forwards it to third-party companies. Thus,
- even if users request deletion of their data from Amazon's servers, <a
+ even if users request deletion of their</em></ins></span> data <span
class="inserted"><ins><em>from Amazon's servers, <a
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
the data remain on other servers</a>, where they can be accessed by
advertising companies and government agencies. In other words,
deleting the collected information doesn't cancel the wrong of
collecting it.</p>
- <p>Data collected by devices such as the Nest thermostat, the Philips
- Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+ <p>Data</em></ins></span> collected by <span
class="removed"><del><strong>various cr…apps</strong></del></span> <span
class="inserted"><ins><em>devices such as the Nest thermostat, the Philips
+ Hue-connected lights, the Chamberlain MyQ garage opener</em></ins></span>
and <span class="removed"><del><strong>sites</strong></del></span> <span
class="inserted"><ins><em>the Sonos
speakers are likewise stored longer than necessary on the servers
- the devices are tethered to. Moreover, they are made available to
+ the devices are tethered to. Moreover, they are</em></ins></span> made
<span class="removed"><del><strong>by different
+ companies.</p>
+
+ <p>They use this</strong></del></span> <span
class="inserted"><ins><em>available to
Alexa. As a result, Amazon has a very precise picture of users' life
at home, not only in the present, but in the past (and, who knows,
in the future too?)</p>
@@ -3401,11 +3353,11 @@
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
location and other personal data</a>.</p>
- <p>Since the client program is nonfree, and data processing is done
+ <p>Since the client program is nonfree, and</em></ins></span> data
<span class="inserted"><ins><em>processing is done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
the cloud</a>” (a soothing way of saying “We won't
- tell you how and where it's done”), users have no way
- to know what happens to the recordings unless human eavesdroppers <a
+ tell you how and where it's done”), users have no
way</em></ins></span>
+ to <span class="removed"><del><strong>manipulate
people</strong></del></span> <span class="inserted"><ins><em>know what
happens</em></ins></span> to <span class="removed"><del><strong>buy
things,</strong></del></span> <span class="inserted"><ins><em>the recordings
unless human eavesdroppers <a
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
break their non-disclosure agreements</a>.</p>
</li>
@@ -3417,7 +3369,7 @@
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
communicates with HP servers</a> to make sure the user is still
- paying for the subscription, and hasn't printed more pages than were
+ paying for the subscription,</em></ins></span> and <span
class="removed"><del><strong>hunt</strong></del></span> <span
class="inserted"><ins><em>hasn't printed more pages than were
paid for.</p>
<p>Even though the ink subscription program may be cheaper in some
@@ -3431,7 +3383,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Crackers found a way to break the security of an Amazon device,
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
- turn it into a listening device</a> for them.</p>
+ turn it into a listening device</a></em></ins></span> for <span
class="removed"><del><strong>“whales” who</strong></del></span>
<span class="inserted"><ins><em>them.</p>
<p>It was very difficult for them to do this. The job would be much
easier for Amazon. And if some government such as China or the US
@@ -3460,8 +3412,8 @@
listen to everyone in the house, all the time</a>.</p>
<p>Today's technological practice does not include any way of making
- a device that can obey your voice commands without potentially spying
- on you. Even if it is air-gapped, it could be saving up records
+ a device that</em></ins></span> can <span class="inserted"><ins><em>obey
your voice commands without potentially spying
+ on you. Even if it is air-gapped, it could</em></ins></span> be <span
class="removed"><del><strong>led</strong></del></span> <span
class="inserted"><ins><em>saving up records
about you for later examination.</p>
</li>
@@ -3478,7 +3430,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy on their
renters</a>.</p>
+ Rent-to-own computers were programmed</em></ins></span> to <span
class="removed"><del><strong>spend</strong></del></span> <span
class="inserted"><ins><em>spy on their renters</a>.</p>
</li>
</ul>
@@ -3510,7 +3462,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Internet-enabled watches with proprietary software
are malware, violating people (specially children's)
- privacy. In addition, they have a lot of security flaws. They <a
+ privacy. In addition, they have</em></ins></span> a lot of <span
class="removed"><del><strong>money.</strong></del></span> <span
class="inserted"><ins><em>security flaws.</em></ins></span> They
+ <span class="removed"><del><strong>also use</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/">
permit security breakers (and unauthorized people) to access</a> the
watch.</p>
@@ -3528,7 +3481,7 @@
href="https://www.theregister.com/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
that connects to an unidentified site in China</a>.</p>
- <p>The article says this is a back door, but that could be a
+ <p>The article says this is</em></ins></span> a back <span
class="removed"><del><strong>door</strong></del></span> <span
class="inserted"><ins><em>door, but that could be a
misunderstanding. However, it is certainly surveillance, at
least.</p>
</li>
@@ -3536,8 +3489,8 @@
<!--#set var="DATE" value='<small
class="date-tag">2014-07</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>An LG “smart” watch is designed <a
-
href="https://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else and to transmit conversations
+
href="https://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
+ to <span class="removed"><del><strong>manipulate</strong></del></span>
<span class="inserted"><ins><em>report its location to someone else and to
transmit conversations
too</a>.</p>
</li>
</ul>
@@ -3554,8 +3507,10 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://gizmodo.com/get-ready-for-in-car-ads-1846888390">Ford
- is planning to force ads on drivers in cars</a>, with the ability for
- the owner to pay extra to turn them off. The system probably imposes
+ is planning to force ads on drivers in cars</a>,
with</em></ins></span> the <span class="removed"><del><strong>game
play</strong></del></span> <span
class="inserted"><ins><em>ability</em></ins></span> for <span
class="removed"><del><strong>specific players.</p>
+
+ <p>While</strong></del></span>
+ the <span class="removed"><del><strong>article describes gratis games,
games</strong></del></span> <span class="inserted"><ins><em>owner to pay extra
to turn them off. The system probably imposes
surveillance on drivers too.</p>
</li>
@@ -3601,7 +3556,7 @@
near-complete access to the internal car network</a>. It is
constantly
connected to the cellular phone network and sends Ford a lot of data,
including car location. This feature operates even when the ignition
- key is removed, and users report that they can't disable it.</p>
+ key is removed, and users report</em></ins></span> that <span
class="removed"><del><strong>cost money</strong></del></span> <span
class="inserted"><ins><em>they can't disable it.</p>
<p>If you own one of these cars, have you succeeded in breaking the
connectivity by disconnecting the cellular modem, or wrapping the
@@ -3633,11 +3588,11 @@
sneaking it into the contract that users sign for some digital service
or other. A requirement for consent is effectively no protection.</p>
- <p>The cars can also collect lots of other data: listening to you,
+ <p>The cars</em></ins></span> can <span
class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>also collect lots of other data: listening to you,
watching you, following your movements, tracking passengers' cell
phones. <em>All</em> such data collection should be
forbidden.</p>
- <p>But if you really want to be safe, we must make sure the car's
+ <p>But if you really want to be safe, we must make
sure</em></ins></span> the <span class="removed"><del><strong>same
tactics.</p></strong></del></span> <span class="inserted"><ins><em>car's
hardware cannot collect any of that data, or that the software
is free so we know it won't collect any of that data.</p>
</li>
@@ -3703,12 +3658,14 @@
is not really a matter of proprietary surveillance. These systems
are an intolerable invasion of privacy, and should be replaced with
anonymous payment systems, but the invasion isn't done by malware. The
- other cases mentioned are done by proprietary malware in the car.</p>
+ other cases mentioned are done by proprietary malware in the
car.</p></em></ins></span>
</li>
</ul>
+<span class="removed"><del><strong><!--
#SpywareOnTheWeb</strong></del></span>
-<div class="big-subsection">
+
+<span class="inserted"><ins><em><div class="big-subsection">
<h4 id="SpywareInVR">Virtual Reality</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInVR">#SpywareInVR</a>)</span>
</div>
@@ -3716,8 +3673,8 @@
<ul class="blurbs">
<li id="M202008182">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Oculus headsets <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+ <span class="inserted"><ins><em><p>Oculus headsets <a
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
users to identify themselves to Facebook</a>. This will give Facebook
free rein to pervasively snoop on Oculus users.</p>
@@ -3907,13 +3864,13 @@
<span
class="removed"><del><strong>href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
snooping</strong></del></span>
<span
class="inserted"><ins><em>href="https://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- to snoop on information that users have typed into a
+ to snoop</em></ins></span> on <span class="inserted"><ins><em>information
that users have typed into a
form but not sent</a>, in order to learn their identity. Some are
<a
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege">
getting sued</a> for this.</p>
- <p>The chat facilities of some customer services use the same sort of
- malware to <a
+ <p>The chat facilities of some customer services
use</em></ins></span> the <span class="removed"><del><strong>user's
browsing</a>, and many</strong></del></span> <span
class="inserted"><ins><em>same sort</em></ins></span> of <span
class="removed"><del><strong>them do so.</p></strong></del></span>
+ <span class="inserted"><ins><em>malware to <a
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
read what the user is typing before it is posted</a>.</p>
</li>
@@ -3923,7 +3880,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
- JavaScript</em></ins></span> on <span class="inserted"><ins><em>its web
site to give other companies personal data on
+ JavaScript on its web site to give other companies personal data on
its customers</a>.</p>
</li>
@@ -3939,7 +3896,7 @@
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Some websites send
- JavaScript code to collect all</em></ins></span> the user's <span
class="removed"><del><strong>browsing</a>, and many of them do
so.</p></strong></del></span> <span class="inserted"><ins><em>input, <a
+ JavaScript code to collect all the user's input, <a
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
can then be used to reproduce the whole session</a>.</p>
@@ -3990,14 +3947,14 @@
<p>Google's proprietary Chrome web browser <a
href="https://www.techrepublic.com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/">
added a surveillance API (idle detection API)</a> which lets
- websites ask Chrome to report when a user with a web page open is
- idle.</p>
+ websites ask Chrome to report when a user with a web page
open</em></ins></span> is <span class="removed"><del><strong>also
used</strong></del></span>
+ <span class="inserted"><ins><em>idle.</p>
</li>
<li id="M201906220">
<!--#set var="DATE" value='<small
class="date-tag">2019-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google Chrome</em></ins></span> is <span
class="removed"><del><strong>also used</strong></del></span> <span
class="inserted"><ins><em>an <a
+ <p>Google Chrome is an <a
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/">
instrument of surveillance</a>. It lets thousands of trackers invade
users' computers and report the sites they visit to advertising and
@@ -4346,7 +4303,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/06/04 15:32:21 $
+$Date: 2022/06/04 17:03:19 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.425
retrieving revision 1.426
diff -u -b -r1.425 -r1.426
--- proprietary/po/proprietary-surveillance.ja.po 4 Jun 2022 15:32:21
-0000 1.425
+++ proprietary/po/proprietary-surveillance.ja.po 4 Jun 2022 17:03:19
-0000 1.426
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-06-04 15:25+0000\n"
+"POT-Creation-Date: 2022-06-04 16:56+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -214,12 +214,6 @@
msgstr "<a href=\"#SpywareInApplications\">ã¢ããªã®ã¹ãã¤ã¦ã§ã¢</a>"
#. type: Content of: <div><div><div><ul><li>
-#, fuzzy
-#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
-msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
-msgstr "<a
href=\"#SpywareInMobileApps\">ã¢ãã¤ã«ã»ã¢ããªã®ã¹ãã¤ã¦ã§ã¢</a>"
-
-#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr ""
@@ -1794,24 +1788,6 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInApplications"
"\">#SpywareInApplications</a>)</span>"
-#. type: Content of: <div><div><div><h4>
-#, fuzzy
-#| msgid "Spyware in Mobile Applications"
-msgid "All Apps"
-msgstr "ã¢ãã¤ã«ã»ã¢ããªã®ã¹ãã¤ã¦ã§ã¢"
-
-#. type: Content of: <div><div><div>
-#, fuzzy
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
-#| "\">#SpywareInMobileApps</a>)</span>"
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
-"\">#SpywareInAllApps</a>)</span>"
-msgstr ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
-"\">#SpywareInMobileApps</a>)</span>"
-
#. type: Content of: <div><div><ul><li><p>
msgid ""
"A worldwide investigation found that most of the applications that school "
@@ -5149,6 +5125,27 @@
msgid "Updated:"
msgstr "æçµæ´æ°:"
+#, fuzzy
+#~| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+#~ msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+#~ msgstr "<a
href=\"#SpywareInMobileApps\">ã¢ãã¤ã«ã»ã¢ããªã®ã¹ãã¤ã¦ã§ã¢</a>"
+
+#, fuzzy
+#~| msgid "Spyware in Mobile Applications"
+#~ msgid "All Apps"
+#~ msgstr "ã¢ãã¤ã«ã»ã¢ããªã®ã¹ãã¤ã¦ã§ã¢"
+
+#, fuzzy
+#~| msgid ""
+#~| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#~| "\">#SpywareInMobileApps</a>)</span>"
+#~ msgid ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+#~ "\">#SpywareInAllApps</a>)</span>"
+#~ msgstr ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#~ "\">#SpywareInMobileApps</a>)</span>"
+
#~ msgid ""
#~ "We can suppose Microsoft look at users' files for the US government on "
#~ "demand, though the “privacy policy” does not explicit say so. "
Index: proprietary/po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.364
retrieving revision 1.365
diff -u -b -r1.364 -r1.365
--- proprietary/po/proprietary-surveillance.pot 4 Jun 2022 15:32:21 -0000
1.364
+++ proprietary/po/proprietary-surveillance.pot 4 Jun 2022 17:03:20 -0000
1.365
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-06-04 15:25+0000\n"
+"POT-Creation-Date: 2022-06-04 16:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -166,10 +166,6 @@
msgstr ""
#. type: Content of: <div><div><div><ul><li>
-msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
-msgstr ""
-
-#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr ""
@@ -1238,16 +1234,6 @@
"href=\"#SpywareInApplications\">#SpywareInApplications</a>)</span>"
msgstr ""
-#. type: Content of: <div><div><div><h4>
-msgid "All Apps"
-msgstr ""
-
-#. type: Content of: <div><div><div>
-msgid ""
-"<span class=\"anchor-reference-id\">(<a "
-"href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>"
-msgstr ""
-
#. type: Content of: <div><div><ul><li><p>
msgid ""
"A worldwide investigation found that most of the applications that school "
Index: proprietary/po/proprietary-surveillance.pt-br-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pt-br-diff.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/proprietary-surveillance.pt-br-diff.html 4 Jun 2022
15:32:21 -0000 1.17
+++ proprietary/po/proprietary-surveillance.pt-br-diff.html 4 Jun 2022
17:03:20 -0000 1.18
@@ -122,8 +122,7 @@
</ul>
<h4><a href="#SpywareInApplications">Spyware in
Applications</a></h4>
<ul>
- <li><a <span
class="inserted"><ins><em>href="#SpywareInAllApps">All
Apps</a></li>
- <li><a</em></ins></span>
href="#SpywareInDesktopApps">Desktop Apps</a></li>
+ <li><a href="#SpywareInDesktopApps">Desktop
Apps</a></li>
<li><a href="#SpywareInMobileApps">Mobile
Apps</a></li>
<li><a href="#SpywareInSkype">Skype</a></li>
<li><a href="#SpywareInGames">Games</a></li>
@@ -1143,12 +1142,7 @@
</div>
<div style="clear: left;"></div>
-<div class="big-subsection">
- <h4 <span class="inserted"><ins><em>id="SpywareInAllApps">All
Apps</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInAllApps">#SpywareInAllApps</a>)</span>
-</div>
-
-<ul class="blurbs">
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202205240">
<!--#set var="DATE" value='<small
class="date-tag">2022-05</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1162,10 +1156,10 @@
still being used in the classrooms even after some of the schools
reopened.</p>
</li>
-</ul>
+</ul></em></ins></span>
<div class="big-subsection">
- <h4</em></ins></span> id="SpywareInDesktopApps">Desktop Apps</h4>
+ <h4 id="SpywareInDesktopApps">Desktop Apps</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span>
</div>
@@ -3778,7 +3772,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/06/04 15:32:21 $
+$Date: 2022/06/04 17:03:20 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pt-br.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary/po/proprietary-surveillance.pt-br.po 4 Jun 2022 15:32:21
-0000 1.38
+++ proprietary/po/proprietary-surveillance.pt-br.po 4 Jun 2022 17:03:20
-0000 1.39
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2022-06-04 15:25+0000\n"
+"POT-Creation-Date: 2022-06-04 16:56+0000\n"
"PO-Revision-Date: 2021-06-26 09:40-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -197,12 +197,6 @@
"aplicativos</a>"
#. type: Content of: <div><div><div><ul><li>
-#, fuzzy
-#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
-msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
-msgstr "<a href=\"#SpywareInMobileApps\">Aplicativos móveis</a>"
-
-#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr "<a href=\"#SpywareInDesktopApps\">Aplicativos de desktop</a>"
@@ -1980,24 +1974,6 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInApplications"
"\">#SpywareInApplications</a>)</span>"
-#. type: Content of: <div><div><div><h4>
-#, fuzzy
-#| msgid "Mobile Apps"
-msgid "All Apps"
-msgstr "Aplicativos móveis"
-
-#. type: Content of: <div><div><div>
-#, fuzzy
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
-#| "\">#SpywareInMobileApps</a>)</span>"
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
-"\">#SpywareInAllApps</a>)</span>"
-msgstr ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
-"\">#SpywareInMobileApps</a>)</span>"
-
#. type: Content of: <div><div><ul><li><p>
msgid ""
"A worldwide investigation found that most of the applications that school "
@@ -6409,5 +6385,26 @@
msgid "Updated:"
msgstr "Ãltima atualização:"
+#, fuzzy
+#~| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+#~ msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+#~ msgstr "<a href=\"#SpywareInMobileApps\">Aplicativos móveis</a>"
+
+#, fuzzy
+#~| msgid "Mobile Apps"
+#~ msgid "All Apps"
+#~ msgstr "Aplicativos móveis"
+
+#, fuzzy
+#~| msgid ""
+#~| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#~| "\">#SpywareInMobileApps</a>)</span>"
+#~ msgid ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+#~ "\">#SpywareInAllApps</a>)</span>"
+#~ msgstr ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#~ "\">#SpywareInMobileApps</a>)</span>"
+
#~ msgid "Copyright © 2015-2021 Free Software Foundation, Inc."
#~ msgstr "Copyright © 2015-2021 Free Software Foundation, Inc."
Index: proprietary/po/proprietary-surveillance.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru-en.html,v
retrieving revision 1.298
retrieving revision 1.299
diff -u -b -r1.298 -r1.299
--- proprietary/po/proprietary-surveillance.ru-en.html 11 May 2022 16:01:49
-0000 1.298
+++ proprietary/po/proprietary-surveillance.ru-en.html 4 Jun 2022 17:03:20
-0000 1.299
@@ -1097,6 +1097,22 @@
</div>
<div style="clear: left;"></div>
+<ul class="blurbs">
+ <li id="M202205240">
+ <!--#set var="DATE" value='<small class="date-tag">2022-05</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A worldwide investigation found that
+ most of the applications that school districts
+ recommended for remote education during the COVID-19 pandemic <a
+
href="https://web.archive.org/web/20220525011540/https://www.washingtonpost.com/technology/2022/05/24/remote-school-app-tracking-privacy/">track
+ and collect personal data from children as young as below the age of
+ five</a>. These applications, and their websites, send the collected
+ information to ad giants such as Facebook and Goodle, and they are
+ still being used in the classrooms even after some of the schools
+ reopened.</p>
+ </li>
+</ul>
+
<div class="big-subsection">
<h4 id="SpywareInDesktopApps">Desktop Apps</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span>
@@ -3648,7 +3664,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/05/11 16:01:49 $
+$Date: 2022/06/04 17:03:20 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.782
retrieving revision 1.783
diff -u -b -r1.782 -r1.783
--- proprietary/po/proprietary-surveillance.ru.po 4 Jun 2022 15:32:21
-0000 1.782
+++ proprietary/po/proprietary-surveillance.ru.po 4 Jun 2022 17:03:20
-0000 1.783
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2022-06-04 15:25+0000\n"
+"POT-Creation-Date: 2022-06-04 16:56+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,7 +16,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2022-06-04 14:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -194,14 +193,6 @@
msgstr "<a href=\"#SpywareInApplications\">ÐÑикладнÑе
пÑогÑаммÑ</a>"
#. type: Content of: <div><div><div><ul><li>
-# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
-# | {+href=\"#SpywareInAllApps\">All+} Apps</a>
-#, fuzzy
-#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
-msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
-msgstr "<a href=\"#SpywareInMobileApps\">ÐобилÑнÑе
пÑиложениÑ</a>"
-
-#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr "<a href=\"#SpywareInDesktopApps\">ÐÑогÑаммÑ
наÑÑолÑнÑÑ
компÑÑÑеÑов</a>"
@@ -1775,28 +1766,6 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInApplications"
"\">#SpywareInApplications</a>)</span>"
-#. type: Content of: <div><div><div><h4>
-# | [-Mobile-]{+All+} Apps
-#, fuzzy
-#| msgid "Mobile Apps"
-msgid "All Apps"
-msgstr "ÐобилÑнÑе пÑиложениÑ"
-
-#. type: Content of: <div><div><div>
-# | <span class=\"anchor-reference-id\">(<a
-# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
-# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
-#, fuzzy
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
-#| "\">#SpywareInMobileApps</a>)</span>"
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
-"\">#SpywareInAllApps</a>)</span>"
-msgstr ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
-"\">#SpywareInMobileApps</a>)</span>"
-
#. type: Content of: <div><div><ul><li><p>
msgid ""
"A worldwide investigation found that most of the applications that school "
@@ -1808,6 +1777,14 @@
"giants such as Facebook and Goodle, and they are still being used in the "
"classrooms even after some of the schools reopened."
msgstr ""
+"ÐбÑемиÑовое ÑаÑÑледование показало, ÑÑо
болÑÑинÑÑво пÑиложений, "
+"ÑекомендованнÑÑ
оÑделами обÑÐ°Ð·Ð¾Ð²Ð°Ð½Ð¸Ñ Ð´Ð»Ñ
Ñдаленного обÑÑÐµÐ½Ð¸Ñ Ð²Ð¾ вÑÐµÐ¼Ñ "
+"пандемии COVID-19, <a
href=\"https://web.archive.org/web/20220525011540/"
+"https://www.washingtonpost.com/technology/2022/05/24/remote-school-app-"
+"tracking-privacy/\">оÑÑлеживаÑÑ Ð¸ ÑобиÑаÑÑ
пеÑÑоналÑнÑе даннÑе деÑей, даже "
+"не доÑÑигÑиÑ
пÑÑи леÑ</a>. ÐÑи пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¸
иÑ
ÑайÑÑ Ð²ÑÑÑлаÑÑ ÑобÑаннÑÑ "
+"инÑоÑмаÑÐ¸Ñ Ð³Ð¸Ð³Ð°Ð½Ñам ÑекламÑ, Ñаким как
Facebook и Google, и вÑе-Ñаки иÑ
"
+"пÑименÑÑÑ Ð² клаÑÑаÑ
даже поÑле
Ð²Ð¾Ð·Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ Ð·Ð°Ð½ÑÑий в ÑколаÑ
."
#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
@@ -5896,6 +5873,27 @@
msgid "Updated:"
msgstr "Ðбновлено:"
+#, fuzzy
+#~| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+#~ msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+#~ msgstr "<a href=\"#SpywareInMobileApps\">ÐобилÑнÑе
пÑиложениÑ</a>"
+
+#, fuzzy
+#~| msgid "Mobile Apps"
+#~ msgid "All Apps"
+#~ msgstr "ÐобилÑнÑе пÑиложениÑ"
+
+#, fuzzy
+#~| msgid ""
+#~| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#~| "\">#SpywareInMobileApps</a>)</span>"
+#~ msgid ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+#~ "\">#SpywareInAllApps</a>)</span>"
+#~ msgstr ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#~ "\">#SpywareInMobileApps</a>)</span>"
+
#~ msgid ""
#~ "Apple's virtual assistance Siri and Amazon's Alexa <a href=\"https://www."
#~ "bloomberg.com/news/features/2019-12-11/silicon-valley-got-millions-to-let-"
Index: proprietary/po/proprietary.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru-en.html,v
retrieving revision 1.260
retrieving revision 1.261
diff -u -b -r1.260 -r1.261
--- proprietary/po/proprietary.ru-en.html 11 May 2022 16:01:52 -0000
1.260
+++ proprietary/po/proprietary.ru-en.html 4 Jun 2022 17:03:20 -0000
1.261
@@ -189,6 +189,20 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M202205240">
+ <!--#set var="DATE" value='<small class="date-tag">2022-05</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A worldwide investigation found that
+ most of the applications that school districts
+ recommended for remote education during the COVID-19 pandemic <a
+
href="https://web.archive.org/web/20220525011540/https://www.washingtonpost.com/technology/2022/05/24/remote-school-app-tracking-privacy/">track
+ and collect personal data from children as young as below the age of
+ five</a>. These applications, and their websites, send the collected
+ information to ad giants such as Facebook and Goodle, and they are
+ still being used in the classrooms even after some of the schools
+ reopened.</p>
+ </li>
+
<li id="M202204280">
<!--#set var="DATE" value='<small class="date-tag">2022-04</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -240,14 +254,6 @@
right to sell it. See also <a
href="/education/educational-malware-app-along.html#content">Educational
Malware App “Along”</a>.</p>
</li>
-
- <li id="M202203210">
- <!--#set var="DATE" value='<small class="date-tag">2022-03</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Apple prevents people from upgrading their Mac hardware <a
-
href="https://www.theverge.com/2022/3/21/22989226/apple-mac-studios-removable-ssd-blocked-software-replacement">by
- imposing DRM on its removable SSD storage</a>.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -310,7 +316,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/05/11 16:01:52 $
+$Date: 2022/06/04 17:03:20 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.618
retrieving revision 1.619
diff -u -b -r1.618 -r1.619
--- proprietary/po/proprietary.ru.po 4 Jun 2022 15:02:52 -0000 1.618
+++ proprietary/po/proprietary.ru.po 4 Jun 2022 17:03:20 -0000 1.619
@@ -16,7 +16,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2022-06-04 14:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -358,6 +357,14 @@
"giants such as Facebook and Goodle, and they are still being used in the "
"classrooms even after some of the schools reopened."
msgstr ""
+"ÐбÑемиÑовое ÑаÑÑледование показало, ÑÑо
болÑÑинÑÑво пÑиложений, "
+"ÑекомендованнÑÑ
оÑделами обÑÐ°Ð·Ð¾Ð²Ð°Ð½Ð¸Ñ Ð´Ð»Ñ
Ñдаленного обÑÑÐµÐ½Ð¸Ñ Ð²Ð¾ вÑÐµÐ¼Ñ "
+"пандемии COVID-19, <a
href=\"https://web.archive.org/web/20220525011540/"
+"https://www.washingtonpost.com/technology/2022/05/24/remote-school-app-"
+"tracking-privacy/\">оÑÑлеживаÑÑ Ð¸ ÑобиÑаÑÑ
пеÑÑоналÑнÑе даннÑе деÑей, даже "
+"не доÑÑигÑиÑ
пÑÑи леÑ</a>. ÐÑи пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¸
иÑ
ÑайÑÑ Ð²ÑÑÑлаÑÑ ÑобÑаннÑÑ "
+"инÑоÑмаÑÐ¸Ñ Ð³Ð¸Ð³Ð°Ð½Ñам ÑекламÑ, Ñаким как
Facebook и Google, и вÑе-Ñаки иÑ
"
+"пÑименÑÑÑ Ð² клаÑÑаÑ
даже поÑле
Ð²Ð¾Ð·Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ Ð·Ð°Ð½ÑÑий в ÑколаÑ
."
#. type: Content of: <div><ul><li><p>
msgid ""
Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.484
retrieving revision 1.485
diff -u -b -r1.484 -r1.485
--- proprietary/po/pt-br.po 4 Jun 2022 15:32:22 -0000 1.484
+++ proprietary/po/pt-br.po 4 Jun 2022 17:03:21 -0000 1.485
@@ -12359,12 +12359,6 @@
"aplicativos</a>"
#. type: Content of: <div><div><div><ul><li>
-#, fuzzy
-#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
-msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
-msgstr "<a href=\"#SpywareInMobileApps\">Aplicativos móveis</a>"
-
-#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr "<a href=\"#SpywareInDesktopApps\">Aplicativos de desktop</a>"
@@ -12728,24 +12722,6 @@
"\">#SpywareInApplications</a>)</span>"
#. type: Content of: <div><div><div><h4>
-#, fuzzy
-#| msgid "Mobile Apps"
-msgid "All Apps"
-msgstr "Aplicativos móveis"
-
-#. type: Content of: <div><div><div>
-#, fuzzy
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
-#| "\">#SpywareInMobileApps</a>)</span>"
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
-"\">#SpywareInAllApps</a>)</span>"
-msgstr ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
-"\">#SpywareInMobileApps</a>)</span>"
-
-#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr "Aplicativos de desktop"
@@ -15473,6 +15449,27 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+#, fuzzy
+#~| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+#~ msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+#~ msgstr "<a href=\"#SpywareInMobileApps\">Aplicativos móveis</a>"
+
+#, fuzzy
+#~| msgid "Mobile Apps"
+#~ msgid "All Apps"
+#~ msgstr "Aplicativos móveis"
+
+#, fuzzy
+#~| msgid ""
+#~| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#~| "\">#SpywareInMobileApps</a>)</span>"
+#~ msgid ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+#~ "\">#SpywareInAllApps</a>)</span>"
+#~ msgstr ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#~ "\">#SpywareInMobileApps</a>)</span>"
+
#~ msgid "<a href=\"/proprietary/malware-edtech.html\">Ed Tech</a>"
#~ msgstr "<a href=\"/proprietary/malware-edtech.html\">Ed Tech</a>"
Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.831
retrieving revision 1.832
diff -u -b -r1.831 -r1.832
--- proprietary/po/ru.po 4 Jun 2022 16:26:28 -0000 1.831
+++ proprietary/po/ru.po 4 Jun 2022 17:03:21 -0000 1.832
@@ -609,14 +609,14 @@
"giants such as Facebook and Goodle, and they are still being used in the "
"classrooms even after some of the schools reopened."
msgstr ""
-"ÐбÑемиÑовое ÑаÑÑледование показало, ÑÑо
болÑÑинÑÑво пÑиложений, ÑекомендованнÑÑ
"
-"оÑделами обÑÐ°Ð·Ð¾Ð²Ð°Ð½Ð¸Ñ Ð´Ð»Ñ Ñдаленного
обÑÑÐµÐ½Ð¸Ñ Ð²Ð¾ вÑÐµÐ¼Ñ Ð¿Ð°Ð½Ð´ÐµÐ¼Ð¸Ð¸ COVID-19, <a "
-"href=\"https://web.archive.org/web/20220525011540/https://www.washingtonpost."
-"com/technology/2022/05/24/remote-school-app-tracking-privacy/\">оÑÑлеживаÑÑ
"
-"и ÑобиÑаÑÑ Ð¿ÐµÑÑоналÑнÑе даннÑе деÑей,
даже не доÑÑигÑиÑ
пÑÑи леÑ</a>. "
-"ÐÑи пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¸ иÑ
ÑайÑÑ Ð²ÑÑÑлаÑÑ
ÑобÑаннÑÑ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð³Ð¸Ð³Ð°Ð½Ñам ÑекламÑ, "
-"Ñаким как Facebook и Google, и вÑе-Ñаки иÑ
пÑименÑÑÑ Ð² клаÑÑаÑ
даже поÑле "
-"Ð²Ð¾Ð·Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ Ð·Ð°Ð½ÑÑий в ÑколаÑ
."
+"ÐбÑемиÑовое ÑаÑÑледование показало, ÑÑо
болÑÑинÑÑво пÑиложений, "
+"ÑекомендованнÑÑ
оÑделами обÑÐ°Ð·Ð¾Ð²Ð°Ð½Ð¸Ñ Ð´Ð»Ñ
Ñдаленного обÑÑÐµÐ½Ð¸Ñ Ð²Ð¾ вÑÐµÐ¼Ñ "
+"пандемии COVID-19, <a
href=\"https://web.archive.org/web/20220525011540/"
+"https://www.washingtonpost.com/technology/2022/05/24/remote-school-app-"
+"tracking-privacy/\">оÑÑлеживаÑÑ Ð¸ ÑобиÑаÑÑ
пеÑÑоналÑнÑе даннÑе деÑей, даже "
+"не доÑÑигÑиÑ
пÑÑи леÑ</a>. ÐÑи пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¸
иÑ
ÑайÑÑ Ð²ÑÑÑлаÑÑ ÑобÑаннÑÑ "
+"инÑоÑмаÑÐ¸Ñ Ð³Ð¸Ð³Ð°Ð½Ñам ÑекламÑ, Ñаким как
Facebook и Google, и вÑе-Ñаки иÑ
"
+"пÑименÑÑÑ Ð² клаÑÑаÑ
даже поÑле
Ð²Ð¾Ð·Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ Ð·Ð°Ð½ÑÑий в ÑколаÑ
."
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -11490,13 +11490,6 @@
msgstr "<a href=\"#SpywareInApplications\">ÐÑикладнÑе
пÑогÑаммÑ</a>"
#. type: Content of: <div><div><div><ul><li>
-# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
-# | {+href=\"#SpywareInAllApps\">All+} Apps</a>
-#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
-msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
-msgstr "<a href=\"#SpywareInAllApps\">ÐÑе пÑиложениÑ</a>"
-
-#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr "<a href=\"#SpywareInDesktopApps\">ÐÑогÑаммÑ
наÑÑолÑнÑÑ
компÑÑÑеÑов</a>"
@@ -11847,26 +11840,6 @@
"\">#SpywareInApplications</a>)</span>"
#. type: Content of: <div><div><div><h4>
-# | [-Mobile-]{+All+} Apps
-#| msgid "Mobile Apps"
-msgid "All Apps"
-msgstr "ÐÑе пÑиложениÑ"
-
-#. type: Content of: <div><div><div>
-# | <span class=\"anchor-reference-id\">(<a
-# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
-# | {+href=\"#SpywareInAllApps\">#SpywareInAllApps</a>)</span>+}
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
-#| "\">#SpywareInMobileApps</a>)</span>"
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
-"\">#SpywareInAllApps</a>)</span>"
-msgstr ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
-"\">#SpywareInAllApps</a>)</span>"
-
-#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr "ÐÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°ÑÑолÑнÑÑ
компÑÑÑеÑов"
@@ -14297,6 +14270,24 @@
msgid "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
+#~| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+#~ msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+#~ msgstr "<a href=\"#SpywareInAllApps\">ÐÑе пÑиложениÑ</a>"
+
+#~| msgid "Mobile Apps"
+#~ msgid "All Apps"
+#~ msgstr "ÐÑе пÑиложениÑ"
+
+#~| msgid ""
+#~| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#~| "\">#SpywareInMobileApps</a>)</span>"
+#~ msgid ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+#~ "\">#SpywareInAllApps</a>)</span>"
+#~ msgstr ""
+#~ "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
+#~ "\">#SpywareInAllApps</a>)</span>"
+
#~ msgid "<a href=\"/proprietary/malware-edtech.html\">Ed Tech</a>"
#~ msgstr "<a
href=\"/proprietary/malware-edtech.html\">ÐбÑазование</a>"
Index: proprietary/po/tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.291
retrieving revision 1.292
diff -u -b -r1.291 -r1.292
--- proprietary/po/tr.po 4 Jun 2022 15:32:22 -0000 1.291
+++ proprietary/po/tr.po 4 Jun 2022 17:03:22 -0000 1.292
@@ -9152,12 +9152,6 @@
msgstr ""
#. type: Content of: <div><div><div><ul><li>
-#, fuzzy
-#| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
-msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
-msgstr "<a href=\"/proprietary/malware-mobiles.html\">Mobil aygıtlar</a>"
-
-#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr ""
@@ -9454,16 +9448,6 @@
msgstr ""
#. type: Content of: <div><div><div><h4>
-msgid "All Apps"
-msgstr ""
-
-#. type: Content of: <div><div><div>
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
-"\">#SpywareInAllApps</a>)</span>"
-msgstr ""
-
-#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr ""
@@ -11369,6 +11353,11 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html#content\">Microsoft</a>"
#, fuzzy
+#~| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
+#~ msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+#~ msgstr "<a href=\"/proprietary/malware-mobiles.html\">Mobil aygıtlar</a>"
+
+#, fuzzy
#~| msgid "<a href=\"/proprietary/malware-education.html\">Ed Tech</a>"
#~ msgid "<a href=\"/proprietary/malware-edtech.html\">Ed Tech</a>"
#~ msgstr ""
Index: proprietary/po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.295
retrieving revision 1.296
diff -u -b -r1.295 -r1.296
--- proprietary/po/zh-cn.po 4 Jun 2022 15:32:23 -0000 1.295
+++ proprietary/po/zh-cn.po 4 Jun 2022 17:03:22 -0000 1.296
@@ -8770,12 +8770,6 @@
msgstr ""
#. type: Content of: <div><div><div><ul><li>
-#, fuzzy
-#| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
-msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
-msgstr "<a href=\"/proprietary/malware-mobiles.html\">ææº</a>"
-
-#. type: Content of: <div><div><div><ul><li>
msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
msgstr ""
@@ -9072,16 +9066,6 @@
msgstr ""
#. type: Content of: <div><div><div><h4>
-msgid "All Apps"
-msgstr ""
-
-#. type: Content of: <div><div><div>
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
-"\">#SpywareInAllApps</a>)</span>"
-msgstr ""
-
-#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr ""
@@ -11014,6 +10998,11 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html\">微软</a>"
#, fuzzy
+#~| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
+#~ msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+#~ msgstr "<a href=\"/proprietary/malware-mobiles.html\">ææº</a>"
+
+#, fuzzy
#~| msgid "<a href=\"/proprietary/malware-education.html\">Education</a>"
#~ msgid "<a href=\"/proprietary/malware-edtech.html\">Ed Tech</a>"
#~ msgstr "<a href=\"/proprietary/malware-education.html\">æè²</a>"
Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.397
retrieving revision 1.398
diff -u -b -r1.397 -r1.398
--- proprietary/po/zh-tw.po 4 Jun 2022 15:32:23 -0000 1.397
+++ proprietary/po/zh-tw.po 4 Jun 2022 17:03:22 -0000 1.398
@@ -8028,16 +8028,6 @@
#. type: Content of: <div><div><div><ul><li>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
-# | devices</a>-] {+href=\"#SpywareInAllApps\">All Apps</a>+}
-#, fuzzy
-#| msgid ""
-#| "<a href=\"/proprietary/malware-mobiles.html\">Malware in mobile devices</"
-#| "a>"
-msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
-msgstr "<a
href=\"/proprietary/malware-mobiles.html\">è¡åè£ç½®çæ¡æè»é«</a>"
-
-#. type: Content of: <div><div><div><ul><li>
-# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
#, fuzzy
#| msgid ""
@@ -8358,16 +8348,6 @@
msgstr ""
#. type: Content of: <div><div><div><h4>
-msgid "All Apps"
-msgstr ""
-
-#. type: Content of: <div><div><div>
-msgid ""
-"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInAllApps"
-"\">#SpywareInAllApps</a>)</span>"
-msgstr ""
-
-#. type: Content of: <div><div><div><h4>
msgid "Desktop Apps"
msgstr ""
@@ -10565,6 +10545,14 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html\">å¾®è»æ¡æè»é«</a>"
#, fuzzy
+#~| msgid ""
+#~| "<a href=\"/proprietary/malware-mobiles.html\">Malware in mobile devices</"
+#~| "a>"
+#~ msgid "<a href=\"#SpywareInAllApps\">All Apps</a>"
+#~ msgstr ""
+#~ "<a
href=\"/proprietary/malware-mobiles.html\">è¡åè£ç½®çæ¡æè»é«</a>"
+
+#, fuzzy
#~| msgid "<a href=\"/proprietary/malware-amazon.html\">Amazon Malware</a>"
#~ msgid "<a href=\"/proprietary/malware-edtech.html\">Ed Tech</a>"
#~ msgstr "<a href=\"/proprietary/malware-amazon.html\">Amazon
æ¡æè»é«</a>"
Index: software/recent-releases-include.ru.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.ru.html,v
retrieving revision 1.2427
retrieving revision 1.2428
diff -u -b -r1.2427 -r1.2428
--- software/recent-releases-include.ru.html 2 Jun 2022 20:31:06 -0000
1.2427
+++ software/recent-releases-include.ru.html 4 Jun 2022 17:03:22 -0000
1.2428
@@ -1,26 +1,26 @@
<!--#set var="LINK_CLOSE" value="</a>, <i>" -->
<ul>
-<li><strong>June 02, 2022</strong>
+<li><strong>02 иÑÐ½Ñ 2021</strong>
<ul>
<li><!--#set var="LINK"
value='<a href="//lists.gnu.org/archive/html/info-gnu/2022-06/msg00001.html">'
-->
<!--#echo
encoding="none" var="LINK" -->
-ANNOUNCE: Nettle-3.8<!--#echo
+ÐÐЪЯÐÐÐÐÐÐ: Nettle-3.8<!--#echo
encoding="none" var="LINK_CLOSE" -->
ÐилÑÑ ÐеллеÑ<!--#set
var="TIME" value="</i>, 15:58" -->
<!--#echo encoding="none" var="TIME" -->
</li>
</ul></li>
-<li><strong>June 01, 2022</strong>
+<li><strong>01 иÑÐ½Ñ 2022</strong>
<ul>
<li><!--#set var="LINK"
value='<a href="//lists.gnu.org/archive/html/info-gnu/2022-06/msg00000.html">'
-->
<!--#echo
encoding="none" var="LINK" -->
-pspp-1.6.0 released [stable]<!--#echo
+ÐÑпÑÑен pspp-1.6.0 [ÑÑабилÑнÑй]<!--#echo
encoding="none" var="LINK_CLOSE" -->
Ðен ÐÑаÑÑ<!--#set
var="TIME" value="</i>, 09:02" -->
Index: software/po/recent-releases-include.ru.po
===================================================================
RCS file: /web/www/www/software/po/recent-releases-include.ru.po,v
retrieving revision 1.3436
retrieving revision 1.3437
diff -u -b -r1.3436 -r1.3437
--- software/po/recent-releases-include.ru.po 4 Jun 2022 16:26:29 -0000
1.3436
+++ software/po/recent-releases-include.ru.po 4 Jun 2022 17:03:23 -0000
1.3437
@@ -14,11 +14,8 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2022-06-01 13:26+0000\n"
#. type: Content of: <ul><li>
-# | <strong>June [-01, 2021</strong>-] {+02, 2022</strong>+}
-#| msgid "<strong>June 01, 2021</strong>"
msgid "<strong>June 02, 2022</strong>"
msgstr "<strong>02 иÑÐ½Ñ 2021</strong>"
@@ -27,8 +24,6 @@
#. #echo
#. encoding="none" var="LINK"
#. type: Content of: <ul><li><ul><li>
-# | ANNOUNCE: Nettle-3.[-7-]{+8+}
-#| msgid "ANNOUNCE: Nettle-3.7"
msgid "ANNOUNCE: Nettle-3.8"
msgstr "ÐÐЪЯÐÐÐÐÐÐ: Nettle-3.8"
@@ -39,8 +34,6 @@
msgstr "ÐилÑÑ ÐеллеÑ"
#. type: Content of: <ul><li>
-# | <strong>June 01, 202[-1-]{+2+}</strong>
-#| msgid "<strong>June 01, 2021</strong>"
msgid "<strong>June 01, 2022</strong>"
msgstr "<strong>01 иÑÐ½Ñ 2022</strong>"
@@ -49,8 +42,6 @@
#. #echo
#. encoding="none" var="LINK"
#. type: Content of: <ul><li><ul><li>
-# | [-pies-1.7-]{+pspp-1.6.0+} released [stable]
-#| msgid "pies-1.7 released [stable]"
msgid "pspp-1.6.0 released [stable]"
msgstr "ÐÑпÑÑен pspp-1.6.0 [ÑÑабилÑнÑй]"
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www planetfeeds.ru.html fun/humor.ru.html fun/p...,
GNUN <=