www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary proprietary-tethers.pt-br.html ...


From: GNUN
Subject: www/proprietary proprietary-tethers.pt-br.html ...
Date: Sat, 26 Jun 2021 10:00:04 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/06/26 10:00:03

Modified files:
        proprietary    : proprietary-tethers.pt-br.html 
                         proprietary-tyrants.pt-br.html 
        proprietary/po : proprietary-addictions.pt-br.po 
                         proprietary-addictions.translist 
                         proprietary-back-doors.translist 
                         proprietary-censorship.translist 
                         proprietary-coverups.translist 
                         proprietary-deception.translist 
                         proprietary-drm.translist 
                         proprietary-fraud.translist 
                         proprietary-incompatibility.translist 
                         proprietary-insecurity.translist 
                         proprietary-interference.pt-br.po 
                         proprietary-interference.translist 
                         proprietary-jails.translist 
                         proprietary-manipulation.translist 
                         proprietary-obsolescence.translist 
                         proprietary-sabotage.translist 
                         proprietary-subscriptions.translist 
                         proprietary-surveillance.pt-br.po 
                         proprietary-surveillance.translist 
Added files:
        proprietary    : proprietary-addictions.pt-br.html 
                         proprietary-back-doors.pt-br.html 
                         proprietary-censorship.pt-br.html 
                         proprietary-coverups.pt-br.html 
                         proprietary-deception.pt-br.html 
                         proprietary-drm.pt-br.html 
                         proprietary-fraud.pt-br.html 
                         proprietary-incompatibility.pt-br.html 
                         proprietary-insecurity.pt-br.html 
                         proprietary-interference.pt-br.html 
                         proprietary-jails.pt-br.html 
                         proprietary-manipulation.pt-br.html 
                         proprietary-obsolescence.pt-br.html 
                         proprietary-sabotage.pt-br.html 
                         proprietary-subscriptions.pt-br.html 
                         proprietary-surveillance.pt-br.html 
        proprietary/po : proprietary-addictions.pt-br-en.html 
                         proprietary-back-doors.pt-br-en.html 
                         proprietary-censorship.pt-br-en.html 
                         proprietary-coverups.pt-br-en.html 
                         proprietary-deception.pt-br-en.html 
                         proprietary-drm.pt-br-en.html 
                         proprietary-fraud.pt-br-en.html 
                         proprietary-incompatibility.pt-br-en.html 
                         proprietary-insecurity.pt-br-en.html 
                         proprietary-interference.pt-br-en.html 
                         proprietary-jails.pt-br-en.html 
                         proprietary-manipulation.pt-br-en.html 
                         proprietary-obsolescence.pt-br-en.html 
                         proprietary-sabotage.pt-br-en.html 
                         proprietary-subscriptions.pt-br-en.html 
                         proprietary-surveillance.pt-br-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tethers.pt-br.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.pt-br.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-addictions.pt-br.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.pt-br.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.pt-br.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-coverups.pt-br.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.pt-br.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.pt-br.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-fraud.pt-br.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-incompatibility.pt-br.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.pt-br.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.pt-br.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.pt-br.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-manipulation.pt-br.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-obsolescence.pt-br.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.pt-br.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.pt-br.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.pt-br.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.pt-br.po?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.translist?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.translist?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.translist?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.translist?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.translist?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.translist?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-fraud.translist?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-incompatibility.translist?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.translist?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.pt-br.po?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.translist?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.translist?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.translist?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.translist?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.translist?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.translist?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pt-br.po?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.translist?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.pt-br-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pt-br-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.pt-br-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.pt-br-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.pt-br-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.pt-br-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-fraud.pt-br-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-incompatibility.pt-br-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pt-br-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.pt-br-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.pt-br-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.pt-br-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.pt-br-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.pt-br-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.pt-br-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pt-br-en.html?cvsroot=www&rev=1.1

Patches:
Index: proprietary-tethers.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tethers.pt-br.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary-tethers.pt-br.html      1 Jun 2021 09:43:59 -0000       1.17
+++ proprietary-tethers.pt-br.html      26 Jun 2021 14:00:00 -0000      1.18
@@ -66,7 +66,7 @@
 
 <div class="important">
 <p>Se você conhece um exemplo que deveria estar nesta página, mas não está
-aqui, por favor escreva para <a
+aqui, por favor, escreva para <a
 href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a> para nos
 informar. Por favor, inclua a URL de uma ou duas referências confiáveis para
 servir como comprovação específica.</p>
@@ -90,7 +90,7 @@
 
     <p>Pode ser uma boa coisa eliminar este produto – pois 
“smart”/“inteligente”
 significa “bisbilhotar” –, mas o Google não fez isso por uma questão de
-privacidade. Em vez disso, estava eliminando a competição de seu próprio
+privacidade. Na verdade, estava eliminando a competição de seu próprio
 produto de bisbilhotamento.</p>
   </li>
 
@@ -104,7 +104,7 @@
 empresa repentinamente <a
 
href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/";>
 transformou essa amarração em uma assinatura</a>, proibindo os usuários
-aproveitem os “recursos avançados"> do fogão, a menos que pagassem uma taxa
+aproveitem os “recursos avançados” do fogão, a menos que pagassem uma 
taxa
 mensal.</p>
   </li>
 
@@ -114,7 +114,7 @@
 2020-05</small>'
     -->
 <!--#echo encoding="none" var="DATE" -->
-<p>O Wink vende um hub doméstico “inteligente” que é amarrado a um 
servidor. Em
+<p>A Wink vende um hub doméstico “inteligente” que é amarrado a um 
servidor. Em
 maio de 2020, ordenou que os compradores começassem a <a
 
href="https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html";>
 pagar uma taxa mensal pelo uso desse servidor</a>. Por causa da amarração, o
@@ -143,7 +143,7 @@
 2019-04</small>'
     -->
 <!--#echo encoding="none" var="DATE" -->
-<p>Os brinquedos do robô Jibo foram amarrados ao servidor do fabricante, e <a
+<p>Os robôs de brinquedo Jibo foram amarrados ao servidor do fabricante, e <a
 href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648";> a empresa
 fez com que todos parassem de funcionar</a> desligando o servidor.</p>
 
@@ -158,7 +158,7 @@
 2019-04</small>'
     -->
 <!--#echo encoding="none" var="DATE" -->
-<p>Ebooks “comprados” da loja da Microsoft verificam se seu DRM é válido
+<p>E-books “comprados” da loja da Microsoft verificam se seu DRM é válido
 conectando-se à loja toda vez que o “dono” quer lê-los. A Microsoft 
fechará
 esta loja, <a href="https://www.bbc.com/news/technology-47810367";>
 inutilizando todos os e-books sob DRM que já “vendeu”</a>. (O artigo 
também
@@ -175,7 +175,7 @@
 2019-03</small>'
     -->
 <!--#echo encoding="none" var="DATE" -->
-<p>O supermercado britânico Tesco vendeu tablets que foram amarrados ao
+<p>O supermercado britânico Tesco vendeu tablets que estavam amarrados ao
 servidor da Tesco para reinstalar as configurações padrão. Tesco <a
 
href="https://www.theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix";>
 desligou o servidor para modelos antigos</a>, então, agora, se você tentar
@@ -348,7 +348,7 @@
 2016-07</small>'
     -->
 <!--#echo encoding="none" var="DATE" -->
-<p>Uma critica de segurança meio cega a um aplicativo de rastreamento:
+<p>Uma crítica de segurança meio cega a um aplicativo de rastreamento:
 descobriu-se que <a
 
href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/";>
 falhas flagrantes permitiram a qualquer um bisbilhotar os dados pessoais de
@@ -462,16 +462,16 @@
 <div class="translators-credits">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
-Traduzido por: Rafael Fontenelle <a
-href="mailto:rafaelff@gnome.org";>&lt;rafaelff@gnome.org&gt;</a>,
-2019-2021.<br/>
-Revisado por: Cassiano Reinert Novais dos Santos <a
-href="mailto:caco@posteo.net";>&lt;caco@posteo.net&gt;</a>, 2019.</div>
+A tradução das páginas na seção Proprietary teve a contribuição de:
+Cassiano Reinert Novais dos Santos <a
+href="mailto:caco@posteo.net";>&lt;caco@posteo.net&gt;</a> e
+Rafael Fontenelle <a
+href="mailto:rafaelff@gnome.org";>&lt;rafaelff@gnome.org&gt;</a>.</div>
 
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2021/06/01 09:43:59 $
+$Date: 2021/06/26 14:00:00 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-tyrants.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.pt-br.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary-tyrants.pt-br.html      1 Jun 2021 09:43:59 -0000       1.12
+++ proprietary-tyrants.pt-br.html      26 Jun 2021 14:00:00 -0000      1.13
@@ -29,7 +29,7 @@
 <p class="breadcrumb">
  <a href="/"><img src="/graphics/icons/home.png" height="24"
     alt="Página inicial do GNU" title="Página inicial do GNU" /></a>&nbsp;/ 
<a href="/proprietary/proprietary.html"><em>Malware</em>
-privado</a>&nbsp;/ Por tipo&nbsp;/
+privativo</a>&nbsp;/ Por tipo&nbsp;/
 </p>
 </div>
 
@@ -63,7 +63,7 @@
 
 <div class="important">
 <p>Se você conhece um exemplo que deveria estar nesta página, mas não está
-aqui, por favor escreva para <a
+aqui, por favor, escreva para <a
 href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a> para nos
 informar. Por favor, inclua a URL de uma ou duas referências confiáveis para
 servir como comprovação específica.</p>
@@ -126,7 +126,7 @@
 2012-12</small>'
     -->
 <!--#echo encoding="none" var="DATE" -->
-<p>TVs “Smart” da Samsung <a
+<p>TVs “inteligentes” da Samsung <a
 
href="https://wiki.samygo.tv/index.php?title=SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F";>
 transformaram o Linux em base para um sistema tirano</a> para poder impor o
 DRM. O que permite que a Samsung faça isso é que o Linux é lançado sob a 
GNU
@@ -151,8 +151,8 @@
 2012-05</small>'
     -->
 <!--#echo encoding="none" var="DATE" -->
-<p>As iCoisas da Apple são dispositivos tiranos. Há uma porta do Android para
-as iCoisas, mas a instalação exige <a
+<p>iCoisas da Apple são dispositivos tiranos. Há uma porta do Android para as
+iCoisas, mas a instalação exige <a
 
href="https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status";>
 encontrar um erro ou <i lang="en">“exploit”</i></a> para possibilitar a
 instalação de um sistema diferente.</p>
@@ -248,15 +248,16 @@
 <div class="translators-credits">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
-Traduzido por: Rafael Fontenelle <a
-href="mailto:rafaelff@gnome.org";>&lt;rafaelff@gnome.org&gt;</a>, 2019-2021.
-Revisado por: Cassiano Reinert Novais dos Santos <a
-href="mailto:caco@posteo.net";>&lt;caco@posteo.net&gt;</a>, 2019.</div>
+A tradução das páginas na seção Proprietary teve a contribuição de:
+Cassiano Reinert Novais dos Santos <a
+href="mailto:caco@posteo.net";>&lt;caco@posteo.net&gt;</a> e
+Rafael Fontenelle <a
+href="mailto:rafaelff@gnome.org";>&lt;rafaelff@gnome.org&gt;</a>.</div>
 
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2021/06/01 09:43:59 $
+$Date: 2021/06/26 14:00:00 $
 
 <!-- timestamp end -->
 </p>

Index: po/proprietary-addictions.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.pt-br.po,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/proprietary-addictions.pt-br.po  26 Jun 2021 13:41:57 -0000      1.1
+++ po/proprietary-addictions.pt-br.po  26 Jun 2021 14:00:01 -0000      1.2
@@ -256,8 +256,8 @@
 #. type: Content of: <div><div><p>
 msgid ""
 "<small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to mean "
-"&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; "
-"instead.)</small>"
+"&ldquo;zero price.&rdquo; We recommend saying &ldquo;gratis&rdquo; instead.)"
+"</small>"
 msgstr ""
 "<small>(Infelizmente, os últimos dois artigos usam <i 
lang=\"en\">“free”</i> "
 "no sentido de “preço zero”. Nós recomendamos dizer 
“grátis”.)</small>"

Index: po/proprietary-addictions.translist
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.translist,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/proprietary-addictions.translist 15 Mar 2020 18:34:48 -0000      1.5
+++ po/proprietary-addictions.translist 26 Jun 2021 14:00:01 -0000      1.6
@@ -5,6 +5,7 @@
 <span dir="ltr" class="original">[en]&nbsp;<a lang="en" hreflang="en" 
href="/proprietary/proprietary-addictions.en.html">English</a> &nbsp;</span>
 <span dir="ltr">[es]&nbsp;<a lang="es" hreflang="es" 
href="/proprietary/proprietary-addictions.es.html">español</a> &nbsp;</span>
 <span dir="ltr">[fr]&nbsp;<a lang="fr" hreflang="fr" 
href="/proprietary/proprietary-addictions.fr.html">français</a> &nbsp;</span>
+<span dir="ltr">[pt-br]&nbsp;<a lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-addictions.pt-br.html">português</a> 
&nbsp;</span>
 <span dir="ltr">[ru]&nbsp;<a lang="ru" hreflang="ru" 
href="/proprietary/proprietary-addictions.ru.html">русский</a> 
&nbsp;</span>
 <span dir="ltr">[tr]&nbsp;<a lang="tr" hreflang="tr" 
href="/proprietary/proprietary-addictions.tr.html">Türkçe</a> &nbsp;</span>
 </p>
@@ -13,6 +14,7 @@
 <link rel="alternate" type="text/html" lang="en" hreflang="en" 
href="/proprietary/proprietary-addictions.en.html" title="English" />
 <link rel="alternate" type="text/html" lang="es" hreflang="es" 
href="/proprietary/proprietary-addictions.es.html" title="español" />
 <link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/proprietary/proprietary-addictions.fr.html" title="français" />
+<link rel="alternate" type="text/html" lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-addictions.pt-br.html" title="português" />
 <link rel="alternate" type="text/html" lang="ru" hreflang="ru" 
href="/proprietary/proprietary-addictions.ru.html" title="русский" />
 <link rel="alternate" type="text/html" lang="tr" hreflang="tr" 
href="/proprietary/proprietary-addictions.tr.html" title="Türkçe" />
 <!-- end translist file -->

Index: po/proprietary-back-doors.translist
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.translist,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/proprietary-back-doors.translist 15 Mar 2020 18:34:48 -0000      1.5
+++ po/proprietary-back-doors.translist 26 Jun 2021 14:00:01 -0000      1.6
@@ -8,6 +8,7 @@
 <span dir="ltr">[fr]&nbsp;<a lang="fr" hreflang="fr" 
href="/proprietary/proprietary-back-doors.fr.html">français</a> &nbsp;</span>
 <span dir="ltr">[it]&nbsp;<a lang="it" hreflang="it" 
href="/proprietary/proprietary-back-doors.it.html">italiano</a> &nbsp;</span>
 <span dir="ltr">[ja]&nbsp;<a lang="ja" hreflang="ja" 
href="/proprietary/proprietary-back-doors.ja.html">日本語</a> &nbsp;</span>
+<span dir="ltr">[pt-br]&nbsp;<a lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-back-doors.pt-br.html">português</a> 
&nbsp;</span>
 <span dir="ltr">[ru]&nbsp;<a lang="ru" hreflang="ru" 
href="/proprietary/proprietary-back-doors.ru.html">русский</a> 
&nbsp;</span>
 </p>
 </div>' -->
@@ -18,5 +19,6 @@
 <link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/proprietary/proprietary-back-doors.fr.html" title="français" />
 <link rel="alternate" type="text/html" lang="it" hreflang="it" 
href="/proprietary/proprietary-back-doors.it.html" title="italiano" />
 <link rel="alternate" type="text/html" lang="ja" hreflang="ja" 
href="/proprietary/proprietary-back-doors.ja.html" title="日本語" />
+<link rel="alternate" type="text/html" lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-back-doors.pt-br.html" title="português" />
 <link rel="alternate" type="text/html" lang="ru" hreflang="ru" 
href="/proprietary/proprietary-back-doors.ru.html" title="русский" />
 <!-- end translist file -->

Index: po/proprietary-censorship.translist
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.translist,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- po/proprietary-censorship.translist 15 Mar 2020 18:34:48 -0000      1.3
+++ po/proprietary-censorship.translist 26 Jun 2021 14:00:01 -0000      1.4
@@ -8,6 +8,7 @@
 <span dir="ltr">[fr]&nbsp;<a lang="fr" hreflang="fr" 
href="/proprietary/proprietary-censorship.fr.html">français</a> &nbsp;</span>
 <span dir="ltr">[it]&nbsp;<a lang="it" hreflang="it" 
href="/proprietary/proprietary-censorship.it.html">italiano</a> &nbsp;</span>
 <span dir="ltr">[ja]&nbsp;<a lang="ja" hreflang="ja" 
href="/proprietary/proprietary-censorship.ja.html">日本語</a> &nbsp;</span>
+<span dir="ltr">[pt-br]&nbsp;<a lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-censorship.pt-br.html">português</a> 
&nbsp;</span>
 <span dir="ltr">[ru]&nbsp;<a lang="ru" hreflang="ru" 
href="/proprietary/proprietary-censorship.ru.html">русский</a> 
&nbsp;</span>
 </p>
 </div>' -->
@@ -18,5 +19,6 @@
 <link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/proprietary/proprietary-censorship.fr.html" title="français" />
 <link rel="alternate" type="text/html" lang="it" hreflang="it" 
href="/proprietary/proprietary-censorship.it.html" title="italiano" />
 <link rel="alternate" type="text/html" lang="ja" hreflang="ja" 
href="/proprietary/proprietary-censorship.ja.html" title="日本語" />
+<link rel="alternate" type="text/html" lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-censorship.pt-br.html" title="português" />
 <link rel="alternate" type="text/html" lang="ru" hreflang="ru" 
href="/proprietary/proprietary-censorship.ru.html" title="русский" />
 <!-- end translist file -->

Index: po/proprietary-coverups.translist
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.translist,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- po/proprietary-coverups.translist   15 Mar 2020 18:34:48 -0000      1.7
+++ po/proprietary-coverups.translist   26 Jun 2021 14:00:01 -0000      1.8
@@ -7,6 +7,7 @@
 <span dir="ltr">[es]&nbsp;<a lang="es" hreflang="es" 
href="/proprietary/proprietary-coverups.es.html">español</a> &nbsp;</span>
 <span dir="ltr">[fr]&nbsp;<a lang="fr" hreflang="fr" 
href="/proprietary/proprietary-coverups.fr.html">français</a> &nbsp;</span>
 <span dir="ltr">[ja]&nbsp;<a lang="ja" hreflang="ja" 
href="/proprietary/proprietary-coverups.ja.html">日本語</a> &nbsp;</span>
+<span dir="ltr">[pt-br]&nbsp;<a lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-coverups.pt-br.html">português</a> &nbsp;</span>
 <span dir="ltr">[ru]&nbsp;<a lang="ru" hreflang="ru" 
href="/proprietary/proprietary-coverups.ru.html">русский</a> 
&nbsp;</span>
 </p>
 </div>' -->
@@ -16,5 +17,6 @@
 <link rel="alternate" type="text/html" lang="es" hreflang="es" 
href="/proprietary/proprietary-coverups.es.html" title="español" />
 <link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/proprietary/proprietary-coverups.fr.html" title="français" />
 <link rel="alternate" type="text/html" lang="ja" hreflang="ja" 
href="/proprietary/proprietary-coverups.ja.html" title="日本語" />
+<link rel="alternate" type="text/html" lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-coverups.pt-br.html" title="português" />
 <link rel="alternate" type="text/html" lang="ru" hreflang="ru" 
href="/proprietary/proprietary-coverups.ru.html" title="русский" />
 <!-- end translist file -->

Index: po/proprietary-deception.translist
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.translist,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- po/proprietary-deception.translist  15 Mar 2020 18:34:48 -0000      1.7
+++ po/proprietary-deception.translist  26 Jun 2021 14:00:01 -0000      1.8
@@ -7,6 +7,7 @@
 <span dir="ltr">[es]&nbsp;<a lang="es" hreflang="es" 
href="/proprietary/proprietary-deception.es.html">español</a> &nbsp;</span>
 <span dir="ltr">[fr]&nbsp;<a lang="fr" hreflang="fr" 
href="/proprietary/proprietary-deception.fr.html">français</a> &nbsp;</span>
 <span dir="ltr">[ja]&nbsp;<a lang="ja" hreflang="ja" 
href="/proprietary/proprietary-deception.ja.html">日本語</a> &nbsp;</span>
+<span dir="ltr">[pt-br]&nbsp;<a lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-deception.pt-br.html">português</a> 
&nbsp;</span>
 <span dir="ltr">[ru]&nbsp;<a lang="ru" hreflang="ru" 
href="/proprietary/proprietary-deception.ru.html">русский</a> 
&nbsp;</span>
 </p>
 </div>' -->
@@ -16,5 +17,6 @@
 <link rel="alternate" type="text/html" lang="es" hreflang="es" 
href="/proprietary/proprietary-deception.es.html" title="español" />
 <link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/proprietary/proprietary-deception.fr.html" title="français" />
 <link rel="alternate" type="text/html" lang="ja" hreflang="ja" 
href="/proprietary/proprietary-deception.ja.html" title="日本語" />
+<link rel="alternate" type="text/html" lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-deception.pt-br.html" title="português" />
 <link rel="alternate" type="text/html" lang="ru" hreflang="ru" 
href="/proprietary/proprietary-deception.ru.html" title="русский" />
 <!-- end translist file -->

Index: po/proprietary-drm.translist
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.translist,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/proprietary-drm.translist        15 Mar 2020 18:34:48 -0000      1.5
+++ po/proprietary-drm.translist        26 Jun 2021 14:00:01 -0000      1.6
@@ -8,6 +8,7 @@
 <span dir="ltr">[fr]&nbsp;<a lang="fr" hreflang="fr" 
href="/proprietary/proprietary-drm.fr.html">français</a> &nbsp;</span>
 <span dir="ltr">[it]&nbsp;<a lang="it" hreflang="it" 
href="/proprietary/proprietary-drm.it.html">italiano</a> &nbsp;</span>
 <span dir="ltr">[ja]&nbsp;<a lang="ja" hreflang="ja" 
href="/proprietary/proprietary-drm.ja.html">日本語</a> &nbsp;</span>
+<span dir="ltr">[pt-br]&nbsp;<a lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-drm.pt-br.html">português</a> &nbsp;</span>
 <span dir="ltr">[ru]&nbsp;<a lang="ru" hreflang="ru" 
href="/proprietary/proprietary-drm.ru.html">русский</a> &nbsp;</span>
 </p>
 </div>' -->
@@ -18,5 +19,6 @@
 <link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/proprietary/proprietary-drm.fr.html" title="français" />
 <link rel="alternate" type="text/html" lang="it" hreflang="it" 
href="/proprietary/proprietary-drm.it.html" title="italiano" />
 <link rel="alternate" type="text/html" lang="ja" hreflang="ja" 
href="/proprietary/proprietary-drm.ja.html" title="日本語" />
+<link rel="alternate" type="text/html" lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-drm.pt-br.html" title="português" />
 <link rel="alternate" type="text/html" lang="ru" hreflang="ru" 
href="/proprietary/proprietary-drm.ru.html" title="русский" />
 <!-- end translist file -->

Index: po/proprietary-fraud.translist
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-fraud.translist,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/proprietary-fraud.translist      15 Mar 2020 18:34:48 -0000      1.5
+++ po/proprietary-fraud.translist      26 Jun 2021 14:00:01 -0000      1.6
@@ -5,6 +5,7 @@
 <span dir="ltr" class="original">[en]&nbsp;<a lang="en" hreflang="en" 
href="/proprietary/proprietary-fraud.en.html">English</a> &nbsp;</span>
 <span dir="ltr">[es]&nbsp;<a lang="es" hreflang="es" 
href="/proprietary/proprietary-fraud.es.html">español</a> &nbsp;</span>
 <span dir="ltr">[fr]&nbsp;<a lang="fr" hreflang="fr" 
href="/proprietary/proprietary-fraud.fr.html">français</a> &nbsp;</span>
+<span dir="ltr">[pt-br]&nbsp;<a lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-fraud.pt-br.html">português</a> &nbsp;</span>
 <span dir="ltr">[ru]&nbsp;<a lang="ru" hreflang="ru" 
href="/proprietary/proprietary-fraud.ru.html">русский</a> &nbsp;</span>
 </p>
 </div>' -->
@@ -12,5 +13,6 @@
 <link rel="alternate" type="text/html" lang="en" hreflang="en" 
href="/proprietary/proprietary-fraud.en.html" title="English" />
 <link rel="alternate" type="text/html" lang="es" hreflang="es" 
href="/proprietary/proprietary-fraud.es.html" title="español" />
 <link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/proprietary/proprietary-fraud.fr.html" title="français" />
+<link rel="alternate" type="text/html" lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-fraud.pt-br.html" title="português" />
 <link rel="alternate" type="text/html" lang="ru" hreflang="ru" 
href="/proprietary/proprietary-fraud.ru.html" title="русский" />
 <!-- end translist file -->

Index: po/proprietary-incompatibility.translist
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-incompatibility.translist,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/proprietary-incompatibility.translist    15 Mar 2020 18:34:48 -0000      
1.5
+++ po/proprietary-incompatibility.translist    26 Jun 2021 14:00:01 -0000      
1.6
@@ -5,6 +5,7 @@
 <span dir="ltr" class="original">[en]&nbsp;<a lang="en" hreflang="en" 
href="/proprietary/proprietary-incompatibility.en.html">English</a> 
&nbsp;</span>
 <span dir="ltr">[es]&nbsp;<a lang="es" hreflang="es" 
href="/proprietary/proprietary-incompatibility.es.html">español</a> 
&nbsp;</span>
 <span dir="ltr">[fr]&nbsp;<a lang="fr" hreflang="fr" 
href="/proprietary/proprietary-incompatibility.fr.html">français</a> 
&nbsp;</span>
+<span dir="ltr">[pt-br]&nbsp;<a lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-incompatibility.pt-br.html">português</a> 
&nbsp;</span>
 <span dir="ltr">[ru]&nbsp;<a lang="ru" hreflang="ru" 
href="/proprietary/proprietary-incompatibility.ru.html">русский</a> 
&nbsp;</span>
 </p>
 </div>' -->
@@ -12,5 +13,6 @@
 <link rel="alternate" type="text/html" lang="en" hreflang="en" 
href="/proprietary/proprietary-incompatibility.en.html" title="English" />
 <link rel="alternate" type="text/html" lang="es" hreflang="es" 
href="/proprietary/proprietary-incompatibility.es.html" title="español" />
 <link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/proprietary/proprietary-incompatibility.fr.html" title="français" />
+<link rel="alternate" type="text/html" lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-incompatibility.pt-br.html" title="português" />
 <link rel="alternate" type="text/html" lang="ru" hreflang="ru" 
href="/proprietary/proprietary-incompatibility.ru.html" title="русский" 
/>
 <!-- end translist file -->

Index: po/proprietary-insecurity.translist
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.translist,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/proprietary-insecurity.translist 15 Mar 2020 18:34:48 -0000      1.6
+++ po/proprietary-insecurity.translist 26 Jun 2021 14:00:01 -0000      1.7
@@ -8,6 +8,7 @@
 <span dir="ltr">[fr]&nbsp;<a lang="fr" hreflang="fr" 
href="/proprietary/proprietary-insecurity.fr.html">français</a> &nbsp;</span>
 <span dir="ltr">[it]&nbsp;<a lang="it" hreflang="it" 
href="/proprietary/proprietary-insecurity.it.html">italiano</a> &nbsp;</span>
 <span dir="ltr">[ja]&nbsp;<a lang="ja" hreflang="ja" 
href="/proprietary/proprietary-insecurity.ja.html">日本語</a> &nbsp;</span>
+<span dir="ltr">[pt-br]&nbsp;<a lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-insecurity.pt-br.html">português</a> 
&nbsp;</span>
 <span dir="ltr">[ru]&nbsp;<a lang="ru" hreflang="ru" 
href="/proprietary/proprietary-insecurity.ru.html">русский</a> 
&nbsp;</span>
 </p>
 </div>' -->
@@ -18,5 +19,6 @@
 <link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/proprietary/proprietary-insecurity.fr.html" title="français" />
 <link rel="alternate" type="text/html" lang="it" hreflang="it" 
href="/proprietary/proprietary-insecurity.it.html" title="italiano" />
 <link rel="alternate" type="text/html" lang="ja" hreflang="ja" 
href="/proprietary/proprietary-insecurity.ja.html" title="日本語" />
+<link rel="alternate" type="text/html" lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-insecurity.pt-br.html" title="português" />
 <link rel="alternate" type="text/html" lang="ru" hreflang="ru" 
href="/proprietary/proprietary-insecurity.ru.html" title="русский" />
 <!-- end translist file -->

Index: po/proprietary-interference.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.pt-br.po,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/proprietary-interference.pt-br.po        26 Jun 2021 13:41:58 -0000      
1.1
+++ po/proprietary-interference.pt-br.po        26 Jun 2021 14:00:01 -0000      
1.2
@@ -353,8 +353,8 @@
 msgid ""
 "<small>(Note that the article refers to the infected software as &ldquo;"
 "content management system&rdquo;. A better term would be &ldquo;<a href=\"/"
-"philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>&rdquo;.)</small>"
+"philosophy/words-to-avoid.html#Content\">website revision system</a>&rdquo;.)"
+"</small>"
 msgstr ""
 "<small>(Note que o artigo se refere ao software infectado como “sistema de "
 "gestão de conteúdo”. Um termo melhor seria “<a 
href=\"/philosophy/words-to-"

Index: po/proprietary-interference.translist
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.translist,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- po/proprietary-interference.translist       15 Mar 2020 18:34:48 -0000      
1.7
+++ po/proprietary-interference.translist       26 Jun 2021 14:00:01 -0000      
1.8
@@ -7,6 +7,7 @@
 <span dir="ltr">[es]&nbsp;<a lang="es" hreflang="es" 
href="/proprietary/proprietary-interference.es.html">español</a> &nbsp;</span>
 <span dir="ltr">[fr]&nbsp;<a lang="fr" hreflang="fr" 
href="/proprietary/proprietary-interference.fr.html">français</a> &nbsp;</span>
 <span dir="ltr">[ja]&nbsp;<a lang="ja" hreflang="ja" 
href="/proprietary/proprietary-interference.ja.html">日本語</a> &nbsp;</span>
+<span dir="ltr">[pt-br]&nbsp;<a lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-interference.pt-br.html">português</a> 
&nbsp;</span>
 <span dir="ltr">[ru]&nbsp;<a lang="ru" hreflang="ru" 
href="/proprietary/proprietary-interference.ru.html">русский</a> 
&nbsp;</span>
 </p>
 </div>' -->
@@ -16,5 +17,6 @@
 <link rel="alternate" type="text/html" lang="es" hreflang="es" 
href="/proprietary/proprietary-interference.es.html" title="español" />
 <link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/proprietary/proprietary-interference.fr.html" title="français" />
 <link rel="alternate" type="text/html" lang="ja" hreflang="ja" 
href="/proprietary/proprietary-interference.ja.html" title="日本語" />
+<link rel="alternate" type="text/html" lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-interference.pt-br.html" title="português" />
 <link rel="alternate" type="text/html" lang="ru" hreflang="ru" 
href="/proprietary/proprietary-interference.ru.html" title="русский" />
 <!-- end translist file -->

Index: po/proprietary-jails.translist
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.translist,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- po/proprietary-jails.translist      15 Mar 2020 18:34:48 -0000      1.3
+++ po/proprietary-jails.translist      26 Jun 2021 14:00:01 -0000      1.4
@@ -8,6 +8,7 @@
 <span dir="ltr">[fr]&nbsp;<a lang="fr" hreflang="fr" 
href="/proprietary/proprietary-jails.fr.html">français</a> &nbsp;</span>
 <span dir="ltr">[it]&nbsp;<a lang="it" hreflang="it" 
href="/proprietary/proprietary-jails.it.html">italiano</a> &nbsp;</span>
 <span dir="ltr">[ja]&nbsp;<a lang="ja" hreflang="ja" 
href="/proprietary/proprietary-jails.ja.html">日本語</a> &nbsp;</span>
+<span dir="ltr">[pt-br]&nbsp;<a lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-jails.pt-br.html">português</a> &nbsp;</span>
 <span dir="ltr">[ru]&nbsp;<a lang="ru" hreflang="ru" 
href="/proprietary/proprietary-jails.ru.html">русский</a> &nbsp;</span>
 </p>
 </div>' -->
@@ -18,5 +19,6 @@
 <link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/proprietary/proprietary-jails.fr.html" title="français" />
 <link rel="alternate" type="text/html" lang="it" hreflang="it" 
href="/proprietary/proprietary-jails.it.html" title="italiano" />
 <link rel="alternate" type="text/html" lang="ja" hreflang="ja" 
href="/proprietary/proprietary-jails.ja.html" title="日本語" />
+<link rel="alternate" type="text/html" lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-jails.pt-br.html" title="português" />
 <link rel="alternate" type="text/html" lang="ru" hreflang="ru" 
href="/proprietary/proprietary-jails.ru.html" title="русский" />
 <!-- end translist file -->

Index: po/proprietary-manipulation.translist
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-manipulation.translist,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/proprietary-manipulation.translist       15 Mar 2020 18:34:48 -0000      
1.5
+++ po/proprietary-manipulation.translist       26 Jun 2021 14:00:01 -0000      
1.6
@@ -5,6 +5,7 @@
 <span dir="ltr" class="original">[en]&nbsp;<a lang="en" hreflang="en" 
href="/proprietary/proprietary-manipulation.en.html">English</a> &nbsp;</span>
 <span dir="ltr">[es]&nbsp;<a lang="es" hreflang="es" 
href="/proprietary/proprietary-manipulation.es.html">español</a> &nbsp;</span>
 <span dir="ltr">[fr]&nbsp;<a lang="fr" hreflang="fr" 
href="/proprietary/proprietary-manipulation.fr.html">français</a> &nbsp;</span>
+<span dir="ltr">[pt-br]&nbsp;<a lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-manipulation.pt-br.html">português</a> 
&nbsp;</span>
 <span dir="ltr">[ru]&nbsp;<a lang="ru" hreflang="ru" 
href="/proprietary/proprietary-manipulation.ru.html">русский</a> 
&nbsp;</span>
 </p>
 </div>' -->
@@ -12,5 +13,6 @@
 <link rel="alternate" type="text/html" lang="en" hreflang="en" 
href="/proprietary/proprietary-manipulation.en.html" title="English" />
 <link rel="alternate" type="text/html" lang="es" hreflang="es" 
href="/proprietary/proprietary-manipulation.es.html" title="español" />
 <link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/proprietary/proprietary-manipulation.fr.html" title="français" />
+<link rel="alternate" type="text/html" lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-manipulation.pt-br.html" title="português" />
 <link rel="alternate" type="text/html" lang="ru" hreflang="ru" 
href="/proprietary/proprietary-manipulation.ru.html" title="русский" />
 <!-- end translist file -->

Index: po/proprietary-obsolescence.translist
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.translist,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/proprietary-obsolescence.translist       15 Mar 2020 18:34:48 -0000      
1.5
+++ po/proprietary-obsolescence.translist       26 Jun 2021 14:00:01 -0000      
1.6
@@ -5,6 +5,7 @@
 <span dir="ltr" class="original">[en]&nbsp;<a lang="en" hreflang="en" 
href="/proprietary/proprietary-obsolescence.en.html">English</a> &nbsp;</span>
 <span dir="ltr">[es]&nbsp;<a lang="es" hreflang="es" 
href="/proprietary/proprietary-obsolescence.es.html">español</a> &nbsp;</span>
 <span dir="ltr">[fr]&nbsp;<a lang="fr" hreflang="fr" 
href="/proprietary/proprietary-obsolescence.fr.html">français</a> &nbsp;</span>
+<span dir="ltr">[pt-br]&nbsp;<a lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-obsolescence.pt-br.html">português</a> 
&nbsp;</span>
 <span dir="ltr">[ru]&nbsp;<a lang="ru" hreflang="ru" 
href="/proprietary/proprietary-obsolescence.ru.html">русский</a> 
&nbsp;</span>
 </p>
 </div>' -->
@@ -12,5 +13,6 @@
 <link rel="alternate" type="text/html" lang="en" hreflang="en" 
href="/proprietary/proprietary-obsolescence.en.html" title="English" />
 <link rel="alternate" type="text/html" lang="es" hreflang="es" 
href="/proprietary/proprietary-obsolescence.es.html" title="español" />
 <link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/proprietary/proprietary-obsolescence.fr.html" title="français" />
+<link rel="alternate" type="text/html" lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-obsolescence.pt-br.html" title="português" />
 <link rel="alternate" type="text/html" lang="ru" hreflang="ru" 
href="/proprietary/proprietary-obsolescence.ru.html" title="русский" />
 <!-- end translist file -->

Index: po/proprietary-sabotage.translist
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.translist,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/proprietary-sabotage.translist   15 Mar 2020 18:34:48 -0000      1.6
+++ po/proprietary-sabotage.translist   26 Jun 2021 14:00:01 -0000      1.7
@@ -8,6 +8,7 @@
 <span dir="ltr">[fr]&nbsp;<a lang="fr" hreflang="fr" 
href="/proprietary/proprietary-sabotage.fr.html">français</a> &nbsp;</span>
 <span dir="ltr">[it]&nbsp;<a lang="it" hreflang="it" 
href="/proprietary/proprietary-sabotage.it.html">italiano</a> &nbsp;</span>
 <span dir="ltr">[ja]&nbsp;<a lang="ja" hreflang="ja" 
href="/proprietary/proprietary-sabotage.ja.html">日本語</a> &nbsp;</span>
+<span dir="ltr">[pt-br]&nbsp;<a lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-sabotage.pt-br.html">português</a> &nbsp;</span>
 <span dir="ltr">[ru]&nbsp;<a lang="ru" hreflang="ru" 
href="/proprietary/proprietary-sabotage.ru.html">русский</a> 
&nbsp;</span>
 </p>
 </div>' -->
@@ -18,5 +19,6 @@
 <link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/proprietary/proprietary-sabotage.fr.html" title="français" />
 <link rel="alternate" type="text/html" lang="it" hreflang="it" 
href="/proprietary/proprietary-sabotage.it.html" title="italiano" />
 <link rel="alternate" type="text/html" lang="ja" hreflang="ja" 
href="/proprietary/proprietary-sabotage.ja.html" title="日本語" />
+<link rel="alternate" type="text/html" lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-sabotage.pt-br.html" title="português" />
 <link rel="alternate" type="text/html" lang="ru" hreflang="ru" 
href="/proprietary/proprietary-sabotage.ru.html" title="русский" />
 <!-- end translist file -->

Index: po/proprietary-subscriptions.translist
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.translist,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- po/proprietary-subscriptions.translist      15 Mar 2020 18:34:48 -0000      
1.7
+++ po/proprietary-subscriptions.translist      26 Jun 2021 14:00:01 -0000      
1.8
@@ -7,6 +7,7 @@
 <span dir="ltr">[es]&nbsp;<a lang="es" hreflang="es" 
href="/proprietary/proprietary-subscriptions.es.html">español</a> &nbsp;</span>
 <span dir="ltr">[fr]&nbsp;<a lang="fr" hreflang="fr" 
href="/proprietary/proprietary-subscriptions.fr.html">français</a> 
&nbsp;</span>
 <span dir="ltr">[ja]&nbsp;<a lang="ja" hreflang="ja" 
href="/proprietary/proprietary-subscriptions.ja.html">日本語</a> 
&nbsp;</span>
+<span dir="ltr">[pt-br]&nbsp;<a lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-subscriptions.pt-br.html">português</a> 
&nbsp;</span>
 <span dir="ltr">[ru]&nbsp;<a lang="ru" hreflang="ru" 
href="/proprietary/proprietary-subscriptions.ru.html">русский</a> 
&nbsp;</span>
 </p>
 </div>' -->
@@ -16,5 +17,6 @@
 <link rel="alternate" type="text/html" lang="es" hreflang="es" 
href="/proprietary/proprietary-subscriptions.es.html" title="español" />
 <link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/proprietary/proprietary-subscriptions.fr.html" title="français" />
 <link rel="alternate" type="text/html" lang="ja" hreflang="ja" 
href="/proprietary/proprietary-subscriptions.ja.html" title="日本語" />
+<link rel="alternate" type="text/html" lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-subscriptions.pt-br.html" title="português" />
 <link rel="alternate" type="text/html" lang="ru" hreflang="ru" 
href="/proprietary/proprietary-subscriptions.ru.html" title="русский" />
 <!-- end translist file -->

Index: po/proprietary-surveillance.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pt-br.po,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/proprietary-surveillance.pt-br.po        26 Jun 2021 13:41:58 -0000      
1.1
+++ po/proprietary-surveillance.pt-br.po        26 Jun 2021 14:00:01 -0000      
1.2
@@ -447,8 +447,8 @@
 "windows-diagnostic-data-in-your-organization#full-level\"> &ldquo;"
 "Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, "
 "among other things, registry keys <a href=\"https://docs.microsoft.com/en-us/";
-"previous-versions/windows/it-pro/windows-2000-server/"
-"cc939702(v=technet.10)\"> which can contain sensitive information like "
+"previous-versions/windows/it-pro/windows-2000-server/cc939702"
+"(v=technet.10)\"> which can contain sensitive information like "
 "administrator's login password</a>."
 msgstr ""
 "O <a href=\"https://docs.microsoft.com/pt-br/windows/privacy/configure-";
@@ -2585,8 +2585,8 @@
 #. type: Content of: <div><div><ul><li><p>
 msgid ""
 "<small>(Note that this article misuses the words &ldquo;<a href=\"/"
-"philosophy/free-sw.html\">free software</a>&rdquo; referring to zero "
-"price.)</small>"
+"philosophy/free-sw.html\">free software</a>&rdquo; referring to zero price.)"
+"</small>"
 msgstr ""
 "<small>(Note que este artigo usa indevidamente as palavras “<a href=\"/"
 "philosophy/free-sw.html\"><i lang=\"en\">free software</i></a>” 
referindo-se "

Index: po/proprietary-surveillance.translist
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.translist,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/proprietary-surveillance.translist       15 Mar 2020 18:34:48 -0000      
1.6
+++ po/proprietary-surveillance.translist       26 Jun 2021 14:00:01 -0000      
1.7
@@ -8,6 +8,7 @@
 <span dir="ltr">[fr]&nbsp;<a lang="fr" hreflang="fr" 
href="/proprietary/proprietary-surveillance.fr.html">français</a> &nbsp;</span>
 <span dir="ltr">[it]&nbsp;<a lang="it" hreflang="it" 
href="/proprietary/proprietary-surveillance.it.html">italiano</a> &nbsp;</span>
 <span dir="ltr">[ja]&nbsp;<a lang="ja" hreflang="ja" 
href="/proprietary/proprietary-surveillance.ja.html">日本語</a> &nbsp;</span>
+<span dir="ltr">[pt-br]&nbsp;<a lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-surveillance.pt-br.html">português</a> 
&nbsp;</span>
 <span dir="ltr">[ru]&nbsp;<a lang="ru" hreflang="ru" 
href="/proprietary/proprietary-surveillance.ru.html">русский</a> 
&nbsp;</span>
 </p>
 </div>' -->
@@ -18,5 +19,6 @@
 <link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/proprietary/proprietary-surveillance.fr.html" title="français" />
 <link rel="alternate" type="text/html" lang="it" hreflang="it" 
href="/proprietary/proprietary-surveillance.it.html" title="italiano" />
 <link rel="alternate" type="text/html" lang="ja" hreflang="ja" 
href="/proprietary/proprietary-surveillance.ja.html" title="日本語" />
+<link rel="alternate" type="text/html" lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-surveillance.pt-br.html" title="português" />
 <link rel="alternate" type="text/html" lang="ru" hreflang="ru" 
href="/proprietary/proprietary-surveillance.ru.html" title="русский" />
 <!-- end translist file -->

Index: proprietary-addictions.pt-br.html
===================================================================
RCS file: proprietary-addictions.pt-br.html
diff -N proprietary-addictions.pt-br.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ proprietary-addictions.pt-br.html   26 Jun 2021 14:00:00 -0000      1.1
@@ -0,0 +1,459 @@
+<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-addictions.en.html" -->
+
+<!--#include virtual="/server/header.pt-br.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">
+!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>Vícios privativos - Projeto GNU - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+
+<!--#include virtual="/proprietary/po/proprietary-addictions.translist" -->
+<!--#include virtual="/server/banner.pt-br.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Índice da Seção"
+      alt="&nbsp;[Índice da Seção]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="Página inicial do GNU" title="Página inicial do GNU" /></a>&nbsp;/ 
<a href="/proprietary/proprietary.html"><em>Malware</em>
+privativo</a>&nbsp;/ Por tipo&nbsp;/
+</p>
+</div>
+
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.pt-br.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Vícios privativos</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>O software não livre (privativo) é muitas vezes um <em>malware</em>
+(projetado para maltratar o usuário). O software não livre é controlado por
+seus desenvolvedores, o que os coloca em uma posição de poder sobre os
+usuários; <a href="/philosophy/free-software-even-more-important.html">isso
+é a injustiça básica</a>. Os desenvolvedores e fabricantes muitas vezes
+exercem esse poder em detrimento dos usuários aos quais eles deveriam
+servir.</p>
+
+<p>Isso geralmente assume a forma de funcionalidades maliciosas.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>Esta página trata de funcionalidades maliciosas que são adicionadas a 
alguns
+programas com o único propósito de atrair os usuários a um uso cada vez mais
+frequente e intensivo do programa, com o risco de se tornarem viciados.</p>
+
+<div class="important">
+<p>Se você conhece um exemplo que deveria estar nesta página, mas não está
+aqui, por favor, escreva para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a> para nos
+informar. Por favor, inclua a URL de uma ou duas referências confiáveis para
+servir como comprovação específica.</p>
+</div>
+
+<h3 id="addictiveness">Como software é tornado viciante</h3>
+
+<h4 id="games">Jogos</h4>
+
+ <p id="M209900000">Muitos jogos são projetados para manter os jogadores 
jogando compulsivamente
+&ndash; e renovando suas assinaturas no jogo. Para alcançar esse resultado,
+os desenvolvedores usam <a
+href="http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html";>
+técnicas que derivam de pesquisa comportamental e cerebral</a>:</p>
+
+    <dl class="compact"><dt>A Caixa de Skinner</dt>
+      <dd>Um ambiente no qual o usuário é treinado para “empurrar a 
alavanca”, ou
+seja, fazer uma certa ação várias vezes para obter uma recompensa. Isso
+também é conhecido como <i lang="en">“grinding”</i>.</dd>
+
+      <dt>Grãos de comida virtuais</dt>
+      <dd>Itens que não têm nada a ver com o jogo em si, mas são valiosos 
para os
+jogadores por causa do trabalho necessário para obtê-los (por exemplo,
+EverQuest); algumas pessoas acabarão coletando-as só por coletar.</dd>
+
+      <dt>Recompensas aleatórias</dt>
+      <dd>Eles transformam o jogo no equivalente a um caça-níqueis (por 
exemplo, World
+of Warcraft, ZT Online).</dd>
+
+      <dt>Ciclos elaborados</dt>
+      <dd>O comportamento dos jogadores pode ser “moldado” tornando os 
ciclos
+(progredir de um nível para o outro) mais e mais lento, projetando tarefas
+complexas das quais é difícil sair (por exemplo, World of Warcraft) ou
+dividindo-as em pequenos pedaços para evitar frustrações (por exemplo, New
+Super Mario Bros.Wii).</dd>
+
+      <dt>Decadência de ativos <i lang="en">(assets)</i> do jogo</dt>
+      <dd>Isso torna necessário que um jogador continue jogando, sem férias,
+simplesmente para evitar perder o que ganhou até agora (por exemplo,
+Farmville, Ultima Online, Animal Crossing).</dd>
+    </dl>
+
+ <p>Jogos como World of Warcraft, que são considerados muito viciantes, usam
+várias dessas técnicas.</p>
+
+ <p>Existem maneiras ainda mais elaboradas de tornar os usuários viciados em 
um
+jogo.</p>
+ <ul>
+    <li>“Caixas de pilhagem” são uma aplicação direta do mecanismo de 
recompensa
+aleatória, e seu vício é reforçado por uma animação sedutora. Elas são 
<a
+href="https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/";>
+semelhantes aos jogos de azar</a>.</li>
+
+    <li id="gacha">Sistemas <a 
href="https://wikipedia.org/wiki/Gacha_game";><i>Gacha</i></a>,
+amplamente utilizados pelos jogos japoneses desde 2010, podem ser
+considerados os ancestrais das caixas de pilhagem. Um <i>gacha</i> é o
+equivalente virtual de uma máquina de venda automática de brinquedos em
+cápsula. Sua dependência é baseada em recompensas aleatórias e também no
+instinto básico das pessoas para coletar itens.</li>
+
+    <li>Os desenvolvedores de jogos grátis para dispositivos móveis aplicam 
as
+técnicas descritas acima para <a
+href="https://www.psychguides.com/interact/the-psychology-of-freemium/";>
+transformar seus produtos em caça-níqueis</a>. Isso está claramente descrito
+em um infográfico. O lucro gerado por esses jogos está diretamente
+relacionado ao número de jogadores fortemente viciados (chamados de
+“baleias”) e à quantidade de dinheiro que eles têm a intenção de
+gastar. Então, os desenvolvedores estudam cuidadosamente o comportamento de
+milhões de usuários para aumentar o vício em seus jogos.</li>
+ </ul>
+
+ <p><small>(Infelizmente, os últimos dois artigos usam <i 
lang="en">“free”</i>
+no sentido de “preço zero”. Nós recomendamos dizer 
“grátis”.)</small></p>
+
+ <p>No entanto, a dependência de um jogo é apenas um dos determinantes do
+vício. Igualmente importante é a constituição psicológica e as
+circunstâncias da vida do jogador. O vício em jogos, como outros vícios, é
+uma forma de fuga mental de uma vida pouco recompensadora. A triste verdade
+é que, a longo prazo, leva a uma vida ainda pior.</p>
+
+ <p><small><em>Nota:</em>&nbsp;Nós não somos <i lang="en">gamers</i>. Se 
você
+acredita que nos equivocamos algum ponto ou tem sugestões para tornar esse
+texto mais claro ou mais correto, envie-os para &lt;<a
+href="mailto:webmasters@gnu.org";>webmasters@gnu.org</a>&gt;.</small></p>
+
+<h4 id="gambling">Aposta online</h4>
+
+ <p id="M201902220">Os serviços de jogos de azar on-line (e seus programas 
clientes não livres)
+são <a
+href="https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-dangerous-than-fobts-study-finds";>
+projetados para serem viciantes</a>, muito parecidos com outros jogos
+on-line. Eles conseguem isso com várias disfunções diferentes, muitas vezes
+em combinação.</p>
+
+    <p>Muitas dessas disfuncionalidades são implementadas pelo servidor e pelo
+programa cliente juntos. Em alguns casos, não existe uma maneira honesta de
+o programa cliente neutralizar a maldade – por exemplo, quando o servidor
+manipula os montantes ganhos para que o usuário fique viciado, a única
+maneira de bloquear o programa é fingir que a vitória não aconteceu. Mas os
+usuários não querem essa modificação.</p>
+
+ <p>No entanto, a modificação do programa cliente pode encobrir alguns
+comportamentos aditivos sem perder nada do usuário.</p>
+
+<h4 id="social-networks">Redes sociais</h4>
+
+ <p>As principais redes sociais otimizam continuamente seu design para <a
+href="https://medium.com/thrive-global/how-technology-hijacks-peoples-minds-from-a-magician-and-google-s-design-ethicist-56d62ef5edf3";>
+prender a atenção dos usuários</a> aproveitando as vulnerabilidades
+psicológicas descritas acima, levando alguns ao vício. Para essas pessoas,
+um telefone se torna o equivalente a uma máquina de caça-níqueis. Muitos dos
+recursos viciantes (menu, “curtir”, marcação de fotos, reprodução 
automática
+etc.) são integrados ao software cliente e não podem ser removidos porque o
+software é privativo.</p>
+   
+ <p id="M201803210">Então, alguns aplicativos de redes sociais <a
+href="https://www.jeffbullas.com/facebook-creates-addiction/";>tentam se
+fundir à sua rotina diária</a> explorando a pressão social e seu desejo
+natural de socialização, convertendo os gestos habituais em um vício
+completo. Como já observado nos jogos, o vício é essencialmente baseada em
+recompensas aleatórias. No presente caso, as recompensas são mensagens de
+amigos e seguidores, “curtidas”, notícias, vídeos interessantes etc. O
+software foi projetado para despertar o desejo dos usuários por essas
+recompensas e manter esse desejo vivo o maior tempo possível.</p>
+
+ <ul>
+      <li>Por padrão, as notificações são enviadas toda vez que um novo 
item aparece,
+em vez de, digamos, uma vez por dia. Eles estão associados a sons ou
+vibrações que os tornam ainda mais atraentes. (Lembre-se das experiências de
+Pavlov com ratos.) Esses gatilhos geralmente estão desativados e muitos
+usuários não tentam desativá-los. Eles são mais eficazes quando o 
aplicativo
+é instalado em um dispositivo móvel que está sempre ativado e nunca sai do
+usuário. Como efeito colateral, eles podem contribuir para a <a
+href="https://www.psychologytoday.com/us/blog/reading-between-the-headlines/201307/smartphone-addiction";>
+dependência de telefones “inteligentes”</a>.</li>
+
+      <li>Usuários são servidos com materiais selecionados que provavelmente 
os
+interessa, com base em <a
+href="https://theconversation.com/facebook-is-killing-democracy-with-its-personality-profiling-data-93611";>perfilamento</a>.
+(Aliás, isso pavimenta o caminho para <a
+href="/proprietary/proprietary-manipulation.html">manipulação</a>.)</li>
+
+      <li>A interface do aplicativo é projetada para fazer os usuários 
ficarem no site
+o máximo possível, usando <a
+href="https://uxplanet.org/ux-infinite-scrolling-vs-pagination-1030d29376f1";>
+rolagem infinita</a>, por exemplo.</li>
+
+      <li>A empresa dona da rede social tenta cobrir as necessidades dos 
usuários o
+mais extensamente possível, <a
+href="https://en.wikipedia.org/wiki/List_of_mergers_and_acquisitions_by_Facebook";>
+adquirindo outras empresas</a>, se necessário. Depois que os usuários
+concentram a maioria de suas atividades online e muitos dados pessoais em
+uma única plataforma (ou um conjunto de plataformas que pertencem ao mesmo
+grupo), eles acham <a
+href="https://www.theguardian.com/lifeandstyle/2018/jan/01/antisocial-media-why-decided-cut-back-facebook-instagram";>
+quase impossível sair</a>. E mesmo se quisessem, eles teriam dificuldade em
+descobrir as opções relevantes, e o aplicativo os importunaria
+agressivamente para ficar.</li>
+    </ul>
+
+ <p>Uma boa maneira de minimizar o risco de dependência, além de evitar as
+mídias sociais, é desativar as notificações e deixar o mínimo possível de
+seus próprios dados na plataforma.</p>
+
+
+<h3 id="proprietary-addictions">Exemplos de software viciante</h3>
+
+<ul class="blurbs">
+  <li id="M202010220">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O viciante Genshin Impact implacavelmente <a
+href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world";>força
+os jogadores a gastar dinheiro sobrecarregando o jogo com caixas de
+pilhagem</a>.</p>
+  </li>
+
+  <li id="M202003110">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Roblox (entre muitos outros jogos) criou características indesejáveis que
+persuadiram crianças a <a
+href="https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge";>
+utilizar serviços de pagamento de terceiros sem autorização.</a></p>
+  </li>
+
+  <li id="M201907090">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Crianças engenhosas descobriram como <a
+href="https://www.bbc.co.uk/news/technology-48908766";> esvaziar a conta
+bancária dos pais</a> comprando pacotes de jogadores especiais para um jogo
+de futebol da Electronic Arts.</p>
+
+    <p>O elemento aleatório desses pacotes (também chamados de “caixas de
+pilhagem”) torna o jogo <a
+href="/proprietary/proprietary-addictions#addictiveness"> fortemente
+viciante</a>, mas o fato de que os jogadores são pressionados a gastar mais
+para chegar à frente de seus concorrentes qualifica-o como
+<em>predatório</em>. Observe que a Bélgica <a
+href="https://www.rockpapershotgun.com/2019/01/29/fifa-ultimate-team-packs-blocked-in-belgium/";>
+tornou essas caixas de pilhagem</a> ilegais em 2018.</p>
+
+    <p>A única boa razão para ter uma cópia desse jogo privativo é 
estudá-lo para o
+desenvolvimento de software livre.</p>
+  </li>
+
+  <li id="M201809210">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Cash of Clans é um bom exemplo de um jogo grátis para celular cujos
+desenvolvedores <a href="https://gamerant.com/clash-of-clans-addiction/";>
+tornaram muito viciante</a> para uma grande proporção de seus usuários – 
e o
+transformaram em um caixa eletrônico para eles mesmos – usando <a
+href="/proprietary/proprietary-addictions.html#addictiveness"> técnicas de
+manipulação psicológica</a>.</p>
+
+    <p><small>(O artigo usa <i lang="en">“free”</i> no sentido de 
“preço zero”,
+sentido este que deve ser evitado. Nós recomendamos dizer 
“grátis”.)</small></p>
+  </li>
+
+  <li id="M201612290">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>No jogo Fruit Pop, o jogador compra bônus com moedas para obter uma
+pontuação alta. O jogador recebe moedas no final de cada jogo e pode comprar
+mais moedas com dinheiro real.</p>
+
+    <p>Obter uma pontuação mais alta uma vez leva o jogador a desejar maior
+pontuação novamente mais tarde. Mas uma pontuação maior resultante do
+impulsionador <a
+href="https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-economic-ideas/";>
+não dá ao jogador mais moedas, e não ajuda o jogador a obter uma pontuação
+mais alta nos jogos subsequentes</a>. Para conseguir isso, o jogador
+precisará de um impulsionador com frequência e, geralmente, terá que pagar
+em dinheiro real por isso. Como os impulsionadores são empolgantes e
+divertidos, o jogador é sutilmente empurrado para comprar mais moedas com
+dinheiro real para obter reforços, e isso pode se transformar em um hábito
+caro.</p>
+  </li>
+
+  <li id="M201604040">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Muitos jogos populares para celular incluem um sistema de recompensa
+aleatório chamado <a href="#gacha"><i>gacha</i></a>, que é especialmente
+eficaz para crianças. Uma variante do gacha foi declarada ilegal no Japão em
+2012, mas as outras variantes ainda estão <a
+href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/";>
+atraindo jogadores para compulsivamente gastar</a> quantias excessivas de
+dinheiro em brinquedos virtuais.</p>
+  </li>
+
+  <li id="M201507290">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Game Of War: Fire Age é um jogo para iPhone com <a
+href="http://www.cracked.com/personal-experiences-1762-5-reasons-i-lost-249000-iphone-game.html";>recursos
+viciantes</a> baseados em <a
+href="/proprietary/proprietary-addictions.html#addictiveness">técnicas de
+manipulação comportamental</a>, compostas com emulação de grupo. Depois de
+um começo bastante fácil, o jogo desacelera e se torna mais difícil, então
+os jogadores são levados a gastar mais e mais dinheiro para acompanhar o
+grupo. E se eles pararem de jogar por um tempo, o equipamento em que eles
+investiram será destruído pelo “inimigo” a menos que eles comprem um
+“escudo” caro para se proteger. Este jogo também é enganador, pois 
utiliza
+menus confusos e estatísticas complexas para ofuscar verdadeiros custos
+monetários.</p>
+  </li>
+
+  <li id="M201504210">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Runescape é um jogo online popular com alguns <a
+href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/";>
+recursos viciantes</a> derivados de <a
+href="/proprietary/proprietary-addictions.html#addictiveness"> técnicas de
+manipulação comportamental</a>. Certos aspectos repetitivos do jogo, como <a
+href="https://en.wikipedia.org/wiki/Grinding_(video_games)"><i
+lang="en">grinding</i></a>, podem ser minimizados ao se tornar um membro
+pagante e, assim, incentivar crianças e pessoas impressionáveis para gastar
+dinheiro no jogo.</p>
+  </li>
+</ul>
+</div>
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!--#include virtual="/proprietary/proprietary-menu.pt-br.html" -->
+<!--#include virtual="/server/footer.pt-br.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Envie perguntas em geral sobre a FSF e o GNU para <a
+href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>. Também existem <a
+href="/contact/">outros meios de contatar</a> a FSF. Links quebrados e
+outras correções ou sugestões podem ser enviadas para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+A equipe de traduções para o português brasileiro se esforça para oferecer
+traduções precisas e de boa qualidade, mas não estamos isentos de erros. Por
+favor, envie seus comentários e sugestões em geral sobre as traduções para
+<a
+href="mailto:web-translators@gnu.org";>&lt;web-translators@gnu.org&gt;</a>.
+</p><p>Consulte o <a href="/server/standards/README.translations.html">Guia
+para as traduções</a> para mais informações sobre a coordenação e a
+contribuição com traduções das páginas deste site.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc.</p>
+
+<p>Esta página está licenciada sob uma licença <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/deed.pt_BR";>Creative
+Commons Atribuição 4.0 Internacional</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.pt-br.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+A tradução das páginas na seção Proprietary teve a contribuição de:
+Cassiano Reinert Novais dos Santos <a
+href="mailto:caco@posteo.net";>&lt;caco@posteo.net&gt;</a> e
+Rafael Fontenelle <a
+href="mailto:rafaelff@gnome.org";>&lt;rafaelff@gnome.org&gt;</a>.</div>
+
+<p class="unprintable"><!-- timestamp start -->
+Última atualização:
+
+$Date: 2021/06/26 14:00:00 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: proprietary-back-doors.pt-br.html
===================================================================
RCS file: proprietary-back-doors.pt-br.html
diff -N proprietary-back-doors.pt-br.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ proprietary-back-doors.pt-br.html   26 Jun 2021 14:00:00 -0000      1.1
@@ -0,0 +1,1119 @@
+<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-back-doors.en.html" -->
+
+<!--#include virtual="/server/header.pt-br.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">
+!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>Backdoors privativos - Projeto GNU - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+
+<!--#include virtual="/proprietary/po/proprietary-back-doors.translist" -->
+<!--#include virtual="/server/banner.pt-br.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Índice da Seção"
+      alt="&nbsp;[Índice da Seção]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="Página inicial do GNU" title="Página inicial do GNU" /></a>&nbsp;/ 
<a href="/proprietary/proprietary.html"><em>Malware</em>
+privativo</a>&nbsp;/ Por tipo&nbsp;/
+</p>
+</div>
+
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.pt-br.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Backdoors privativos</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>O software não livre (privativo) é muitas vezes um <em>malware</em>
+(projetado para maltratar o usuário). O software não livre é controlado por
+seus desenvolvedores, o que os coloca em uma posição de poder sobre os
+usuários; <a href="/philosophy/free-software-even-more-important.html">isso
+é a injustiça básica</a>. Os desenvolvedores e fabricantes muitas vezes
+exercem esse poder em detrimento dos usuários aos quais eles deveriam
+servir.</p>
+
+<p>Isso geralmente assume a forma de funcionalidades maliciosas.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>Algumas funcionalidades maliciosas são possibilitadas por <a
+href="/proprietary/proprietary.html#f1"><em>backdoors</em></a>. Aqui estão
+alguns exemplos de programas que contêm um ou vários deles, classificados de
+acordo com o que o <em>backdoor</em> é conhecida por ter o poder de
+fazer. Os <em>backdoors</em> que permitem o controle total sobre os
+programas que os contêm são considerados “universais”.</p>
+
+<div class="important">
+<p>Se você conhece um exemplo que deveria estar nesta página, mas não está
+aqui, por favor, escreva para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a> para nos
+informar. Por favor, inclua a URL de uma ou duas referências confiáveis para
+servir como comprovação específica.</p>
+</div>
+
+<div id="TOC" class="toc-inline">
+<h3>Funcionalidades <em>backdoors</em></h3>
+<ul>
+  <li><a href="#spy">Espionagem</a></li>
+  <li><a href="#alter-data">Alteração dos dados e das configurações do 
usuário</a></li>
+  <li><a href="#install-delete">Instalação, exclusão ou desabilitação de
+programas</a></li>
+  <li><a href="#universal">Controle total</a></li>
+  <li><a href="#other">Outros/indefinidos</a></li>
+</ul>
+</div>
+
+<h3 id='spy'>Espionagem</h3>
+
+<ul class="blurbs">
+  <li id="M202008030">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Google Nest <a
+href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/";>
+está assumindo o ADT</a>. O Google enviou uma atualização de software para
+seus alto-falantes usando seu <em>backdoor</em> <a
+href="https://www.protocol.com/google-smart-speaker-alarm-adt";> que escuta
+coisas como alarmes de fumaça</a> e notifica seu telefone de que um alarme
+está acontecendo. Isso significa que os dispositivos agora ouvem mais do que
+apenas as palavras de ativação. O Google diz que a atualização do software
+foi enviada prematuramente e por acidente e que estava planejando divulgar
+esse novo recurso e oferecê-lo aos clientes que pagam por ele.</p>
+  </li>
+
+  <li id="M201706200.2">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p id="InternetCameraBackDoor">Muitos modelos de câmeras conectadas à 
Internet contêm um <em>backdoor</em>
+evidente – eles têm contas de login com senhas codificadas, que não podem
+ser alteradas, e <a
+href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/";>
+também não há como excluir essas contas</a>.</p>
+
+    <p>Uma vez que essas contas com senhas codificadas são impossíveis de 
excluir,
+esse problema não é apenas uma insegurança; é um <em>backdoor</em> que pode
+ser usado pelo fabricante (e pelo governo) para espionar os usuários.</p>
+  </li>
+
+  <li id="M201701130">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O WhatsApp tem um recurso que <a
+href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/";>
+foi descrito como um <em>backdoor</em></a> porque permitiria aos governos
+anular sua criptografia.</p>
+
+    <p>Os desenvolvedores dizem que não foi planejado como um 
<em>backdoor</em>, e
+isso pode muito bem ser verdade. Mas isso deixa a questão crucial de saber
+se ele funciona como um. Como o programa não é livre, não podemos verificar
+estudando-o.</p>
+  </li>
+
+  <li id="M201512280">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Microsoft <a
+href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
+adicionou um <em>backdoor</em> em sua criptografia de disco</a>.</p>
+  </li>
+
+  <li id="M201409220">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple pode, e faz regularmente, <a
+href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>
+extrair remotamente alguns dados de iPhones para o estado</a>.</p>
+
+    <p>Isso pode ter melhorado com <a
+href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/";>
+melhorias de segurança do iOS 8</a>, mas <a
+href="https://firstlook.org/theintercept/2014/09/22/apple-data/";> não tanto
+quanto a Apple afirma</a>.</p>
+  </li>
+</ul>
+
+
+<h3 id='alter-data'>Alteração dos dados e das configurações do 
usuário</h3>
+
+<ul class="blurbs">
+  <li id="M201905060">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A BlizzCon 2019 impôs um <a
+href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/";>
+requisito de executar um aplicativo privativo de telefone</a> para ser
+aceito no evento.</p>
+
+    <p>Esse aplicativo é um <i lang="en">spyware</i> que consegue bisbilhotar
+vários dados sensíveis, incluindo a localização e a lista de contato do
+usuário, e tem <a
+href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/";>
+controle quase completo</a> sobre seu telefone.</p>
+  </li>
+
+  <li id="M201809140">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Android tem um <a
+href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change";>
+<em>backdoor</em> para alterar remotamente as configurações do
+“usuário”</a>.</p>
+
+    <p>O artigo sugere que pode ser um <em>backdoor</em> universal, mas isso 
não
+está claro.</p>
+  </li>
+
+  <li id="M201607284">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O aplicativo Dropbox para Macintosh <a
+href="https://web.archive.org/web/20180124123506/http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/";>
+assume o controle dos itens da interface do usuário após induzir o usuário a
+inserir uma senha de administrador</a>.</p>
+  </li>
+
+  <li id="M201604250">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um aplicativo de controle de teste de gravidez não só pode <a
+href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security";>
+espionar muitos tipos de dados no telefone e em contas de servidor, ele
+também pode alterá-los</a>.</p>
+  </li>
+
+  <li id="M201512074">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html";>
+Alguns roteadores da D-Link</a> têm um <em>backdoor</em> para alterar as
+configurações em um piscar de olhos.</p>
+
+    <p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/";> O roteador da
+TP-Link tem um <em>backdoor</em></a>.</p>
+
+    <p><a href="https://github.com/elvanderb/TCP-32764";>Muitos modelos de
+roteadores têm <em>backdoors</em></a>.</p>
+  </li>
+
+  <li id="M201511244">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Há muito tempo que o Google tem <a
+href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted";>um
+<em>backdoor</em> para desbloquear remotamente um dispositivo Android</a>, a
+menos que seu disco esteja criptografado (possível desde o Android 5.0
+Lollipop, mas ainda não é o padrão).</p>
+  </li>
+
+  <li id="M201511194">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os veículos da Caterpillar vêm com <a
+href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it";>
+um <em>backdoor</em> para desligar o motor</a> remotamente.</p>
+  </li>
+
+  <li id="M201509160">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Aplicativos modernos de jogos grátis <a
+href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/";>
+coletam uma ampla gama de dados sobre seus usuários e amigos e associados de
+seus usuários</a>.</p>
+
+    <p>Ainda mais desagradável, eles fazem isso por meio de redes de anúncio 
que
+mesclam os dados coletados por vários aplicativos e sites feitos por
+empresas diferentes.</p>
+
+    <p>Eles usam esses dados para manipular as pessoas para comprar coisas e 
caçar
+“baleias” que podem ser levadas a gastar muito dinheiro. Eles também usam 
um
+<em>backdoor</em> para manipular o jogo para jogadores específicos.</p>
+
+    <p>Embora o artigo descreva jogos grátis, os jogos que custam dinheiro 
podem
+usar as mesmas táticas.</p>
+  </li>
+
+  <li id="M201403120.1">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p id="samsung"><a
+href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor";>
+Os dispositivos Samsung Galaxy que executam versões privativas do Android
+vêm com um <em>backdoor</em></a> que fornece acesso remoto aos arquivos
+armazenados no dispositivo.</p>
+  </li>
+
+  <li id="M201210220">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2012-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p id="swindle-eraser">O Amazon Kindle-Swindle tem um <em>backdoor</em> que 
tem sido usado para <a
+href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
+apagar livros remotamente</a>. Um dos livros apagados foi <cite>1984</cite>,
+de George Orwell.</p>
+
+    <p>A Amazon respondeu às críticas dizendo que excluiria os livros apenas
+seguindo ordens do estado. No entanto, essa política não durou. Em 2012, <a
+href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html";>
+apagou o Kindle-Swindle de uma usuária e excluiu sua conta</a>, então
+ofereceu suas “explicações” kafkianas.</p>
+
+    <p>Outros leitores de e-book têm <em>backdoors</em> em seus softwares não
+livres? Não sabemos e não temos como descobrir. Não há razão para supor 
que
+não o façam.</p>
+  </li>
+
+  <li id="M201011220">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2010-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O iPhone tem um <em>backdoor</em> para <a
+href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>
+exclusão remota</a>. Nem sempre está habilitado, mas os usuários são 
levados
+a habilitá-lo sem entender.</p>
+  </li>
+</ul>
+
+
+<h3 id='install-delete'>Instalação, exclusão ou desabilitação de 
programas</h3>
+
+<ul class="blurbs">
+  <li id="M202012020">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Adobe Flash Player <a
+href="https://www.adobe.com/products/flashplayer/end-of-life.html";> tem um
+<em>backdoor</em> universal</a> que permite à Adobe controlar o software e,
+por exemplo, desativá-lo sempre que desejar. A Adobe bloqueará a execução 
de
+conteúdo do Flash no Flash Player a partir de 12 de janeiro de 2021, o que
+indica que eles têm acesso a todos os Flash Player por um 
<em>backdoor</em>.</p>
+
+    <p>O <em>backdoor</em> não será perigoso no futuro, pois desabilitará um
+programa privativo e fará com que os usuários excluam o software, mas foi
+uma injustiça por muitos anos. Os usuários deveriam ter excluído o Flash
+Player antes mesmo de sua vida útil terminar.</p>
+  </li>
+
+  <li id="M202007020">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>BMW está tentando <a
+href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates";>bloquear
+certos recursos de seus carros e forçar as pessoas a pagar para usar parte
+do carro que já compraram</a>. Isso é feito por meio da atualização 
forçada
+do software do carro por meio de uma <em>backdoor</em> operada por rádio.</p>
+  </li>
+
+  <li id="M201908270">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um aplicativo muito popular encontrado na loja Google Play continha um
+módulo desenvolvido para <a
+href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/";>instalar
+secretamente <em>malware</em> no computador do usuário</a>. Os
+desenvolvedores de aplicativos costumavam usá-lo para fazer o computador
+baixar e executar qualquer código que desejassem.</p>
+
+    <p>Este é um exemplo concreto a que os usuários são expostos quando 
executam
+aplicativos não livres. Eles nunca podem ter certeza absoluta de que um
+aplicativo não livre é seguro.</p>
+  </li>
+
+  <li id="M201907100">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple parece dizer que <a
+href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/";> há
+um <em>backdoor</em> no MacOS</a> para atualização automática de alguns
+(todos?) aplicativos.</p>
+
+    <p>A alteração específica descrita no artigo não era maliciosa &ndash; 
protegia
+os usuários da vigilância de terceiros &ndash; mas essa é uma questão à
+parte.</p>
+  </li>
+
+  <li id="M201811100">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Corel Paintshop Pro tem um <a
+href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/";>
+<em>backdoor</em> que pode fazê-lo parar de funcionar</a>.</p>
+
+    <p>O artigo está cheio de confusões, erros e preconceitos que temos a 
obrigação
+de expor, dado que estamos fazendo um link para eles.</p>
+
+    <ul>
+    <li>Obter uma patente não “permite” uma empresa fazer qualquer coisa 
em
+particular em seus produtos. O que ela permite que a empresa faça é
+processar outras empresas se elas fizerem alguma coisa em particular em seus
+produtos.</li>
+
+    <li>As políticas de uma empresa sobre quando atacar usuários por meio de 
um
+<em>backdoor</em> estão fora de questão. Inserir o <em>backdoor</em> é
+errado em primeiro lugar, e usar o <em>backdoor</em> também é errado. Nenhum
+desenvolvedor de software deve ter esse poder sobre os usuários.</li>
+
+    <li>“<a href="/philosophy/words-to-avoid.html#Piracy">Pirataria</a>” 
significa
+atacar navios. Usar essa palavra para se referir ao compartilhamento de
+cópias é uma mancha no seu sentido; por favor, não manche o
+compartilhamento.</li>
+
+    <li><p>A ideia de “proteger nossa PI” é confusão total. O termo 
“PI” em si é uma <a
+href="/philosophy/not-ipr.html">generalização falsa sobre coisas que não 
têm
+nada em comum</a>.</p>
+
+    <p>Além disso, falar de “proteger” essa generalização falsa é um 
absurdo a
+parte. É como chamar a polícia porque as crianças dos vizinhos estão
+brincando no seu quintal da frente e dizendo que você está “protegendo a
+linha divisória”. As crianças não podem fazer mal à linha limítrofe, nem
+mesmo com uma britadeira, porque é uma abstração e não pode ser afetada 
pela
+ação física.</p></li>
+    </ul>
+  </li>
+
+  <li id="M201804010">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Algumas TVs “inteligentes” <a
+href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928";>
+carregam automaticamente <i lang="en">downgrades</i> que instalam um
+aplicativo de vigilância</a>.</p>
+
+    <p>Adicionamos um link para o artigo pelos fatos que ele apresenta. É uma 
pena
+que o artigo termine defendendo a fraqueza moral de se render ao Netflix. O
+aplicativo Netflix <a
+href="/proprietary/malware-google.html#netflix-app-geolocation-drm">também é
+<em>malware</em></a>.</p>
+  </li>
+
+  <li id="M201511090">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A biblioteca Android privativa do Baidu, Moplus, tem um <em>backdoor</em>
+que <a
+href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made";>
+pode “fazer upload de arquivos” bem como instalar aplicativos à 
força</a>.</p>
+
+    <p>Ela usada por 14.000 aplicativos de Android.</p>
+  </li>
+
+  <li id="M201112080">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2011-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p> Além de seu <a href="#windows-update"><em>backdoor</em> universal</a>, o
+Windows 8 tem um <em>backdoor</em> para <a
+href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html";>
+excluir aplicativos remotamente</a>.</p>
+
+    <p>Você pode decidir permitir que um serviço de segurança em que você 
confia
+<em>desative</em> remotamente programas que ele considera maliciosos. Mas
+não há desculpa para <em>excluir</em> os programas, e você deve ter o
+direito de decidir em quem (se houver) confiar desta forma.</p>
+  </li>
+
+  <li id="M201103070">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2011-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>No Android, <a
+href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html";>
+o Google tem um <em>backdoor</em> para excluir aplicativos
+remotamente</a>. (Estava em um programa chamado GTalkService, que desde
+então parece ter sido incorporado ao Google Play.)</p>
+
+    <p>O Google também pode <a
+href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";>
+instalar aplicativos à força e remotamente</a> por meio de
+GTalkService. Isso não é equivalente a um <em>backdoor</em> universal, mas
+permite vários truques sujos.</p>
+
+    <p>Embora o <em>exercício</em> desse poder pelo Google não tenha sido 
malicioso
+até agora, a questão é que ninguém deveria ter tal poder, que também 
poderia
+ser usado de forma maliciosa. Você pode decidir deixar um serviço de
+segurança <em>desativar</em> remotamente programas que ele considera
+maliciosos. Mas não há desculpa para permitir <em>excluir</em> os programas,
+e você deve ter o direito de decidir em quem (se houver) confiar desta
+forma.</p>
+  </li>
+
+  <li id="M200808110">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2008-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O iPhone tem um <em>backdoor</em> <a
+href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html";>
+que permite à Apple excluir aplicativos remotamente</a> que a Apple
+considera “impróprios”. Jobs disse que está tudo bem para a Apple ter 
esse
+poder porque é claro que podemos confiar na Apple.</p>
+  </li>
+</ul>
+
+
+<h3 id='universal'>Controle total</h3>
+
+<ul class="blurbs">
+  <li id="M202102180">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Microsoft está <a
+href="https://uk.pcmag.com/operating-systems/131798/microsoft-starts-automatically-removing-flash-from-windows";>removendo
+forçadamente o Flash player dos computadores com Windows 10</a>, usando <a
+href="/proprietary/proprietary-back-doors.html#windows-update">uma
+<em>backdoor</em> universal no Windows</a>.</p>
+
+    <p>O fato de o Flash ter sido <a
+href="/proprietary/proprietary-back-doors.html#M202012020">desativado pela
+Adobe</a> não é desculpa para esse abuso de poder. A natureza do software
+privativo, como o Microsoft Windows, dá aos desenvolvedores o poder de impor
+suas decisões aos usuários. O software livre, por outro lado, permite que os
+usuários tomem suas próprias decisões.</p>
+  </li>
+
+  <li id="M202011230">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Alguns roteadores wi-fi Wavelink e JetStream têm <em>backdoors</em>
+universais que permitem que usuários não autenticados controlem remotamente
+não apenas os roteadores, mas também quaisquer dispositivos conectados à
+rede. Há evidências de que <a
+href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/";>
+esta vulnerabilidade é explorada ativamente</a>.</p>
+
+    <p>Se você está pensando em comprar um roteador, recomendamos que compre 
um que
+<a href="https://ryf.fsf.org/categories/routers";>use software
+livre</a>. Qualquer tentativa de introdução de funcionalidades maliciosas
+nele (por exemplo, por meio de uma atualização de firmware) será detectada
+pela comunidade e logo corrigida.</p>
+
+    <p>Se, infelizmente, você possui um roteador que executa software 
privativo,
+não entre em pânico! Você pode substituir seu firmware por um sistema
+operacional livre, como o <a href="https://librecmc.org";>libreCMC</a>. Se
+você não sabe como, pode obter ajuda de um grupo de usuários GNU/Linux
+próximo.</p>
+  </li>
+
+  <li id="M202011060">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um novo aplicativo publicado pelo Google <a
+href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/";>permite
+que bancos e credores desativem os dispositivos Android das pessoas</a> se
+eles deixam de fazer pagamentos. Se o dispositivo de alguém for desativado,
+ele ficará limitado às funcionalidades básicas, como chamadas de emergência
+e acesso às configurações.</p>
+  </li>
+
+  <li id="M202007010">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A BMW vai <a
+href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/";> ativar
+e desativar a funcionalidade em carros</a> remotamente por meio de um
+<em>backdoor</em> universal.</p>
+  </li>
+
+  <li id="M202004130">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os <a href="https://www.google.com/mobile/android/market-tos.html";> Termos
+de Serviço do Google Play</a> insistem em que o usuário do Android aceite a
+presença de <em>backdoors</em> universais em aplicativos lançados pelo
+Google.</p>
+
+    <p>Isso não nos diz se atualmente algum aplicativo do Google contém um
+<em>backdoor</em> universal, mas essa é uma questão secundária. Em termos
+morais, exigir que as pessoas aceitem antecipadamente certos maus tratos é
+equivalente a realmente fazê-lo. Qualquer que seja a condenação que o 
último
+mereça, o primeiro merece o mesmo.</p>
+  </li>
+
+  <li id="M202001090">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os telefones Android subsidiados pelo governo dos EUA vêm com <a
+href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/";>
+<em>adware</em> pré-instalado e uma <em>backdoor</em> para forçar a
+instalação de aplicativos</a>.</p>
+
+    <p>O <em>adware</em> está em uma versão modificada de um aplicativo 
essencial
+de configuração do sistema. O <em>backdoor</em> é uma adição clandestina a
+um programa cujo objetivo declarado é ser um <a
+href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/";>
+<em>backdoor</em> universal para firmware</a>.</p>
+
+    <p>Em outras palavras, um programa cuja razão de ser é maliciosa tem um
+objetivo malicioso secundário secreto. Tudo isso além do <em>malware</em> do
+próprio Android.</p>
+  </li>
+
+  <li id="M201910130.1">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Foi descoberto que o <a
+href="/proprietary/proprietary-surveillance.html#M201910130"> aplicativo
+“Study the Great Nation”</a> do Partido Comunista Chinês continha <a
+href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962";>
+um <em>backdoor</em> que permite aos desenvolvedores executar qualquer
+código que desejem</a> no telefone dos usuários, como 
“superusuários”.</p>
+
+    <p>Nota: A <a
+href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html";>
+versão de artigo do Washington Post</a> (parcialmente ofuscada, mas legível
+após copiar e colar em um editor de texto) inclui um esclarecimento dizendo
+que os testes foram realizados apenas na versão Android do aplicativo e que,
+segundo a Apple, “esse tipo de vigilância de ‘superusuário’ não pôde 
ser
+realizado no sistema operacional da Apple”.</p>
+  </li>
+
+  <li id="M201908220">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O ChromeBooks está programado para obsolescência: o ChromeOS possui um
+<em>backdoor</em> universal usado para atualizações e <a
+href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/";>
+deixa de funcionar em uma data predefinida</a>. A partir de então, parece
+não haver suporte para o computador.</p>
+
+    <p>Em outras palavras, quando você para de se ferrar pelo 
<em>backdoor</em>,
+começa a se ferrar pela obsolescência.</p>
+  </li>
+
+  <li id="M201902011">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O recurso FordPass Connect de alguns veículos da Ford tem <a
+href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html";>
+acesso quase completo à rede interna dos carros</a>. Ele está constantemente
+conectado à rede de telefonia celular e envia à Ford uma grande quantidade
+de dados, incluindo a localização do carro. Esse recurso funciona mesmo
+quando a chave de ignição é removida e os usuários relatam que não podem
+desativá-lo.</p>
+
+    <p>Se você possui um desses carros, conseguiu quebrar a conectividade
+desconectando o modem celular ou envolvendo a antena em papel alumínio?</p>
+  </li>
+
+  <li id="M201812300">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Novos carros da GM <a
+href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html";>
+oferecem o recurso de um <em>backdoor</em> universal</a>.</p>
+
+    <p>Todo programa não livre oferece ao usuário segurança zero contra seu
+desenvolvedor. Com este mal-funcionamento, a GM explicitamente tornou as
+coisas ainda piores.</p>
+  </li>
+
+  <li id="M201711244">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Furby Connect tem um <a
+href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>
+<em>backdoor</em> universal</a>. Se o produto enviado não atua como um
+dispositivo de escuta, as alterações remotas no código certamente podem
+convertê-lo em um.</p>
+  </li>
+
+  <li id="M201711010">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Sony trouxe de volta seu animal de estimação robótico Aibo, dessa vez 
<a
+href="https://www.vice.com/en/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet";>
+com um <em>backdoor</em> universal e amarrado a um servidor que requer
+assinatura</a>.</p>
+  </li>
+
+  <li id="M201709090.1">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Tesla usou um software para limitar a parte da bateria que estava
+disponível para os clientes em alguns carros e <a
+href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/";>
+um <em>backdoor</em> universal no software</a> para aumentar temporariamente
+este limite.</p>
+
+    <p>Enquanto permitir remotamente que “donos” de carro usem toda a 
capacidade da
+bateria não lhes causou nenhum dano, o mesmo <em>backdoor</em> permitiria a
+Tesla (talvez sob o comando de algum governo) ordenar remotamente que o
+carro não usasse nenhuma bateria. Ou talvez para levar seu passageiro a uma
+prisão de tortura.</p>
+  </li>
+
+  <li id="M201702060.1">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>TVs “inteligentes” da Vizio <a
+href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen";>
+têm um <em>backdoor</em> universal</a>.</p>
+  </li>
+
+  <li id="M201609130">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os telefones Xiaomi vêm com <a
+href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/";>
+um <em>backdoor</em> universal no processador do aplicativo, para uso da
+Xiaomi</a>.</p>
+
+    <p>Isso é separado da <a
+href="#universal-back-door-phone-modem"><em>backdoor</em> universal no
+processador do modem que a companhia telefônica local pode usar</a>.</p>
+  </li>
+
+  <li id="M201608171">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p id="windows-update">O Microsoft Windows tem um <em>backdoor</em> universal 
através do qual <a
+href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183";>
+qualquer alteração pode ser imposta aos usuários</a>.</p>
+
+    <p>Isso foi <a
+href="https://web.archive.org/web/20200219180230/http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
+relatado em 2007</a> para XP e Vista, e parece que a Microsoft usou o mesmo
+método para fazer o <a
+href="/proprietary/malware-microsoft.html#windows10-forcing"> <i
+lang="en">downgrade</i> do Windows 10</a> para computadores que executam o
+Windows 7 e 8.</p>
+
+    <p>No Windows 10, o <em>backdoor</em> universal não está mais oculto; 
todas as
+“atualizações” serão <a
+href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/";>
+impostas forçada e imediatamente</a>.</p>
+  </li>
+
+  <li id="M201606060">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Amazon Echo parece ter um <em>backdoor</em> universal, pois <a
+href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates";> ele
+instala “atualizações” automaticamente</a>.</p>
+
+    <p>Não encontramos nada que documentasse explicitamente a falta de uma 
maneira
+de desabilitar as alterações remotas no software, então não temos certeza 
de
+que não haja uma, mas isso parece bastante claro.</p>
+  </li>
+
+  <li id="M201412180">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor";>
+Uma versão chinesa do Android tem um <em>backdoor</em> universal</a>. Quase
+todos os modelos de telefones celulares têm um <a
+href="#universal-back-door-phone-modem"> <em>backdoor</em> universal no chip
+do modem</a>. Então, por que o Coolpad se deu ao trabalho de apresentar
+outro? Porque este é controlado pela Coolpad.</p>
+  </li>
+
+  <li id="M201311300">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/";>
+Alguns aplicativos vêm com MyFreeProxy, que é um <em>backdoor</em>
+universal</a> que pode baixar programas e executá-los.</p>
+  </li>
+
+  <li id="M201202280">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2012-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O ChromeOS tem um <em>backdoor</em> universal. Pelo menos, o Google afirma
+que sim – na <a
+href="https://www.google.com/intl/en/chromebook/termsofservice.html";> seção
+4 do EULA</a>.</p>
+  </li>
+
+  <li id="M200700000.1">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+[2007]</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Além de seu <a href="#swindle-eraser">apagador de livro</a>, o
+Kindle-Swindle tem um <a
+href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090";>
+<em>backdoor</em> universal</a>.</p>
+  </li>
+
+  <li id="M200612050">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2006-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p id="universal-back-door-phone-modem">Quase todo processador de 
comunicação de telefone tem um <em>backdoor</em>
+universal que é <a
+href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>
+frequentemente usado para fazer um telefone transmitir todas as conversas
+dele ouve</a>. Consulte <a
+href="/proprietary/malware-mobiles.html#universal-back-door-phone-modem">Malware
+em dispositivos móveis</a> para obter mais informações.</p>
+  </li>
+</ul>
+
+
+<h3 id='other'>Outras ou indefinidas</h3>
+
+<ul class="blurbs">
+  <li id="M201711204">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O “mecanismo de gerenciamento” da Intel, um <em>backdoor</em> 
intencional,
+também tem <a
+href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/";>
+<em>backdoors</em> não intencionais</a>.</p>
+  </li>
+
+  <li id="M201609240">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Uma atualização do Street Fighter V da Capcom <a
+href="https://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/";>
+instalou um driver que poderia ser usado como <em>backdoor</em> por qualquer
+aplicativo instalado em um computador com Windows</a>, mas foi <a
+href="https://www.rockpapershotgun.com/2016/09/24/street-fighter-v-removes-new-anti-crack";>
+revertido imediatamente</a> em resposta ao clamor público.</p>
+  </li>
+
+  <li id="M201511260">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os computadores da Dell, fornecidos com Windows, tinham um certificado raiz
+falso que <a
+href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/";>
+permitiu que qualquer pessoa (não apenas a Dell) autorizasse remotamente a
+execução de qualquer software</a> no computador.</p>
+  </li>
+
+  <li id="M201511198">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O modem a cabo ARRIS tem um <a
+href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1";>
+<em>backdoor</em> no <em>backdoor</em></a>.</p>
+  </li>
+
+  <li id="M201510200">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>As unidades de disco com “autocriptografia” fazem a criptografia com
+firmware privativo, portanto, você não pode confiar nele. As unidades de 
“My
+Passport” da Western Digital <a
+href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption";>
+têm um <em>backdoor</em></a>.</p>
+  </li>
+
+  <li id="M201504090">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Mac OS X tinha um <a
+href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
+<em>backdoor</em> local intencional por 4 anos</a>, que podia ser explorado
+por invasores para obter privilégios de root.</p>
+  </li>
+
+  <li id="M201309110">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Aqui está um grande problema cujos detalhes ainda são secretos: <a
+href="http://mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/";> O
+FBI pede a muitas empresas que abram <em>backdoors</em> em programas
+privativos</a>. Não sabemos de casos específicos em que isso foi feito, mas
+todo programa privativo para criptografia é uma possibilidade.</p>
+  </li>
+
+  <li id="M201308230">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O governo alemão <a
+href="https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/";>se
+afasta dos computadores Windows 8 com TPM 2.0</a> (<a
+href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa";>artigo
+original em alemão</a>), devido aos potenciais recursos de <em>backdoor</em>
+do chip de TPM 2.0.</p>
+  </li>
+
+  <li id="M201307300">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Aqui está uma suspeita que não podemos provar, mas vale a pena pensar: <a
+href="https://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI";>
+Microcódigo gravável para microprocessadores da Intel e da AMD</a> pode ser
+um veículo para a NSA invadir computadores, com a ajuda da Microsoft, dizem
+respeitados especialistas em segurança.</p>
+  </li>
+
+  <li id="M201307114">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>“Dispositivos de armazenamento” da HP que usam o sistema operacional 
“Left
+Hand” têm <em>backdoors</em> que fornecem à HP <a
+href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/";>
+acesso de login remoto</a> para eles. A HP afirma que isso não dá à HP
+acesso aos dados do cliente, mas se o <em>backdoor</em> permitir a
+instalação de alterações de software, uma alteração poderia ser instalada
+para dar acesso aos dados do cliente.</p>
+  </li>
+</ul>
+
+<div class="column-limit"></div>
+
+<p>A EFF tem outros exemplos de <a
+href="https://www.eff.org/deeplinks/2015/02/who-really-owns-your-drones";>
+uso de <em>backdoors</em></a>.</p>
+</div>
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!--#include virtual="/proprietary/proprietary-menu.pt-br.html" -->
+<!--#include virtual="/server/footer.pt-br.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Envie perguntas em geral sobre a FSF e o GNU para <a
+href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>. Também existem <a
+href="/contact/">outros meios de contatar</a> a FSF. Links quebrados e
+outras correções ou sugestões podem ser enviadas para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+A equipe de traduções para o português brasileiro se esforça para oferecer
+traduções precisas e de boa qualidade, mas não estamos isentos de erros. Por
+favor, envie seus comentários e sugestões em geral sobre as traduções para
+<a
+href="mailto:web-translators@gnu.org";>&lt;web-translators@gnu.org&gt;</a>.
+</p><p>Consulte o <a href="/server/standards/README.translations.html">Guia
+para as traduções</a> para mais informações sobre a coordenação e a
+contribuição com traduções das páginas deste site.</p>
+</div>
+
+<p>Copyright &copy; 2014-2021 Free Software Foundation, Inc.</p>
+
+<p>Esta página está licenciada sob uma licença <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/deed.pt_BR";>Creative
+Commons Atribuição 4.0 Internacional</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.pt-br.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+A tradução das páginas na seção Proprietary teve a contribuição de:
+Cassiano Reinert Novais dos Santos <a
+href="mailto:caco@posteo.net";>&lt;caco@posteo.net&gt;</a> e
+Rafael Fontenelle <a
+href="mailto:rafaelff@gnome.org";>&lt;rafaelff@gnome.org&gt;</a>.</div>
+
+<p class="unprintable"><!-- timestamp start -->
+Última atualização:
+
+$Date: 2021/06/26 14:00:00 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: proprietary-censorship.pt-br.html
===================================================================
RCS file: proprietary-censorship.pt-br.html
diff -N proprietary-censorship.pt-br.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ proprietary-censorship.pt-br.html   26 Jun 2021 14:00:00 -0000      1.1
@@ -0,0 +1,260 @@
+<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-censorship.en.html" -->
+
+<!--#include virtual="/server/header.pt-br.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">
+!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>Censura privativa - Projeto GNU - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+
+<!--#include virtual="/proprietary/po/proprietary-censorship.translist" -->
+<!--#include virtual="/server/banner.pt-br.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Índice da Seção"
+      alt="&nbsp;[Índice da Seção]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="Página inicial do GNU" title="Página inicial do GNU" /></a>&nbsp;/ 
<a href="/proprietary/proprietary.html"><em>Malware</em>
+privativo</a>&nbsp;/ Por tipo&nbsp;/
+</p>
+</div>
+
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.pt-br.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Censura privativa</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>O software não livre (privativo) é muitas vezes um <em>malware</em>
+(projetado para maltratar o usuário). O software não livre é controlado por
+seus desenvolvedores, o que os coloca em uma posição de poder sobre os
+usuários; <a href="/philosophy/free-software-even-more-important.html">isso
+é a injustiça básica</a>. Os desenvolvedores e fabricantes muitas vezes
+exercem esse poder em detrimento dos usuários aos quais eles deveriam
+servir.</p>
+
+<p>Isso geralmente assume a forma de funcionalidades maliciosas.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>Um tipo de funcionalidade maliciosa é a censura do que os usuários podem
+acessar. Aqui estão alguns exemplos de programas que fazem isso. Temos uma
+<a href="/proprietary/proprietary-jails.html#about-page">lista separada de
+sistemas privativos que censuram a instalação</a> de programas de
+aplicativos (os chamamos de “prisões”).</p>
+
+<p>Vender produtos concebidos como plataformas para uma empresa impor censura
+deveria ser proibido por lei, mas não é.</p>
+
+<div class="important">
+<p>Se você conhece um exemplo que deveria estar nesta página, mas não está
+aqui, por favor, escreva para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a> para nos
+informar. Por favor, inclua a URL de uma ou duas referências confiáveis para
+servir como comprovação específica.</p>
+</div>
+
+<h3 id="apple">Apple</h3>
+
+<p>A Apple usa principalmente o iOS, que é uma prisão típica, para impor
+censura por meio da Apple Store. Consulte <a
+href="/proprietary/proprietary-jails.html#apple">Prisões privativas</a> para
+obter mais informações.</p>
+
+<h3 id="google">Google</h3>
+
+<ul class="blurbs">
+  <li id="M201703160">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Google <a
+href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts";>
+oferece software de censura</a>, ostensivamente, para os pais colocarem nos
+computadores de seus filhos.</p>
+  </li>
+
+  <li id="M201701180">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>No Windows e MacOS, o Chrome <a
+href="https://sites.google.com/a/chromium.org/dev/developers/extensions-deployment-faq";>
+desativa extensões</a> que não estão hospedadas no Chrome Web Store.</p>
+
+    <p>Por exemplo, uma extensão era <a
+href="https://web.archive.org/web/20170120094917/https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/";>
+banida da Chrome Web Store e permanentemente desativada</a> em mais de
+40.000 computadores.</p>
+  </li>
+
+  <li id="M201602030">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones";>
+O Google censurou a instalação do bloqueador de anúncios da Samsung</a> em
+telefones Android, dizendo que o bloqueio de anúncios é “interferência” 
com
+os sites que anunciam (e vigiam os usuários por meio de anúncios).</p>
+
+    <p>O bloqueador de anúncios é um software privativo, assim como o 
programa
+(Google Play) que o Google usou para negar o acesso para instalá-lo. O uso
+de um programa não livre dá ao dono poder sobre você, e o Google exerce esse
+poder.</p>
+
+    <p>A censura do Google, ao contrário da Apple, não é total: o Android 
permite
+que os usuários instalem aplicativos de outras maneiras. Você pode instalar
+programas livres em f-droid.org.</p>
+  </li>
+</ul>
+
+
+<h3 id="consoles">Consoles de jogos</h3>
+
+<ul class="blurbs">
+  <li id="M201408290">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O <a
+href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/";>
+Nintendo 3DS</a> censura a navegação na web; é possível desligar a censura,
+mas isso exige a identificação para pagar, o que é uma forma de 
vigilância.</p>
+  </li>
+</ul>
+
+
+<h3 id="online-conferencing">Conferência online</h3>
+<ul class="blurbs">
+  <li id="M202006120">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A empresa por trás do Zoom não apenas nega a liberdade de uso do 
computador
+ao desenvolver este software não livre, mas também viola os direitos civis
+dos usuários <a
+href="https://www.theverge.com/2020/6/12/21288995/zoom-blocking-feature-chinese-government-censorship";>banindo
+eventos e censurando usuários</a> para servir à agenda dos governos.</p>
+
+    <p>Programas que respeitam a liberdade como <a
+href="https://directory.fsf.org/wiki/Jitsi";>Jitsi</a> ou BigBlueButton podem
+ser usados, melhor ainda se instalados em um servidor controlado por seus
+usuários.</p>
+  </li>
+</ul>
+</div>
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!--#include virtual="/proprietary/proprietary-menu.pt-br.html" -->
+<!--#include virtual="/server/footer.pt-br.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Envie perguntas em geral sobre a FSF e o GNU para <a
+href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>. Também existem <a
+href="/contact/">outros meios de contatar</a> a FSF. Links quebrados e
+outras correções ou sugestões podem ser enviadas para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+A equipe de traduções para o português brasileiro se esforça para oferecer
+traduções precisas e de boa qualidade, mas não estamos isentos de erros. Por
+favor, envie seus comentários e sugestões em geral sobre as traduções para
+<a
+href="mailto:web-translators@gnu.org";>&lt;web-translators@gnu.org&gt;</a>.
+</p><p>Consulte o <a href="/server/standards/README.translations.html">Guia
+para as traduções</a> para mais informações sobre a coordenação e a
+contribuição com traduções das páginas deste site.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright &copy; 2014-2021 Free Software Foundation, Inc.</p>
+
+<p>Esta página está licenciada sob uma licença <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/deed.pt_BR";>Creative
+Commons Atribuição 4.0 Internacional</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.pt-br.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+A tradução das páginas na seção Proprietary teve a contribuição de:
+Cassiano Reinert Novais dos Santos <a
+href="mailto:caco@posteo.net";>&lt;caco@posteo.net&gt;</a> e
+Rafael Fontenelle <a
+href="mailto:rafaelff@gnome.org";>&lt;rafaelff@gnome.org&gt;</a>.</div>
+
+<p class="unprintable"><!-- timestamp start -->
+Última atualização:
+
+$Date: 2021/06/26 14:00:00 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: proprietary-coverups.pt-br.html
===================================================================
RCS file: proprietary-coverups.pt-br.html
diff -N proprietary-coverups.pt-br.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ proprietary-coverups.pt-br.html     26 Jun 2021 14:00:00 -0000      1.1
@@ -0,0 +1,171 @@
+<!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary-coverups.en.html" 
-->
+
+<!--#include virtual="/server/header.pt-br.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">
+!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>Encobrimentos privativos - Projeto GNU - Free Software 
Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+
+<!--#include virtual="/proprietary/po/proprietary-coverups.translist" -->
+<!--#include virtual="/server/banner.pt-br.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Índice da Seção"
+      alt="&nbsp;[Índice da Seção]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="Página inicial do GNU" title="Página inicial do GNU" /></a>&nbsp;/ 
<a href="/proprietary/proprietary.html"><em>Malware</em>
+privativo</a>&nbsp;/ Por tipo&nbsp;/
+</p>
+</div>
+
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.pt-br.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Encobrimentos privativos</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>O software não livre (privativo) é muitas vezes um <em>malware</em>
+(projetado para maltratar o usuário). O software não livre é controlado por
+seus desenvolvedores, o que os coloca em uma posição de poder sobre os
+usuários; <a href="/philosophy/free-software-even-more-important.html">isso
+é a injustiça básica</a>. Os desenvolvedores e fabricantes muitas vezes
+exercem esse poder em detrimento dos usuários aos quais eles deveriam
+servir.</p>
+
+<p>Isso geralmente assume a forma de funcionalidades maliciosas.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>Esta página lista situações em que o software privativo tinha um bug e os
+desenvolvedores o converteram em uma funcionalidade maliciosa ao tentar
+encobrir a existência do bug.</p>
+
+<div class="important">
+<p>Se você conhece um exemplo que deveria estar nesta página, mas não está
+aqui, por favor, escreva para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a> para nos
+informar. Por favor, inclua a URL de uma ou duas referências confiáveis para
+servir como comprovação específica.</p>
+</div>
+
+<div class="column-limit" id="proprietary-coverups"></div>
+
+<ul class="blurbs">
+  <li id="M201612120">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Price Waterhouse Coopers tentou suprimir o conhecimento de uma falha de
+segurança <a
+href="http://www.zdnet.com/article/pwc-sends-security-researchers-cease-and-desist-letter-instead-of-fixing-security-flaw/";>
+fazendo ameaças legais contra a empresa de segurança que a encontrou</a>.</p>
+  </li>
+</ul>
+</div>
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!--#include virtual="/proprietary/proprietary-menu.pt-br.html" -->
+<!--#include virtual="/server/footer.pt-br.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Envie perguntas em geral sobre a FSF e o GNU para <a
+href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>. Também existem <a
+href="/contact/">outros meios de contatar</a> a FSF. Links quebrados e
+outras correções ou sugestões podem ser enviadas para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+A equipe de traduções para o português brasileiro se esforça para oferecer
+traduções precisas e de boa qualidade, mas não estamos isentos de erros. Por
+favor, envie seus comentários e sugestões em geral sobre as traduções para
+<a
+href="mailto:web-translators@gnu.org";>&lt;web-translators@gnu.org&gt;</a>.
+</p><p>Consulte o <a href="/server/standards/README.translations.html">Guia
+para as traduções</a> para mais informações sobre a coordenação e a
+contribuição com traduções das páginas deste site.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright &copy; 2017-2021 Free Software Foundation, Inc.</p>
+
+<p>Esta página está licenciada sob uma licença <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/deed.pt_BR";>Creative
+Commons Atribuição 4.0 Internacional</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.pt-br.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+A tradução das páginas na seção Proprietary teve a contribuição de:
+Cassiano Reinert Novais dos Santos <a
+href="mailto:caco@posteo.net";>&lt;caco@posteo.net&gt;</a> e
+Rafael Fontenelle <a
+href="mailto:rafaelff@gnome.org";>&lt;rafaelff@gnome.org&gt;</a>.</div>
+
+<p class="unprintable"><!-- timestamp start -->
+Última atualização:
+
+$Date: 2021/06/26 14:00:00 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: proprietary-deception.pt-br.html
===================================================================
RCS file: proprietary-deception.pt-br.html
diff -N proprietary-deception.pt-br.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ proprietary-deception.pt-br.html    26 Jun 2021 14:00:00 -0000      1.1
@@ -0,0 +1,297 @@
+<!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary-deception.en.html" 
-->
+
+<!--#include virtual="/server/header.pt-br.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">
+!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>Engano privativo - Projeto GNU - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+
+<!--#include virtual="/proprietary/po/proprietary-deception.translist" -->
+<!--#include virtual="/server/banner.pt-br.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Índice da Seção"
+      alt="&nbsp;[Índice da Seção]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="Página inicial do GNU" title="Página inicial do GNU" /></a>&nbsp;/ 
<a href="/proprietary/proprietary.html"><em>Malware</em>
+privativo</a>&nbsp;/ Por tipo&nbsp;/
+</p>
+</div>
+
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.pt-br.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Engano privativo</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>O software não livre (privativo) é muitas vezes um <em>malware</em>
+(projetado para maltratar o usuário). O software não livre é controlado por
+seus desenvolvedores, o que os coloca em uma posição de poder sobre os
+usuários; <a href="/philosophy/free-software-even-more-important.html">isso
+é a injustiça básica</a>. Os desenvolvedores e fabricantes muitas vezes
+exercem esse poder em detrimento dos usuários aos quais eles deveriam
+servir.</p>
+
+<p>Isso geralmente assume a forma de funcionalidades maliciosas.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>Engano é uma funcionalidade maliciosa que torna o programa desonesto ou
+oculta truques. Aqui estão alguns exemplos de tais funcionalidades
+maliciosas. Os casos de engano que envolvem tirar o dinheiro das pessoas
+estão listados em <a
+href="/proprietary/proprietary-fraud.html#main-heading"> Fraude
+privativa</a>.</p>
+
+<div class="important">
+<p>Se você conhece um exemplo que deveria estar nesta página, mas não está
+aqui, por favor, escreva para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a> para nos
+informar. Por favor, inclua a URL de uma ou duas referências confiáveis para
+servir como comprovação específica.</p>
+</div>
+
+<div class="column-limit" id="proprietary-deception"></div>
+
+<ul class="blurbs">
+  <li id="M202011050">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A HP enganou os usuários para que instalassem uma atualização maliciosa 
em
+suas impressoras que <a
+href="https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-soul-digital-freedom-taking-place-inside-your-printer";>fez
+com que os dispositivos rejeitassem todos os cartuchos de tinta de
+terceiros</a>.</p>
+  </li>
+
+  <li id="M202002020">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Muitos aplicativos Android enganam seus usuários pedindo que eles decidam
+quais permissões dar ao programa e, em seguida, <a
+href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/";>
+ignorando essas permissões</a>.</p>
+
+    <p>O sistema Android deve impedir o vazamento de dados executando 
aplicativos
+em caixas de proteção isoladas, mas os desenvolvedores encontraram maneiras
+de acessar os dados por outros meios, e não há nada que o usuário possa
+fazer para impedi-lo, pois o sistema e o os aplicativos são não livres.</p>
+  </li>
+
+  <li id="M201904150">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p id="M201509210">A Volkswagen programou seus computadores com motor de carro 
para <a
+href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions";>
+detectar os testes de emissões da Agência de Proteção Ambiental</a>, e
+funcionar incorretamente o resto do tempo. Na condução real, os carros
+superaram os padrões de emissão em um fator de até 35.</p>
+
+    <p>Usar o software livre não teria impedido a Volkswagen de programá-lo 
dessa
+maneira, mas teria dificultado a ocultação e dado aos usuários a
+possibilidade de corrigir o engano.</p>
+
+    <p>Ex-executivos da Volkswagen estão sendo <a
+href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison";>
+processados por esta fraude</a>.</p>
+  </li>
+
+  <li id="M201903281">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>OfficeMax enganou os clientes <a
+href="https://arstechnica.com/tech-policy/2019/03/office-depot-tricked-people-into-buying-pc-support-with-fake-virus-scans/";>
+usando software privativo de “Verificação de Saúde do PC”</a> preparado 
para
+dar resultados falsos, enganando o cliente a pensar que o computador estava
+infectado e comprar serviços de suporte desnecessários da empresa.</p>
+  </li>
+
+  <li id="M201902041.2">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Vinte e nove aplicativos de “câmera de beleza” que costumavam estar no
+Google Play tinham uma ou mais funcionalidades maliciosas, como <a
+href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/";>
+roubar fotos dos usuários em vez de “embelezá-las”</a>, empurrando 
anúncios
+indesejados e muitas vezes maliciosos para os usuários, e redirecionando-os
+para sites de <i lang="en">phishing</i> que roubaram suas credenciais. Além
+disso, a interface do usuário da maioria deles foi projetada para dificultar
+a desinstalação.</p>
+
+    <p>Os usuários devem, é claro, desinstalar esses aplicativos perigosos 
se ainda
+não o fizeram, mas eles também devem ficar longe de aplicativos não livres
+em geral. <em>Todos</em> os aplicativos não livres apresentam um risco
+potencial, porque não há uma maneira fácil de saber o que eles realmente
+fazem.</p>
+  </li>
+
+  <li id="M201611060">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969";>
+O software privativo da Audi usava um método simples para trapacear nos
+testes de emissões</a>: ativar um modo especial de troca de marcha de baixa
+emissão até a primeira vez que o carro fizesse uma curva.</p>
+  </li>
+
+  <li id="M201609010">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Muitos programas privativos secretamente <a
+href="https://www.theregister.co.uk/2016/08/05/payperinstall_study/";>
+instalam outros programas privativos que os usuários não querem</a>.</p>
+  </li>
+
+  <li id="M201607140">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O dono do jogo Pokémon Go <a
+href="https://www.theguardian.com/technology/2016/jul/14/pokemon-go-sponsored-locations-restaurants-business";>
+convida restaurantes e outras empresas a pagar para que o jogo atraia as
+pessoas até lá</a>.</p>
+  </li>
+
+  <li id="M201511110">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um cliente privativo popular do Instagram prometendo dizer aos usuários 
quem
+estava assistindo suas fotos estava, na realidade, <a
+href="http://www.theguardian.com/technology/2015/nov/11/top-ranking-free-app-stole-instagram-passwords";>roubando
+suas credenciais</a>, anunciando a si mesmo em seu feed e publicando imagens
+sem seu consentimento.</p>
+  </li>
+</ul>
+</div>
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!--#include virtual="/proprietary/proprietary-menu.pt-br.html" -->
+<!--#include virtual="/server/footer.pt-br.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Envie perguntas em geral sobre a FSF e o GNU para <a
+href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>. Também existem <a
+href="/contact/">outros meios de contatar</a> a FSF. Links quebrados e
+outras correções ou sugestões podem ser enviadas para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+A equipe de traduções para o português brasileiro se esforça para oferecer
+traduções precisas e de boa qualidade, mas não estamos isentos de erros. Por
+favor, envie seus comentários e sugestões em geral sobre as traduções para
+<a
+href="mailto:web-translators@gnu.org";>&lt;web-translators@gnu.org&gt;</a>.
+</p><p>Consulte o <a href="/server/standards/README.translations.html">Guia
+para as traduções</a> para mais informações sobre a coordenação e a
+contribuição com traduções das páginas deste site.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright &copy; 2015-2021 Free Software Foundation, Inc.</p>
+
+<p>Esta página está licenciada sob uma licença <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/deed.pt_BR";>Creative
+Commons Atribuição 4.0 Internacional</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.pt-br.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+A tradução das páginas na seção Proprietary teve a contribuição de:
+Cassiano Reinert Novais dos Santos <a
+href="mailto:caco@posteo.net";>&lt;caco@posteo.net&gt;</a> e
+Rafael Fontenelle <a
+href="mailto:rafaelff@gnome.org";>&lt;rafaelff@gnome.org&gt;</a>.</div>
+
+<p class="unprintable"><!-- timestamp start -->
+Última atualização:
+
+$Date: 2021/06/26 14:00:00 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: proprietary-drm.pt-br.html
===================================================================
RCS file: proprietary-drm.pt-br.html
diff -N proprietary-drm.pt-br.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ proprietary-drm.pt-br.html  26 Jun 2021 14:00:00 -0000      1.1
@@ -0,0 +1,620 @@
+<!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary-drm.en.html" -->
+
+<!--#include virtual="/server/header.pt-br.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">
+!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>DRM privativo - Projeto GNU - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+
+<!--#include virtual="/proprietary/po/proprietary-drm.translist" -->
+<!--#include virtual="/server/banner.pt-br.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Índice da Seção"
+      alt="&nbsp;[Índice da Seção]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="Página inicial do GNU" title="Página inicial do GNU" /></a>&nbsp;/ 
<a href="/proprietary/proprietary.html"><em>Malware</em>
+privativo</a>&nbsp;/ Por tipo&nbsp;/
+</p>
+</div>
+
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.pt-br.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>DRM privativo</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>O software não livre (privativo) é muitas vezes um <em>malware</em>
+(projetado para maltratar o usuário). O software não livre é controlado por
+seus desenvolvedores, o que os coloca em uma posição de poder sobre os
+usuários; <a href="/philosophy/free-software-even-more-important.html">isso
+é a injustiça básica</a>. Os desenvolvedores e fabricantes muitas vezes
+exercem esse poder em detrimento dos usuários aos quais eles deveriam
+servir.</p>
+
+<p>Isso geralmente assume a forma de funcionalidades maliciosas.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>Aqui estão alguns exemplos de programas e sistemas privativos que
+implementam <em>gestão digital de restrições</em> (DRM): funcionalidades
+projetadas intencionalmente para restringir o que os usuários podem
+fazer. Essas funcionalidades também são chamadas de <em>algemas
+digitais</em>.
+</p>
+
+<p>O DRM é reforçado pelas <a
+href="http://www.theguardian.com/technology/blog/2014/feb/05/digital-rights-management";>
+leis de censura</a> que proíbem software (e hardware) que pode quebrar as
+algemas. Em vez dessas leis, o DRM em si deveria ser ilegal. Apoie nossa
+campanha para <a href="http://DefectiveByDesign.org/";>abolir o DRM</a>.
+</p>
+
+<div class="important">
+<p>Se você conhece um exemplo que deveria estar nesta página, mas não está
+aqui, por favor, escreva para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a> para nos
+informar. Por favor, inclua a URL de uma ou duas referências confiáveis para
+servir como comprovação específica.</p>
+</div>
+
+<div class="column-limit" id="proprietary-drm"></div>
+
+<ul class="blurbs">
+  <li id="M202105300">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.theguardian.com/technology/2021/may/30/gadgets-have-stopped-working-together-interoperability-apple";>A
+Apple está minando sistematicamente a interoperabilidade</a>. No nível do
+hardware, ele faz isso por meio de plugues, barramentos e redes não
+padrão. No nível do software, ele não permite que o usuário tenha nenhum
+dado, exceto dentro de um aplicativo.</p>
+  </li>
+
+  <li id="M202103100">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O monopólio da Amazon e DRM está <a
+href="https://www.washingtonpost.com/technology/2021/03/10/amazon-library-ebook-monopoly/";>impedindo
+as bibliotecas públicas de emprestar e-books e audiolivros</a>. A Amazon se
+tornou poderosa no mundo dos e-books com o <a
+href="/philosophy/why-call-it-the-swindle.html">Swindle</a> e agora está
+fazendo mau uso de seu poder e viola os direitos das pessoas usando <a
+href="https://www.defectivebydesign.org";>Gestão Digital de 
Restrições</a>.</p>
+
+    <p>O artigo foi escrito de uma forma que endossa o DRM em geral, o que é
+inaceitável. <a href="/proprietary/proprietary-drm.html">DRM é uma injustiça
+para as pessoas</a>.</p>
+  </li>
+
+  <li id="M202010180">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Microsoft está <a
+href="https://www.slashgear.com/windows-10-users-are-grumpy-over-forced-updates-and-unwanted-apps-18643135/";>forçando
+usuários do Windows</a> a <a
+href="https://support.microsoft.com/en-us/windows/manage-updates-in-windows-10-643e9ea7-3cf6-7da6-a25c-95d4f7f099fe";>instalar
+atualizações que são empurradas</a> usando <a
+href="/proprietary/proprietary-back-doors.html#windows-update">seus
+<em>backdoors</em> universais</a>. Essas atualizações podem causar vários
+danos aos usuários, como restringir algumas funções dos computadores e/ou
+forçar os usuários a fazerem, sem qualquer defesa, tudo o que a Microsoft
+lhes diz para fazer.</p>
+  </li>
+
+  <li id="M201908150">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple está inserindo DRM em baterias do iPhone e o software de sistema
+privativo <a
+href="https://www.vice.com/en_us/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair";>desliga
+certos recursos quando as baterias são substituídas por outra além da
+Apple.</a></p>
+  </li>
+
+  <li id="M201904040">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>E-books “comprados” da loja da Microsoft verificam se seu DRM é válido
+conectando-se à loja toda vez que o “dono” quer lê-los. A Microsoft 
fechará
+esta loja, <a href="https://www.bbc.com/news/technology-47810367";>
+inutilizando todos os e-books sob DRM que já “vendeu”</a>. (O artigo 
também
+destaca as armadilhas do DRM.)</p>
+
+    <p>Esta é outra prova de que um produto com DRM não pertence à pessoa 
que o
+comprou. A Microsoft disse que reembolsará os clientes, mas isso não é
+desculpa para vendê-los livros restritos.</p>
+  </li>
+
+  <li id="M201902080">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os <a href="https://boingboing.net/2019/02/08/inkjet-dystopias.html";>
+cartuchos de “assinatura de tinta” têm DRM que se comunica constantemente
+com os servidores HP</a> para garantir que o usuário ainda esteja pagando
+pela assinatura e não imprima mais páginas do que o pago.</p>
+
+    <p>Mesmo que o programa de assinatura de tinta possa ser mais barato em 
alguns
+casos específicos, ela espiona os usuários e envolve restrições totalmente
+inaceitáveis no uso de cartuchos de tinta que, de outra forma, estariam
+funcionando.</p>
+  </li>
+
+  <li id="M201810150">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os fabricantes de impressoras são muito inovadores – ao bloquear o uso de
+cartuchos de tinta substitutos independentes. Suas “atualizações de
+segurança” ocasionalmente impõem novas formas de DRM de cartucho. <a
+href="https://www.vice.com/en/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates";>
+A HP e a Epson fizeram isso</a>.</p>
+  </li>
+
+  <li id="M201806250">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O jogo Metal Gear Rising para MacOS foi amarrado a um servidor. A empresa <a
+href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm";>
+desligou o servidor e todas as cópias pararam de funcionar</a>.</p>
+  </li>
+
+  <li id="M201711250">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A DMCA e a Diretiva de Direitos Autorais da UE tornam <a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html";> ilegal
+estudar como aplicativos do iOS espionam os usuários</a>, pois isso exigiria
+contornar o DRM do iOS.</p>
+  </li>
+
+  <li id="M201705150">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Google agora permite que aplicativos Android detectem se foi feito root em
+um dispositivo, <a
+href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/";>e
+se recusa a instalar se for o caso</a>. O aplicativo Netflix usa essa
+capacidade para aplicar DRM, recusando-se a instalar em dispositivos Android
+com root.</p>
+
+    <p>Atualização: o Google mudou <i>intencionalmente</i> o Android para 
que os
+aplicativos <a
+href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/";>possam
+detectar dispositivos com acesso root e se recusar a executá-los</a>. O
+aplicativo Netflix é um <em>malware</em> privativo e não deve ser usado. No
+entanto, isso não torna o que o Google fez menos errado.</p>
+  </li>
+
+  <li id="M201704130">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a href="https://itstillworks.com/kindle-drm-17841.html";> O Amazon Kindle
+tem DRM</a>. Esse artigo tem falhas por não tratar o DRM como uma questão
+ética; pressupõe que tudo o que a Amazon possa fazer aos seus usuários é
+legítimo. Refere-se ao DRM como gestão digital de “direitos”, que é o 
termo
+usado para promover o DRM. Mesmo assim, serve de referência para os fatos.</p>
+
+    <p>Nós nos referimos a esse produto como <a
+href="/philosophy/why-call-it-the-swindle.html"> Amazon Swindle</a> por
+causa disso e <a href="/philosophy/ebooks.html"> outras funcionalidades
+maliciosas</a>.</p>
+  </li>
+
+  <li id="M201704070">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p id="iphone7-sabotage">O iPhone 7 contém DRM especificamente projetado para 
<a
+href="https://www.vice.com/en/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock";>
+transformá-lo em um tijolo se uma loja de reparos “não autorizada”
+consertá-lo</a>. “Não autorizada” essencialmente significa qualquer 
pessoa
+além da Apple.</p>
+
+    <p><small>(O artigo usa o termo <i lang="en">“lock”</i> (cadeado) para
+descrever o DRM, mas preferimos usar o termo <a
+href="/philosophy/words-to-avoid.html#DigitalLocks"> algemas
+digitais</a>.)</small></p>
+  </li>
+
+  <li id="M201702020">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Arquivos com restrição de DRM podem ser usados para <a
+href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users";>
+identificar as pessoas que navegam com Tor</a>. A vulnerabilidade existe
+apenas se você usar o Windows.</p>
+  </li>
+
+  <li id="M201701300">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Chrome <a
+href="http://boingboing.net/2017/01/30/google-quietly-makes-optiona.html";>
+implementa DRM</a>. O mesmo ocorre com o Chromium, por meio de software não
+livre que efetivamente faz parte dele.</p>
+
+    <p><a
+href="https://bugs.chromium.org/p/chromium/issues/detail_ezt?id=686430";>Mais
+informações</a>.</p>
+  </li>
+
+  <li id="M201609200">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um <i lang="en">downgrade</i> de firmware da HP <a
+href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update";>impôs
+DRM a algumas impressoras, que agora recusam para funcionar com cartuchos de
+tinta de terceiros</a>.</p>
+  </li>
+
+  <li id="M201605200">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os jogos Oculus Rift agora têm <a
+href="https://www.vice.com/en/article/vv77ea/new-oculus-drm-cross-platform";>
+DRM destinado a impedir sua execução em outros sistemas</a>.</p>
+  </li>
+
+  <li id="M201601100">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a href="http://michaelweinberg.org/post/137045828005/free-the-cube";> A
+impressora 3D “Cube” foi projetada com DRM</a>: ela não aceita materiais 
de
+impressão de terceiros. É o Keurig das impressoras. Agora ela está sendo
+descontinuada, o que significa que eventualmente materiais autorizados não
+estarão disponíveis e as impressoras podem ficar inutilizáveis.</p>
+
+    <p>Com uma <a 
href="http://www.fsf.org/resources/hw/endorsement/aleph-objects";>
+impressora que obtém a certificação Respects Your Freedom</a>, esse problema
+não seria nem mesmo uma possibilidade remota.</p>
+
+    <p>É lamentável que o autor daquele artigo diga que não havia “nada 
de errado”
+com o design do dispositivo em restringir os usuários em primeiro
+lugar. Isso é como colocar um aviso “me engane e me maltrate” no seu
+peito. Devemos saber melhor: devemos condenar todas as empresas que se
+aproveitam de pessoas como ele. Na verdade, é a aceitação de sua prática
+injusta que ensina as pessoas a serem capachos.</p>
+  </li>
+
+  <li id="M201512260">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.vice.com/en/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017";>
+A Apple usa software com DRM para evitar que as pessoas carreguem uma iCoisa
+com um cabo USB genérico</a>.</p>
+  </li>
+
+  <li id="M201512140">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Lâmpadas “inteligentes” da Philips foram inicialmente projetadas para
+interagir com lâmpadas inteligentes de outras empresas, mas <a
+href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml";>
+posteriormente, a empresa atualizou o firmware para impedir a
+interoperabilidade</a>.</p>
+
+    <p>Se um produto for “inteligente” e você não o construiu, ele está 
servindo de
+maneira inteligente ao fabricante <em>contra você</em>.</p>
+  </li>
+
+  <li id="M201501030">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p id="netflix-app-geolocation-drm">O aplicativo Netflix para Android <a
+href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/";>
+força o uso do DNS do Google</a>. Este é um dos métodos que a Netflix usa
+para fazer cumprir as restrições de geolocalização ditadas pelos estúdios 
de
+cinema.</p>
+  </li>
+
+  <li id="M201410080.1">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Adobe faz o “DigitalEditions”, o e-reader usado pela maioria das 
bibliotecas
+dos EUA, espionar o usuário <a
+href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/";>
+por causa do DRM.</a></p>
+  </li>
+
+  <li id="M201311130">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-consumers-crazy";>
+DRM em carros deixará os consumidores loucos</a>.</p>
+  </li>
+
+  <li id="M201310070">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p id="bluray"><a
+href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up";>
+DVDs e discos Bluray têm DRM</a>.</p>
+
+    <p>Essa página usa termos invertidos que favorecem o DRM, incluindo <a
+href="/philosophy/words-to-avoid.html#DigitalRightsManagement"> gestão de
+direitos “digitais”</a> e <a
+href="/philosophy/words-to-avoid.html#Protection"> “proteger”</a>, e afirma
+que “artistas” (e não as empresas) são os principais responsáveis por
+colocar a gestão digital de restrições nesses discos. No entanto, é uma
+referência para os fatos.</p>
+
+    <p>Todo disco Bluray (com poucas e raras exceções) tem DRM – portanto, 
não use
+discos Bluray!</p>
+  </li>
+
+  <li id="M201102250">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2011-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Android <a
+href="https://developer.android.com/reference/android/drm/package-summary.html";>
+contém recursos especificamente para oferecer suporte a DRM</a>.</p>
+  </li>
+
+  <li id="M201002180">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2010-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O DRM é mais desagradável às obras publicadas do que simplesmente 
impedir as
+pessoas de olhá-las e/ou copiá-las. Mesmo quando permite que você olhe, ele
+o perturba de várias maneiras. O artigo de Cory Doctorow apresenta <a
+href="https://boingboing.net/2010/02/18/infographic-buying-d.html";> DVDs
+como um exemplo</a>.</p>
+
+    <p>Condenamos o termo propaganda “pirata” quando é aplicado a pessoas 
que
+compartilham cópias. Muitos desses DVDs são feitos e distribuídos
+comercialmente; em referência a essa prática, “pirata” pode ser 
parcialmente
+justificado. Mas não quando eles protegem os usuários de assédio.</p>
+
+    <p>A causa fundamental desse assédio, e o erro fundamental do DRM em 
DVDs, é o
+requisito de usar um software não livre para reproduzir o DVD. Felizmente,
+temos um software livre substituto.</p>
+  </li>
+
+  <li id="M200811210">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2008-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm";>
+DRM (mecanismos digitais de restrições) no MacOS</a>. Este artigo se
+concentra no fato de que um novo modelo de Macbook introduziu um requisito
+para monitores de hardware malicioso, mas o software com DRM no MacOS está
+envolvido na ativação do hardware. O software de acesso ao iTunes também é
+responsável.</p>
+  </li>
+
+  <li id="M200803040">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2008-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://en.wikipedia.org/wiki/High-bandwidth_Digital_Content_Protection";>
+HDCP</a> é um sistema DRM que criptografa dados de vídeo e áudio do
+processador para o monitor. É implementado principalmente em hardware, mas o
+software do sistema também participa, o que o torna qualificado como
+<em>malware</em>.</p>
+
+    <p>Além de controlar os usuários, a HDCP nega seus direitos de uso justo 
e
+causa vários problemas práticos.</p>
+  </li>
+
+  <li id="M200802190">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2008-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a href="https://www.eff.org/deeplinks/2008/02/adobe-pushes-drm-flash";> DRM
+no Flash Player</a>.</p>
+  </li>
+
+  <li id="M200708130.1">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2007-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";> DRM no
+Windows</a>, introduzido para atender a discos de <a
+href="/proprietary/proprietary-drm.html#bluray">Bluray</a>. (O artigo fala
+sobre como o mesmo <em>malware</em> seria posteriormente introduzido no
+MacOS. Isso não tinha sido feito na época, mas foi feito posteriormente.)</p>
+  </li>
+
+  <li id="M200703310">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2007-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os vídeos do iTunes têm DRM, o que permite à Apple <a
+href="https://en.wikipedia.org/wiki/FairPlay";>ditar onde seus clientes podem
+assistir aos vídeos que compraram</a>.</p>
+  </li>
+</ul>
+</div>
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!--#include virtual="/proprietary/proprietary-menu.pt-br.html" -->
+<!--#include virtual="/server/footer.pt-br.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Envie perguntas em geral sobre a FSF e o GNU para <a
+href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>. Também existem <a
+href="/contact/">outros meios de contatar</a> a FSF. Links quebrados e
+outras correções ou sugestões podem ser enviadas para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+A equipe de traduções para o português brasileiro se esforça para oferecer
+traduções precisas e de boa qualidade, mas não estamos isentos de erros. Por
+favor, envie seus comentários e sugestões em geral sobre as traduções para
+<a
+href="mailto:web-translators@gnu.org";>&lt;web-translators@gnu.org&gt;</a>.
+</p><p>Consulte o <a href="/server/standards/README.translations.html">Guia
+para as traduções</a> para mais informações sobre a coordenação e a
+contribuição com traduções das páginas deste site.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright &copy; 2014-2021 Free Software Foundation, Inc.</p>
+
+<p>Esta página está licenciada sob uma licença <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/deed.pt_BR";>Creative
+Commons Atribuição 4.0 Internacional</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.pt-br.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+A tradução das páginas na seção Proprietary teve a contribuição de:
+Cassiano Reinert Novais dos Santos <a
+href="mailto:caco@posteo.net";>&lt;caco@posteo.net&gt;</a> e
+Rafael Fontenelle <a
+href="mailto:rafaelff@gnome.org";>&lt;rafaelff@gnome.org&gt;</a>.</div>
+
+<p class="unprintable"><!-- timestamp start -->
+Última atualização:
+
+$Date: 2021/06/26 14:00:00 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: proprietary-fraud.pt-br.html
===================================================================
RCS file: proprietary-fraud.pt-br.html
diff -N proprietary-fraud.pt-br.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ proprietary-fraud.pt-br.html        26 Jun 2021 14:00:00 -0000      1.1
@@ -0,0 +1,181 @@
+<!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary-fraud.en.html" -->
+
+<!--#include virtual="/server/header.pt-br.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">
+!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>Fraude privativa - Projeto GNU - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+
+<!--#include virtual="/proprietary/po/proprietary-fraud.translist" -->
+<!--#include virtual="/server/banner.pt-br.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Índice da Seção"
+      alt="&nbsp;[Índice da Seção]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="Página inicial do GNU" title="Página inicial do GNU" /></a>&nbsp;/ 
<a href="/proprietary/proprietary.html"><em>Malware</em>
+privativo</a>&nbsp;/ Por tipo&nbsp;/
+</p>
+</div>
+
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.pt-br.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Fraude privativa</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>O software não livre (privativo) é muitas vezes um <em>malware</em>
+(projetado para maltratar o usuário). O software não livre é controlado por
+seus desenvolvedores, o que os coloca em uma posição de poder sobre os
+usuários; <a href="/philosophy/free-software-even-more-important.html">isso
+é a injustiça básica</a>. Os desenvolvedores e fabricantes muitas vezes
+exercem esse poder em detrimento dos usuários aos quais eles deveriam
+servir.</p>
+
+<p>Isso geralmente assume a forma de funcionalidades maliciosas.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+  <p>Aqui estão alguns exemplos de software privativo que defrauda os 
usuários –
+tirando seu dinheiro por meio de truques.</p>
+
+<div class="important">
+<p>Se você conhece um exemplo que deveria estar nesta página, mas não está
+aqui, por favor, escreva para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a> para nos
+informar. Por favor, inclua a URL de uma ou duas referências confiáveis para
+servir como comprovação específica.</p>
+</div>
+
+<div class="column-limit" id="proprietary-fraud"></div>
+
+<ul class="blurbs">
+  <li id="M201908160">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um jogo publicado no Facebook <a
+href="https://www.revealnews.org/article/so-your-child-racked-up-unwanted-credit-card-charges-playing-video-games-now-what/";>visava
+levar as crianças a gastar</a> grandes quantias do dinheiro de seus pais sem
+explicá-lo para elas.</p>
+  </li>
+
+  <li id="M201401190">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Alguns <a
+href="http://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases";>
+jogos privativos atraem as crianças para gastar o dinheiro dos pais</a>.</p>
+  </li>
+</ul>
+</div>
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!--#include virtual="/proprietary/proprietary-menu.pt-br.html" -->
+<!--#include virtual="/server/footer.pt-br.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Envie perguntas em geral sobre a FSF e o GNU para <a
+href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>. Também existem <a
+href="/contact/">outros meios de contatar</a> a FSF. Links quebrados e
+outras correções ou sugestões podem ser enviadas para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+A equipe de traduções para o português brasileiro se esforça para oferecer
+traduções precisas e de boa qualidade, mas não estamos isentos de erros. Por
+favor, envie seus comentários e sugestões em geral sobre as traduções para
+<a
+href="mailto:web-translators@gnu.org";>&lt;web-translators@gnu.org&gt;</a>.
+</p><p>Consulte o <a href="/server/standards/README.translations.html">Guia
+para as traduções</a> para mais informações sobre a coordenação e a
+contribuição com traduções das páginas deste site.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc.</p>
+
+<p>Esta página está licenciada sob uma licença <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/deed.pt_BR";>Creative
+Commons Atribuição 4.0 Internacional</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.pt-br.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+A tradução das páginas na seção Proprietary teve a contribuição de:
+Cassiano Reinert Novais dos Santos <a
+href="mailto:caco@posteo.net";>&lt;caco@posteo.net&gt;</a> e
+Rafael Fontenelle <a
+href="mailto:rafaelff@gnome.org";>&lt;rafaelff@gnome.org&gt;</a>.</div>
+
+<p class="unprintable"><!-- timestamp start -->
+Última atualização:
+
+$Date: 2021/06/26 14:00:00 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: proprietary-incompatibility.pt-br.html
===================================================================
RCS file: proprietary-incompatibility.pt-br.html
diff -N proprietary-incompatibility.pt-br.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ proprietary-incompatibility.pt-br.html      26 Jun 2021 14:00:00 -0000      
1.1
@@ -0,0 +1,223 @@
+<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-incompatibility.en.html" -->
+
+<!--#include virtual="/server/header.pt-br.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">
+!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>Incompatibilidade privativa - Projeto GNU - Free Software 
Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+
+<!--#include virtual="/proprietary/po/proprietary-incompatibility.translist" 
-->
+<!--#include virtual="/server/banner.pt-br.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Índice da Seção"
+      alt="&nbsp;[Índice da Seção]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="Página inicial do GNU" title="Página inicial do GNU" /></a>&nbsp;/ 
<a href="/proprietary/proprietary.html"><em>Malware</em>
+privativo</a>&nbsp;/ Por tipo&nbsp;/
+</p>
+</div>
+
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.pt-br.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Incompatibilidade privativa</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>O software não livre (privativo) é muitas vezes um <em>malware</em>
+(projetado para maltratar o usuário). O software não livre é controlado por
+seus desenvolvedores, o que os coloca em uma posição de poder sobre os
+usuários; <a href="/philosophy/free-software-even-more-important.html">isso
+é a injustiça básica</a>. Os desenvolvedores e fabricantes muitas vezes
+exercem esse poder em detrimento dos usuários aos quais eles deveriam
+servir.</p>
+
+<p>Isso geralmente assume a forma de funcionalidades maliciosas.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>Uma dessas funcionalidades maliciosas é a incompatibilidade deliberada de 
um
+programa com software de terceiros que opera nos mesmos tipos de dados.</p>
+
+<p>Um tipo bastante comum de incompatibilidade é o uso de formatos ou
+protocolos secretos. Isso bloqueia ou impede diretamente os usuários de
+alternar para qualquer outro programa – e, em particular, de alternar para o
+software livre que pode liberar o dispositivo em que o software é 
executado.</p>
+
+<p>Além de serem deliberadamente anticompetitivos, os formatos secretos 
colocam
+os dados digitais dos usuários em risco. Por exemplo, a recuperação de dados
+antigos se tornará muito difícil se o suporte para o software privativo que
+pode lê-los for descontinuado.</p>
+
+<p>Outro tipo de incompatibilidade ocorre quando um sistema realiza alguma
+operação importante que seria necessária para a migração de dados para
+qualquer outro sistema tão pesada ou tão lenta que não é viável para mais 
do
+que uma pequena quantidade de dados.</p>
+
+<p>De forma mais geral, as principais empresas de tecnologia tendem a impor <a
+href="https://www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-companies";>
+restrições artificiais</a> sobre a interoperabilidade de seus produtos para
+monopolizar o mercado, e isso geralmente é obtido por meio de
+<em>malware</em> privativo.</p>
+
+<div class="important">
+<p>Se você conhece um exemplo que deveria estar nesta página, mas não está
+aqui, por favor, escreva para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a> para nos
+informar. Por favor, inclua a URL de uma ou duas referências confiáveis para
+servir como comprovação específica.</p>
+</div>
+
+<div class="column-limit" id="proprietary-incompatibility"></div>
+
+<ul class="blurbs">
+  <li id="M201803300">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>No MacOS e iOS, o procedimento para <a
+href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac";>
+converter imagens do formato do Photos</a> para um formato livre é tão
+entediante e demorado que os usuários simplesmente desistem se tiverem
+muitos deles.</p>
+  </li>
+
+  <li id="M201802120">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os dispositivos da Apple bloqueiam os usuários <a
+href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347";>
+exclusivamente para os serviços da Apple</a> por serem projetados para ser
+incompatível com todas as outras opções, éticas ou antiéticas.</p>
+  </li>
+
+  <li id="M201605044">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O iWork (software de escritório executado em MacOS, iOS e iCloud) usa
+formatos secretos e <a href="https://en.wikipedia.org/wiki/IWork";> não
+oferece meios de convertê-los de ou para formatos de documentos
+abertos</a>. Os formatos do iWork mudaram várias vezes desde que foram
+introduzidos pela primeira vez. Isso pode ter impedido os <a
+href="https://github.com/obriensp/iWorkFileFormat";>esforços de engenharia
+reversa</a>, evitando que o software livre tivesse suporte total a eles.</p>
+
+    <p>Formatos do iWork são considerados <a
+href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&amp;modificationDate=1459873751000&amp;api=v2";>
+inadequados para preservação de documento</a>.</p>
+  </li>
+</ul>
+</div>
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!--#include virtual="/proprietary/proprietary-menu.pt-br.html" -->
+<!--#include virtual="/server/footer.pt-br.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Envie perguntas em geral sobre a FSF e o GNU para <a
+href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>. Também existem <a
+href="/contact/">outros meios de contatar</a> a FSF. Links quebrados e
+outras correções ou sugestões podem ser enviadas para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+A equipe de traduções para o português brasileiro se esforça para oferecer
+traduções precisas e de boa qualidade, mas não estamos isentos de erros. Por
+favor, envie seus comentários e sugestões em geral sobre as traduções para
+<a
+href="mailto:web-translators@gnu.org";>&lt;web-translators@gnu.org&gt;</a>.
+</p><p>Consulte o <a href="/server/standards/README.translations.html">Guia
+para as traduções</a> para mais informações sobre a coordenação e a
+contribuição com traduções das páginas deste site.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright &copy; 2018-2021 Free Software Foundation, Inc.</p>
+
+<p>Esta página está licenciada sob uma licença <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/deed.pt_BR";>Creative
+Commons Atribuição 4.0 Internacional</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.pt-br.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+A tradução das páginas na seção Proprietary teve a contribuição de:
+Cassiano Reinert Novais dos Santos <a
+href="mailto:caco@posteo.net";>&lt;caco@posteo.net&gt;</a> e
+Rafael Fontenelle <a
+href="mailto:rafaelff@gnome.org";>&lt;rafaelff@gnome.org&gt;</a>.</div>
+
+<p class="unprintable"><!-- timestamp start -->
+Última atualização:
+
+$Date: 2021/06/26 14:00:00 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: proprietary-insecurity.pt-br.html
===================================================================
RCS file: proprietary-insecurity.pt-br.html
diff -N proprietary-insecurity.pt-br.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ proprietary-insecurity.pt-br.html   26 Jun 2021 14:00:00 -0000      1.1
@@ -0,0 +1,1433 @@
+<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-insecurity.en.html" -->
+
+<!--#include virtual="/server/header.pt-br.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">
+!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>Insegurança privativa - Projeto GNU - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+
+<!--#include virtual="/proprietary/po/proprietary-insecurity.translist" -->
+<!--#include virtual="/server/banner.pt-br.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Índice da Seção"
+      alt="&nbsp;[Índice da Seção]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="Página inicial do GNU" title="Página inicial do GNU" /></a>&nbsp;/ 
<a href="/proprietary/proprietary.html"><em>Malware</em>
+privativo</a>&nbsp;/ Por tipo&nbsp;/
+</p>
+</div>
+
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.pt-br.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Insegurança privativa</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>O software não livre (privativo) é muitas vezes um <em>malware</em>
+(projetado para maltratar o usuário). O software não livre é controlado por
+seus desenvolvedores, o que os coloca em uma posição de poder sobre os
+usuários; <a href="/philosophy/free-software-even-more-important.html">isso
+é a injustiça básica</a>. Os desenvolvedores e fabricantes muitas vezes
+exercem esse poder em detrimento dos usuários aos quais eles deveriam
+servir.</p>
+
+<p>Isso geralmente assume a forma de funcionalidades maliciosas.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>Esta página lista casos claramente estabelecidos de insegurança em 
software
+privativo que têm consequências graves ou são dignos de nota. Embora a
+maioria dessas falhas de segurança não sejam intencionais, portanto, não 
são
+funcionalidades mal-intencionadas em sentido estrito, nós as relatamos para
+mostrar que o software privativo não é imune a bugs e costuma ser bastante
+desleixado.</p>
+
+<p>Todos os programas complexos, sejam livres ou privativos, contêm bugs. O 
que
+torna os bugs mais perigosos em software privativo é que os usuários são
+<em>incapazes de corrigir quaisquer problemas de segurança que
+surjam</em>. Manter os usuários desamparados é o que é culpado no software
+privativo.</p>
+
+<div class="important">
+<p>Se você conhece um exemplo que deveria estar nesta página, mas não está
+aqui, por favor, escreva para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a> para nos
+informar. Por favor, inclua a URL de uma ou duas referências confiáveis para
+servir como comprovação específica.</p>
+</div>
+
+<div class="column-limit" id="proprietary-insecurity"></div>
+
+<ul class="blurbs">
+  <li id="M202106030">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/";>Os
+aplicativos TikTok coletam identificadores biométricos e informações
+biométricas dos smartphones dos usuários</a>. A empresa por trás disso faz o
+que quer e coleta todos os dados que pode.</p>
+  </li>
+
+  <li id="M202105240">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/";>A
+Apple está transferindo os dados iCloud de seus clientes chineses para um
+datacenter controlado pelo governo chinês</a>. A Apple já está armazenando
+as chaves de criptografia nesses servidores, obedecendo à autoridade
+chinesa, disponibilizando todos os dados do usuário chinês para o 
governo.</p>
+  </li>
+
+  <li id="M202105040">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Uma empresa de motocicletas chamada Klim está vendendo coletes de airbag 
com
+diferentes métodos de pagamento, um deles é por meio de um <a
+href="https://www.vice.com/en/article/93yyyd/this-motorcycle-airbag-vest-will-stop-working-if-you-miss-a-payment";>opção
+privativa baseada em assinatura que bloqueará o aumento do colete se os
+pagamentos não forem realizados</a>.</p>
+
+    <p>Eles dizem que há um período de carência de 30 dias se você perder 
um
+pagamento, mas o período de carência não é desculpa para a 
insegurança.</p>
+  </li>
+
+  <li id="M202105030">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O governo dos Estados Unidos está considerando <a
+href="https://www.infosecurity-magazine.com/news/private-companies-may-spy-on/";>formar
+uma parceria com empresas privadas para monitorar cidadãos americanos
+atividade online e comunicações digitais</a>.</p>
+
+    <p>O que cria a oportunidade de tentar isso é o fato de que essas 
empresas já
+estão bisbilhotando as atividades privadas dos usuários. Isso, por sua vez,
+é devido ao uso que as pessoas fazem de softwares não livres que bisbilhotam
+e de serviços on-line que bisbilhotam.</p>
+  </li>
+
+  <li id="M202104090">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Uma vulnerabilidade de dia zero no Zoom que <a
+href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/";>pode
+ser usada para lançar ataques de execução remota de código (RCE)</a> foi
+divulgada por pesquisadores. Os pesquisadores demonstraram uma cadeia de
+ataque de três bugs que causou um RCE em uma máquina-alvo, e tudo sem
+qualquer forma de interação do usuário.</p>
+  </li>
+
+  <li id="M202103090">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams";>Mais
+de 150 mil câmeras de segurança que usavam software privativo da empresa
+Verkada foram invadidas</a> por uma grande violação de segurança. Os
+crackers tiveram acesso a arquivos de segurança de várias academias,
+hospitais, prisões, escolas e delegacias que usaram as câmeras de 
Verdaka.</p>
+
+    <p><a href="/philosophy/surveillance-vs-democracy.html">É uma injustiça 
para o
+público</a> que ginásios, lojas, hospitais, prisões e escolas entreguem
+filmagens de “segurança” para uma empresa da qual o governo pode coletar a
+qualquer momento, mesmo sem avisá-los.</p>
+
+    <p><small>(Note que o artigo, de forma incorreta, refere-se a 
<em>crackers</em>
+como “<a
+href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.)</small></p>
+  </li>
+
+  <li id="M202103050">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Pelo menos 30 mil organizações nos Estados Unidos foram recentemente “<a
+href="/philosophy/words-to-avoid.html#Hacker">crackeadas</a>” via <a
+href="https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/";>buracos
+no software de e-mail privativo da Microsoft, denominado Microsoft
+365</a>. Não está claro se existem outras falhas e vulnerabilidades no
+programa ou não, mas a história e a experiência nos dizem que não seria o
+último desastre com programas privativos.</p>
+  </li>
+
+  <li id="M202102110">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Pesquisadores da empresa de segurança SentinelOne descobriram uma <a
+href="https://www.wired.com/story/windows-defender-vulnerability-twelve-years/";>falha
+de segurança no programa privativo Microsoft Windows Defender que permaneceu
+sem ser detectado por 12 anos</a>. Se o programa fosse livre (como em
+liberdade), mais pessoas teriam a chance de perceber o problema, portanto,
+poderia ter sido corrigido muito antes.</p>
+  </li>
+
+  <li id="M202101110">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um <em>cracker</em> <a
+href="https://www.vice.com/en/article/m7apnn/your-cock-is-mine-now-hacker-locks-internet-connected-chastity-cage-demands-ransom";>
+assumiu o controle de cintos de castidade das pessoas conectadas à Internet
+e exigiu resgate</a>. Os cintos de castidade estão sendo controlados por um
+aplicativo privativo (programa móvel).</p>
+
+    <p><small>(Note que o artigo, de forma incorreta, refere-se a 
<em>crackers</em>
+como <a
+href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>.)</small></p>
+  </li>
+
+  <li id="M202012200">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Crackware comercial pode <a
+href="https://www.theguardian.com/technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-researchers-say";>
+obter senhas de um iMonstros</a>, usar o microfone e a câmera, entre outras
+coisas.</p>
+  </li>
+
+  <li id="M202012190">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-china-surveillance/";>
+Um executivo do Zoom realizou bisbilhotamento e censura para a China</a>.</p>
+
+    <p>Esse abuso do poder do Zoom mostra o quão perigoso é esse poder. A 
raiz do
+problema não é a vigilância e a censura, mas sim o poder que o Zoom tem. Ele
+obtém esse poder em parte do uso de seu servidor, mas também em parte do
+programa cliente não livre.</p>
+  </li>
+
+  <li id="M202012150">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>As autoridades dos Estados Unidos estão enfrentando uma das maiores
+violações contra eles em anos, quando um <a
+href="https://www.theguardian.com/technology/2020/dec/15/orion-hack-solar-winds-explained-us-treasury-commerce-department";>código
+malicioso foi inserido sorrateiramente no software privativo da SolarWinds
+chamado Orion</a>. Os <em>crackers</em> tiveram acesso às redes quando os
+usuários baixaram uma atualização de software contaminada. Os
+<em>crackers</em> conseguiram monitorar e-mails internos em algumas das
+principais agências dos Estados Unidos.</p>
+
+    <p><small>(Note que o artigo, de forma incorreta, refere-se a 
<em>crackers</em>
+como <a
+href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>.)</small></p>
+  </li>
+
+  <li id="M202012070">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Aplicativos do Baidu foram <a
+href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/";>
+pegos coletando dados pessoais confidenciais</a> que podem ser usados para
+rastreamento vitalício de usuários e para colocá-los em perigo. Mais de 1,4
+bilhão de pessoas em todo o mundo são afetadas por esses aplicativos
+privativos e a privacidade dos usuários é ameaçada por esta ferramenta de
+vigilância. Os dados coletados pelo Baidu podem ser entregues ao governo
+chinês, possivelmente colocando o povo chinês em perigo.</p>
+  </li>
+
+  <li id="M202011120">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple <a
+href="https://sneak.berlin/20201112/your-computer-isnt-yours";>implementou um
+<em>malware</em> em seus computadores que impõe vigilância</a> aos usuários
+e relata a computação dos usuários à Apple.</p>
+
+    <p>Os relatórios não são criptografados e eles já vazaram esses dados 
por dois
+anos. Este <em>malware</em> está relatando à Apple qual usuário abre qual
+programa e a que horas. Também dá à Apple o poder de sabotar a computação
+dos usuários.</p>
+  </li>
+
+  <li id="M202010120">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Samsung está forçando que seus usuários de smartphones em Hong Kong (e
+Macau) <a
+href="https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-dns-service-upon-hong-kong-wifi-users/";>usem
+um DNS público na China Continental</a>, usando a atualização de software
+lançada em setembro de 2020, o que causa muitas preocupações e 
preocupações
+com a privacidade.</p>
+  </li>
+
+  <li id="M202008110">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>TikTok <a
+href="https://boingboing.net/2020/08/11/tiktok-exploited-android-secur.html";>
+explorou uma vulnerabilidade do Android</a> para obter endereços MAC de
+usuários.</p>
+  </li>
+
+  <li id="M202006160">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C";>
+Um erro de segurança desastroso</a> afeta milhões de produtos conectados.</p>
+
+    <p>Como resultado, qualquer um pode atacar o usuário, não apenas o 
fabricante.</p>
+  </li>
+
+  <li id="M202004270">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A insegurança do programa privativo Microsoft Teams <a
+href="https://www.forbes.com/sites/thomasbrewster/2020/04/27/your-whole-companys-microsoft-teams-data-couldve-been-stolen-with-an-evil-gif";>pode
+ter permitido que um GIF malicioso roubasse dados de usuários de contas do
+Microsoft Teams</a>, possivelmente de uma empresa inteira, e assumisse o
+controle de “toda a lista de contas do Teams de uma organização”.</p>
+  </li>
+
+  <li id="M202004150">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O novo sistema antitrapaça da Riot Games é <em>malware</em>; <a
+href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver";>ele
+é executado na inicialização do sistema no nível do kernel</a> no Windows. 
É
+um software inseguro que aumenta a superfície de ataque do sistema
+operacional.</p>
+  </li>
+
+  <li id="M201912170">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Alguns violadores de segurança (erroneamente referidos neste artigo como <a
+href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>) conseguiram
+interferir no sistema privativo do Amazon Ring e <a
+href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>acessar
+sua câmera, alto-falantes e microfones</a>.</p>
+  </li>
+
+  <li id="M201911190">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Amazon Ring amarrado à Internet tinha uma vulnerabilidade de segurança 
que
+permitia aos invasores <a
+href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password";>
+acessar a senha de WiFi do usuário</a> e bisbilhotar a casa através de
+dispositivos de vigilância conectados.</p>
+
+    <p>O conhecimento da senha do WiFi não seria suficiente para realizar uma
+vigilância significativa se os dispositivos implementassem segurança
+adequada, incluindo criptografia. Mas muitos dispositivos com software
+privativo não possuem isso. Obviamente, eles também são usados por seus
+fabricantes para bisbilhotamento.</p>
+  </li>
+
+  <li id="M201908310">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Uma série de vulnerabilidades <a
+href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/";>encontradas
+no iOS permitiu que invasores tivessem acesso a informações sensíveis,
+incluindo mensagens privadas, senhas, fotos e contatos armazenados no
+iMonstro do usuário</a>.</p>
+
+    <p>A profunda insegurança de iMonstros é ainda mais pertinente, uma vez 
que o
+software privativo da Apple torna os usuários totalmente dependentes da
+Apple para um mínimo de segurança. Isso também significa que os dispositivos
+nem tentam oferecer segurança contra a própria Apple.</p>
+  </li>
+
+  <li id="M201908020">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Dos 21 aplicativos antivírus grátis para Android que foram testados por
+pesquisadores de segurança, oito <a
+href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/";>
+falharam em detectar um vírus de teste</a>. Todos eles pediram permissões
+perigosas ou continham rastreadores de publicidade, sendo sete mais
+arriscados do que a média dos 100 aplicativos mais populares para Android.</p>
+
+    <p><small>(Note que o artigo se refere a estes aplicativos privativos como 
<i
+lang="en">“free”</i>. Deveria dizer <i 
lang="en">“gratis”</i>.)</small></p>
+  </li>
+
+  <li id="M201907080">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Muitos aplicativos do Android podem rastrear os movimentos dos usuários
+quando o usuário fala que <a
+href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location";>
+não permite-os acessar a localização</a>.</p>
+
+    <p>Isso evolve uma aparente falha não intencional no Android, explorada
+intencionalmente por aplicativos maliciosos.</p>
+  </li>
+
+  <li id="M201905150">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Usuários pegos na prisão de um iMonstros são <a
+href="https://boingboing.net/2019/05/15/brittle-security.html";>patos
+sentados para outros atacantes</a>, e a censura de aplicativos impede
+empresas de segurança de descobrir como esses ataques funcionam.</p>
+
+    <p>A censura de aplicativos pela Apple é fundamentalmente injusta e seria
+indesculpável, mesmo que não levasse também a ameaças de segurança.</p>
+  </li>
+
+  <li id="M201903210">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Protocolo de Telemetria da Medtronics Conexus tem <a
+href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/";>
+duas vulnerabilidades que afetam vários modelos de desfibriladores
+implantáveis</a> e os dispositivos aos quais eles se conectam.</p>
+
+    <p>Esse protocolo existe desde 2006, e vulnerabilidades semelhantes foram
+descobertas em um protocolo de comunicação anterior da Medtronics em
+2008. Aparentemente, nada foi feito pela empresa para corrigi-las. Isso
+significa que você não pode confiar em desenvolvedores de software privativo
+para corrigir erros em seus produtos.</p>
+  </li>
+
+  <li id="M201902270">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A câmera da campainha Ring (agora Amazon) é projetada para que o 
fabricante
+(agora Amazon) possa assistir o tempo todo. Agora, ocorre que <a
+href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>
+qualquer outra pessoa também pode assistir, e falsificar vídeos 
também</a>.</p>
+
+    <p>A vulnerabilidade de terceiros é presumivelmente não intencional e 
suponho
+que a Amazon consertará isso. Não tenho esperanças de que a Amazon mude o
+design que <a href="/proprietary/proprietary-surveillance.html#M201901100">
+permite que a Amazon assista</a>.</p>
+  </li>
+
+  <li id="M201809240">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Pesquisadores descobriram como <a
+href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co";>
+ocultar comandos de voz em outro áudio</a>, para que as pessoas não possam
+ouvi-los, mas Alexa e Siri podem.</p>
+  </li>
+
+  <li id="M201808130">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Desde o início de 2017, <a
+href="https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/";>telefones
+Android têm coletado os endereços de torres de celular próximas</a>, mesmo
+quando os serviços de localização estão desativados, e o envio desses dados
+de volta ao Google.</p>
+  </li>
+
+  <li id="M201808120">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os <em>crackers</em> encontraram uma maneira de quebrar a segurança de um
+dispositivo da Amazon e <a
+href="https://boingboing.net/2018/08/12/alexa-bob-carol.html";> transformá-lo
+em um dispositivo de escuta</a> para eles.</p>
+
+    <p>Foi muito difícil para eles fazerem isso. O trabalho seria muito mais 
fácil
+para a Amazon. E se algum governo, como a China ou os Estados Unidos,
+dissesse à Amazon para fazer isso, ou parar de vender o produto naquele
+país, você acha que a Amazon teria fibra moral para dizer não?</p>
+
+    <p><small>(Estes <em>crackers</em> são provavelmente hackers também, 
mas, por
+favor, <a href="https://stallman.org/articles/on-hacking.html";> não use
+“hacking” como sinônimo “quebra de segurança”</a>.)</small></p>
+  </li>
+
+  <li id="M201807100">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Siri, Alexa e todos os outros sistemas de controle por voz podem ser <a
+href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa";>
+sequestrados por programas que reproduzem comandos de ultrassom que os
+humanos não conseguem ouvir</a>.</p>
+  </li>
+
+  <li id="M201807020">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Alguns telefones da Samsung <a
+href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages";>enviam
+fotos aleatoriamente para pessoas na lista de contatos do dono</a>.</p>
+  </li>
+
+  <li id="M201712240">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um dos perigos da “internet das picadas” é que, se você perder seu 
serviço
+de Internet, você também <a
+href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/";>
+perderá o controle de sua casa e eletrodomésticos</a>.</p>
+
+    <p>Para sua segurança, não use nenhum aparelho com conexão à Internet 
real.</p>
+  </li>
+
+  <li id="M201711204">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O “mecanismo de gerenciamento” da Intel, um <em>backdoor</em> 
intencional,
+também tem <a
+href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/";>
+<em>backdoors</em> não intencionais</a>.</p>
+  </li>
+
+  <li id="M201711200">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Amazon recentemente convidou os consumidores a serem otários e <a
+href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo";>
+permitir que a equipe de entrega abrisse as portas da frente</a>. Você não
+sabe, mas o sistema tem uma grave falha de segurança.</p>
+  </li>
+
+  <li id="M201709290">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A segurança ruim em alguns carros torna possível <a
+href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937";> ativar
+remotamente os airbags</a>.</p>
+  </li>
+
+  <li id="M201709200">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Uma bomba intravenosa “inteligente” projetada para hospitais está 
conectada
+à internet. Naturalmente <a
+href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml";>
+sua segurança foi violada</a>.</p>
+
+    <p><small>(Note que este artigo faz mau uso do termo <a
+href="/philosophy/words-to-avoid.html#Hacker">&ldquo;hackers&rdquo;</a>,
+referindo-se a <em>crackers</em>.)</small></p>
+  </li>
+
+  <li id="M201708280">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A segurança ruim em muitos dispositivos da Internet das Picadas permite aos
+<a
+href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml";>ISPs
+bisbilhotarem as pessoas que os usam</a>.</p>
+
+    <p>Não seja um otário – rejeite todas as picadas.</p>
+
+    <p><small>(É uma pena que o artigo use o termo <a
+href="/philosophy/words-to-avoid.html#Monetize">“monetizar”</a>.)</small></p>
+  </li>
+
+  <li id="M201706200.1">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Muitos modelos de câmeras conectadas à Internet <a
+href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor"> têm
+<em>backdoors</em></a>.</p>
+
+    <p>Essa é uma funcionalidade maliciosa, mas, além disso, é uma grande
+insegurança, pois qualquer pessoa, incluindo <em>crackers</em> maliciosos,
+<a
+href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/";>podem
+encontrar essas contas e usá-las para entrar nas câmeras dos 
usuários</a>.</p>
+  </li>
+
+  <li id="M201706050">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p id="intel-me-10-year-vulnerability">Um <em>backdoor</em> da CPU da Intel 
­– o Mecanismo de Gerenciamento Intel –
+tinha uma <a
+href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/";>grande
+vulnerabilidade de segurança por 10 anos</a>.</p>
+
+    <p>A vulnerabilidade permitiu que um <em>cracker</em> acessasse a <a
+href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/";>
+interface da web da Tecnologia de Gerenciamento Ativo Intel (<abbr
+title="Intel Active Management Technology">AMT</abbr>) do computador com uma
+senha vazia e dava acesso administrativo</a> para acessar o teclado do
+computador, mouse, monitor entre outros privilégios.</p>
+
+    <p>Não ajuda nada o fato de que nos processadores Intel mais recentes é
+impossível desligar o Mecanismo de gerenciamento Intel. Assim, mesmo os
+usuários que são proativos com sua segurança não podem fazer nada para se
+proteger, a não ser usar máquinas que não vêm com o <em>backdoor</em>.</p>
+  </li>
+
+  <li id="M201705250">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O código privativo que executa marca-passos, bombas de insulina e outros
+dispositivos médicos está <a
+href="http://www.bbc.co.uk/news/technology-40042584";> cheio de falhas graves
+de segurança</a>.</p>
+  </li>
+
+  <li id="M201705160">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O pacote de driver de áudio Conexant HD (versão 1.0.0.46 e anterior)
+pré-instalado em 28 modelos de laptops HP registrou o pressionamento de
+tecla do usuário em um arquivo no sistema de arquivos. Qualquer processo com
+acesso ao sistema de arquivos ou API MapViewOfFile pode obter acesso ao
+log. Além disso, <a
+href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt";>de
+acordo com modzero</a>, o “vazamento de informações via Covert Storage
+Channel permite que autores de <em>malware</em> capturem pressionamentos de
+tecla sem correr o risco de serem classificados como tarefa maliciosa pela
+heurística de antivírus”.</p>
+  </li>
+
+  <li id="M201705120">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Explorações de bugs no Windows, que foram desenvolvidos pela NSA e depois
+vazados pelo grupo Shadowbrokers, agora estão sendo usadas para <a
+href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/";>atacar
+um grande número de computadores Windows com <em>ransomware</em></a>.</p>
+  </li>
+
+  <li id="M201704050">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Muitos dispositivos Android <a
+href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/";>
+podem ser sequestrados por meio de seus chips Wi-Fi</a> por causa de um bug
+no firmware não livre da Broadcom.</p>
+  </li>
+
+  <li id="M201703270">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Quando a máquina de lavar louça desinfetante hospitalar de Internet das
+Picadas da Miele está <a
+href="https://www.vice.com/en/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit";>
+conectada à Internet, sua segurança é uma porcaria</a>.</p>
+
+    <p>Por exemplo, um <em>cracker</em> pode obter acesso ao sistema de 
arquivos da
+máquina de lavar louça, infectá-lo com <em>malware</em> e forçar a máquina
+de lavar louça a lançar ataques a outros dispositivos na rede. Como essas
+máquinas de lavar louça são usadas em hospitais, esses ataques podem colocar
+centenas de vidas em risco.</p>
+  </li>
+
+  <li id="M201703070">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A CIA explorou as vulnerabilidades existentes em TVs e telefones
+“inteligentes” para projetar um <em>malware</em> que <a
+href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html";>
+espia através de seus microfones e câmeras enquanto os faz parecer
+desligados</a>. Como o <i lang="en">spyware</i> detecta sinais, ignora a
+criptografia.</p>
+  </li>
+
+  <li id="M201702200">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Se você comprar produtos “inteligentes” usados, como um carro, casa, 
TV,
+geladeira etc., geralmente <a
+href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html";>os
+donos anteriores ainda podem remotamente controlá-los</a>.</p>
+  </li>
+
+  <li id="M201702170">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os aplicativos móveis para se comunicar <a
+href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/";>
+com um carro inteligente, mas tolo, têm segurança muito ruim</a>.</p>
+
+    <p>Isso além do fato de que o carro contém um modem celular que avisa o 
<i
+lang="en">big brother</i> o tempo todo onde ele está. Se você possui um
+carro assim, é aconselhável desconectar o modem para desligar o
+rastreamento.</p>
+  </li>
+
+  <li id="M201701271">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um <em>cracker</em> seria capaz de <a
+href="https://uploadvr.com/hackable-webcam-oculus-sensor-be-aware/";>
+transformar os sensores Oculus Rift em câmeras espiãs</a> após invadir o
+computador no qual eles estão conectados.</p>
+
+    <p><small>(Infelizmente, o artigo <a
+href="/philosophy/words-to-avoid.html#Hacker">inadequadamente se refere a
+<em>crackers</em> como “hackers”</a>.)</small></p>
+  </li>
+
+  <li id="M201701270">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os telefones Samsung <a
+href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/";>
+têm uma falha de segurança que permite que uma mensagem SMS instale
+<em>ransomware</em></a>.</p>
+  </li>
+
+  <li id="M201701130">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O WhatsApp tem um recurso que <a
+href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/";>
+foi descrito como um <em>backdoor</em></a> porque permitiria aos governos
+anular sua criptografia.</p>
+
+    <p>Os desenvolvedores dizem que não foi planejado como um 
<em>backdoor</em>, e
+isso pode muito bem ser verdade. Mas isso deixa a questão crucial de saber
+se ele funciona como um. Como o programa não é livre, não podemos verificar
+estudando-o.</p>
+  </li>
+
+  <li id="M201612060.1">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os brinquedos “inteligentes” My Friend Cayla e i-Que podem ser <a
+href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws";>controlados
+remotamente com um telefone celular</a>; o acesso físico não é
+necessário. Isso permitiria aos <em>crackers</em> ouvir as conversas de uma
+criança e até falar para os próprios brinquedos.</p>
+
+    <p>Isso significa que um ladrão pode falar para os brinquedos e pedir à 
criança
+para destrancar a porta da frente enquanto a mamãe não está olhando.</p>
+  </li>
+
+  <li id="M201610230">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>As redes de telefones 4G LTE são drasticamente inseguras. Elas podem ser <a
+href="https://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/";>
+assumidas por terceiras e usadas para ataques <i
+lang="en">man-in-the-middle</i></a>.</p>
+  </li>
+
+  <li id="M201608110">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Devido à segurança fraca, <a
+href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844";>
+é fácil abrir as portas de 100 milhões de carros fabricados pela
+Volkswagen</a>.</p>
+  </li>
+
+  <li id="M201608080">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um <em>ransomware</em> <a
+href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/";>
+foi desenvolvido para um termostato que usa software privativo</a>.</p>
+  </li>
+
+  <li id="M201608020">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Uma <a
+href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/";>
+falha no Internet Explorer e Edge</a> permite que um invasor obtenha as
+credenciais da conta da Microsoft, se o usuário for induzido a visitar um
+link malicioso.</p>
+  </li>
+
+  <li id="M201607290">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/";>Mensagens
+“excluídas” do WhatsApp não são totalmente excluídas</a>. Elas podem 
ser
+recuperadas de várias maneiras.</p>
+  </li>
+
+  <li id="M201607220">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Uma vulnerabilidade na API de Image I/O da Apple permitiu que um invasor <a
+href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple";>execute
+código malicioso de qualquer aplicativo que usa esta API para renderizar um
+certo tipo de arquivo de imagem</a>.</p>
+  </li>
+
+  <li id="M201607190">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um bug em uma biblioteca privativa ASN.1, usada em torres de telefones
+celulares e também em telefones celulares e roteadores, <a
+href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover";>permite
+assumir o controle desses sistemas</a>.</p>
+  </li>
+
+  <li id="M201606290">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os programas antivírus têm tantos erros que <a
+href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374";>
+eles podem piorar a segurança</a>.</p>
+
+    <p>GNU/Linux não precisa de software antivírus.</p>
+  </li>
+
+  <li id="M201605020">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O “Smart Home” da Samsung tem uma grande falha de segurança; <a
+href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/";>
+pessoas não autorizadas podem controlá-lo remotamente</a>.</p>
+
+    <p>A Samsung afirma que esta é uma plataforma “aberta”, então o 
problema é
+parcialmente culpa dos desenvolvedores de aplicativos. Isso é claramente
+verdade se os aplicativos forem software privativo.</p>
+
+    <p>Qualquer coisa cujo nome seja “Inteligente” ou “Smart” 
provavelmente vai te
+ferrar.</p>
+  </li>
+
+  <li id="M201604120">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um bug no aplicativo Messages de iCoisas <a
+href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/";>permitiu
+a um site malicioso para extrair todo o histórico de mensagens do
+usuário</a>.</p>
+  </li>
+
+  <li id="M201604110">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um <em>malware</em> foi encontrado em <a
+href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html";>
+câmeras de segurança disponíveis na Amazon</a>.</p>
+
+    <p>Uma câmera que grava localmente em mídia física e não tem conexão 
de rede
+não ameaça as pessoas com vigilância – nem observar as pessoas pela 
câmera,
+nem por <em>malware</em> na câmera.</p>
+  </li>
+
+  <li id="M201603220">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Mais de 70 marcas de câmeras de vigilância conectadas em rede têm <a
+href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html";>
+bugs de segurança que permitem que qualquer um assista através delas</a>.</p>
+  </li>
+
+  <li id="M201603100">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Muitos aplicativos privativos de pagamento <a
+href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data";>
+transmitem dados pessoais de forma insegura</a>. No entanto, o pior aspecto
+desses aplicativos é que <a
+href="/philosophy/surveillance-vs-democracy.html">o pagamento não é
+anônimo</a>.</p>
+  </li>
+
+  <li id="M201602240">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p id="nissan-modem">O Nissan Leaf possui um modem de telefone celular 
integrado que permite
+efetivamente que qualquer pessoa <a
+href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/";>
+acesse seus computadores remotamente e faça alterações em várias
+configurações</a>.</p>
+
+    <p>Isso é fácil de fazer porque o sistema não possui autenticação 
quando
+acessado através do modem. No entanto, mesmo que solicitasse autenticação,
+você não poderia ter certeza de que a Nissan não tem acesso. O software do
+carro é privativo, <a
+href="/philosophy/free-software-even-more-important.html">o que significa
+que exige fé cega de seus usuários</a>.</p>
+
+    <p>Mesmo que ninguém se conecte ao carro remotamente, o modem do celular
+permite que a companhia telefônica rastreie os movimentos do carro o tempo
+todo; no entanto, é possível remover fisicamente o modem do telefone
+celular.</p>
+  </li>
+
+  <li id="M201510210">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os rastreadores de condicionamento físico da FitBit têm um <a
+href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/";>
+vulnerabilidade de Bluetooth</a> que permite que invasores enviem
+<em>malware</em> aos dispositivos, que podem se espalhar posteriormente para
+computadores e outros rastreadores FitBit que interagem com eles.</p>
+  </li>
+
+  <li id="M201510200">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>As unidades de disco com “autocriptografia” fazem a criptografia com
+firmware privativo, portanto, você não pode confiar nele. As unidades de 
“My
+Passport” da Western Digital <a
+href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption";>
+têm um <em>backdoor</em></a>.</p>
+  </li>
+
+  <li id="M201508120">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Pesquisadores de segurança descobriram uma vulnerabilidade <a
+href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text";>
+em dispositivos de diagnóstico usados para rastreamento e seguro de
+veículos</a> que lhes permite assumir o controle remoto de um carro ou
+caminhão usando um SMS.</p>
+  </li>
+
+  <li id="M201507214">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><em>Crackers</em> conseguiram <a
+href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/";>
+assumir o controle remoto do “carro conectado” da Jeep</a>. Eles poderiam
+rastrear o carro, ligar ou desligar o motor, ativar ou desativar os freios e
+muito mais.</p>
+
+    <p>Esperamos que a Chrysler e a NSA também possam fazer isso.</p>
+
+    <p>Se você possui um carro que contém um modem telefônico, convém 
desativá-lo.</p>
+  </li>
+
+  <li id="M201506080">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Devido à segurança ruim em uma bomba de drogas, os <em>crackers</em> podem
+usá-la para <a
+href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/";>
+matar pacientes</a>.</p>
+  </li>
+
+  <li id="M201505294">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html";>
+Muitos aplicativos de smartphone usam métodos de autenticação inseguros ao
+armazenar seus dados pessoais em servidores remotos</a>. Isso deixa
+informações pessoais como endereços de e-mail, senhas e informações de 
saúde
+vulneráveis. Como muitos desses aplicativos são privativos, é difícil ou
+impossível saber quais aplicativos estão em risco.</p>
+  </li>
+
+  <li id="M201505050">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>As bombas de infusão da Hospira, que são usadas para administrar
+medicamentos a um paciente, foram classificadas como “<a
+href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/";>dispositivo
+IP menos seguro que já vi</a>” por um pesquisador de segurança.</p>
+
+    <p>Dependendo da droga que está sendo infundida, a insegurança pode 
abrir a
+porta para o assassinato.</p>
+  </li>
+
+  <li id="M201504090">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Mac OS X tinha um <a
+href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
+<em>backdoor</em> local intencional por 4 anos</a>, que podia ser explorado
+por invasores para obter privilégios de root.</p>
+  </li>
+
+  <li id="M201405190">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um aplicativo para evitar “roubo de identidade” (acesso a dados 
pessoais)
+armazenando os dados dos usuários em um servidor especial <a
+href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/";>foi
+desativado por seu desenvolvedor</a>, que descobriu uma falha de 
segurança.</p>
+
+    <p>Esse desenvolvedor parece ser cuidadoso em proteger dados pessoais de
+terceiros em geral, mas não pode proteger esses dados do estado. Muito pelo
+contrário: confiar seus dados ao servidor de outra pessoa, se não
+criptografados primeiro por você com software livre, prejudica seus
+direitos.</p>
+  </li>
+
+  <li id="M201404250">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Muitos <a
+href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/";>
+equipamentos hospitalares têm péssima segurança</a> e isso pode ser 
fatal.</p>
+  </li>
+
+  <li id="M201402210">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A <a
+href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/";>insegurança
+do WhatsApp</a> torna a escuta rápida.</p>
+  </li>
+
+  <li id="M201312290">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a href="http://www.bunniestudios.com/blog/?p=3554";> Algumas memórias flash
+têm software modificável</a>, o que as torna vulneráveis a vírus.</p>
+
+    <p>Não chamamos isso de “<em>backdoor</em>” porque é normal que 
você possa
+instalar um novo sistema em um computador, tendo acesso físico a ele. No
+entanto, os pendrives e cartões de memória não devem ser modificáveis desta
+forma.</p>
+  </li>
+
+  <li id="M201312040">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/";>
+Terminais de ponto de venda com Windows foram invadidos</a> e transformados
+em botnet com o objetivo de coletar números de cartão de crédito dos
+clientes.</p>
+  </li>
+
+  <li id="M201311120">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html";>
+A NSA pode interceptar dados em smartphones, incluindo iPhones, Android e
+BlackBerry</a>. Embora não haja muitos detalhes aqui, parece que isso não
+funciona através do <em>backdoor</em> universal que sabemos que quase todos
+os telefones portáteis possuem. Pode envolver a exploração de vários
+bugs. Existem <a
+href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>
+muitos bugs no software de rádio dos telefones</a>.</p>
+  </li>
+
+  <li id="M201309054">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>A
+NSA colocou <em>backdoors</em> em softwares de criptografia não
+livres</a>. Não sabemos quais são, mas podemos ter certeza de que incluem
+alguns sistemas amplamente usados. Isso reforça o ponto de que você nunca
+pode confiar na segurança de um software não livre.</p>
+  </li>
+
+  <li id="M201309050">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A FTC puniu uma empresa por fazer webcams com <a
+href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html";>
+segurança ruim para que seja fácil para qualquer um ver através 
delas</a>.</p>
+  </li>
+
+  <li id="M201308060">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a href="http://spritesmods.com/?art=hddhack&amp;page=6";> O software não
+livre substituível em unidades de disco pode ser escrito por um programa não
+livre</a>. Isso torna qualquer sistema vulnerável a ataques persistentes que
+o forense normal não detecta.</p>
+  </li>
+
+  <li id="M201307270">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p> É possível <a
+href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/";>
+matar pessoas assumindo o controle de implantes médicos por rádio</a>. Mais
+informações em <a href="http://www.bbc.co.uk/news/technology-17631838";>BBC
+News</a> e <a
+href="https://ioactive.com/broken-hearts-how-plausible-was-the-homeland-pacemaker-hack/";>
+IOActive Labs Research blog</a>.</p>
+  </li>
+
+  <li id="M201307260">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/";>
+“Casas inteligentes”</a> acabam sendo estupidamente vulneráveis a 
intrusões.</p>
+  </li>
+
+  <li id="M201212170">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2012-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p id="break-security-smarttv"><a
+href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html";><em>Crackers</em>
+encontraram uma maneira de quebrar a segurança em uma TV 
“inteligente”</a> e
+use sua câmera para assistir as pessoas que estão assistindo TV.</p>
+  </li>
+
+  <li id="M201103110">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2011-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>É possível <a
+href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/";>
+assumir o controle de alguns computadores de automóveis por meio de
+<em>malware</em> em arquivos de música</a>. Também <a
+href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0";> por
+rádio</a>. Mais informações em <a href="http://www.autosec.org/faq.html";>
+Automotive Security And Privacy Center</a>.</p>
+  </li>
+</ul>
+</div>
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!--#include virtual="/proprietary/proprietary-menu.pt-br.html" -->
+<!--#include virtual="/server/footer.pt-br.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Envie perguntas em geral sobre a FSF e o GNU para <a
+href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>. Também existem <a
+href="/contact/">outros meios de contatar</a> a FSF. Links quebrados e
+outras correções ou sugestões podem ser enviadas para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+A equipe de traduções para o português brasileiro se esforça para oferecer
+traduções precisas e de boa qualidade, mas não estamos isentos de erros. Por
+favor, envie seus comentários e sugestões em geral sobre as traduções para
+<a
+href="mailto:web-translators@gnu.org";>&lt;web-translators@gnu.org&gt;</a>.
+</p><p>Consulte o <a href="/server/standards/README.translations.html">Guia
+para as traduções</a> para mais informações sobre a coordenação e a
+contribuição com traduções das páginas deste site.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright &copy; 2013, 2015-2021 Free Software Foundation, Inc.</p>
+
+<p>Esta página está licenciada sob uma licença <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/deed.pt_BR";>Creative
+Commons Atribuição 4.0 Internacional</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.pt-br.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+A tradução das páginas na seção Proprietary teve a contribuição de:
+Cassiano Reinert Novais dos Santos <a
+href="mailto:caco@posteo.net";>&lt;caco@posteo.net&gt;</a> e
+Rafael Fontenelle <a
+href="mailto:rafaelff@gnome.org";>&lt;rafaelff@gnome.org&gt;</a>.</div>
+
+<p class="unprintable"><!-- timestamp start -->
+Última atualização:
+
+$Date: 2021/06/26 14:00:00 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: proprietary-interference.pt-br.html
===================================================================
RCS file: proprietary-interference.pt-br.html
diff -N proprietary-interference.pt-br.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ proprietary-interference.pt-br.html 26 Jun 2021 14:00:00 -0000      1.1
@@ -0,0 +1,550 @@
+<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-interference.en.html" -->
+
+<!--#include virtual="/server/header.pt-br.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">
+!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>Interferência privativa - Projeto GNU - Free Software 
Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+
+<!--#include virtual="/proprietary/po/proprietary-interference.translist" -->
+<!--#include virtual="/server/banner.pt-br.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Índice da Seção"
+      alt="&nbsp;[Índice da Seção]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="Página inicial do GNU" title="Página inicial do GNU" /></a>&nbsp;/ 
<a href="/proprietary/proprietary.html"><em>Malware</em>
+privativo</a>&nbsp;/ Por tipo&nbsp;/
+</p>
+</div>
+
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.pt-br.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Interferência privativa</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>O software não livre (privativo) é muitas vezes um <em>malware</em>
+(projetado para maltratar o usuário). O software não livre é controlado por
+seus desenvolvedores, o que os coloca em uma posição de poder sobre os
+usuários; <a href="/philosophy/free-software-even-more-important.html">isso
+é a injustiça básica</a>. Os desenvolvedores e fabricantes muitas vezes
+exercem esse poder em detrimento dos usuários aos quais eles deveriam
+servir.</p>
+
+<p>Isso geralmente assume a forma de funcionalidades maliciosas.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>Um tipo de funcionalidade maliciosa possibilitada pela interferência do
+desenvolvedor no uso do software. Esta página descreve como vários programas
+privativos assediam ou incomodam o usuário, ou causam problemas para o
+usuário. Essas ações são como <a
+href="/proprietary/proprietary-sabotage#about-page">sabotagem</a>, mas a
+palavra “sabotagem” é muito forte para eles.
+</p>
+
+<div class="important">
+<p>Se você conhece um exemplo que deveria estar nesta página, mas não está
+aqui, por favor, escreva para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a> para nos
+informar. Por favor, inclua a URL de uma ou duas referências confiáveis para
+servir como comprovação específica.</p>
+</div>
+
+<div class="column-limit" id="proprietary-interference"></div>
+
+<ul class="blurbs">
+  <li id="M202105300">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.theguardian.com/technology/2021/may/30/gadgets-have-stopped-working-together-interoperability-apple";>A
+Apple está minando sistematicamente a interoperabilidade</a>. No nível do
+hardware, ele faz isso por meio de plugues, barramentos e redes não
+padrão. No nível do software, ele não permite que o usuário tenha nenhum
+dado, exceto dentro de um aplicativo.</p>
+  </li>
+
+  <li id="M202105130">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a href="https://gizmodo.com/get-ready-for-in-car-ads-1846888390";>A Ford
+está planejando forçar anúncios sobre motoristas de carros</a>, com a
+possibilidade de o dono pagar a mais para desligá-los. O sistema
+provavelmente também impõe vigilância aos motoristas.</p>
+  </li>
+
+  <li id="M202104060">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/";>O
+aplicativo WeddingWire armazena as fotos do casamento das pessoas para
+sempre e entrega os dados a outros</a> e não dá às pessoas nenhum controle
+sobre suas informações/dados pessoais. O aplicativo às vezes também mostra
+fotos e memórias antigas para o usuário, sem que o usuário tenha controle
+sobre isso também.</p>
+  </li>
+
+  <li id="M202102180">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Microsoft está <a
+href="https://uk.pcmag.com/operating-systems/131798/microsoft-starts-automatically-removing-flash-from-windows";>removendo
+forçadamente o Flash player dos computadores com Windows 10</a>, usando <a
+href="/proprietary/proprietary-back-doors.html#windows-update">uma
+<em>backdoor</em> universal no Windows</a>.</p>
+
+    <p>O fato de o Flash ter sido <a
+href="/proprietary/proprietary-back-doors.html#M202012020">desativado pela
+Adobe</a> não é desculpa para esse abuso de poder. A natureza do software
+privativo, como o Microsoft Windows, dá aos desenvolvedores o poder de impor
+suas decisões aos usuários. O software livre, por outro lado, permite que os
+usuários tomem suas próprias decisões.</p>
+  </li>
+
+  <li id="M202010180">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Microsoft está <a
+href="https://www.slashgear.com/windows-10-users-are-grumpy-over-forced-updates-and-unwanted-apps-18643135/";>forçando
+usuários do Windows</a> a <a
+href="https://support.microsoft.com/en-us/windows/manage-updates-in-windows-10-643e9ea7-3cf6-7da6-a25c-95d4f7f099fe";>instalar
+atualizações que são empurradas</a> usando <a
+href="/proprietary/proprietary-back-doors.html#windows-update">seus
+<em>backdoors</em> universais</a>. Essas atualizações podem causar vários
+danos aos usuários, como restringir algumas funções dos computadores e/ou
+forçar os usuários a fazerem, sem qualquer defesa, tudo o que a Microsoft
+lhes diz para fazer.</p>
+  </li>
+
+  <li id="M202005250">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os carros da Tesla têm um <a
+href="/proprietary/proprietary-back-doors.html#M201709090.1">
+<em>backdoor</em> universal remoto</a>. A Tesla o usou para <a
+href="https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-disabled-remotely-used-car-update";>
+desativar os recursos do piloto automático</a> nos carros das pessoas para
+fazê-las pagar mais pela reativação dos recursos.</p>
+
+    <p>Esse tipo de falha é possível apenas com software privativo — o 
software
+livre é controlado por seus usuários que não deixariam essas coisas com
+eles.</p>
+  </li>
+
+  <li id="M202004150">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O novo sistema antitrapaça da Riot Games é <em>malware</em>; <a
+href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver";>ele
+é executado na inicialização do sistema no nível do kernel</a> no Windows. 
É
+um software inseguro que aumenta a superfície de ataque do sistema
+operacional.</p>
+  </li>
+
+  <li id="M201912170">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Alguns violadores de segurança (erroneamente referidos neste artigo como <a
+href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>) conseguiram
+interferir no sistema privativo do Amazon Ring e <a
+href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>acessar
+sua câmera, alto-falantes e microfones</a>.</p>
+  </li>
+
+  <li id="M201908150">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple está inserindo DRM em baterias do iPhone e o software de sistema
+privativo <a
+href="https://www.vice.com/en_us/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair";>desliga
+certos recursos quando as baterias são substituídas por outra além da
+Apple.</a></p>
+  </li>
+
+  <li id="M201901230">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Google está modificando o Chromium para que <a
+href="https://tech.slashdot.org/story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-will-break-content-blocking-extensions-including-various-ad-blockers";>
+extensões não possam alterar ou bloquear o que a página contiver</a>. Os
+usuários poderiam inverter a mudança em um fork do Chromium, mas com certeza
+o Chrome (não livre) terá a mesma alteração e os usuários não poderão
+corrigi-lo.</p>
+  </li>
+
+  <li id="M201901110">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os telefones Samsung vêm pré-carregados com <a
+href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook";>
+uma versão do aplicativo do Facebook que não pode ser excluída</a>. <a
+href="https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-app";>
+O Facebook alega que este é um esboço</a> que não faz nada, mas nós temos
+que aceitar a palavra deles nisso, e há o risco permanente de que o
+aplicativo será ativado por uma atualização automática.</p>
+
+    <p>Pré-carregar o “crapware” junto com um sistema operacional não 
livre é uma
+prática comum, mas fazer o <em>“crapware”</em> não poder ser excluído,
+Facebook e Samsung (<a
+href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook";>entre
+outros</a>) estão indo um passo adiante em seu sequestro de dispositivos dos
+usuários.</p>
+  </li>
+
+  <li id="M201809120">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Uma versão do Windows 10 <a
+href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/";>
+incomoda os usuários se eles tentarem instalar o Firefox (ou Chrome)</a>.</p>
+  </li>
+
+  <li id="M201807310">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um videogame não livre, disponível através do cliente não livre Steam, 
<a
+href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-";>
+incluiu um “minerador”</a>, ou seja, um executável que sequestra a CPU nos
+computadores dos usuários para minerar uma criptomoeda.</p>
+  </li>
+
+  <li id="M201805080">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um <em>cracker</em> explorou uma vulnerabilidade em software desatualizado
+para <a
+href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito";>
+injetar um “minerador” em páginas da web</a> servidas aos visitantes. Esse
+tipo de <em>malware</em> sequestra o processador do computador para minerar
+uma criptomoeda.</p>
+
+    <p><small>(Note que o artigo se refere ao software infectado como 
“sistema de
+gestão de conteúdo”. Um termo melhor seria “<a
+href="/philosophy/words-to-avoid.html#Content">sistema de revisão de web
+sites</a>”.)</small></p>
+
+    <p>Como o minerador era um programa JavaScript não livre, os visitantes 
não
+seriam afetados se tivessem usado o <a
+href="/software/librejs/index.html">LibreJS</a>. Algumas extensões de
+navegador que <a
+href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/";>
+bloqueiam especificamente os mineradores em JavaScript</a> também estão
+disponíveis.</p>
+  </li>
+
+  <li id="M201804180">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O software educacional privativo da Pearson <a
+href="https://gizmodo.com/pearson-embedded-a-social-psychological-experiment-in-s-1825367784";>
+fez um experimento em alunos reais</a>, tratando os alunos de maneira
+diferente para observar os resultados.</p>
+  </li>
+
+  <li id="M201803190">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Microsoft está planejando fazer o Windows <a
+href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox";>
+impor o uso de seu navegador, Edge, em certas circunstâncias</a>.</p>
+
+    <p>O motivo pelo qual a Microsoft pode forçar os usuários é que o 
Windows é não
+livre.</p>
+  </li>
+
+  <li id="M201712060">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Saiba como <a
+href="https://www.huffingtonpost.com/joseph-farrell/the-fascinating-psycholog_b_6076502.html";>
+jogos grátis-para-jogar-e-sem-ganhar-muito manipulam seus “usados”
+psicologicamente</a>.</p>
+
+    <p>Esses comportamentos manipulativos são funcionalidades maliciosas e 
são
+possíveis porque o jogo é privativo. Se fosse livre, as pessoas poderiam
+publicar uma versão não manipulativa e jogá-la.</p>
+  </li>
+
+  <li id="M201703170">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Windows exibe <a
+href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer";>
+anúncios intrusivos para produtos Microsoft e produtos de seus
+parceiros</a>.</p>
+
+    <p>O autor do artigo parte da premissa de que a Microsoft tem o direito de
+controlar o que o Windows faz aos usuários, desde que não vá “longe
+demais”. Nós discordamos.</p>
+  </li>
+
+  <li id="M201701110">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um pacote de atualização para o Acrobat Reader <a
+href="https://www.bleepingcomputer.com/news/software/adobe-acrobat-reader-dc-update-installs-chrome-browser-extension/";>silenciosamente
+altera o Chrome</a>.</p>
+  </li>
+
+  <li id="M201612140">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O serviço Microsoft Telemetry Compatibility <a
+href="https://answers.microsoft.com/pt-br/windows/forum/windows_10-performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs";>
+reduz drasticamente o desempenho de máquinas com Windows&nbsp;10</a> e pode
+ser facilmente desabilitado.</p>
+  </li>
+
+  <li id="M201608170">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p> Após <a 
href="/proprietary/malware-microsoft.html#windows10-forcing">forçar
+o download do Windows 10</a> em computadores que estavam executando o
+Windows 7 e 8, a Microsoft <a
+href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
+ativou repetidamente um sinalizador que incentivava os usuários a
+“atualizar” para o Windows 10</a> quando o desligaram, na esperança de que
+algum dia não dissessem não. Para fazer isso, a Microsoft usou <a
+href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/";>
+técnicas de <em>malware</em></a>.</p>
+
+    <p>Uma <a
+href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
+análise detalhada do esquema da Microsoft</a> está disponível no site da
+Electronic Frontier Foundation.</p>
+  </li>
+
+  <li id="M201603090">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Microsoft tornou as máquinas Windows das empresas gerenciadas pelos
+administradores de sistemas da empresa <a
+href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html";>arenga
+aos usuários para reclamar aos administradores do sistema sobre não
+“atualizar” para o Windows 10</a>.</p>
+  </li>
+
+  <li id="M201601160">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Microsoft <a
+href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake";>
+cancelou o suporte de todas as futuras CPUs Intel para Windows 7 e
+8</a>. Essas máquinas ficarão presas com o Windows 10. <a
+href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825";>
+CPUs AMD e Qualcomm também</a>.</p>
+
+    <p>Claro, o Windows 7 e o 8 também não são éticos, porque são 
softwares
+privativos. Mas este exemplo de como a Microsoft está exercendo seu poder
+demonstra o poder que detém.</p>
+
+    <p>Os desenvolvedores de software livre também param de manter versões 
antigas
+de seus programas, mas isso não é injusto para os usuários, porque os
+usuários de software livre têm controle sobre ele. Se for importante o
+suficiente para você, você e outros usuários podem contratar alguém para
+oferecer suporte à versão antiga em suas plataformas futuras.</p>
+  </li>
+
+  <li id="M201510220">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O software não livre da Adobe pode interromper todos os outros trabalhos e
+congelar um computador <a
+href="http://shallowsky.com/blog/gimp/non-free-software-surprises.html";>
+para executar uma verificação de licença</a>, em um momento aleatório a 
cada
+30 dias.</p>
+  </li>
+
+  <li id="M201506260">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Oracle fez um acordo com o Yahoo; o plug-in Java não livre da Oracle <a
+href="http://searchengineland.com/yahoo-signs-deal-with-oracle-to-attract-new-users-via-java-installs-224097";>
+mudará a página da web inicial do usuário e mecanismo de busca padrão para 
o
+Yahoo</a>, a menos que o usuário intervenha para impedi-lo.</p>
+  </li>
+</ul>
+</div>
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!--#include virtual="/proprietary/proprietary-menu.pt-br.html" -->
+<!--#include virtual="/server/footer.pt-br.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Envie perguntas em geral sobre a FSF e o GNU para <a
+href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>. Também existem <a
+href="/contact/">outros meios de contatar</a> a FSF. Links quebrados e
+outras correções ou sugestões podem ser enviadas para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+A equipe de traduções para o português brasileiro se esforça para oferecer
+traduções precisas e de boa qualidade, mas não estamos isentos de erros. Por
+favor, envie seus comentários e sugestões em geral sobre as traduções para
+<a
+href="mailto:web-translators@gnu.org";>&lt;web-translators@gnu.org&gt;</a>.
+</p><p>Consulte o <a href="/server/standards/README.translations.html">Guia
+para as traduções</a> para mais informações sobre a coordenação e a
+contribuição com traduções das páginas deste site.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright &copy; 2015-2021 Free Software Foundation, Inc.</p>
+
+<p>Esta página está licenciada sob uma licença <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/deed.pt_BR";>Creative
+Commons Atribuição 4.0 Internacional</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.pt-br.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+A tradução das páginas na seção Proprietary teve a contribuição de:
+Cassiano Reinert Novais dos Santos <a
+href="mailto:caco@posteo.net";>&lt;caco@posteo.net&gt;</a> e
+Rafael Fontenelle <a
+href="mailto:rafaelff@gnome.org";>&lt;rafaelff@gnome.org&gt;</a>.</div>
+
+<p class="unprintable"><!-- timestamp start -->
+Última atualização:
+
+$Date: 2021/06/26 14:00:00 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: proprietary-jails.pt-br.html
===================================================================
RCS file: proprietary-jails.pt-br.html
diff -N proprietary-jails.pt-br.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ proprietary-jails.pt-br.html        26 Jun 2021 14:00:00 -0000      1.1
@@ -0,0 +1,494 @@
+<!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary-jails.en.html" -->
+
+<!--#include virtual="/server/header.pt-br.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">
+!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>Prisões privativas - Projeto GNU - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+
+<!--#include virtual="/proprietary/po/proprietary-jails.translist" -->
+<!--#include virtual="/server/banner.pt-br.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Índice da Seção"
+      alt="&nbsp;[Índice da Seção]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="Página inicial do GNU" title="Página inicial do GNU" /></a>&nbsp;/ 
<a href="/proprietary/proprietary.html"><em>Malware</em>
+privativo</a>&nbsp;/ Por tipo&nbsp;/
+</p>
+</div>
+
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.pt-br.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Prisões privativas</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>O software não livre (privativo) é muitas vezes um <em>malware</em>
+(projetado para maltratar o usuário). O software não livre é controlado por
+seus desenvolvedores, o que os coloca em uma posição de poder sobre os
+usuários; <a href="/philosophy/free-software-even-more-important.html">isso
+é a injustiça básica</a>. Os desenvolvedores e fabricantes muitas vezes
+exercem esse poder em detrimento dos usuários aos quais eles deveriam
+servir.</p>
+
+<p>Isso geralmente assume a forma de funcionalidades maliciosas.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>As “prisões” são sistemas operacionais maliciosos projetados para 
impor
+censura de quais aplicativos o usuário pode instalar. A <a
+href="http://i.imgur.com/ZRViDum.jpg";>imagem do iPrisão</a> ilustra esse
+problema.</p>
+
+<!-- embed http://i.imgur.com/ZRViDum.jpg here -->
+<!-- Linking to it. Not possible to embed due to licensing. See RT #887471 -->
+<p>Esses sistemas são plataformas de censura impostas pela empresa privativa 
do
+sistema. Vender produtos concebidos como plataformas para uma empresa impor
+censura deveria ser proibido por lei, mas não é.</p>
+
+<p>Esta página lista algumas prisões, junto com alguns dos métodos que eles
+usam para censurar aplicativos e inclui exemplos específicos de aplicativos
+que foram bloqueados usando esse poder de censura.</p>
+
+<div class="important">
+<p>Se você conhece um exemplo que deveria estar nesta página, mas não está
+aqui, por favor, escreva para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a> para nos
+informar. Por favor, inclua a URL de uma ou duas referências confiáveis para
+servir como comprovação específica.</p>
+</div>
+
+<div id="TOC" class="toc-inline">
+<ul>
+  <li>&nbsp;<a href="#apple">Apple</a>&nbsp;</li>
+  <li>&nbsp;<a href="#microsoft">Microsoft</a>&nbsp;</li>
+  <li>&nbsp;<a href="#consoles">Consoles&nbsp;de&nbsp;jogo</a>&nbsp;</li>
+</ul>
+</div>
+
+<h3 id="apple">Apple</h3>
+
+<ul class="blurbs">
+  <li id="M201904080">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Apple planeja exigir que <a
+href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/";>
+todos aplicativos para MacOS sejam primeiro aprovados pela Apple</a>.</p>
+
+    <p>Oferecer um serviço de verificação como opção poderia ser útil e 
não estaria
+errado. Exigir que os usuários obtenham a aprovação da Apple é uma
+tirania. A Apple diz que a verificação procurará apenas <em>malware</em>
+(sem contar o <em>malware</em> que é <a
+href="/proprietary/malware-apple.html#TOC">parte do sistema
+operacional</a>), mas a Apple pode mudar essa política passo a passo. Ou
+talvez a Apple defina <em>malware</em> para incluir qualquer aplicativo que
+a China não goste.</p>
+
+    <p>Para software livre, isso significa que os usuários precisarão obter a
+aprovação da Apple após a compilação. Isso equivale a um sistema de
+monitoramento do uso de programas livres.</p>
+  </li>
+
+  <li id="M200803070">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2008-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046";>
+iOS, o sistema operacional da iCoisas da Apple, é o protótipo de uma
+prisão</a>. Foi a Apple que introduziu a prática de projetar computadores de
+uso geral com censura de programas aplicativos.</p>
+
+    <p>Aqui está um artigo sobre a <a
+href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/";>
+assinatura de código</a> que os iCoisas usam para prender o usuário.</p>
+
+    <p>Curiosamente, a Apple está começando a permitir uma passagem limitada 
pelas
+paredes da prisão de iCoisas: os usuários agora podem instalar aplicativos
+compilados a partir do código-fonte, desde que o código-fonte seja escrito
+em Swift. Os usuários não podem fazer isso livremente porque são obrigados a
+se identificar. <a href="https://developer.apple.com/xcode/";>Aqui estão os
+detalhes</a>. Embora seja uma rachadura nas paredes da prisão, não é grande
+o suficiente para significar que os iCoisas não são mais prisões.</p>
+  </li>
+</ul>
+
+<h4 id="apple-censorship">Exemplos de censura de prisões da Apple</h4>
+
+<ul class="blurbs">
+  <li id="M202008300">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple está <a
+href="https://www.theguardian.com/technology/2020/aug/30/this-isnt-the-1990s-apple-under-pressure-from-app-developers";>
+espremendo todos os negócios</a> conduzidos por meio de aplicativos para
+iMonstros.</p>
+
+    <p>Este é um sintoma de uma injustiça muito grande: a Apple tem o poder 
de
+decidir qual software pode ser instalado em um iMonstro. Que é uma 
prisão.</p>
+  </li>
+
+  <li id="M201910100">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple <a
+href="https://www.theguardian.com/world/2019/oct/10/hong-kong-protests-apple-pulls-tracking-app-after-china-criticism";>
+baniu o aplicativo que os protestantes de Hong Kong usam para se
+comunicar</a>.</p>
+
+    <p>A obediência da “lei local” sobre o que as pessoas que podem fazer 
com
+software não é uma desculpa para censurar qual software as pessoas podem
+usar.</p>
+  </li>
+
+  <li id="M201910070">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple <a
+href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html";>
+censura a bandeira de Taiwan no iOS</a> em favor do governo chinês. Quando a
+região está definida para Hong Kong, essa bandeira não está visível no
+widget de seleção de emojis, mas ainda está acessível. Quando a região 
está
+definida para a China continental, todas as tentativas de exibi-la vão
+resultar no ícone “emoji vazio” como se a bandeira nunca existisse.</p>
+
+    <p>Então, não apenas a Apple usa a App Store como um instrumento de 
censura,
+ela também usa o sistema operacional do iCoisa para esse propósito.</p>
+  </li>
+
+  <li id="M201905150">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Usuários pegos na prisão de um iMonstros são <a
+href="https://boingboing.net/2019/05/15/brittle-security.html";>patos
+sentados para outros atacantes</a>, e a censura de aplicativos impede
+empresas de segurança de descobrir como esses ataques funcionam.</p>
+
+    <p>A censura de aplicativos pela Apple é fundamentalmente injusta e seria
+indesculpável, mesmo que não levasse também a ameaças de segurança.</p>
+  </li>
+
+  <li id="M201710130">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple está <a
+href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet";>
+censurando aplicativos para o governo dos EUA também</a>. Especificamente,
+está excluindo aplicativos desenvolvidos por iranianos.</p>
+
+    <p>A raiz desses erros está na Apple. Se a Apple não tivesse projetado os
+iMonstros para permitir a censura de aplicativos, a Apple não teria o poder
+de impedir os usuários de instalar qualquer tipo de aplicativo.</p>
+  </li>
+
+  <li id="M201707290">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple <a
+href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html";>
+excluiu várias VPNs de sua loja de aplicativos para a China</a>, usando
+assim seu próprio poder de censura para fortalecer o do governo chinês.</p>
+  </li>
+
+  <li id="M201701064">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple usou seu sistema de censura para impor a vigilância russa <a
+href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0";>
+ao bloquear a distribuição do aplicativo LinkedIn na Rússia</a>.</p>
+
+    <p>Isso é irônico porque o LinkedIn é um sistema de vigilância em si. 
Ao
+submeter seus usuários à sua própria vigilância, ele tenta protegê-los da
+vigilância russa e, portanto, está sujeito à censura russa.</p>
+
+    <p>No entanto, o ponto aqui é o erro da censura de aplicativos da 
Apple.</p>
+  </li>
+
+  <li id="M201701050">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple usou seu sistema de censura para impor a censura da China <a
+href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china";>
+bloqueando a distribuição do aplicativo do New York Times</a>.</p>
+  </li>
+
+  <li id="M201605190">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple censura jogos, <a
+href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game";>
+banindo alguns jogos da cr&hellip;app store</a> por causa dos pontos
+políticos que eles sugerem. Alguns pontos políticos são aparentemente
+considerados aceitáveis.</p>
+  </li>
+
+  <li id="M201509290">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/";> baniu um
+programa da App Store</a> porque seus desenvolvedores se comprometeram a
+desmontar alguns iCoisas.</p>
+  </li>
+
+  <li id="M201509230">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A partir de 2015, a Apple <a
+href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights";>
+sistematicamente pune com banimento os aplicativos que endossem os direitos
+ao aborto ou ajudem as mulheres a encontrar abortos</a>.</p>
+
+    <p>Esta inclinação política específica <a
+href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions";>
+afeta outros serviços da Apple</a>.</p>
+  </li>
+
+  <li id="M201506250">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple baniu os aplicativos de iCoisas que exibem a bandeira
+confederada. <a
+href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html";>
+Não só aqueles que o usam como símbolo de racismo</a>, mas até jogos
+estratégicos que o usam para representar unidades do exército confederado
+lutando na Guerra Civil.</p>
+
+    <p>Essa rigidez ridícula ilustra o ponto de que a Apple não deve ter 
permissão
+para censurar aplicativos. Mesmo que a Apple realizasse esse ato de censura
+com algum cuidado, ainda estaria errado. Se o racismo é ruim, se educar as
+pessoas sobre ataques de drones é ruim, não são o problema real. A Apple 
não
+deve ter o poder de impor seus pontos de vista sobre nenhuma dessas questões
+ou qualquer outra.</p>
+  </li>
+
+  <li id="M201412110">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans";>
+Mais exemplos de censura arbitrária e inconsistente da Apple</a>.</p>
+  </li>
+
+  <li id="M201405250">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple usou esse poder de censura em 2014 para <a
+href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html";>
+banir todos os aplicativos de bitcoin</a> para os iCoisas por um
+tempo. Também <a
+href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/";>
+baniu um jogo sobre o cultivo de maconha</a>, embora permita jogos sobre
+outros crimes, como matar pessoas. Talvez a Apple considere matar mais
+aceitável do que a maconha.</p>
+  </li>
+
+  <li id="M201402070">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple rejeitou um aplicativo que exibia os locais dos assassinatos por
+drones dos Estados Unidos, apresentando várias desculpas. Cada vez que os
+desenvolvedores corrigiam um “problema”, a Apple reclamava de outro. Após 
a
+quinta rejeição, a Apple <a
+href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/";>
+admitiu que estava censurando o aplicativo com base no assunto</a>.</p>
+  </li>
+</ul>
+
+
+<h3 id="microsoft">Microsoft</h3>
+
+<ul class="blurbs">
+  <li id="M201706130">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Windows 10 S era uma prisão: <a
+href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison";>
+apenas programas do Windows Store podiam ser instalados e executados</a>. No
+entanto, era possível <a
+href="https://www.theverge.com/2017/6/13/15789998/microsoft-windows-10-s-upgrade-windows-10-pro-guide";>
+atualizar para Windows 10 Pro</a>. O sucessor do Windows 10 S é uma
+configuração especial do Windows 10 chamada <a
+href="https://support.microsoft.com/pt-br/windows/windows-10-in-s-mode-faq-851057d6-1ee9-b9e5-c30b-93baebeebc85";>
+modo S</a>. A principal diferença com o Windows 10 S é que há uma maneira
+fácil de sair do modo S.</p>
+  </li>
+
+  <li id="M201210080">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2012-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://web.archive.org/web/20190917162027/https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html";>
+Windows 8 em “dispositivos móveis” (agora extinto) era uma 
prisão</a>.</p>
+  </li>
+</ul>
+
+
+<h3 id="consoles">Consoles de jogos</h3>
+
+<p>Nenhum jogo pode ser executado no console a menos que o fabricante do
+console o autorize. Infelizmente, não podemos encontrar um artigo para citar
+como referência para esse fato. Informe-nos se você souber de algum.</p>
+</div>
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!--#include virtual="/proprietary/proprietary-menu.pt-br.html" -->
+<!--#include virtual="/server/footer.pt-br.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Envie perguntas em geral sobre a FSF e o GNU para <a
+href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>. Também existem <a
+href="/contact/">outros meios de contatar</a> a FSF. Links quebrados e
+outras correções ou sugestões podem ser enviadas para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+A equipe de traduções para o português brasileiro se esforça para oferecer
+traduções precisas e de boa qualidade, mas não estamos isentos de erros. Por
+favor, envie seus comentários e sugestões em geral sobre as traduções para
+<a
+href="mailto:web-translators@gnu.org";>&lt;web-translators@gnu.org&gt;</a>.
+</p><p>Consulte o <a href="/server/standards/README.translations.html">Guia
+para as traduções</a> para mais informações sobre a coordenação e a
+contribuição com traduções das páginas deste site.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright &copy; 2014-2021 Free Software Foundation, Inc.</p>
+
+<p>Esta página está licenciada sob uma licença <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/deed.pt_BR";>Creative
+Commons Atribuição 4.0 Internacional</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.pt-br.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+A tradução das páginas na seção Proprietary teve a contribuição de:
+Cassiano Reinert Novais dos Santos <a
+href="mailto:caco@posteo.net";>&lt;caco@posteo.net&gt;</a> e
+Rafael Fontenelle <a
+href="mailto:rafaelff@gnome.org";>&lt;rafaelff@gnome.org&gt;</a>.</div>
+
+<p class="unprintable"><!-- timestamp start -->
+Última atualização:
+
+$Date: 2021/06/26 14:00:00 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: proprietary-manipulation.pt-br.html
===================================================================
RCS file: proprietary-manipulation.pt-br.html
diff -N proprietary-manipulation.pt-br.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ proprietary-manipulation.pt-br.html 26 Jun 2021 14:00:00 -0000      1.1
@@ -0,0 +1,270 @@
+<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-manipulation.en.html" -->
+
+<!--#include virtual="/server/header.pt-br.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">
+!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>Manipulação privativa - Projeto GNU - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+
+<!--#include virtual="/proprietary/po/proprietary-manipulation.translist" -->
+<!--#include virtual="/server/banner.pt-br.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Índice da Seção"
+      alt="&nbsp;[Índice da Seção]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="Página inicial do GNU" title="Página inicial do GNU" /></a>&nbsp;/ 
<a href="/proprietary/proprietary.html"><em>Malware</em>
+privativo</a>&nbsp;/ Por tipo&nbsp;/
+</p>
+</div>
+
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.pt-br.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Manipulação privativa</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>O software não livre (privativo) é muitas vezes um <em>malware</em>
+(projetado para maltratar o usuário). O software não livre é controlado por
+seus desenvolvedores, o que os coloca em uma posição de poder sobre os
+usuários; <a href="/philosophy/free-software-even-more-important.html">isso
+é a injustiça básica</a>. Os desenvolvedores e fabricantes muitas vezes
+exercem esse poder em detrimento dos usuários aos quais eles deveriam
+servir.</p>
+
+<p>Isso geralmente assume a forma de funcionalidades maliciosas.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>A manipulação de usuários é uma dessas funcionalidades maliciosas. Aqui
+estão alguns exemplos de programas projetados para fazer isso tirando
+proveito da psicologia humana.</p>
+
+<p>Temos uma página especial para <a
+href="/proprietary/proprietary-addictions.html">Programas viciantes</a>, que
+também tiram proveito da psicologia humana, mas de uma forma muito mais
+elaborada e perigosa.</p>
+
+<div class="important">
+<p>Se você conhece um exemplo que deveria estar nesta página, mas não está
+aqui, por favor, escreva para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a> para nos
+informar. Por favor, inclua a URL de uma ou duas referências confiáveis para
+servir como comprovação específica.</p>
+</div>
+
+<div class="column-limit" id="proprietary-manipulation"></div>
+
+<ul class="blurbs">
+  <li id="M202102190">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O jogo de matemática Prodigy, jogado gratuitamente nas escolas, incentiva 
os
+alunos a jogá-lo em casa, onde <a
+href="https://www.theguardian.com/technology/2021/feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model";>
+a empresa tenta atraí-los a pagar por uma assinatura premium</a> em troca de
+meras características cosméticas que, na escola, sublinham a lacuna
+socioeconômica entre aqueles que podem pagar e aqueles que não podem.</p>
+
+    <p>A estratégia de <a href="/education/edu-schools.html">usar escolas como
+ponto de pesca de clientes </a> é uma prática comum tradicionalmente adotada
+por empresas de software não livres.</p>
+  </li>
+
+  <li id="M202007020">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>BMW está tentando <a
+href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates";>bloquear
+certos recursos de seus carros e forçar as pessoas a pagar para usar parte
+do carro que já compraram</a>. Isso é feito por meio da atualização 
forçada
+do software do carro por meio de uma <em>backdoor</em> operada por rádio.</p>
+  </li>
+
+  <li id="M201905300">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O aplicativo de “fertilidade” Femm é secretamente uma <a
+href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners";>
+ferramenta de propaganda</a> por cristãos natalistas. Ele espalha a
+desconfiança pela contracepção.</p>
+
+    <p>Ele bisbilhota os usuários também, como você deve esperar de 
programas não
+livres.</p>
+  </li>
+
+  <li id="M201904260">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os robôs de brinquedo Jibo foram amarrados ao servidor do fabricante, e <a
+href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648";> a empresa
+fez com que todos parassem de funcionar</a> desligando o servidor.</p>
+
+    <p>O desligamento pode, ironicamente, ser bom para seus usuários, já que 
o
+produto foi projetado para manipular as pessoas, apresentando uma aparência
+falsa de emoções, e certamente estava espionando elas.</p>
+  </li>
+
+  <li id="M201809121">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Tiny Lab Productions, junto com empresas de publicidade online
+administradas pelo Google, Twitter e três outras empresas estão enfrentando
+uma ação judicial <a
+href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html";>por
+violar a privacidade das pessoas ao coletar seus dados de jogos para celular
+e repassar esses dados a outras empresas/anunciantes</a>.</p>
+  </li>
+
+  <li id="M201808131">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.theverge.com/2018/8/13/17684660/google-turn-off-location-history-data";>O
+Google vai rastrear as pessoas mesmo se elas desativarem o histórico de
+localização</a>, usando o Google Maps, atualizações do tempo e pesquisas no
+navegador. O Google basicamente usa qualquer atividade do aplicativo para
+rastrear pessoas.</p>
+  </li>
+
+  <li id="M201308290">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>“Padrões escuros” são <a
+href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>interfaces
+de usuário projetadas para enganar os usuários, ou tornar as configurações
+de opções difíceis de encontrar</a>.</p>
+
+    <p>Isso permite que uma empresa como a Apple diga: “Permitimos que os 
usuários
+desativem essa opção” ao mesmo tempo que garante que poucos compreenderão
+como realmente desligá-lo.</p>
+  </li>
+</ul>
+</div>
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!--#include virtual="/proprietary/proprietary-menu.pt-br.html" -->
+<!--#include virtual="/server/footer.pt-br.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Envie perguntas em geral sobre a FSF e o GNU para <a
+href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>. Também existem <a
+href="/contact/">outros meios de contatar</a> a FSF. Links quebrados e
+outras correções ou sugestões podem ser enviadas para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+A equipe de traduções para o português brasileiro se esforça para oferecer
+traduções precisas e de boa qualidade, mas não estamos isentos de erros. Por
+favor, envie seus comentários e sugestões em geral sobre as traduções para
+<a
+href="mailto:web-translators@gnu.org";>&lt;web-translators@gnu.org&gt;</a>.
+</p><p>Consulte o <a href="/server/standards/README.translations.html">Guia
+para as traduções</a> para mais informações sobre a coordenação e a
+contribuição com traduções das páginas deste site.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc.</p>
+
+<p>Esta página está licenciada sob uma licença <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/deed.pt_BR";>Creative
+Commons Atribuição 4.0 Internacional</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.pt-br.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+A tradução das páginas na seção Proprietary teve a contribuição de:
+Cassiano Reinert Novais dos Santos <a
+href="mailto:caco@posteo.net";>&lt;caco@posteo.net&gt;</a> e
+Rafael Fontenelle <a
+href="mailto:rafaelff@gnome.org";>&lt;rafaelff@gnome.org&gt;</a>.</div>
+
+<p class="unprintable"><!-- timestamp start -->
+Última atualização:
+
+$Date: 2021/06/26 14:00:00 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>
+

Index: proprietary-obsolescence.pt-br.html
===================================================================
RCS file: proprietary-obsolescence.pt-br.html
diff -N proprietary-obsolescence.pt-br.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ proprietary-obsolescence.pt-br.html 26 Jun 2021 14:00:00 -0000      1.1
@@ -0,0 +1,281 @@
+<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-obsolescence.en.html" -->
+
+<!--#include virtual="/server/header.pt-br.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">
+!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>Obsolescência privativa - Projeto GNU - Free Software 
Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+
+<!--#include virtual="/proprietary/po/proprietary-obsolescence.translist" -->
+<!--#include virtual="/server/banner.pt-br.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Índice da Seção"
+      alt="&nbsp;[Índice da Seção]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="Página inicial do GNU" title="Página inicial do GNU" /></a>&nbsp;/ 
<a href="/proprietary/proprietary.html"><em>Malware</em>
+privativo</a>&nbsp;/ Por tipo&nbsp;/
+</p>
+</div>
+
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.pt-br.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Obsolescência privativa</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>O software não livre (privativo) é muitas vezes um <em>malware</em>
+(projetado para maltratar o usuário). O software não livre é controlado por
+seus desenvolvedores, o que os coloca em uma posição de poder sobre os
+usuários; <a href="/philosophy/free-software-even-more-important.html">isso
+é a injustiça básica</a>. Os desenvolvedores e fabricantes muitas vezes
+exercem esse poder em detrimento dos usuários aos quais eles deveriam
+servir.</p>
+
+<p>Isso geralmente assume a forma de funcionalidades maliciosas.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>A obsolescência programada é uma das funcionalidades maliciosas que podem
+ser projetadas em software privativo.</p>
+
+<p>A tecnologia computacional tem inevitavelmente um impacto ambiental, mas o
+software privativo torna-o pior porque muitas vezes é projetado para levar
+ou pressionar os usuários a descartar dispositivos mais cedo porque o
+suporte a eles foi interrompido, ou descartar hardware defeituoso que
+poderia ter sido reparado.</p>
+
+<p>Aqui estão alguns exemplos de programas privativos que tornam os
+dispositivos de hardware prematuramente obsoletos.</p>
+
+<div class="important">
+<p>Se você conhece um exemplo que deveria estar nesta página, mas não está
+aqui, por favor, escreva para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a> para nos
+informar. Por favor, inclua a URL de uma ou duas referências confiáveis para
+servir como comprovação específica.</p>
+</div>
+
+<div class="column-limit" id="proprietary-obsolescence"></div>
+
+<ul class="blurbs">
+  <li id="M202101040">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O software de gestão de finanças pessoais “Quicken” <a
+href="https://www.quicken.com/support/quicken-discontinuation-policy";> tem
+uma política de descontinuação, também conhecida como obsolescência
+programada</a>, que é uma injustiça para os usuários. Um programa livre
+permitiria aos usuários controlar o software. Mas quando você usa um
+software privativo, você não estará no controle.</p>
+  </li>
+
+  <li id="M201908220">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O ChromeBooks está programado para obsolescência: o ChromeOS possui um
+<em>backdoor</em> universal usado para atualizações e <a
+href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/";>
+deixa de funcionar em uma data predefinida</a>. A partir de então, parece
+não haver suporte para o computador.</p>
+
+    <p>Em outras palavras, quando você para de se ferrar pelo 
<em>backdoor</em>,
+começa a se ferrar pela obsolescência.</p>
+  </li>
+
+  <li id="M201903250">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O supermercado britânico Tesco vendeu tablets que estavam amarrados ao
+servidor da Tesco para reinstalar as configurações padrão. Tesco <a
+href="https://www.theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix";>
+desligou o servidor para modelos antigos</a>, então, agora, se você tentar
+reinstalar as configurações padrão, eles serão inutilizados.</p>
+  </li>
+
+  <li id="M201810240">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Apple e Samsung deliberadamente <a
+href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones";>degradam
+o desempenho de telefones antigos para forçar usuários a comprar seus novos
+telefones</a>.</p>
+  </li>
+
+  <li id="M201706060">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple vai parar de <a
+href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete";>corrigir
+erros em modelos mais antigos de iCoisas</a>.</p>
+
+    <p>Enquanto isso, a Apple impede que as pessoas resolvam os problemas 
sozinhas;
+essa é a natureza do software privativo.</p>
+  </li>
+
+  <li id="M201604050">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Revolv é um dispositivo que gerenciava as operações da “casa 
inteligente”:
+trocar luzes, operar sensores de movimento, regular a temperatura etc. Seu
+software privativo depende de um servidor remoto para executar essas
+tarefas. Em 15 de maio de 2016, Google/Alphabet <a
+href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be";>
+intencionalmente inutilizou-o desligando o servidor</a>.</p>
+
+    <p>Se fosse um software livre, os usuários teriam a capacidade de fazê-lo
+funcionar de novo, de maneira diferente, e então teriam uma casa que
+respeita a liberdade em vez de uma casa “inteligente”. Não permita que o
+software privativo controle seus dispositivos e os transforme em tijolos de
+US$ 300,00 sem garantia. Insista em computadores independentes que usem
+apenas software livre!</p>
+  </li>
+
+  <li id="M201601100">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a href="http://michaelweinberg.org/post/137045828005/free-the-cube";> A
+impressora 3D “Cube” foi projetada com DRM</a>: ela não aceita materiais 
de
+impressão de terceiros. É o Keurig das impressoras. Agora ela está sendo
+descontinuada, o que significa que eventualmente materiais autorizados não
+estarão disponíveis e as impressoras podem ficar inutilizáveis.</p>
+
+    <p>Com uma <a 
href="http://www.fsf.org/resources/hw/endorsement/aleph-objects";>
+impressora que obtém a certificação Respects Your Freedom</a>, esse problema
+não seria nem mesmo uma possibilidade remota.</p>
+
+    <p>É lamentável que o autor daquele artigo diga que não havia “nada 
de errado”
+com o design do dispositivo em restringir os usuários em primeiro
+lugar. Isso é como colocar um aviso “me engane e me maltrate” no seu
+peito. Devemos saber melhor: devemos condenar todas as empresas que se
+aproveitam de pessoas como ele. Na verdade, é a aceitação de sua prática
+injusta que ensina as pessoas a serem capachos.</p>
+  </li>
+</ul>
+</div>
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!--#include virtual="/proprietary/proprietary-menu.pt-br.html" -->
+<!--#include virtual="/server/footer.pt-br.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Envie perguntas em geral sobre a FSF e o GNU para <a
+href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>. Também existem <a
+href="/contact/">outros meios de contatar</a> a FSF. Links quebrados e
+outras correções ou sugestões podem ser enviadas para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+A equipe de traduções para o português brasileiro se esforça para oferecer
+traduções precisas e de boa qualidade, mas não estamos isentos de erros. Por
+favor, envie seus comentários e sugestões em geral sobre as traduções para
+<a
+href="mailto:web-translators@gnu.org";>&lt;web-translators@gnu.org&gt;</a>.
+</p><p>Consulte o <a href="/server/standards/README.translations.html">Guia
+para as traduções</a> para mais informações sobre a coordenação e a
+contribuição com traduções das páginas deste site.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc.</p>
+
+<p>Esta página está licenciada sob uma licença <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/deed.pt_BR";>Creative
+Commons Atribuição 4.0 Internacional</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.pt-br.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+A tradução das páginas na seção Proprietary teve a contribuição de:
+Cassiano Reinert Novais dos Santos <a
+href="mailto:caco@posteo.net";>&lt;caco@posteo.net&gt;</a> e
+Rafael Fontenelle <a
+href="mailto:rafaelff@gnome.org";>&lt;rafaelff@gnome.org&gt;</a>.</div>
+
+<p class="unprintable"><!-- timestamp start -->
+Última atualização:
+
+$Date: 2021/06/26 14:00:00 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: proprietary-sabotage.pt-br.html
===================================================================
RCS file: proprietary-sabotage.pt-br.html
diff -N proprietary-sabotage.pt-br.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ proprietary-sabotage.pt-br.html     26 Jun 2021 14:00:00 -0000      1.1
@@ -0,0 +1,1059 @@
+<!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary-sabotage.en.html" 
-->
+
+<!--#include virtual="/server/header.pt-br.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">
+!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>Sabotagem privativa - Projeto GNU - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+
+<!--#include virtual="/proprietary/po/proprietary-sabotage.translist" -->
+<!--#include virtual="/server/banner.pt-br.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Índice da Seção"
+      alt="&nbsp;[Índice da Seção]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="Página inicial do GNU" title="Página inicial do GNU" /></a>&nbsp;/ 
<a href="/proprietary/proprietary.html"><em>Malware</em>
+privativo</a>&nbsp;/ Por tipo&nbsp;/
+</p>
+</div>
+
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.pt-br.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Sabotagem privativa</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>O software não livre (privativo) é muitas vezes um <em>malware</em>
+(projetado para maltratar o usuário). O software não livre é controlado por
+seus desenvolvedores, o que os coloca em uma posição de poder sobre os
+usuários; <a href="/philosophy/free-software-even-more-important.html">isso
+é a injustiça básica</a>. Os desenvolvedores e fabricantes muitas vezes
+exercem esse poder em detrimento dos usuários aos quais eles deveriam
+servir.</p>
+
+<p>Isso geralmente assume a forma de funcionalidades maliciosas.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>Algumas funcionalidades maliciosas são meios para sabotagem, ou seja, a
+interferência abusiva do desenvolvedor no uso do software, com consequências
+prejudiciais para os usuários. Exemplos de tais situações estão listados
+abaixo.</p>
+
+<div class="important">
+<p>Se você conhece um exemplo que deveria estar nesta página, mas não está
+aqui, por favor, escreva para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a> para nos
+informar. Por favor, inclua a URL de uma ou duas referências confiáveis para
+servir como comprovação específica.</p>
+</div>
+
+<div class="column-limit" id="proprietary-sabotage"></div>
+
+<ul class="blurbs">
+  <li id="M202105040">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Uma empresa de motocicletas chamada Klim está vendendo coletes de airbag 
com
+diferentes métodos de pagamento, um deles é por meio de um <a
+href="https://www.vice.com/en/article/93yyyd/this-motorcycle-airbag-vest-will-stop-working-if-you-miss-a-payment";>opção
+privativa baseada em assinatura que bloqueará o aumento do colete se os
+pagamentos não forem realizados</a>.</p>
+
+    <p>Eles dizem que há um período de carência de 30 dias se você perder 
um
+pagamento, mas o período de carência não é desculpa para a 
insegurança.</p>
+  </li>
+
+  <li id="M202011120">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple <a
+href="https://sneak.berlin/20201112/your-computer-isnt-yours";>implementou um
+<em>malware</em> em seus computadores que impõe vigilância</a> aos usuários
+e relata a computação dos usuários à Apple.</p>
+
+    <p>Os relatórios não são criptografados e eles já vazaram esses dados 
por dois
+anos. Este <em>malware</em> está relatando à Apple qual usuário abre qual
+programa e a que horas. Também dá à Apple o poder de sabotar a computação
+dos usuários.</p>
+  </li>
+
+  <li id="M202011060">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um novo aplicativo publicado pelo Google <a
+href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/";>permite
+que bancos e credores desativem os dispositivos Android das pessoas</a> se
+eles deixam de fazer pagamentos. Se o dispositivo de alguém for desativado,
+ele ficará limitado às funcionalidades básicas, como chamadas de emergência
+e acesso às configurações.</p>
+  </li>
+
+  <li id="M202010120">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Samsung está forçando que seus usuários de smartphones em Hong Kong (e
+Macau) <a
+href="https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-dns-service-upon-hong-kong-wifi-users/";>usem
+um DNS público na China Continental</a>, usando a atualização de software
+lançada em setembro de 2020, o que causa muitas preocupações e 
preocupações
+com a privacidade.</p>
+  </li>
+
+  <li id="M202008182">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os <i lang="en">headsets</i> Oculus <a
+href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october";>
+exigem que os usuários identifiquem para o Facebook</a>. Isso dará ao
+Facebook liberdade para bisbilhotar os usuários Oculus de forma
+generalizada.</p>
+  </li>
+
+  <li id="M202007270">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O fogão <i lang="fr">sous-vide</i> Mellow está amarrado a um servidor. A
+empresa repentinamente <a
+href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/";>
+transformou essa amarração em uma assinatura</a>, proibindo os usuários
+aproveitem os “recursos avançados” do fogão, a menos que pagassem uma 
taxa
+mensal.</p>
+  </li>
+
+  <li id="M201912090">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os iMonstros e os telefones Android, quando usados no trabalho, proporcionam
+aos empregadores poderosos <a
+href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy";>
+recursos de bisbilhotamento e sabotagem</a> se eles instalarem seu próprio
+software no dispositivo. Muitos empregadores exigem isso. Para o
+funcionário, esse é simplesmente um software não livre, fundamentalmente
+injusto e perigoso como qualquer outro software não livre.</p>
+  </li>
+
+  <li id="M201910071">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Adobe <a
+href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order/";>
+cancelou as assinaturas de software de todos os usuários na
+Venezuela</a>. Isso demonstra como que um requisito de assinatura pode ser
+tornado em uma ferramenta para sabotagem.</p>
+  </li>
+
+  <li id="M201909160">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os usuários da Tesla alegam que a Tesla <a
+href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW";>instalou
+à força o software para reduzir a duração da bateria</a>, em vez de
+substituir as baterias com defeito. Tesla fez isso para evitar ter que
+atender a sua garantia.</p>
+
+    <p>Isso significa que o software privativo pode ser uma maneira de cometer
+perjúrio com impunidade.</p>
+  </li>
+
+  <li id="M201908130">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Quando a Apple suspeita de um usuário de fraude, ela julga o caso
+secretamente e apresenta o veredicto como um fato consumado. A punição para
+um usuário considerado culpado <a
+href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/";>é
+ser cortado para sempre, o que prejudica mais ou menos os dispositivos Apple
+do usuário para sempre</a>. Não há recurso.</p>
+  </li>
+
+  <li id="M201904041">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Microsoft tem <a
+href="https://borncity.com/win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/";>instalado
+forçadamente um programa de “remediação”</a> em computadores com
+determinadas versões do Windows 10. Remediação, na visão da Microsoft,
+significa <a
+href="https://support.microsoft.com/en-us/topic/kb4023057-update-for-windows-10-update-service-components-fccad0ca-dc10-2e46-9ed1-7e392450fb3a";>
+adulteração de configurações e arquivos dos usuários</a>, notadamente para
+“consertar” quaisquer componentes do sistema de atualização que os 
usuários
+possam ter desativado intencionalmente e, assim, recuperar o poder total
+sobre eles. A Microsoft repetidamente pressionou as versões defeituosas
+desse programa para as máquinas dos usuários, causando inúmeros problemas,
+alguns dos quais foram <a
+href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/";>críticos</a>.</p>
+
+    <p>Isso exemplifica a atitude arrogante e manipuladora que desenvolvedores 
de
+software privativo aprenderam a adotar em relação às pessoas que
+supostamente estão servindo. Migre para um <a
+href="/distros/free-distros.html">sistema operacional livre</a> se puder!</p>
+
+    <p>Se o seu empregador lhe forçar o uso do Windows, diga ao departamento
+financeiro como isso desperdiça seu tempo lidando com conexões intermináveis
+e falhas prematuras de hardware.</p>
+  </li>
+
+  <li id="M201904040">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>E-books “comprados” da loja da Microsoft verificam se seu DRM é válido
+conectando-se à loja toda vez que o “dono” quer lê-los. A Microsoft 
fechará
+esta loja, <a href="https://www.bbc.com/news/technology-47810367";>
+inutilizando todos os e-books sob DRM que já “vendeu”</a>. (O artigo 
também
+destaca as armadilhas do DRM.)</p>
+
+    <p>Esta é outra prova de que um produto com DRM não pertence à pessoa 
que o
+comprou. A Microsoft disse que reembolsará os clientes, mas isso não é
+desculpa para vendê-los livros restritos.</p>
+  </li>
+
+  <li id="M201903250">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O supermercado britânico Tesco vendeu tablets que estavam amarrados ao
+servidor da Tesco para reinstalar as configurações padrão. Tesco <a
+href="https://www.theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix";>
+desligou o servidor para modelos antigos</a>, então, agora, se você tentar
+reinstalar as configurações padrão, eles serão inutilizados.</p>
+  </li>
+
+  <li id="M201902041">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Vinte e nove aplicativos de “câmera de beleza” que costumavam estar no
+Google Play tinham uma ou mais funcionalidades maliciosas, como roubar fotos
+dos usuários em vez de “embelezá-las”, <a
+href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/";>
+empurrando anúncios indesejados e muitas vezes maliciosos para os usuários,
+e redirecionando-os para sites de <em>phishing</em></a> que roubaram suas
+credenciais. Além disso, a interface do usuário da maioria deles foi
+projetada para dificultar a desinstalação.</p>
+
+    <p>Os usuários devem, é claro, desinstalar esses aplicativos perigosos 
se ainda
+não o fizeram, mas eles também devem ficar longe de aplicativos não livres
+em geral. <em>Todos</em> os aplicativos não livres apresentam um risco
+potencial, porque não há uma maneira fácil de saber o que eles realmente
+fazem.</p>
+  </li>
+
+  <li id="M201811020">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O software gráfico da Foundry <a
+href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/";>
+relata informações para identificar quem está executando-o</a>. O resultado
+é muitas vezes uma ameaça legal que exige muito dinheiro.</p>
+
+    <p>O fato de que isso é usado para repressão de compartilhamento 
proibido torna
+ainda mais cruel.</p>
+
+    <p>Isso mostra que fazer cópias não autorizadas de software não livre 
não é uma
+cura para a injustiça do software não livre. Pode evitar pagar pelo
+desagradável, mas não pode torná-lo menos desagradável.</p>
+  </li>
+
+  <li id="M201810240">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Apple e Samsung deliberadamente <a
+href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones";>degradam
+o desempenho de telefones antigos para forçar usuários a comprar seus novos
+telefones</a>.</p>
+  </li>
+
+  <li id="M201810150">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os fabricantes de impressoras são muito inovadores – ao bloquear o uso de
+cartuchos de tinta substitutos independentes. Suas “atualizações de
+segurança” ocasionalmente impõem novas formas de DRM de cartucho. <a
+href="https://www.vice.com/en/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates";>
+A HP e a Epson fizeram isso</a>.</p>
+  </li>
+
+  <li id="M201807050">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O monitor <i lang="en">fitness</i> da Jawbone estava amarrado a um
+aplicativo privativo de telefone. Em 2017, a empresa fechou e fez o
+aplicativo parar de funcionar. <a
+href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which";>Todos
+os monitores existentes pararam de funcionar para sempre</a>.</p>
+
+    <p>O artigo concentra-se em mais um impulso desagradável, de que as 
vendas dos
+dispositivos quebrados continuaram. Mas consideramos isso como uma questão
+secundária. Isso fez com que as consequências desagradáveis se estendessem a
+algumas pessoas adicionais. O erro fundamental foi projetar os dispositivos
+para depender de outra coisa que não respeitou a liberdade dos usuários.</p>
+  </li>
+
+  <li id="M201806250">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O jogo Metal Gear Rising para MacOS foi amarrado a um servidor. A empresa <a
+href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm";>
+desligou o servidor e todas as cópias pararam de funcionar</a>.</p>
+  </li>
+
+  <li id="M201805310">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple <a
+href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia";>
+impediu que o Telegram atualizasse seu aplicativo por um mês</a>.</p>
+
+    <p>Isso evidentemente tem a ver com a ordem da Rússia à Apple para 
bloquear o
+Telegram na Rússia.</p>
+
+    <p>O cliente Telegram é um software livre em outras plataformas, mas não 
no
+iCoisas. Como <a href="/proprietary/proprietary-jails.html#apple">eles são
+prisões</a>, eles não permitem que nenhum aplicativo seja software livre.</p>
+  </li>
+
+  <li id="M201711080">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Logitech irá sabotar todos os dispositivos de controle doméstico da
+Harmony Link <a
+href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/";>
+desligando o servidor através do qual os supostos donos dos produtos se
+comunicam com eles</a>.</p>
+
+    <p>Os donos suspeitam que isso é para pressioná-los a comprar um modelo 
mais
+novo. Se forem sábios, aprenderão, antes, a desconfiar de qualquer produto
+que exija que os usuários conversem com eles por meio de algum serviço
+especializado.</p>
+  </li>
+
+  <li id="M201710044">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O MacOS High Sierra reformata as unidades de inicialização SSD à força 
e <a
+href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html";>
+altera o sistema de arquivos de HFS+ para APFS</a>, que não pode ser
+acessado em GNU/Linux, Windows ou mesmo em versões anteriores do MacOS.</p>
+  </li>
+
+  <li id="M201710040.1">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A câmera de vigilância doméstica da Canary foi sabotada por seu 
fabricante,
+<a
+href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change";>
+desligando muitos recursos, a menos que o usuário comece a pagar por uma
+assinatura</a>.</p>
+
+    <p>Com fabricantes como esses, quem precisa de <em>crackers</em>?</p>
+
+    <p>Os consumidores devem aprender a lição maior e rejeitar aparelhos 
conectados
+com software privativo embarcado. Cada um desses produtos é uma tentação em
+cometer sabotagem.</p>
+  </li>
+
+  <li id="M201709090">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Tesla usou software para limitar os clientes a usar apenas <a href =
+"https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-
+in-florida-to-help-people-evacuate / ">parte da bateria de alguns
+carros</a>.</p>
+  </li>
+
+  <li id="M201708230">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Sonos <a
+href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/";>
+disse a todos os seus consumidores: “Concordem” com bisbilhotamento ou o
+produto vai parar de funcionar</a>. <a
+href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/";>Outro
+artigo</a> diz que eles não mudarão o software à força, mas as pessoas não
+conseguirão fazer nenhuma atualização e, eventualmente, ele vai parar de
+funcionar.</p>
+  </li>
+
+  <li id="M201706060">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple vai parar de <a
+href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete";>corrigir
+erros em modelos mais antigos de iCoisas</a>.</p>
+
+    <p>Enquanto isso, a Apple impede que as pessoas resolvam os problemas 
sozinhas;
+essa é a natureza do software privativo.</p>
+  </li>
+
+  <li id="M201705180">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>As aves e coelhos de estimação foram implementados para o Second Life por
+uma empresa que amarrou seus alimentos a um servidor. <a
+href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying";>
+Ela desligou o servidor e os animais morreram, por assim dizer</a>.</p>
+  </li>
+
+  <li id="M201704194">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Microsoft fez com que o Windows 7 e 8 parassem de funcionar em alguns
+novos computadores, <a
+href="https://support.microsoft.com/pt-br/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that";>efetivamente
+forçando seus donos a mudar para o Windows 10</a>.</p>
+  </li>
+
+  <li id="M201704134">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A  Microsoft <a
+href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/";>
+abandonou o suporte para Windows 7 e 8 nos processadores recentes</a> com
+muita pressa.</p>
+
+    <p>Não faz diferença quais motivos legítimos a Microsoft possa ter para 
não
+trabalhar para apoiá-los. Se ele não quiser fazer esse trabalho, deve
+permitir que os usuários façam o trabalho.</p>
+  </li>
+
+  <li id="M201704120">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Anova sabotou os dispositivos de cozinha dos usuários com um <i
+lang="en">downgrade</i> que os amarrou a um servidor remoto. <a
+href="https://web.archive.org/web/20170415145520/https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/";>
+A menos que os usuários criem uma conta nos servidores da Anova, seus fogões
+não funcionarão</a>.</p>
+  </li>
+
+  <li id="M201704070">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p id="iphone7-sabotage">O iPhone 7 contém DRM especificamente projetado para 
<a
+href="https://www.vice.com/en/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock";>
+transformá-lo em um tijolo se uma loja de reparos “não autorizada”
+consertá-lo</a>. “Não autorizada” essencialmente significa qualquer 
pessoa
+além da Apple.</p>
+
+    <p><small>(O artigo usa o termo <i lang="en">“lock”</i> (cadeado) para
+descrever o DRM, mas preferimos usar o termo <a
+href="/philosophy/words-to-avoid.html#DigitalLocks"> algemas
+digitais</a>.)</small></p>
+  </li>
+
+  <li id="M201612200">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O desenvolvedor do Ham Radio Deluxe <a
+href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml";>sabotou
+um instalação do cliente como punição por postar um comentário 
negativo</a>.</p>
+
+    <p>A maioria das empresas de software privativo não usa seu poder tão
+duramente, mas é uma injustiça que todas <em>tenham</em> tal poder.</p>
+  </li>
+
+  <li id="M201609200">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um <i lang="en">downgrade</i> de firmware da HP <a
+href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update";>impôs
+DRM a algumas impressoras, que agora recusam para funcionar com cartuchos de
+tinta de terceiros</a>.</p>
+  </li>
+
+  <li id="M201606270">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p id="windows10-forcing">Em seus esforços para enganar os usuários do 
Windows 7 e 8 para que instalem
+o total espião Windows 10 contra sua vontade, a Microsoft forçou seus
+computadores a <a
+href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1";>
+baixar silenciosamente… todo o Windows 10</a>! Aparentemente, isso foi feito
+por meio de um <a
+href="/proprietary/proprietary-back-doors.html#windows-update">
+<em>backdoor</em> universal</a>. Os downloads indesejados <a
+href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/";>
+colocaram em risco operações importantes em regiões do mundo com
+conectividade deficiente</a>, mas muitas das pessoas que deixaram a
+instalação continuar descobriram que esta “atualização” era na verdade 
um <a
+href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
+<i lang="en">downgrade</i></a>.</p>
+  </li>
+
+  <li id="M201606080">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple <a
+href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/";>
+impede que os usuários corrijam os bugs de segurança no Quicktime para
+Windows</a>, enquanto se recusa a corrigi-los por conta própria.</p>
+  </li>
+
+  <li id="M201606010">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Após a Microsoft ter enganado um usuário para que ele aceite a 
instalação do
+Windows 10, <a
+href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/";>este
+percebe que não tem a opção de cancelar ou mesmo adiar a data de 
instalação
+imposta</a>.</p>
+
+    <p>Isso demonstra o que dissemos há anos: usar software privativo 
significa
+deixar alguém ter poder sobre você, e mais cedo ou mais tarde você vai se
+ferrar.</p>
+  </li>
+
+  <li id="M201605040">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O programa cliente Apple Music <a
+href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/";>percorre
+o sistema de arquivos do usuário em busca de arquivos de música, copia-os
+para um servidor Apple e os exclui</a>.</p>
+  </li>
+
+  <li id="M201604050">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Revolv é um dispositivo que gerenciava as operações da “casa 
inteligente”:
+trocar luzes, operar sensores de movimento, regular a temperatura etc. Seu
+software privativo depende de um servidor remoto para executar essas
+tarefas. Em 15 de maio de 2016, Google/Alphabet <a
+href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be";>
+intencionalmente inutilizou-o desligando o servidor</a>.</p>
+
+    <p>Se fosse um software livre, os usuários teriam a capacidade de fazê-lo
+funcionar de novo, de maneira diferente, e então teriam uma casa que
+respeita a liberdade em vez de uma casa “inteligente”. Não permita que o
+software privativo controle seus dispositivos e os transforme em tijolos de
+US$ 300,00 sem garantia. Insista em computadores independentes que usem
+apenas software livre!</p>
+  </li>
+
+  <li id="M201602050">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>iOS versão 9 para iCoisas <a
+href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair";>sabota-os
+irreparavelmente se forem consertados por alguém exceto a Apple</a>. A Apple
+acabou desistindo dessa política sob críticas dos usuários. No entanto, não
+reconheceu que isso estava errado.</p>
+  </li>
+
+  <li id="M201601310">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O driver privativo da FTDI para seus chips USB para serial foi projetado
+para <a
+href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/";>sabotar
+chips alternativos compatíveis</a> para que eles não funcionem mais. A
+Microsoft está <a
+href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again";>instalando
+isso automaticamente</a> como uma “atualização”.</p>
+  </li>
+
+  <li id="M201512140">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Lâmpadas “inteligentes” da Philips foram inicialmente projetadas para
+interagir com lâmpadas inteligentes de outras empresas, mas <a
+href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml";>
+posteriormente, a empresa atualizou o firmware para impedir a
+interoperabilidade</a>.</p>
+
+    <p>Se um produto for “inteligente” e você não o construiu, ele está 
servindo de
+maneira inteligente ao fabricante <em>contra você</em>.</p>
+  </li>
+
+  <li id="M201511244">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Há muito tempo que o Google tem <a
+href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted";>um
+<em>backdoor</em> para desbloquear remotamente um dispositivo Android</a>, a
+menos que seu disco esteja criptografado (possível desde o Android 5.0
+Lollipop, mas ainda não é o padrão).</p>
+  </li>
+
+  <li id="M201511240">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>“Atualizações” do Windows 10 <a
+href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/";>excluem
+aplicativos</a> sem pedir permissão.</p>
+  </li>
+
+  <li id="M201510020">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple forçou milhões de iCoisas a <a
+href="https://discussions.apple.com/thread/7256669?tstart=0";>baixar uma
+atualização do sistema sem perguntar aos usuários</a>. A Apple não instalou
+a atualização à força, mas apenas o download causou muitos problemas.</p>
+  </li>
+
+  <li id="M201509220">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
+A Lenovo instalou furtivamente <em>crapware</em> e <em>spyware</em> via
+BIOS</a> nas instalações do Windows. Note que o método de sabotagem
+específico usado pela Lenovo não afetou o GNU/Linux; também, uma 
instalação
+“limpa” do Windows não é realmente limpa, pois <a
+href="/proprietary/malware-microsoft.html">a Microsoft coloca seu próprio
+<em>malware</em></a>.</p>
+  </li>
+
+  <li id="M201504300">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Vizio <a
+href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";>
+usou uma “atualização” de firmware para fazer suas TVs bisbilhotarem o 
que
+os usuários assistem</a>. As TVs não faziam isso quando vendidas pela
+primeira vez.</p>
+  </li>
+
+  <li id="M201504090">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Mac OS X tinha um <a
+href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
+<em>backdoor</em> local intencional por 4 anos</a>, que podia ser explorado
+por invasores para obter privilégios de root.</p>
+  </li>
+
+  <li id="M201503260">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://web.archive.org/web/20191205010621/https://www.computerworld.com/article/3423768/windows-xp--end-of-an-era--end-of-an-error.html";>A
+Microsoft cortou as correções de segurança para o Windows XP, exceto para
+alguns grandes usuários que pagam exorbitantemente</a>.</p>
+
+    <p>A Microsoft vai <a
+href="https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/";>
+cortar o suporte para algumas versões do Internet Explorer</a> da mesma
+maneira.</p>
+
+    <p>Uma pessoa ou empresa tem o direito de parar de trabalhar em um 
determinado
+programa; o errado aqui é que a Microsoft faz isso depois de tornar os
+usuários dependentes da Microsoft, porque eles não são livres para pedir a
+ninguém para trabalhar no programa para eles.</p>
+  </li>
+
+  <li id="M201503210">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Amazon <a
+href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml";>
+fez o <i lang="en">downgrade</i> do software no Swindles dos usuários</a>
+para que aqueles que já tinham o root deixassem de funcionar.</p>
+  </li>
+
+  <li id="M201412040">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple <a
+href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs";>
+excluiu dos iPods as músicas que os usuários conseguiram de lojas de música
+da Internet que competiam com o iTunes</a>.</p>
+  </li>
+
+  <li id="M201410130">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.eff.org/deeplinks/2014/10/nintendo-updates-take-wii-u-hostage-until-you-agree-new-legal-terms";>A
+Nintendo sabotou remotamente todos os Wiis, fazendo-os não funcionar a menos
+que o usuário concorde com um novo EULA</a>.</p>
+
+    <p>Podemos ter certeza de que este EULA é injusto porque a injustiça é 
o único
+motivo para impor um EULA.</p>
+  </li>
+
+  <li id="M201405200.1">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A LG <a
+href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>
+desativou recursos de rede</a> em TVs “inteligentes” <em>adquiridas
+anteriormente</em>, a menos que os compradores concordassem em permitir que
+a LG comece a bisbilhotá-los e distribuir seus dados pessoais.</p>
+  </li>
+
+  <li id="M201401190">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Alguns <a
+href="http://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases";>
+jogos privativos atraem as crianças para gastar o dinheiro dos pais</a>.</p>
+  </li>
+
+  <li id="M201309054">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>A
+NSA colocou <em>backdoors</em> em softwares de criptografia não
+livres</a>. Não sabemos quais são, mas podemos ter certeza de que incluem
+alguns sistemas amplamente usados. Isso reforça o ponto de que você nunca
+pode confiar na segurança de um software não livre.</p>
+  </li>
+
+  <li id="M201306220">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>A
+Microsoft informa a NSA sobre bugs no Windows antes de corrigi-los</a>.</p>
+  </li>
+
+  <li id="M201305060">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os aplicativos da Adobe têm bombas-relógio: eles <a
+href="http://techcrunch.com/2013/05/06/adobe-goes-all-in-with-subscription-based-creative-cloud-will-stop-selling-regular-cs-licenses-shrink-wrapped-boxes/";>
+param de funcionar depois de um certo tempo</a>, após o qual o usuário deve
+pagar para estender o tempo.</p>
+
+    <p>Uma vez que houve um problema com os servidores que esses programas usam
+para verificar quem pagou e <a
+href="https://web.archive.org/web/20150120010845/http://www.macuser.co.uk/9015-adobe-creative-cloud-outage-leaves-adobe-users-locked-out";>
+os aplicativos deixaram de funcionar para todo mundo</a>.</p>
+  </li>
+
+  <li id="M201301280">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Plug-in Java não livre da Oracle para navegadores <a
+href="http://www.zdnet.com/article/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates/";>instala
+furtivamente outro software privativo irritante</a>.</p>
+
+    <p>Esse artigo desconsidera todas as outras coisas ruins sobre software
+privativo. Por exemplo, diz respeito à inclusão de Flash Player privativo
+(que tem um <a
+href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/";>recurso
+de vigilância</a> e DRM) no Chrome como uma coisa boa. O Chrome é um
+navegador privativo com um <em>backdoor</em> universal.</p>
+
+    <p>Não concordamos com a visão do artigo sobre essas questões, mas o
+apresentamos como uma referência factual.</p>
+
+    <p>Em 2014, <a
+href="https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html";>
+Oracle insistiu em continuar esta prática</a>.</p>
+  </li>
+
+  <li id="M201003300">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2010-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Sony <a
+href="https://www.eff.org/deeplinks/2010/03/sony-steals-feature-from-your-playstation-3";>sabotou
+o Playstation 3</a> com um <i lang="en">downgrade</i> de firmware que
+removeu o recurso que permitia aos usuários usarem GNU/Linux nele.</p>
+
+    <p>Posteriormente, a Sony enviou a polícia atrás de Geohot, depois que 
ele
+decifrou o código que impedia os usuários de alterar o firmware, e
+respondemos pedindo um <a href="http://boycottsony.org";>boicote à 
Sony</a>.</p>
+
+    <p>Em um acordo judicial, a Sony está <a
+href="http://arstechnica.com/tech-policy/2016/06/if-you-used-to-run-linux-on-your-ps3-you-could-get-55-from-sony/";>
+agora pagando pela sabotagem</a>.</p>
+  </li>
+
+  <li id="M200709270">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2007-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html";>
+Uma “atualização” de firmware da Apple transformou em tijolos os iPhones 
que
+foram desbloqueados</a>. A “atualização” também desativou aplicativos 
não
+aprovados pela <a href="/proprietary/proprietary-jails.html">censura da
+Apple</a>. Tudo isso foi aparentemente intencional.</p>
+  </li>
+</ul>
+</div>
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!--#include virtual="/proprietary/proprietary-menu.pt-br.html" -->
+<!--#include virtual="/server/footer.pt-br.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Envie perguntas em geral sobre a FSF e o GNU para <a
+href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>. Também existem <a
+href="/contact/">outros meios de contatar</a> a FSF. Links quebrados e
+outras correções ou sugestões podem ser enviadas para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+A equipe de traduções para o português brasileiro se esforça para oferecer
+traduções precisas e de boa qualidade, mas não estamos isentos de erros. Por
+favor, envie seus comentários e sugestões em geral sobre as traduções para
+<a
+href="mailto:web-translators@gnu.org";>&lt;web-translators@gnu.org&gt;</a>.
+</p><p>Consulte o <a href="/server/standards/README.translations.html">Guia
+para as traduções</a> para mais informações sobre a coordenação e a
+contribuição com traduções das páginas deste site.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright &copy; 2013, 2015-2021 Free Software Foundation, Inc.</p>
+
+<p>Esta página está licenciada sob uma licença <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/deed.pt_BR";>Creative
+Commons Atribuição 4.0 Internacional</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.pt-br.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+A tradução das páginas na seção Proprietary teve a contribuição de:
+Cassiano Reinert Novais dos Santos <a
+href="mailto:caco@posteo.net";>&lt;caco@posteo.net&gt;</a> e
+Rafael Fontenelle <a
+href="mailto:rafaelff@gnome.org";>&lt;rafaelff@gnome.org&gt;</a>.</div>
+
+<p class="unprintable"><!-- timestamp start -->
+Última atualização:
+
+$Date: 2021/06/26 14:00:00 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: proprietary-subscriptions.pt-br.html
===================================================================
RCS file: proprietary-subscriptions.pt-br.html
diff -N proprietary-subscriptions.pt-br.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ proprietary-subscriptions.pt-br.html        26 Jun 2021 14:00:00 -0000      
1.1
@@ -0,0 +1,289 @@
+<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-subscriptions.en.html" -->
+
+<!--#include virtual="/server/header.pt-br.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">
+!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>Assinaturas privativas - Projeto GNU - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+
+<!--#include virtual="/proprietary/po/proprietary-subscriptions.translist" -->
+<!--#include virtual="/server/banner.pt-br.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Índice da Seção"
+      alt="&nbsp;[Índice da Seção]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="Página inicial do GNU" title="Página inicial do GNU" /></a>&nbsp;/ 
<a href="/proprietary/proprietary.html"><em>Malware</em>
+privativo</a>&nbsp;/ Por tipo&nbsp;/
+</p>
+</div>
+
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.pt-br.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Assinaturas privativas</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>O software não livre (privativo) é muitas vezes um <em>malware</em>
+(projetado para maltratar o usuário). O software não livre é controlado por
+seus desenvolvedores, o que os coloca em uma posição de poder sobre os
+usuários; <a href="/philosophy/free-software-even-more-important.html">isso
+é a injustiça básica</a>. Os desenvolvedores e fabricantes muitas vezes
+exercem esse poder em detrimento dos usuários aos quais eles deveriam
+servir.</p>
+
+<p>Isso geralmente assume a forma de funcionalidades maliciosas.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>Parece simples dizer que um determinado programa “requer uma 
assinatura”. O
+que isso significa concretamente é que contém uma bomba-relógio, de modo que
+se recusará a operar após essa data. Ou então está <a
+href="/proprietary/proprietary-tethers.html#about-page">amarrado a um
+servidor</a>, e esse servidor verifica a data. Qualquer um deles é uma
+funcionalidade maliciosa.</p>
+
+<p>Exemplos de assinaturas de software que prejudicaram os usuários 
diretamente
+são fornecidos abaixo.</p>
+
+<div class="important">
+<p>Se você conhece um exemplo que deveria estar nesta página, mas não está
+aqui, por favor, escreva para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a> para nos
+informar. Por favor, inclua a URL de uma ou duas referências confiáveis para
+servir como comprovação específica.</p>
+</div>
+
+<div class="column-limit" id="proprietary-subscriptions"></div>
+
+<ul class="blurbs">
+  <li id="M202008180">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple pode, remotamente, <a
+href="https://www.theguardian.com/games/2020/aug/18/apple-sets-deadline-in-feud-with-fortnite-maker-epic-games";>
+cortar qualquer acesso do desenvolvedor às ferramentas de desenvolvimento de
+software</a> para iOS ou MacOS.</p>
+
+    <p>A Epic (alvo da Apple neste exemplo) faz jogos não livres que têm seus
+próprios <a
+href="https://ekgaming.com/2019/03/17/is-the-epic-games-store-spying-on-your-computer/";>
+recursos maliciosos</a>, mas isso não torna aceitável que a Apple tenha esse
+tipo de poder.</p>
+  </li>
+
+  <li id="M202007020">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>BMW está tentando <a
+href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates";>bloquear
+certos recursos de seus carros e forçar as pessoas a pagar para usar parte
+do carro que já compraram</a>. Isso é feito por meio da atualização 
forçada
+do software do carro por meio de uma <em>backdoor</em> operada por rádio.</p>
+  </li>
+
+  <li id="M201910071">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Adobe <a
+href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order/";>
+cancelou as assinaturas de software de todos os usuários na
+Venezuela</a>. Isso demonstra como que um requisito de assinatura pode ser
+tornado em uma ferramenta para sabotagem.</p>
+  </li>
+
+  <li id="M201902080">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os <a href="https://boingboing.net/2019/02/08/inkjet-dystopias.html";>
+cartuchos de “assinatura de tinta” têm DRM que se comunica constantemente
+com os servidores HP</a> para garantir que o usuário ainda esteja pagando
+pela assinatura e não imprima mais páginas do que o pago.</p>
+
+    <p>Mesmo que o programa de assinatura de tinta possa ser mais barato em 
alguns
+casos específicos, ela espiona os usuários e envolve restrições totalmente
+inaceitáveis no uso de cartuchos de tinta que, de outra forma, estariam
+funcionando.</p>
+  </li>
+
+  <li id="M201711010">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Sony trouxe de volta seu animal de estimação robótico Aibo, dessa vez 
<a
+href="https://www.vice.com/en/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet";>
+com um <em>backdoor</em> universal e amarrado a um servidor que requer
+assinatura</a>.</p>
+  </li>
+
+  <li id="M201710040.1">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A câmera de vigilância doméstica da Canary foi sabotada por seu 
fabricante,
+<a
+href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change";>
+desligando muitos recursos, a menos que o usuário comece a pagar por uma
+assinatura</a>.</p>
+
+    <p>Com fabricantes como esses, quem precisa de <em>crackers</em>?</p>
+
+    <p>Os consumidores devem aprender a lição maior e rejeitar aparelhos 
conectados
+com software privativo embarcado. Cada um desses produtos é uma tentação em
+cometer sabotagem.</p>
+  </li>
+
+  <li id="M201507150">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Microsoft Office força os usuários a <a
+href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>se
+inscreverem no Office 365 para poder criar/editar documentos</a>.</p>
+  </li>
+
+  <li id="M201402200">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.scientificamerican.com/article/adobe-software-subscription-model-means-you-cant-own-your-software/";>
+As ferramentas da Adobe exigem uma assinatura</a>. A Adobe também tentou <a
+href="http://chocolateandvodka.com/2014/02/20/adobe-creative-cloud-subscription-warning/";>
+enganar as pessoas tornando as assinaturas anuais</a>, mas isso é uma
+questão secundária em comparação com o erro básico da bomba-relógio. 
Quando
+for um programa privativo, ou mesmo <em>malware</em>, não se distraia com
+questões secundárias, como preço.</p>
+
+    <p><small>(Não repita o termo de marketing “Creative Cloud” exceto 
para
+expressar repulsa por ele. O <a
+href="/philosophy/words-to-avoid.html#CloudComputing"> termo “nuvem” é
+projetado para nebular a mente dos usuários</a>.)</small></p>
+  </li>
+</ul>
+</div>
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!--#include virtual="/proprietary/proprietary-menu.pt-br.html" -->
+<!--#include virtual="/server/footer.pt-br.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Envie perguntas em geral sobre a FSF e o GNU para <a
+href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>. Também existem <a
+href="/contact/">outros meios de contatar</a> a FSF. Links quebrados e
+outras correções ou sugestões podem ser enviadas para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+A equipe de traduções para o português brasileiro se esforça para oferecer
+traduções precisas e de boa qualidade, mas não estamos isentos de erros. Por
+favor, envie seus comentários e sugestões em geral sobre as traduções para
+<a
+href="mailto:web-translators@gnu.org";>&lt;web-translators@gnu.org&gt;</a>.
+</p><p>Consulte o <a href="/server/standards/README.translations.html">Guia
+para as traduções</a> para mais informações sobre a coordenação e a
+contribuição com traduções das páginas deste site.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright &copy; 2016-2021 Free Software Foundation, Inc.</p>
+
+<p>Esta página está licenciada sob uma licença <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/deed.pt_BR";>Creative
+Commons Atribuição 4.0 Internacional</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.pt-br.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+A tradução das páginas na seção Proprietary teve a contribuição de:
+Cassiano Reinert Novais dos Santos <a
+href="mailto:caco@posteo.net";>&lt;caco@posteo.net&gt;</a> e
+Rafael Fontenelle <a
+href="mailto:rafaelff@gnome.org";>&lt;rafaelff@gnome.org&gt;</a>.</div>
+
+<p class="unprintable"><!-- timestamp start -->
+Última atualização:
+
+$Date: 2021/06/26 14:00:00 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: proprietary-surveillance.pt-br.html
===================================================================
RCS file: proprietary-surveillance.pt-br.html
diff -N proprietary-surveillance.pt-br.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ proprietary-surveillance.pt-br.html 26 Jun 2021 14:00:00 -0000      1.1
@@ -0,0 +1,4296 @@
+<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-surveillance.en.html" -->
+
+<!--#include virtual="/server/header.pt-br.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">
+!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>Vigilância privativa - Projeto GNU - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+<style type="text/css" media="screen,print"><!--
+.pict {
+    width: 18em;
+    margin: 2em auto;
+}
+.pict p {
+    font-size: .9em;
+}
+@media (min-width: 46em) {
+    .pict {
+        width: 18em;
+        float: right;
+        margin: .3em 0 1em 2em;
+    }
+}
+-->
+</style>
+
+<!-- GNUN: localize URL /graphics/dog.small.jpg -->
+<!--#include virtual="/proprietary/po/proprietary-surveillance.translist" -->
+<!--#include virtual="/server/banner.pt-br.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Índice da Seção"
+      alt="&nbsp;[Índice da Seção]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="Página inicial do GNU" title="Página inicial do GNU" /></a>&nbsp;/ 
<a href="/proprietary/proprietary.html"><em>Malware</em>
+privativo</a>&nbsp;/ Por tipo&nbsp;/
+</p>
+</div>
+
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.pt-br.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Vigilância privativa</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>O software não livre (privativo) é muitas vezes um <em>malware</em>
+(projetado para maltratar o usuário). O software não livre é controlado por
+seus desenvolvedores, o que os coloca em uma posição de poder sobre os
+usuários; <a href="/philosophy/free-software-even-more-important.html">isso
+é a injustiça básica</a>. Os desenvolvedores e fabricantes muitas vezes
+exercem esse poder em detrimento dos usuários aos quais eles deveriam
+servir.</p>
+
+<p>Isso geralmente assume a forma de funcionalidades maliciosas.</p>
+<hr class="full-width" />
+</div>
+
+<div id="surveillance" class="pict">
+<a href="/graphics/dog.html">
+<img src="/graphics/dog.small.jpg" alt="Desenho de um cachorro, em dúvida 
sobre as três anúncios que apareceram em
+sua tela..." /></a>
+<p>“Como eles descobriram que eu sou um cachorro?”</p>
+</div>
+
+<div class="article">
+<p>Uma funcionalidade maliciosa comum é bisbilhotar o usuário. Esta página
+registra <strong>casos claramente estabelecidos de software privativo que
+espiona ou rastreia usuários</strong>. Os fabricantes até se recusam a <a
+href="https://techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/";>dizer
+se eles bisbilhotam os usuários para o estado</a>.</p>
+
+<p>Todos os aparelhos e aplicativos amarrados a um servidor específico são
+bisbilhoteiros por natureza. Não os listamos aqui porque eles têm sua
+própria página: <a
+href="/proprietary/proprietary-tethers.html#about-page">Amarrações
+privativas</a>.</p>
+
+<p>Existe um site semelhante denominado <a
+href="https://spyware.neocities.org";>Spyware Watchdog</a> que classifica
+programas de spyware, para que os usuários possam estar mais cientes de que
+estão instalando spyware.</p>
+
+<div class="important" style="clear: both">
+<p>Se você conhece um exemplo que deveria estar nesta página, mas não está
+aqui, por favor, escreva para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a> para nos
+informar. Por favor, inclua a URL de uma ou duas referências confiáveis para
+servir como comprovação específica.</p>
+</div>
+
+<div id="TOC" class="toc-inline">
+    <h3 id="TableOfContents">Conteúdo</h3>
+    <h4><a href="#Introduction">Introdução</a></h4>
+    <h4><a href="#OSSpyware"><i lang="en">Spyware</i> em laptops e 
desktops</a></h4>
+    <ul>
+      <li><a href="#SpywareInWindows">Windows</a></li>
+      <li><a href="#SpywareInMacOS">MacOS</a></li>
+      <li><a href="#SpywareInBIOS">BIOS</a></li>
+    </ul>
+    <h4><a href="#SpywareOnMobiles"><i lang="en">Spyware</i> em dispositivos
+móveis</a></h4>
+    <ul>
+      <li><a href="#SpywareInTelephones">Todos os telefones 
“inteligentes”</a></li>
+      <li><a href="#SpywareIniThings">iCoisas</a></li>
+      <li><a href="#SpywareInAndroid">Telefones Android</a></li>
+      <li><a href="#SpywareInElectronicReaders">Leitores de livros 
eletrônicos</a></li>
+     </ul>
+    <h4><a href="#SpywareInApplications"><i lang="en">Spyware</i> em 
aplicativos</a></h4>
+    <ul>
+      <li><a href="#SpywareInDesktopApps">Aplicativos de desktop</a></li>
+      <li><a href="#SpywareInMobileApps">Aplicativos móveis</a></li>
+      <li><a href="#SpywareInSkype">Skype</a></li>
+      <li><a href="#SpywareInGames">Jogos</a></li>
+    </ul>
+    <h4><a href="#SpywareInEquipment"><i lang="en">Spyware</i> em equipamento
+conectado</a></h4>
+    <ul>
+      <li><a href="#SpywareInTVSets">Aparelhos de TV</a></li>
+      <li><a href="#SpywareInCameras">Câmeras</a></li>
+      <li><a href="#SpywareInToys">Brinquedos</a></li>
+      <li><a href="#SpywareInDrones">Drones</a></li>
+      <li><a href="/proprietary/malware-appliances.html">Outros <i
+lang="en">appliances</i></a></li>
+      <li><a href="/proprietary/malware-webpages.html">Tecnologias 
vestíveis</a>
+        <ul>
+          <li><a href="#SpywareOnSmartWatches">Relógios 
“inteligentes”</a></li>
+        </ul>
+      </li>
+      <li><a href="#SpywareInVehicles">Veículos</a></li>
+      <li><a href="#SpywareInVR">Realidade virtual</a></li>
+    </ul>
+    <h4><a href="#SpywareOnTheWeb"><i lang="en">Spyware</i> na web</a></h4>
+    <ul>
+      <li><a href="#SpywareInChrome">Chrome</a></li>
+      <li><a href="#SpywareInJavaScript">JavaScript</a></li>
+      <li><a href="#SpywareInFlash">Flash</a></li>
+    </ul>
+    <h4><a href="#SpywareInNetworks"><i lang="en">Spyware</i> em redes</a></h4>
+</div>
+
+<div class="big-section">
+  <h3 id="Introduction">Introdução</h3>
+</div>
+<div style="clear: left;"></div>
+
+<p>Durante décadas, o movimento Software Livre denunciou a máquina de
+vigilância abusiva de empresas de <a
+href="/proprietary/proprietary.html">software privativo</a>, como a <a
+href="/proprietary/malware-microsoft.html">Microsoft</a> e <a
+href="/proprietary/malware-apple.html">Apple</a>. Nos últimos anos, essa
+tendência de observar as pessoas se espalhou por todos os setores, não
+apenas de software, mas também de hardware. Além disso, ele também se
+espalhou dramaticamente longe do teclado, na indústria de computação móvel,
+no escritório, em casa, em sistemas de transporte e na sala de aula.</p>
+
+<h4 id="AggregateInfoCollection">Dados agregados ou anonimizados</h4>
+
+<p>Muitas empresas, em sua política de privacidade, têm uma cláusula que 
afirma
+que compartilham informações agregadas e não pessoalmente identificáveis 
com
+terceiros/parceiros. Essas alegações são inúteis, por vários motivos:</p>
+
+<ul>
+    <li>Eles podem mudar a política a qualquer momento.</li>
+    <li>Eles podem distorcer as palavras distribuindo um “agregado” de 
dados
+“anonimizados” que podem ser identificados novamente e atribuídos aos
+indivíduos.</li>
+    <li>Os dados brutos que eles normalmente não distribuem podem ser obtidos 
por
+violações de dados.</li>
+    <li>Os dados brutos que eles normalmente não distribuem podem ser obtidos 
por
+ordens judiciais.</li>
+</ul>
+
+<p>Portanto, não devemos nos distrair com as declarações das empresas sobre 
o
+que elas <em>farão</em> com os dados que coletam. O errado é que eles
+coletam tudo.</p>
+
+<h4 id="LatestAdditions">Últimas adições</h4>
+
+<p>As inscrições em cada categoria estão em ordem cronológica inversa, com 
base
+nas datas de publicação dos artigos vinculados. As últimas adições estão
+listadas na <a href="/proprietary/proprietary.html#latest">página
+principal</a> da seção Malware.</p>
+
+
+
+<div class="big-section">
+  <h3 id="OSSpyware"><i lang="en">Spyware</i> em laptops e desktops</h3>
+  <span class="anchor-reference-id">(<a
+href="#OSSpyware">#OSSpyware</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+  <h4 id="SpywareInWindows">Windows</h4>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInWindows">#SpywareInWindows</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M201912160">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Microsoft está <a
+href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/";>enganando
+os usuários para que criem uma conta em sua rede</a> para poder instalar e
+usar o sistema operacional Windows, que é <em>malware</em>. A conta pode ser
+usada para vigilância e/ou violação dos direitos das pessoas de várias
+maneiras, como transformar o software adquirido em um produto por
+assinatura.</p>
+  </li>
+
+  <li id="M201712110">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O sistema operacional privativo da HP <a
+href="http://www.bbc.com/news/technology-42309371";>inclui um driver de
+teclado privativo com um <i lang="en">key logger</i> nele</a>.</p>
+  </li>
+
+  <li id="M201710134">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O programa de telemetria do Windows 10 envia informações à Microsoft 
sobre o
+computador do usuário e o uso do computador.</p>
+
+    <p>Além disso, para usuários que instalaram a quarta versão estável do 
Windows
+10, chamada de “Atualização para Criadores”, o Windows maximizou a
+vigilância <a
+href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law";>
+forçando a configuração do modo de telemetria para “Completo”</a>.</p>
+
+    <p>O <a
+href="https://docs.microsoft.com/pt-br/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level";>
+modo de telemetria “Completo”</a> permite que os engenheiros do Microsoft
+Windows acessem, entre outras coisas, as chaves de registro <a
+href="https://docs.microsoft.com/pt-br/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)">
+que podem conter informações confidenciais, como a senha de login do
+administrador</a>.</p>
+  </li>
+
+  <li id="M201702020">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Arquivos com restrição de DRM podem ser usados para <a
+href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users";>
+identificar as pessoas que navegam com Tor</a>. A vulnerabilidade existe
+apenas se você usar o Windows.</p>
+  </li>
+
+  <li id="M201611240">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Por padrão, o Windows 10 <a
+href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties";>envia
+informações de depuração para a Microsoft, incluindo despejos
+principais</a>. A Microsoft agora os distribui para outra empresa.</p>
+  </li>
+
+  <li id="M201608170.1">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Para aumentar a base de instalação do Windows 10, a Microsoft <a
+class="not-a-duplicate"
+href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
+descaradamente ignora a escolha e privacidade do usuário</a>.</p>
+  </li>
+
+  <li id="M201603170">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security";>
+O Windows 10 vem com 13 telas de opções de bisbilhotamento</a>, todas
+habilitadas por padrão, e desligá-las seria assustador para a maioria dos
+usuários.</p>
+  </li>
+
+  <li id="M201601050">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Parece que <a
+href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/";>
+o Windows 10 envia dados à Microsoft sobre quais aplicativos estão sendo
+executados</a>.</p>
+  </li>
+
+  <li id="M201512280">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Microsoft <a
+href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
+adicionou um <em>backdoor</em> em sua criptografia de disco</a>.</p>
+  </li>
+
+  <li id="M201511264">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um <i lang="en">downgrade</i> para o Windows 10 excluiu aplicativos de
+detecção de vigilância. Em seguida, outro <i lang="en">downgrade</i> inseriu
+um programa de espionagem geral. Os usuários perceberam isso e reclamaram,
+então a Microsoft o renomeou como <a
+href="https://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/";>
+para dar aos usuários a impressão de que ele havia sumido</a>.</p>
+
+    <p>Usar software privativo é um convite a tal tratamento.</p>
+  </li>
+
+  <li id="M201508180">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://web.archive.org/web/20150905163414/http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping";>
+Os dispositivos Intel serão capazes de ouvir a fala o tempo todo, mesmo
+quando “desligados”.</a></p>
+  </li>
+
+  <li id="M201508130">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/";>
+O Windows 10 envia informações identificáveis para a Microsoft</a>, mesmo se
+um usuário desativar a pesquisa do Bing e os recursos da Cortana, e ativar
+as configurações de proteção de privacidade.</p>
+  </li>
+
+  <li id="M201507300">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Windows 10 <a
+href="https://web.archive.org/web/20180923125732/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/";>
+vem com configurações padrão que não mostram nenhuma consideração pela
+privacidade de seus usuários</a>, dando à Microsoft o “direito” para
+bisbilhotar os arquivos dos usuários, entrada de texto, entrada de voz,
+informações de localização, contatos, registros de calendário e 
histórico de
+navegação na web, bem como conectar automaticamente as máquinas para abrir
+pontos de acesso e exibir anúncios direcionados.</p>
+
+    <p>Podemos supor que a Microsoft analisa os arquivos dos usuários do 
governo
+dos Estados Unidos sob demanda, embora a “política de privacidade” não 
diga
+isso explicitamente. Ela examinará os arquivos dos usuários do governo
+chinês sob demanda?</p>
+  </li>
+
+  <li id="M201506170">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Microsoft usa a “política de privacidade” do Windows 10; para impor
+abertamente um “direito” de ver os arquivos dos usuários a qualquer
+momento. A criptografia de disco completo do Windows 10 <a
+href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/";>
+dá uma chave à Microsoft</a>.</p>
+
+    <p>Assim, o Windows é um <em>malware</em> evidente no que diz respeito à
+vigilância, como em outras questões.</p>
+
+    <p>O “ID de publicidade” único para cada usuário permite que outras 
empresas
+rastreiem a navegação de cada usuário específico.</p>
+
+    <p>É como se a Microsoft tivesse escolhido deliberadamente tornar o 
Windows 10
+o máximo maléfico em todas as dimensões; para obter poder total sobre
+qualquer um que não abandone o Windows agora.</p>
+  </li>
+
+  <li id="M201410040">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Só piora com o tempo. <a
+href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html";>
+O Windows 10 exige que os usuários deem permissão para bisbilhotamento
+total</a>, incluindo seus arquivos, seus comandos, sua entrada de texto e
+sua entrada de voz.</p>
+  </li>
+
+  <li id="M201401150">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p id="baidu-ime"><a
+href="https://www.techrepublic.com/blog/asian-technology/japanese-government-warns-baidu-ime-is-spying-on-users/";>
+Os aplicativos de entrada japonesa e chinesa do Baidu espionam os
+usuários</a>.</p>
+  </li>
+
+  <li id="M201307080">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><i lang="en">Spyware</i> em versões anteriores do Windows: <a
+href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
+Windows Update bisbilhota o usuário</a>. <a
+href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>
+Windows 8.1 bisbilhota pesquisas locais</a>. E há uma <a
+href="http://www.marketoracle.co.uk/Article40836.html";> chave secreta da NSA
+no Windows</a>, cujas funções não conhecemos.</p>
+  </li>
+</ul>
+
+
+<p>O bisbilhotamento da Microsoft sobre os usuários não começou com o 
Windows
+10. Há muito mais <a href="/proprietary/malware-microsoft.html">
+<em>malware</em> da Microsoft</a>.</p>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInMacOS">MacOS</h4>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInMacOS">#SpywareInMacOS</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M202011120">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple <a
+href="https://sneak.berlin/20201112/your-computer-isnt-yours";>implementou um
+<em>malware</em> em seus computadores que impõe vigilância</a> aos usuários
+e relata a computação dos usuários à Apple.</p>
+
+    <p>Os relatórios não são criptografados e eles já vazaram esses dados 
por dois
+anos. Este <em>malware</em> está relatando à Apple qual usuário abre qual
+programa e a que horas. Também dá à Apple o poder de sabotar a computação
+dos usuários.</p>
+  </li>
+
+  <li id="M201809070">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Adware Doctor, um bloqueador de anúncios para MacOS, <a
+href="https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history";>relata
+o histórico de navegação do usuário</a>.</p>
+  </li>
+
+  <li id="M201411040">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple fez com que vários <a
+href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud";>
+programas de MacOS enviassem arquivos para servidores Apple sem pedir
+permissão</a>. Isso expõe os arquivos ao <i lang="en">Big Brother</i> e
+talvez a outros bisbilhoteiros.</p>
+
+    <p>Também demonstra como você não pode confiar em software privativo, 
porque
+mesmo que a versão de hoje não tenha uma funcionalidade maliciosa, a versão
+de amanhã pode adicioná-la. O desenvolvedor não removerá o defeito, a menos
+que muitos usuários façam força, e os usuários não possam removê-lo
+sozinhos.</p>
+  </li>
+
+  <li id="M201410300">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p> O MacOS automaticamente <a
+href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/";>
+envia aos servidores da Apple documentos não salvos que estão sendo
+editados</a>. As coisas que você ainda não decidiu salvar são <a
+href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/";>
+ainda mais sensíveis</a> que as coisas que você armazenou nos arquivos.</p>
+  </li>
+
+  <li id="M201410220">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple admite <a
+href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/";>
+espionagem em um mecanismo de pesquisa</a>, mas há muito <a
+href="https://github.com/fix-macosx/yosemite-phone-home";> mais
+bisbilhotamento que a Apple não falou</a>.</p>
+  </li>
+
+  <li id="M201410200">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Várias operações <a
+href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540";>
+no MacOS mais recente enviam relatórios para os servidores da Apple</a>.</p>
+  </li>
+
+  <li id="M201401100.1">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A <a
+href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
+pesquisa do Spotlight</a> envia os termos de pesquisa dos usuários para a
+Apple.</p>
+  </li>
+</ul>
+
+
+<p>Há muito mais <a href="#SpywareIniThings"><em>spyware</em> em iCoisas</a> e
+<a href="/proprietary/malware-apple.html"><em>malware</em> da Apple</a>.</p>
+
+
+<div class="big-subsection">
+  <span id="SpywareAtLowLevel"></span>
+  <h4 id="SpywareInBIOS">BIOS</h4>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M201509220">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
+A Lenovo instalou furtivamente <em>crapware</em> e <em>spyware</em> via
+BIOS</a> nas instalações do Windows. Note que o método de sabotagem
+específico usado pela Lenovo não afetou o GNU/Linux; também, uma 
instalação
+“limpa” do Windows não é realmente limpa, pois <a
+href="/proprietary/malware-microsoft.html">a Microsoft coloca seu próprio
+<em>malware</em></a>.</p>
+  </li>
+</ul>
+
+
+
+<div class="big-section">
+  <h3 id="SpywareOnMobiles"><i lang="en">Spyware</i> em dispositivos 
móveis</h3>
+  <span class="anchor-reference-id">(<a
+href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+  <h4 id="SpywareInTelephones">Todos os telefones “inteligentes”</h4>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M202106170">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-health-apps-harvest-user-data-global-study-shows";>Quase
+todos os aplicativos de saúde privativos coletam dados dos usuários</a>,
+incluindo informações confidenciais de saúde, identificadores de
+rastreamento e cookies para rastrear as atividades do usuário. Alguns desses
+aplicativos estão rastreando usuários em diferentes plataformas.</p>
+  </li>
+
+  <li id="M202102200">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O programa privativo Clubhouse é um <em>malware</em> e um desastre de
+privacidade. Clubhouse <a
+href="https://www.theguardian.com/commentisfree/2021/feb/20/why-hot-new-social-app-clubhouse-spells-nothing-but-trouble";>coleta
+dados pessoais de pessoas, como como gravações das conversas das pessoas</a>
+e, como um problema secundário, não as criptografa, o que mostra uma parte
+de segurança ruim do problema.</p>
+
+    <p>O número do Clubhouse ID e o ID da sala de bate-papo exclusivos de um
+usuário são transmitidos em texto simples, e a Agora (a empresa por trás do
+aplicativo) provavelmente teria acesso ao áudio bruto dos usuários,
+potencialmente fornecendo acesso ao governo chinês.</p>
+
+    <p>Mesmo com uma boa segurança de transmissão de dados, a coleta de dados
+pessoais de pessoas é errada e uma violação dos direitos de privacidade das
+pessoas.</p>
+  </li>
+
+  <li id="M202101080">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Em 2021, o WhatsApp (uma das subsidiárias do Facebook) está <a
+href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/";>forçando
+seus usuários a entregar dados pessoais confidenciais</a> para sua
+empresa-mãe. Isso aumenta o poder do Facebook sobre os usuários e prejudica
+ainda mais a privacidade e a segurança das pessoas.</p>
+
+    <p>Em vez do WhatsApp, você pode usar o <a
+href="https://directory.fsf.org/wiki/Jami";>GNU Jami</a>, que é um software
+livre e não coleta seus dados.</p>
+  </li>
+
+  <li id="M202006260">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A maioria dos aplicativos são <em>malware</em>, mas o aplicativo de 
campanha
+do Trump, assim como o aplicativo de campanha do Modi, é um <a
+href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/";><em>malware</em>
+especialmente nojento, ajudando empresas a bisbilhotar usuários assim como a
+eles mesmos</a>.</p>
+
+    <p>O artigo diz que o aplicativo do Biden tem uma abordagem geral menos
+manipuladora, mas isso não nos diz se possui funcionalidades que
+consideramos maliciosas, como o envio de dados que o usuário não solicitou
+explicitamente.</p>
+  </li>
+
+  <li id="M201809121">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Tiny Lab Productions, junto com empresas de publicidade online
+administradas pelo Google, Twitter e três outras empresas estão enfrentando
+uma ação judicial <a
+href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html";>por
+violar a privacidade das pessoas ao coletar seus dados de jogos para celular
+e repassar esses dados a outras empresas/anunciantes</a>.</p>
+  </li>
+
+  <li id="M201601110">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A extensão natural do monitoramento de pessoas por meio de “seus” 
telefones
+é o <a
+href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html";>
+software privativo garantir que eles não possam “enganar” o
+monitoramento</a>.</p>
+  </li>
+
+  <li id="M201510050">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>De acordo com Edward Snowden, <a
+href="http://www.bbc.com/news/uk-34444233";>as agências podem assumir o
+controle de smartphones</a> enviando mensagens de texto ocultas que permitem
+ligar os telefones e desligar, ouvir o microfone, recuperar dados de
+geolocalização do GPS, tirar fotos, ler mensagens de texto, ler chamadas,
+localização e histórico de navegação na web e ler a lista de contatos. 
Este
+<em>malware</em> foi projetado para se disfarçar de investigação.</p>
+  </li>
+
+  <li id="M201311120">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html";>
+A NSA pode interceptar dados em smartphones, incluindo iPhones, Android e
+BlackBerry</a>. Embora não haja muitos detalhes aqui, parece que isso não
+funciona através do <em>backdoor</em> universal que sabemos que quase todos
+os telefones portáteis possuem. Pode envolver a exploração de vários
+bugs. Existem <a
+href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>
+muitos bugs no software de rádio dos telefones</a>.</p>
+  </li>
+
+  <li id="M201307000">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Telefones portáteis com GPS <a
+href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers";>
+enviarão sua localização GPS por comando remoto, e os usuários não podem
+impedi-los</a>. (Os EUA afirmam que eventualmente exigirão que todos os
+novos telefones portáteis tenham GPS.)</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareIniThings">iCoisas</h4>
+  <span class="anchor-reference-id">(<a
+href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M202105240">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/";>A
+Apple está transferindo os dados iCloud de seus clientes chineses para um
+datacenter controlado pelo governo chinês</a>. A Apple já está armazenando
+as chaves de criptografia nesses servidores, obedecendo à autoridade
+chinesa, disponibilizando todos os dados do usuário chinês para o 
governo.</p>
+  </li>
+
+  <li id="M202009183">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Facebook <a
+href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html";>bisbilhota
+usuários do Instagram</a> ligando sub-repticiamente a câmera do 
dispositivo.</p>
+  </li>
+
+  <li id="M202004200">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O denunciante da Apple, Thomas Le Bonniec, relata que a Apple adotou a
+prática de ativar clandestinamente o software Siri para <a
+href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf";>
+gravar conversas de usuários quando eles não ativaram a Siri</a>. Isso não
+era apenas ocasional, era uma prática sistemática.</p>
+
+    <p>Seu trabalho era ouvir essas gravações, em um grupo que fazia as
+transcrições delas. Ele não acredita que a Apple tenha abandonado essa
+prática.</p>
+
+    <p>A única maneira confiável de evitar isso é o programa que controla o 
acesso
+ao microfone decidir quando o usuário “ativou” qualquer serviço, como
+software livre, e o sistema operacional sob ele livre também. Dessa forma,
+os usuários podem ter certeza de que a Apple não pode ouvi-los.</p>
+  </li>
+
+  <li id="M201910131">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Safari ocasionalmente <a
+href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/";>
+envia dados de navegação de dispositivos Apple na China ao serviço de
+Navegação Segura da Tencent</a>, para verificar URLs que possivelmente
+correspondem a sites “fraudulentos”. Como a Tencent colabora com o governo
+chinês, sua lista negra de navegação segura certamente contém os sites de
+oponentes políticos. Ao vincular as solicitações originárias de endereços 
IP
+únicos, o governo pode identificar dissidentes na China e em Hong Kong,
+colocando em risco suas vidas.</p>
+  </li>
+
+  <li id="M201905280">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Apesar do suposto compromisso da Apple com a privacidade, os aplicativos
+para iPhone contêm rastreadores ocupados à noite <a
+href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html";>
+enviando informações pessoais dos usuários para terceiros</a>.</p>
+
+    <p>O artigo menciona exemplos específicos: Microsoft OneDrive, Mint da 
Intuit,
+Nike, Spotify, The Washington Post, The Weather Channel (de propriedade da
+IBM), o serviço de alerta de crime Citizen, Yelp e DoorDash. Mas é provável
+que a maioria dos aplicativos não livres contenham rastreadores. Alguns
+deles enviam dados de identificação pessoal, como impressão digital do
+telefone, localização exata, endereço de e-mail, número de telefone ou até
+mesmo endereço de entrega (no caso da DoorDash). Uma vez que essa informação
+é coletada pela empresa, não há como dizer para que ela será usada.</p>
+  </li>
+
+  <li id="M201711250">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A DMCA e a Diretiva de Direitos Autorais da UE tornam <a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html";> ilegal
+estudar como aplicativos do iOS espionam os usuários</a>, pois isso exigiria
+contornar o DRM do iOS.</p>
+  </li>
+
+  <li id="M201709210">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>No sistema mais recente de iCoisas, “desligar” WiFi e Bluetooth da 
maneira
+óbvia <a
+href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off";>
+realmente não os desliga</a>. Uma maneira mais avançada realmente os
+desativa – somente até as 5h. Essa é a Apple para você – “Sabemos que 
você
+quer ser espionado”.</p>
+  </li>
+
+  <li id="M201702150">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple propõe <a
+href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen";>uma
+tela de toque para leitura de impressões digitais</a> – o que significaria
+nenhuma maneira de usá-lo sem tirar suas impressões digitais. Os usuários
+não têm como saber se o telefone os está bisbilhotando.</p>
+  </li>
+
+  <li id="M201611170">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>iPhones <a
+href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/";>enviam
+muitos dados pessoais para servidores da Apple</a>. O <i lang="en">Big
+Brother</i> pode obtê-los de lá.</p>
+  </li>
+
+  <li id="M201609280">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O aplicativo iMessage em iCoisas (produtos da Apple) <a
+href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/";>fala
+para um servidor cada número de telefone que o usuário digita</a>; o
+servidor grava esses números por pelo menos 30 dias.</p>
+  </li>
+
+  <li id="M201509240">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>iCoisas carregam automaticamente para os servidores da Apple todas as fotos
+e vídeos que eles fazem.</p>
+
+    <blockquote><p> A Biblioteca de Fotos do iCloud armazena todas as fotos e 
vídeos que você
+tira e os mantêm atualizados em todos os seus dispositivos. Todas as edições
+feitas são atualizadas automaticamente em todos os lugares. … 
</p></blockquote>
+
+    <p>(Das <a href="https://www.apple.com/icloud/photos/";>informações do 
iCloud da
+Apple</a>, acessado em 24 de setembro de 2015.) O recurso iCloud é <a
+href="https://support.apple.com/en-us/HT202033";>ativado pela inicialização
+do iOS</a>. O termo “nuvem” significa “por favor, não pergunte 
onde”.</p>
+
+    <p>Existe uma maneira de <a 
href="https://support.apple.com/en-us/HT201104";>
+desativar o iCloud</a>, mas ele está ativo por padrão, então ainda conta
+como uma funcionalidade de vigilância.</p>
+
+    <p>Pessoas desconhecidas aparentemente aproveitaram isso para <a
+href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence";>obter
+fotos nuas de muitas celebridades</a>. Eles precisaram quebrar a segurança
+da Apple para chegar até eles, mas a NSA pode acessar qualquer um deles por
+meio do <a
+href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+  </li>
+
+  <li id="M201409220">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Apple pode, e faz regularmente, <a
+href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>
+extrair remotamente alguns dados de iPhones para o estado</a>.</p>
+
+    <p>Isso pode ter melhorado com <a
+href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/";>
+melhorias de segurança do iOS 8</a>, mas <a
+href="https://firstlook.org/theintercept/2014/09/22/apple-data/";> não tanto
+quanto a Apple afirma</a>.</p>
+  </li>
+
+  <li id="M201407230">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services";>
+Vários “recursos” do iOS parecem existir para nenhum outro propósito 
além da
+vigilância</a>. Aqui está a <a
+href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf";>
+apresentação técnica</a>.</p>
+  </li>
+
+  <li id="M201401100">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O <a class="not-a-duplicate"
+href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
+iBeacon</a> permite que as lojas determinem exatamente onde está o iCoisa e
+também obtenham outras informações.</p>
+  </li>
+
+  <li id="M201312300">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep";>
+Ou a Apple ajuda a NSA a bisbilhotar todos os dados em um iCoisa ou é
+totalmente incompetente</a>.</p>
+  </li>
+
+  <li id="M201308080">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O iCoisa também <a
+href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/";>
+informa à Apple sua geolocalização</a> por padrão, embora isso possa ser
+desligado.</p>
+  </li>
+
+  <li id="M201210170">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2012-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Há também um recurso para sites rastrearem usuários, que está <a
+href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/";>
+habilitado por padrão</a>. (Esse artigo fala sobre iOS 6, mas ainda é
+verdadeiro no iOS 7.)</p>
+  </li>
+
+  <li id="M201204280">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2012-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os usuários não podem fazer um ID Apple (<a
+href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id";>necessário
+para instalar até aplicativos grátis</a>) sem fornecer um endereço de e-mail
+válido e sem receber o código de verificação que a Apple envia para 
ele.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInAndroid">Telefones Android</h4>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInAndroid">#SpywareInAndroid</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M202012070">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Aplicativos do Baidu foram <a
+href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/";>
+pegos coletando dados pessoais confidenciais</a> que podem ser usados para
+rastreamento vitalício de usuários e para colocá-los em perigo. Mais de 1,4
+bilhão de pessoas em todo o mundo são afetadas por esses aplicativos
+privativos e a privacidade dos usuários é ameaçada por esta ferramenta de
+vigilância. Os dados coletados pelo Baidu podem ser entregues ao governo
+chinês, possivelmente colocando o povo chinês em perigo.</p>
+  </li>
+
+  <li id="M202010120">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Samsung está forçando que seus usuários de smartphones em Hong Kong (e
+Macau) <a
+href="https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-dns-service-upon-hong-kong-wifi-users/";>usem
+um DNS público na China Continental</a>, usando a atualização de software
+lançada em setembro de 2020, o que causa muitas preocupações e 
preocupações
+com a privacidade.</p>
+  </li>
+
+  <li id="M202004300">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Telefones Xiaomi <a
+href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/";>relata
+muitas ações que o usuário executa</a>: iniciar um aplicativo, olhar uma
+pasta, visitar um site, ouvir uma música. Eles também enviam informações de
+identificação do dispositivo.</p>
+
+    <p>Outros programas não livres também bisbilhotam. Por exemplo, o 
Spotify e
+outros serviços de <i lang="en">streaming</i> fazem um dossiê sobre cada
+usuário e <a href="/malware/proprietary-surveillance.html#M201508210"> eles
+fazem os usuários se identificarem para pagar</a>. Sai, sai, Spotify
+amaldiçoado!</p>
+
+    <p>A Forbes exonera os mesmos erros quando os culpados não são chineses, 
mas
+condenamos isso, não importa quem o faça.</p>
+  </li>
+
+  <li id="M201812060">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O aplicativo do Facebook obteve &ldquo;consentimento&rdquo; para <a
+href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent";>
+enviar logs de chamadas automaticamente de telefones Android</a> enquanto
+disfarça a finalidade do &ldquo;consentimento&rdquo;.</p>
+  </li>
+
+  <li id="M201811230">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um telefone Android foi flagrado rastreando a localização mesmo durante o
+modo avião. Ele não enviou os dados de localização enquanto estava no modo
+avião. Em vez disso, <a
+href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/";>
+armazenou os dados e os enviou mais tarde</a>.</p>
+  </li>
+
+  <li id="M201711210">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Android rastreia a localização para o Google <a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml";>
+mesmo quando os “serviços de localização” estão desligados, mesmo 
quando o
+telefone não tem cartão SIM</a>.</p>
+  </li>
+
+  <li id="M201611150">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Alguns telefones portáteis <a
+href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html";>são
+vendidos com <i lang="en">spyware</i> enviando muitos dados para a
+China</a>.</p>
+  </li>
+
+  <li id="M201609140">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Google Play (um componente do Android) <a
+href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg";>
+rastreia os movimentos dos usuários sem sua permissão</a>.</p>
+
+    <p>Mesmo se você desativar o Google Maps e o rastreamento de 
localização, você
+deve desativar o próprio Google Play para interromper completamente o
+rastreamento. Este é mais um exemplo de software não livre que finge
+obedecer ao usuário, quando na verdade está fazendo outra coisa. Isso seria
+quase impensável com o software livre.</p>
+  </li>
+
+  <li id="M201507030">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os telefones da Samsung vêm com <a
+href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/";>
+aplicativos que os usuários não podem excluir</a> e enviam tantos dados que
+sua transmissão representa uma despesa substancial para os usuários. A
+referida transmissão, não desejada ou solicitada pelo usuário, deve
+claramente constituir espionagem de algum tipo.</p>
+  </li>
+
+  <li id="M201403120">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a href="/proprietary/proprietary-back-doors.html#samsung">
+<em>Backdoors</em> da Samsung</a> fornecem acesso a qualquer arquivo no
+sistema.</p>
+  </li>
+
+  <li id="M201308010">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><i lang="en">spyware</i> em telefones Android (e laptops Windows?): The Wall
+Street Journal (em um artigo bloqueado para nós por exigir acesso pago)
+relata que <a
+href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj";>
+o FBI pode ativar remotamente o GPS e o microfone em telefones e laptops
+Android</a> (presumivelmente laptops Windows). Aqui estão <a
+href="http://cryptome.org/2013/08/fbi-hackers.htm";>mais informações</a>.</p>
+  </li>
+
+  <li id="M201307280">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O <i lang="en">spyware</i> está presente em alguns dispositivos Android no
+momento da venda. Alguns telefones da Motorola, fabricados quando esta
+empresa era propriedade do Google, usam uma versão modificada do Android que
+<a
+href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html";>
+envia dados pessoais para a Motorola</a>.</p>
+  </li>
+
+  <li id="M201307250">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um telefone Motorola <a
+href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/";>
+escuta a voz o tempo todo</a>.</p>
+  </li>
+
+  <li id="M201302150">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Google Play envia intencionalmente aos desenvolvedores de aplicativos <a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116";>
+os detalhes pessoais dos usuários que instalam o aplicativo</a>.</p>
+
+    <p>Simplesmente pedir o “consentimento” de usuários não é 
suficiente para
+legitimar ações como essa. Nesse ponto, a maioria dos usuários parou de ler
+os “Termos e Condições” que explicam ao que eles estão 
“consentindo”. O
+Google deve identificar de forma clara e honesta as informações que coleta
+sobre os usuários, em vez de ocultá-las em um EULA com palavras obscuras.</p>
+
+    <p>No entanto, para realmente proteger a privacidade das pessoas, devemos
+evitar que o Google e outras empresas obtenham essas informações pessoais em
+primeiro lugar!</p>
+  </li>
+
+  <li id="M201111170">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2011-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Alguns fabricantes adicionam um <a
+href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/";>
+pacote oculto de vigilância geral, como o Carrier IQ</a>.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInElectronicReaders">Leitores de livros eletrônicos</h4>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M201603080">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os e-books podem conter código JavaScript e, <a
+href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds";>
+às vezes, esse código bisbilhota os leitores</a>.</p>
+  </li>
+
+  <li id="M201410080">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Adobe fez o “Digital Editions”, o e-reader usado pela maioria das
+bibliotecas dos EUA, <a
+href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/";>
+enviar muitos dados para a Adobe</a>. A “desculpa” da Adobe: é necessário
+verificar o DRM!</p>
+  </li>
+
+  <li id="M201212030">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2012-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><i lang="en">Spyware</i> em muitos e-readers – não apenas no Kindle: <a
+href="https://www.eff.org/pages/reader-privacy-chart-2012";> eles relatam até
+mesmo qual página o usuário lê a que horas</a>.</p>
+  </li>
+</ul>
+
+
+
+<div class="big-section">
+  <h3 id="SpywareInApplications"><i lang="en">Spyware</i> em aplicativos</h3>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInApplications">#SpywareInApplications</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+  <h4 id="SpywareInDesktopApps">Aplicativos de desktop</h4>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M202011260">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O pacote Office 365 da Microsoft permite que os empregadores <a
+href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance";>bisbilhotem
+cada funcionário</a>. Depois de uma explosão pública, a Microsoft declarou
+que <a
+href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance";>iria
+remover esse recurso</a>. Esperemos.</p>
+  </li>
+
+  <li id="M201912190">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Descobriu-se que algumas extensões Avast e AVG para Firefox e Chrome <a
+href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome";>
+bisbilhotam os hábitos detalhados de navegação dos usuários</a>. A Mozilla 
e
+o Google removeram as extensões problemáticas de suas lojas, mas isso mostra
+mais uma vez como software não livre não seguro pode ser. As ferramentas que
+deveriam proteger um sistema privativo estão infectando-o com
+<em>malware</em> adicional (o próprio sistema sendo o <em>malware</em>
+original).</p>
+  </li>
+
+  <li id="M201811020">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O software gráfico da Foundry <a
+href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/";>
+relata informações para identificar quem está executando-o</a>. O resultado
+é muitas vezes uma ameaça legal que exige muito dinheiro.</p>
+
+    <p>O fato de que isso é usado para repressão de compartilhamento 
proibido torna
+ainda mais cruel.</p>
+
+    <p>Isso mostra que fazer cópias não autorizadas de software não livre 
não é uma
+cura para a injustiça do software não livre. Pode evitar pagar pelo
+desagradável, mas não pode torná-lo menos desagradável.</p>
+  </li>
+</ul>
+
+<div class="big-subsection">
+  <h4 id="SpywareInMobileApps">Aplicativos móveis</h4>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M202106030">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/";>Os
+aplicativos TikTok coletam identificadores biométricos e informações
+biométricas dos smartphones dos usuários</a>. A empresa por trás disso faz o
+que quer e coleta todos os dados que pode.</p>
+  </li>
+
+  <li id="M202104060">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/";>O
+aplicativo WeddingWire armazena as fotos do casamento das pessoas para
+sempre e entrega os dados a outros</a> e não dá às pessoas nenhum controle
+sobre suas informações/dados pessoais. O aplicativo às vezes também mostra
+fotos e memórias antigas para o usuário, sem que o usuário tenha controle
+sobre isso também.</p>
+  </li>
+
+  <li id="M202102010">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Muitos cr&hellip;apps, desenvolvidos por várias empresas para várias
+organizações, fazem <a
+href="https://www.expressvpn.com/digital-security-lab/investigation-xoth";>
+rastreamento de localização desconhecido para essas empresas e
+organizações</a>. Na verdade, são algumas bibliotecas amplamente utilizadas
+que fazem o rastreamento.</p>
+
+    <p>O que é incomum aqui é que o desenvolvedor de software privativo A 
engana os
+desenvolvedores de software privativo B1 … B50 em fazer plataformas para que
+A maltrate o usuário final.</p>
+  </li>
+
+  <li id="M202003260">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A versão Apple iOS do Zoom <a
+href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account";>está
+enviando dados de usuários para o Facebook</a> mesmo se o usuário não tiver
+uma conta no Facebook. De acordo com o artigo, Zoom e Facebook nem mesmo
+mencionam essa vigilância em sua página de política de privacidade,
+tornando-se uma violação óbvia da privacidade das pessoas até em seus
+próprios termos.</p>
+  </li>
+
+  <li id="M202003010">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O aplicativo Alipay Health Code estima se o usuário possui Covid-19 e <a
+href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html";>
+informa aos policiais diretamente</a>.</p>
+  </li>
+
+  <li id="M202001290">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O aplicativo Amazon Ring faz <a
+href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report";>
+vigilância para outras empresas bem como para a Amazon</a>.</p>
+  </li>
+
+  <li id="M201912220">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O aplicativo de mensagens ToToc parece ser uma <a
+href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html";>
+ferramenta de espionagem para o governo dos Emirados Árabes
+Unidos</a>. Qualquer programa não livre pode estar fazendo isso, e esse é um
+bom motivo para usar o software livre.</p>
+
+    <p><small>Note que o artigo usa a palavra <i lang="en">“free”</i> no 
sentido de
+“grátis”.</small></p>
+  </li>
+
+  <li id="M201912090">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os iMonstros e os telefones Android, quando usados no trabalho, proporcionam
+aos empregadores poderosos <a
+href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy";>
+recursos de bisbilhotamento e sabotagem</a> se eles instalarem seu próprio
+software no dispositivo. Muitos empregadores exigem isso. Para o
+funcionário, esse é simplesmente um software não livre, fundamentalmente
+injusto e perigoso como qualquer outro software não livre.</p>
+  </li>
+
+  <li id="M201910130">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O aplicativo “Study the Great Nation”, do Partido Comunista Chinês, 
exige
+que os usuários o concedam <a
+href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962";>
+acesso a microfone, fotos, mensagens de texto, contatos e histórico da
+Internet do telefone</a>, e a versão Android contém um <em>backdoor</em> que
+permite que os desenvolvedores executem qualquer código que desejarem desejo
+no telefone dos usuários, como “superusuários”. Baixar e usar este
+aplicativo é obrigatório em alguns locais de trabalho.</p>
+
+    <p>Nota: A <a
+href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html";>
+versão de artigo do Washington Post</a> (parcialmente ofuscada, mas legível
+após copiar e colar em um editor de texto) inclui um esclarecimento dizendo
+que os testes foram realizados apenas na versão Android do aplicativo e que,
+segundo a Apple, “esse tipo de vigilância de ‘superusuário’ não pôde 
ser
+realizado no sistema operacional da Apple”.</p>
+  </li>
+
+  <li id="M201909091">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O aplicativo do Facebook <a
+href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/";>
+rastreia os usuários mesmo quando está desativado</a>, depois de induzi-los
+a conceder amplas permissões ao aplicativo para usar uma de suas
+funcionalidades.</p>
+  </li>
+
+  <li id="M201909090">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Alguns aplicativos não livres de rastreamento de ciclo menstrual incluindo
+MIA Fem e Maya <a
+href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem";>
+enviam detalhes íntimos das vidas das usuárias para Facebook</a>.</p>
+  </li>
+
+  <li id="M201909060">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Manter rastro de quem faz o download de um programa privativo é uma forma 
de
+vigilância. Existe um programa privativo para ajustar uma certa mira de
+rifle. <a
+href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/";>
+Um promotor dos EUA exigiu a lista de todas as 10.000 ou mais pessoas que
+instalaram-no</a>.</p>
+
+    <p>Com um programa livre, não haveria uma lista de quem o instalou.</p>
+  </li>
+
+  <li id="M201907081">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Muitos desenvolvedores inescrupulosos de aplicativos para dispositivos
+móveis continuam encontrando maneiras de <a
+href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/";>
+contornar as configurações do usuário</a>, regulamentos e recursos de
+aprimoramento de privacidade do sistema operacional, com a finalidade de
+reunir o máximo de dados privados que puderem.</p>
+
+    <p>Assim, não podemos confiar em regras contra a espionagem. O que podemos
+confiar é em ter controle sobre o software que executamos.</p>
+  </li>
+
+  <li id="M201907080">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Muitos aplicativos do Android podem rastrear os movimentos dos usuários
+quando o usuário fala que <a
+href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location";>
+não permite-os acessar a localização</a>.</p>
+
+    <p>Isso evolve uma aparente falha não intencional no Android, explorada
+intencionalmente por aplicativos maliciosos.</p>
+  </li>
+
+  <li id="M201905300">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O aplicativo de “fertilidade” Femm é secretamente uma <a
+href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners";>
+ferramenta de propaganda</a> por cristãos natalistas. Ele espalha a
+desconfiança pela contracepção.</p>
+
+    <p>Ele bisbilhota os usuários também, como você deve esperar de 
programas não
+livres.</p>
+  </li>
+
+  <li id="M201905060">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A BlizzCon 2019 impôs um <a
+href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/";>
+requisito de executar um aplicativo privativo de telefone</a> para ser
+aceito no evento.</p>
+
+    <p>Esse aplicativo é um <i lang="en">spyware</i> que consegue bisbilhotar
+vários dados sensíveis, incluindo a localização e a lista de contato do
+usuário, e tem <a
+href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/";>
+controle quase completo</a> sobre seu telefone.</p>
+  </li>
+
+  <li id="M201904131">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os dados coletados pelos aplicativos de monitoramento menstrual e de
+gravidez estão muitas vezes <a
+href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance";>disponíveis
+para empregadores e empresas de seguros</a>. Mesmo que os dados sejam
+“anônimos e agregados”, pode ser facilmente rastreável até a mulher que 
usa
+o aplicativo.</p>
+
+    <p>Isto tem implicações prejudiciais para os direitos das mulheres a 
igualdade
+de emprego e liberdade de fazer suas próprias escolhas de gravidez. Não use
+esses aplicativos, mesmo que alguém lhe ofereça uma recompensa para isso. Um
+aplicativo de software livre que faz mais ou menos a mesma coisa sem lhe
+espionar está disponível no <a
+href="https://search.f-droid.org/?q=menstr";>F-Droid</a> e <a
+href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f";>
+um novo está sendo desenvolvido</a>.</p>
+  </li>
+
+  <li id="M201904130">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Google rastreia os movimentos de telefones Android e iPhones contendo os
+aplicativos do Google e, às vezes, <a
+href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html";>
+armazena os dados de anos</a>.</p>
+
+    <p>Software não livre no telefone tem que ser responsável por enviar os 
dados
+de localização para o Google.</p>
+  </li>
+
+  <li id="M201903251">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Muitos telefones Android vêm com um grande número de <a
+href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html";>
+aplicativos não livres pré-instalados que têm acesso a dados confidenciais
+sem o conhecimento dos usuários</a>. Esses aplicativos ocultos podem ligar
+para casa com os dados ou transmiti-los a aplicativos instalados pelo
+usuário que tenham acesso à rede, mas sem acesso direto aos dados. Isso
+resulta em uma vigilância maciça na qual o usuário não tem absolutamente
+nenhum controle.</p>
+  </li>
+
+  <li id="M201903201">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um estudo de 24 aplicativos de “saúde” descobriu que 19 deles <a
+href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows";>
+enviam dados pessoais sensíveis para terceiros</a>, os quais podem usá-los
+para publicidade invasiva ou discriminar pessoas em más condições 
médicas.</p>
+
+    <p>Sempre que o “consentimento” do usuário é solicitado, ele é 
soterrado com
+longos termos de serviço que são difíceis de entender. Em qualquer caso,
+“consentir” não é suficiente para legitimar o bisbilhotamento.</p>
+  </li>
+
+  <li id="M201902230">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Facebook ofereceu uma biblioteca privativa conveniente para a construção
+de aplicativos móveis, que também <a
+href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html";>
+enviava dados pessoais para o Facebook</a>. Muitas empresas criaram
+aplicativos dessa maneira e os lançaram, aparentemente sem perceber que
+todos os dados pessoais coletados também iriam para o Facebook.</p>
+
+    <p>Isso mostra que ninguém pode confiar em um programa não livre, nem 
mesmo os
+desenvolvedores de outros programas não livres.</p>
+  </li>
+
+  <li id="M201902140">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O banco de dados do AppCensus fornece informações sobre <a
+href="https://www.appcensus.mobi";> como os aplicativos de Android usam e
+fazem mau uso dos dados pessoais dos usuários</a>. Até março de 2019, quase
+78.000 foram analisados, dos quais 24.000 (31%) transmitem o <a
+href="/proprietary/proprietary-surveillance.html#M201812290"> ID de
+publicidade</a> para outras empresas e <a
+href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/";> 18.000
+(23% do total) vinculam esse ID a identificadores de hardware</a>, para que
+os usuários não possam escapar do rastreamento redefinindo-o.</p>
+
+    <p>A coleta de identificadores de hardware está em aparente violação das
+políticas do Google. Mas parece que o Google não estava ciente disso e, uma
+vez informado, não estava com pressa de agir. Isso prova que as políticas de
+uma plataforma de desenvolvimento são ineficazes para evitar que
+desenvolvedores de software não livres incluam <em>malware</em> em seus
+programas.</p>
+  </li>
+
+  <li id="M201902060">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Muitos aplicativos não livres têm um recurso de vigilância para <a
+href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/";>
+gravar todas as ações dos usuários</a> na interação com o aplicativo.</p>
+  </li>
+
+  <li id="M201902041.1">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Vinte e nove aplicativos de “câmera de beleza” que costumavam estar no
+Google Play tinham uma ou mais funcionalidades maliciosas, como <a
+href="http://web-old.archive.org/web/20190917162150/https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923";>
+roubar fotos dos usuários</a> em vez de “embelezá-las”, empurrando 
anúncios
+indesejados e muitas vezes maliciosos para os usuários, e redirecionando-os
+para sites de <i lang="en">phishing</i> que roubaram suas credenciais. Além
+disso, a interface do usuário da maioria deles foi projetada para dificultar
+a desinstalação.</p>
+
+    <p>Os usuários devem, é claro, desinstalar esses aplicativos perigosos 
se ainda
+não o fizeram, mas eles também devem ficar longe de aplicativos não livres
+em geral. <em>Todos</em> os aplicativos não livres apresentam um risco
+potencial, porque não há uma maneira fácil de saber o que eles realmente
+fazem.</p>
+  </li>
+
+  <li id="M201902010">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Uma investigação sobre os 150 aplicativos VPN mais populares do Google 
Play
+descobriu que <a
+href="https://www.top10vpn.com/free-vpn-android-app-risk-index/";> 25% deles
+não protegem a privacidade de seus usuários</a> devido a vazamentos de
+DNS. Além disso, 85% apresentam permissões intrusivas ou funções em seu
+código-fonte – muitas vezes usadas para publicidade invasiva – que também
+poderiam ser usadas para espionar usuários. Outras falhas técnicas foram
+encontradas também.</p>
+
+    <p>Além disso, uma investigação anterior descobrira que <a
+href="https://www.top10vpn.com/free-vpn-app-investigation/";>metade dos 10
+aplicativos grátis e mais populares de VPN tinham péssimas políticas de
+privacidade</a>.</p>
+
+    <p><small>É lamentável que esses artigos falem sobre <i lang="en">“free
+apps”</i>. Esses aplicativos são grátis, mas <em>não</em> são <a
+href="/philosophy/free-sw.html">software livre</a>.</small></p>
+  </li>
+
+  <li id="M201901050">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O aplicativo <em>Weather Channel</em> <a
+href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling";>
+armazenou locais dos usuários no servidor da empresa</a>. A empresa está
+sendo processada, demandando que ela notifique os usuários do que ela fará
+com os dados.</p>
+
+    <p>Acreditamos que o processo é sobre uma questão secundária. O que a 
empresa
+faz com os dados é uma questão secundária. O principal injustiça aqui é 
que
+a empresa consegue esses dados.</p>
+
+    <p><a
+href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps";>
+Outros aplicativos de meteorologia</a>, incluindo Accuweather e WeatherBug,
+estão rastreando as localizações das pessoas.</p> 
+  </li>
+
+  <li id="M201812290">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Cerca de 40% dos aplicativos grátis para Android <a
+href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report";>
+relatam as ações do usuário no Facebook</a>.</p>
+
+    <p>Muitas vezes eles enviam o “ID de publicidade” da máquina para que 
o
+Facebook possa correlacionar os dados que obtém da mesma máquina por meio de
+vários aplicativos. Alguns deles enviam informações detalhadas do Facebook
+sobre as atividades do usuário no aplicativo; outros dizem apenas que o
+usuário está usando esse aplicativo, mas isso por si só é muitas vezes
+bastante informativo.</p>
+
+    <p>Esta espionagem ocorre independentemente de o usuário ter uma conta no
+Facebook.</p>
+  </li>
+
+  <li id="M201810244">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Alguns aplicativos de Android <a
+href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/";>
+rastreiam os telefones de usuários que os excluíram</a>.</p>
+  </li>
+
+  <li id="M201808030">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Alguns aplicativos do Google no Android <a
+href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile";>
+registram a localização do usuário mesmo quando os usuários desativam
+“rastreamento de localização”</a>.</p>
+
+    <p>Existem outras maneiras de desligar os outros tipos de rastreamento de
+localização, mas a maioria dos usuários será enganada pelo controle
+enganoso.</p>
+  </li>
+
+  <li id="M201806110">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O aplicativo de transmissão de futebol espanhol pela internet <a
+href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html";>rastreia
+os movimentos do usuário e ouve pelo microfone</a>.</p>
+
+    <p>Isso os faz agir como espiões para o cumprimento do licenciamento.</p>
+
+    <p>É de se esperar que ele implemente DRM também – que não há como 
salvar uma
+gravação. Mas não podemos ter certeza pelo artigo.</p>
+
+    <p>Se você aprender a se importar menos com os esportes, terá muitos
+benefícios. Este é mais um.</p>
+  </li>
+
+  <li id="M201804160">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Foi descoberto que mais de <a
+href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy";>50%
+dos 5.855 aplicativos Android estudados por pesquisadores bisbilhotam e
+coletam informações sobre seus usuários</a>. Desses, 40% dos aplicativos
+delatam de forma insegura seus usuários. Além disso, foi possível detectar
+apenas alguns métodos de bisbilhotamento, nesses aplicativos privativos cujo
+código-fonte eles não podem ver. Outros aplicativos podem estar
+bisbilhotando de outras maneiras.</p>
+
+    <p>Isso é evidência de que aplicativos privativos geralmente funcionam 
contra
+seus usuários. Para proteger sua privacidade e liberdade, os usuários do
+Android precisam se livrar do software privativo – tanto o Android privativo
+<a href="https://replicant.us";>mudando para o Replicant</a> e os aplicativos
+privativos, obtendo aplicativos de software livre apenas da <a
+href="https://f-droid.org/";>loja do F-Droid</a> que <a
+href="https://f-droid.org/wiki/page/Antifeatures";> avisa o usuário de forma
+proeminente se um aplicativo contém características indesejadas</a>.</p>
+  </li>
+
+  <li id="M201804020">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Grindr coleta informações sobre <a
+href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status";>
+quais usuários são HIV positivos e, em seguida, fornece as informações às
+empresas</a>.</p>
+
+    <p>O Grindr não deveria ter tantas informações sobre seus usuários. 
Ele poderia
+ser projetado para que os usuários comuniquem essas informações uns aos
+outros, mas não ao banco de dados do servidor.</p>
+  </li>
+
+  <li id="M201803050">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O aplicativo, e desserviço, moviepass espiona os usuários ainda mais do 
que
+eles esperavam. Ele <a
+href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/";>
+registra onde eles viajam antes e depois de ir ao cinema</a>.</p>
+
+    <p>Não seja rastreado – pague em dinheiro!</p>
+  </li>
+
+  <li id="M201711240">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Softwares de rastreamento em aplicativos Android populares são abrangentes
+e, às vezes, muito inteligentes. Alguns rastreadores podem <a
+href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/";>
+seguir os movimentos de um usuário em torno de uma loja física observando as
+redes WiFi</a>.</p>
+  </li>
+
+  <li id="M201708270">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O aplicativo Sarahah <a
+href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/";>
+carrega todos os números de telefone e endereços de e-mail</a> na agenda de
+endereços do usuário para o servidor do desenvolvedor.</p>
+
+    <p><small>(Note que este artigo usa indevidamente as palavras “<a
+href="/philosophy/free-sw.html"><i lang="en">free software</i></a>”
+referindo-se a preço zero.)</small></p>
+  </li>
+
+  <li id="M201707270">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>20 aplicativos Android desonestos registram <a
+href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts";>telefonemas
+e mensagens de texto e e-mails enviados para bisbilhoteiros</a>.</p>
+
+    <p>O Google não pretendia tornar esses aplicativos em espiões; pelo 
contrário,
+funcionou de várias maneiras para evitar isso e excluiu esses aplicativos
+depois de descobrir o que eles faziam. Portanto, não podemos culpar o Google
+especificamente pelo bisbilhotamento desses aplicativos.</p>
+
+    <p>Por outro lado, o Google redistribui os aplicativos Android não livres 
e,
+portanto, compartilha da responsabilidade pela injustiça de não serem
+livres. Também distribui seus próprios aplicativos não livres, como o Google
+Play, <a href="/philosophy/free-software-even-more-important.html">que são
+maliciosos</a>.</p>
+
+    <p>O Google poderia ter feito um trabalho melhor para impedir que 
aplicativos
+trapaceiem? Não existe uma maneira sistemática de os usuários do Google ou
+do Android inspecionarem aplicativos privativos executáveis para ver o que
+eles fazem.</p>
+
+    <p>O Google poderia exigir o código-fonte desses aplicativos e estudar o
+código-fonte de alguma forma para determinar se eles maltratam os usuários
+de várias maneiras. Se fizesse um bom trabalho, poderia mais ou menos evitar
+tal bisbilhotamento, exceto quando os desenvolvedores de aplicativos fossem
+espertos o suficiente para serem mais espertos que a verificação.</p>
+
+    <p>Mas, uma vez que o próprio Google desenvolve aplicativos maliciosos, 
não
+podemos confiar no Google para nos proteger. Devemos exigir a liberação do
+código-fonte ao público, para que possamos depender uns dos outros.</p>
+  </li>
+
+  <li id="M201705230">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Aplicativos do BART <a
+href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/";>
+bisbilhotam os usuários</a>.</p>
+
+    <p>Com os aplicativos de software livre, os usuários podem
+<em>certificar-se</em> de que não bisbilhotam.</p>
+
+    <p>Com aplicativos privativos, só podemos esperar que não o façam.</p>
+  </li>
+
+  <li id="M201705040">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um estudo encontrou 234 aplicativos Android que rastreiam usuários <a
+href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/";>ouvindo
+ultrassom de sinalizadores colocados em lojas ou reproduzidos por programas
+de TV</a>.</p>
+  </li>
+
+  <li id="M201704260">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Faceapp parece fazer muita vigilância, a julgar por <a
+href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/";>
+quanto acesso exige aos dados pessoais no dispositivo</a>.</p>
+  </li>
+
+  <li id="M201704190">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os usuários estão processando a Bose por <a
+href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/";>
+distribuir um aplicativo <i lang="en">spyware</i> para seus fones de
+ouvido</a>. Especificamente, o aplicativo gravaria os nomes dos arquivos de
+áudio que os usuários ouvem junto com o número de série exclusivo do fone 
de
+ouvido.</p>
+
+    <p>A ação acusa que isso foi feito sem o consentimento dos usuários. Se 
as
+letras miúdas do aplicativo dissessem que os usuários deram consentimento
+para isso, isso o tornaria aceitável? De jeito nenhum! Deveria ser
+totalmente <a href="/philosophy/surveillance-vs-democracy.html"> ilegal
+projetar o aplicativo para bisbilhotar</a>.</p>
+  </li>
+
+  <li id="M201704074">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Pares de aplicativos Android podem conspirar para transmitir os dados
+pessoais dos usuários aos servidores. <a
+href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/";>
+Um estudo encontrou dezenas de milhares de pares que conspiravam</a>.</p>
+  </li>
+
+  <li id="M201703300">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Verizon <a
+href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones";>
+anunciou uma pesquisa privativa opcional aplicativo que ela vai</a>
+pré-instalar em alguns de seus telefones. O aplicativo dará à Verizon as
+mesmas informações sobre as buscas dos usuários que o Google normalmente
+obtém quando eles usam seu mecanismo de busca.</p>
+
+    <p>Atualmente, o aplicativo está <a
+href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware";>
+sendo pré-instalado em apenas um telefone</a> e o usuário deve ativá-lo
+explicitamente antes que o aplicativo entre em vigor. No entanto, o
+aplicativo continua sendo um <i lang="en">spyware</i> — um pedaço 
“opcional”
+de <i lang="en">spyware</i> ainda é spyware.</p>
+  </li>
+
+  <li id="M201701210">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O aplicativo de edição de fotos Meitu <a
+href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/";>
+envia dados do usuário para uma empresa chinesa</a>.</p>
+  </li>
+
+  <li id="M201611280">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O aplicativo Uber rastreia <a
+href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/";>os
+movimentos dos clientes antes e depois do passeio</a>.</p>
+
+    <p>Este exemplo ilustra como “obter o consentimento do usuário” para 
vigilância
+é inadequado como uma proteção contra vigilância massiva.</p>
+  </li>
+
+  <li id="M201611160">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um <a
+href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf";>
+artigo de pesquisa</a> que investigou a privacidade e a segurança de 283
+aplicativos VPN para Android concluiu que, “apesar das promessas de
+privacidade, segurança e anonimato feitas pela maioria dos aplicativos VPN,
+milhões de usuários podem estar inadvertidamente sujeitos a garantias de
+segurança insatisfatórias e práticas abusivas infligidas por aplicativos
+VPN”.</p>
+
+    <p>A seguir está uma lista não exaustiva, retirada do documento de 
pesquisa, de
+alguns aplicativos VPN privativos que rastreiam usuários e violam sua
+privacidade:</p>
+
+    <dl class="compact">
+      <dt>SurfEasy</dt>
+      <dd>Inclui bibliotecas de rastreamento, como NativeX e Appflood, 
destinadas a
+rastrear usuários e mostrar-lhes anúncios direcionados.</dd>
+
+      <dt>sFly Network Booster</dt>
+      <dd>Solicita as permissões <code>READ_SMS</code> e 
<code>SEND_SMS</code> na
+instalação, o que significa que tem acesso total às mensagens de texto dos
+usuários.</dd>
+
+      <dt>DroidVPN e TigerVPN</dt>
+      <dd>Solicita a permissão <code>READ_LOGS</code> para ler logs de outros
+aplicativos e também logs do sistema central. Os desenvolvedores do TigerVPN
+confirmaram isso.</dd>
+
+      <dt>HideMyAss</dt>
+      <dd>Envia tráfego para o LinkedIn. Além disso, ele armazena registros 
detalhados
+e pode entregá-los ao governo do Reino Unido, se solicitado.</dd>
+
+      <dt>Hotspot Shield de serviços VPN</dt>
+      <dd>Injeta código JavaScript nas páginas HTML retornadas aos 
usuários. O
+objetivo declarado da injeção JS é exibir anúncios. Usa cerca de cinco
+bibliotecas de rastreamento. Além disso, ele redireciona o tráfego do
+usuário através de valueclick.com (um site de publicidade).</dd>
+
+      <dt>WiFi Protector VPN</dt>
+      <dd>Injeta código JavaScript em páginas HTML e também usa cerca de 
cinco
+bibliotecas de rastreamento. Os desenvolvedores deste aplicativo confirmaram
+que a versão não premium do aplicativo injeta JavaScript para rastrear o
+usuário e exibir anúncios.</dd>
+    </dl>
+  </li>
+
+  <li id="M201609210">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O novo aplicativo de mensagens de voz do Google <a
+href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google";>
+registra todas as conversas</a>.</p>
+  </li>
+
+  <li id="M201606050">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O novo aplicativo do Facebook, o Magic Photo, <a
+href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/";>
+percorre as coleções de fotos do seu celular em busca de rostos
+conhecidos</a> e sugere que você circule a foto tirada de acordo com quem
+está no quadro.</p>
+
+    <p>Esse recurso de <i lang="en">spyware</i> parece exigir acesso online a 
algum
+banco de dados de rostos conhecidos, o que significa que as imagens
+provavelmente serão enviadas através da rede para os servidores do Facebook
+e algoritmos de reconhecimento de rostos.</p>
+
+    <p>Nesse caso, nenhuma das fotos dos usuários do Facebook é privada, 
mesmo que
+o usuário não tenha “carregado-as” para o serviço.</p>
+  </li>
+
+  <li id="M201605310">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O aplicativo do Facebook escuta o tempo todo, <a
+href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html";>para
+bisbilhotar o que as pessoas estão ouvindo ou assistindo</a>. Além disso,
+pode estar analisando as conversas das pessoas para servi-las com anúncios
+direcionados.</p>
+  </li>
+
+  <li id="M201604250">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um aplicativo de controle de teste de gravidez não só pode <a
+href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security";>
+espionar muitos tipos de dados no telefone e em contas de servidor, ele
+também pode alterá-los</a>.</p>
+  </li>
+
+  <li id="M201601130">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Aplicativos que incluem <a
+href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/";>
+o software de vigilância Symphony bisbilhotam os programas de rádio e TV que
+estão reproduzindo nas proximidades</a>. Também sobre o que os usuários
+postam em vários sites como Facebook, Google+ e Twitter.</p>
+  </li>
+
+  <li id="M201511190">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>“Comunicação enigmática” não relacionada à funcionalidade do 
aplicativo, foi
+<a
+href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119";>
+encontrada nos 500 aplicativos Android grátis mais populares</a>.</p>
+
+    <p>O artigo não deveria ter descrito esses aplicativos como <i
+lang="en">“free”</i> – eles não são software livre (<i lang="en">free
+software</i>). A maneira clara de dizer “preço zero” é “grátis”.</p>
+
+    <p>O artigo pressupõe que as ferramentas analíticas usuais são 
legítimas, mas
+isso é válido? Os desenvolvedores de software não têm o direito de analisar
+o que os usuários estão fazendo ou como. Ferramentas “analíticas” que
+bisbilhotam são tão erradas quanto qualquer outro bisbilhotamento.</p>
+  </li>
+
+  <li id="M201510300">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Mais de 73% e 47% dos aplicativos móveis, para Android e iOS,
+respectivamente, <a href="https://techscience.org/a/2015103001/";>entregam
+informações pessoais, comportamentais e de localização</a> de seus 
usuários
+para terceiros.</p>
+  </li>
+
+  <li id="M201508210">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Como a maioria dos desserviços de “gritos musicais”, Spotify é 
baseado em
+<em>malware</em> privativo (DRM e bisbilhotamento). Em agosto de 2015, <a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy";>
+exigia que os usuários se submetessem a um bisbilhotamento maior</a>, e
+alguns estão começando a perceber que é desagradável.</p>
+
+    <p>Este artigo mostra as <a
+href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/";>
+formas tortuosas de apresentar o bisbilhotamento como uma forma de “servir”
+usuários melhores</a> – não importa se eles querem isso. Este é um exemplo
+típico da atitude da indústria de software privativo para com aqueles que
+eles subjugaram.</p>
+
+    <p>Sai, sai, Spotify amaldiçoado!</p>
+  </li>
+
+  <li id="M201506264">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf";>
+Um estudo em 2015</a> descobriu que 90% dos mais bem classificados
+aplicativos privativos e grátis para Android continham bibliotecas de
+rastreamento reconhecíveis. Para os aplicativos privativos pagos, era de
+apenas 60%.</p>
+
+    <p>O artigo descreve de forma confusa os aplicativos grátis como 
“free”, mas a
+maioria deles não é, na verdade, <a href="/philosophy/free-sw.html"><i
+lang="en">free software</i> no sentido de software livre</a>. Ele também usa
+a palavra feia “monetizar”. Um bom substituto para essa palavra é
+“explorar”; quase sempre isso se encaixa perfeitamente.</p>
+  </li>
+
+  <li id="M201505060">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Aplicativos grátis para Android (que não são <a
+href="/philosophy/free-sw.html">software livres</a>) conectam a 100 URLs de
+<a
+href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites";>rastreamento
+e anúncios</a>, em média.</p>
+  </li>
+
+  <li id="M201504060">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Aplicativos privativos amplamente usados de <a
+href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/";>leitura
+de código QR bisbilhotam o usuário</a>. Isso além do bisbilhotamento feito
+pela companhia telefônica e, talvez, pelo sistema operacional do telefone.</p>
+
+    <p>Não se distraia com a questão de saber se os desenvolvedores de 
aplicativos
+fazem os usuários dizerem “Concordo”. Isso não é desculpa para
+<em>malware</em>.</p>
+  </li>
+
+  <li id="M201411260">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Muitos aplicativos privativos para dispositivos móveis relatam quais outros
+aplicativos o usuário instalou. <a
+href="http://techcrunch.com/2014/11/26/twitter-app-graph/";> O Twitter está
+fazendo isso de uma forma que pelo menos seja visível e opcional</a>. Não
+tão ruim quanto o que os outros fazem.</p>
+  </li>
+
+  <li id="M201401150.1">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O teclado Simeji é uma versão para smartphone do <a
+href="/proprietary/proprietary-surveillance.html#baidu-ime"><abbr
+title="Input Method Editor">IME</abbr> espião</a> do Baidu.</p>
+  </li>
+
+  <li id="M201312270">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O principal objetivo do aplicativo não livre Snapchat é restringir o uso 
de
+dados no computador do usuário, mas ele também faz vigilância: <a
+href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers";>
+tenta obter a lista do usuário dos números de telefone de outras
+pessoas</a>.</p>
+  </li>
+
+  <li id="M201312060">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O aplicativo Brightest Flashlight <a
+href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers";>
+envia dados do usuário, incluindo geolocalização, para uso por 
empresas</a>.</p>
+
+    <p>A FTC criticou este aplicativo porque solicitou que o usuário 
aprovasse o
+envio de dados pessoais para o desenvolvedor do aplicativo, mas não
+perguntou sobre o envio para outras empresas. Isso mostra a fraqueza da
+“solução” do rejeite-se-você-não-gosta-de-espionagem à vigilância: 
por que
+um aplicativo de lanterna deveria enviar qualquer informação para alguém? Um
+aplicativo de lanterna de software livre não faria isso.</p>
+  </li>
+
+  <li id="M201212100">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2012-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A FTC afirma que a maioria dos aplicativos móveis para crianças não 
respeita
+a privacidade: <a
+href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/";>
+http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInSkype">Skype</h4>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M201908151">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Skype se recusa a dizer se ele pode <a
+href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html";>espionar
+chamadas</a>.</p>
+
+    <p>Isso quase com certeza significa que ele pode fazê-lo.</p>
+  </li>
+
+  <li id="M201307110">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Skype contém <a
+href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/";><i
+lang="en">spyware</i></a>. A Microsoft mudou o Skype <a
+href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data";>
+especificamente para espionar</a>.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInGames">Jogos</h4>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInGames">#SpywareInGames</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M202010221">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Microsoft está impondo sua vigilância sobre o jogo do Minecraft <a
+href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java";>exigindo
+que cada jogador abra uma conta na rede da Microsoft</a>. A Microsoft
+comprou o jogo e irá mesclar todas as contas em sua rede, o que lhes dará
+acesso aos dados das pessoas.</p>
+
+    <p>Os jogadores do Minecraft <a
+href="https://directory.fsf.org/wiki/Minetest";>podem jogar o Minetest</a>. A
+vantagem essencial do Minetest é ser um software livre, o que significa que
+respeita a liberdade do usuário no computador. Como bônus, oferece mais
+opções.</p>
+  </li>
+
+  <li id="M201908210">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Microsoft gravou usuários de Xboxes e tinha <a
+href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana";>
+trabalhadores humanos ouvindo às gravações</a>.</p>
+
+    <p>Moralmente, não vejo diferença entre ter trabalhadores humanos 
ouvindo ou
+sistemas de reconhecimento de fala ouvindo. Ambos se intrometem na
+privacidade.</p>
+  </li>
+
+  <li id="M201806240">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Red Shell é um <i lang="en">spyware</i> encontrado em muitos jogos
+privativos. Ele <a
+href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/";>
+rastreia os dados nos computadores dos usuários e os envia para
+terceiros</a>.</p>
+  </li>
+
+  <li id="M201804144">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A ArenaNet instalou sub-repticiamente um programa de <i
+lang="en">spyware</i> junto com uma atualização do enorme jogo multijogador
+Guild Wars 2. O <i lang="en">spyware</i> permitiu a ArenaNet <a
+href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave";>
+bisbilhotar todos os processos abertos em execução no computador do
+usuário</a>.</p>
+  </li>
+
+  <li id="M201711070">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O driver de um determinado teclado para jogos <a
+href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html";>
+envia informações para a China</a>.</p>
+  </li>
+
+  <li id="M201512290">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Muitos <a
+href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/";>
+consoles de videogame bisbilhotam seus usuários e informam à Internet</a> –
+até mesmo o peso dos usuários.</p>
+
+    <p>Um console de jogo é um computador e você não pode confiar em um 
computador
+com um sistema operacional não livre.</p>
+  </li>
+
+  <li id="M201509160">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Aplicativos modernos de jogos grátis <a
+href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/";>
+coletam uma ampla gama de dados sobre seus usuários e amigos e associados de
+seus usuários</a>.</p>
+
+    <p>Ainda mais desagradável, eles fazem isso por meio de redes de anúncio 
que
+mesclam os dados coletados por vários aplicativos e sites feitos por
+empresas diferentes.</p>
+
+    <p>Eles usam esses dados para manipular as pessoas para comprar coisas e 
caçar
+“baleias” que podem ser levadas a gastar muito dinheiro. Eles também usam 
um
+<em>backdoor</em> para manipular o jogo para jogadores específicos.</p>
+
+    <p>Embora o artigo descreva jogos grátis, os jogos que custam dinheiro 
podem
+usar as mesmas táticas.</p>
+  </li>
+
+  <li id="M201401280">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Angry Birds <a
+href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html";>
+espiona para empresas e o NSA também aproveita para espioná-lo</a>. Aqui
+estão as informações sobre <a
+href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html";>
+mais aplicativos <i lang="en">spyware</i></a>.</p>
+
+    <p><a
+href="https://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data";>
+Mais sobre a espionagem de aplicativos pela NSA</a>.</p>
+  </li>
+
+  <li id="M200510200">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2005-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Blizzard Warden é um programa “prevenção de trapaça” que <a
+href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware";>
+espiona cada processo em execução no computador de um jogador e interceptar
+uma grande quantidade de dados pessoais</a>, incluindo muitas atividades que
+nada têm a ver com trapaça.</p>
+  </li>
+</ul>
+
+
+
+<div class="big-section">
+  <h3 id="SpywareInEquipment"><i lang="en">Spyware</i> em equipamento 
conectado</h3>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul class="blurbs">
+  <li id="M202101050">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A maioria dos dispositivos conectados à Internet na lista de <a
+href="https://foundation.mozilla.org/en/privacynotincluded";>“Privacidade não
+incluída”</a> da Mozilla <a
+href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell";>é
+projetada para bisbilhotar usuários</a> mesmo se o dispositivo atender os
+“Padrões Mínimos de Segurança” (<i lang="en">Minimum Security 
Standards</i>)
+da Mozilla. O design inseguro do programa em execução em alguns destes
+dispositivos <a
+href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster";>torna
+o usuário suscetível a ser bisbilhotado por <em>crackers</em> 
também</a>.</p>
+  </li>
+
+  <li id="M201708280">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A segurança ruim em muitos dispositivos da Internet das Picadas permite aos
+<a
+href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml";>ISPs
+bisbilhotarem as pessoas que os usam</a>.</p>
+
+    <p>Não seja um otário – rejeite todas as picadas.</p>
+
+    <p><small>(É uma pena que o artigo use o termo <a
+href="/philosophy/words-to-avoid.html#Monetize">“monetizar”</a>.)</small></p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInTVSets">Aparelhos de TV</h4>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+</div>
+
+<p>Emo Phillips fez uma piada: Outro dia, uma mulher se aproximou de mim e
+disse “Não te vi na televisão?”, e eu disse “Não sei. Você não pode 
ver o
+outro lado.” Evidentemente, isso foi antes das TVs “inteligentes” da 
Amazon.</p>
+
+<ul class="blurbs">
+  <li id="M202010282">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os fabricantes de TV estão começando a produzir apenas aparelhos de TV
+“inteligentes” (que incluem spyware) que <a
+href="https://frame.work/blog/in-defense-of-dumb-tvs";>agora é muito difícil
+encontrar uma TV que não espione você</a>.</p>
+
+    <p>Parece que o modelo de negócios desses fabricantes não é produzir TV 
e
+vendê-los por dinheiro, mas coletar seus dados pessoais e (possivelmente)
+entregá-los a terceiros em benefício.</p>
+  </li>
+
+  <li id="M202006250">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os fabricantes de TV conseguem <a
+href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/";>bisbilhotar
+cada segundo do que o usuário está assistindo</a>. Isso é ilegal devido à
+Lei de Proteção à Privacidade de Vídeo de 1988, mas está sendo contornada
+por meio de EULAs.</p>
+  </li>
+
+  <li id="M201901070">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>TVs da Vizio <a
+href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019";>
+colecionam “tudo o que a TV vê”</a>, nas próprias palavras do CTO da
+empresa, e esses dados são vendidos a terceiros. Isso é em troca de um
+“serviço melhor” (significando anúncios mais intrusivos?) e preços de 
varejo
+ligeiramente inferiores.</p>
+
+    <p>O que supostamente torna essa espionagem aceitável, segundo ele, é 
que ela
+está optando por modelos mais novos. Mas como o software da Vizio é não
+livre, não sabemos o que está acontecendo nos bastidores, e não há garantia
+de que todas as atualizações futuras deixarão as configurações 
inalteradas.</p>
+
+    <p>Se você já possui uma TV “inteligente” da Vizio (ou qualquer TV
+“inteligente”, a propósito), a maneira mais fácil de garantir que não 
está
+espionando você é desconectá-la da Internet e usar uma antena
+terrestre. Infelizmente, isso nem sempre é possível. Outra opção, se você
+for orientado tecnicamente, é ter seu próprio roteador (que pode ser um
+computador antigo rodando software completamente livre), e configurar um
+firewall para bloquear conexões com os servidores da Vizio. Ou, como último
+recurso, você pode substituir sua TV por outro modelo.</p>
+  </li>
+
+  <li id="M201804010">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Algumas TVs “inteligentes” <a
+href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928";>
+carregam automaticamente <i lang="en">downgrades</i> que instalam um
+aplicativo de vigilância</a>.</p>
+
+    <p>Adicionamos um link para o artigo pelos fatos que ele apresenta. É uma 
pena
+que o artigo termine defendendo a fraqueza moral de se render ao Netflix. O
+aplicativo Netflix <a
+href="/proprietary/malware-google.html#netflix-app-geolocation-drm">também é
+<em>malware</em></a>.</p>
+  </li>
+
+  <li id="M201702060">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen";>TVs
+“inteligentes” da Vizio relatam tudo o que é visto sobre elas, e não 
apenas
+transmissões e canais a cabo</a>. Ainda que a imagem venha do próprio
+computador do usuário, a TV relata o que é. A existência de uma forma de
+desabilitar a vigilância, mesmo que não estivesse oculta como estava nessas
+TVs, não legitima a vigilância.</p>
+  </li>
+
+  <li id="M201511130">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Alguns anúncios na web e na TV reproduzem sons inaudíveis a serem captados
+por <em>malware</em> privativo em execução em outros dispositivos ao
+alcance, a fim de determinar que eles estão próximos. Assim que seus
+dispositivos de Internet estiverem emparelhados com sua TV, os anunciantes
+podem correlacionar anúncios com atividades na web e outros <a
+href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/";>
+rastreamento entre dispositivos</a>.</p>
+  </li>
+
+  <li id="M201511060">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Vizio vai um passo além de outros fabricantes de TV quanto a espionar 
seus
+usuários: suas <a
+href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you";>
+TVs “inteligentes” analisam seus hábitos de visualização em detalhes e 
os
+vinculam ao seu endereço IP</a> para que os anunciantes possam lhe rastrear
+em todos os dispositivos.</p>
+
+    <p>É possível desligar isso, mas tê-lo ativado por padrão já é uma 
injustiça.</p>
+  </li>
+
+  <li id="M201511020">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A aliança da Tivo com a Viacom adiciona 2,3 milhões de residências aos 
600
+milhões de perfis de mídia social que a empresa já monitora. Os clientes da
+Tivo não sabem que estão sendo observados pelos anunciantes. Ao combinar
+informações de exibição de TV com participação em mídia social online, o
+Tivo agora pode <a
+href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102";>
+correlacionar anúncios de TV com compras online</a>, expondo todos os
+usuários a uma nova vigilância combinada por padrão.</p>
+  </li>
+
+  <li id="M201507240">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>As TVs “inteligentes” da Vizio reconhecem e <a
+href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/";>rastreiam o
+que as pessoas estão assistindo</a>, mesmo que não seja um canal de TV.</p>
+  </li>
+
+  <li id="M201505290">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A TV a cabo da Verizon <a
+href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/";>
+bisbilhota quais programas as pessoas assistem e até o que eles queriam
+gravar</a>.</p>
+  </li>
+
+  <li id="M201504300">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Vizio <a
+href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";>
+usou uma “atualização” de firmware para fazer suas TVs bisbilhotarem o 
que
+os usuários assistem</a>. As TVs não faziam isso quando vendidas pela
+primeira vez.</p>
+  </li>
+
+  <li id="M201502090">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A TV “inteligente” da Samsung <a
+href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm";>
+transmite a voz dos usuários na Internet para outra empresa, a Nuance</a>. A
+Nuance pode armazená-la e então teria que dá-la aos EUA ou a algum outro
+governo.</p>
+
+    <p>O reconhecimento de voz não é confiável, a menos que seja feito por 
software
+livre em seu próprio computador.</p>
+
+    <p>Em sua política de privacidade, a Samsung confirma explicitamente que 
<a
+href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs";>
+dados de voz contendo informações sensíveis serão transmitidas a
+terceiros</a>.</p>
+  </li>
+
+  <li id="M201411090">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A TV “inteligente” da Amazon está <a
+href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance";>
+bisbilhotando a todo momento</a>.</p>
+  </li>
+
+  <li id="M201409290">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Mais ou menos todas as TVs “inteligentes” <a
+href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/";>espionam
+seus usuários</a>.</p>
+
+    <p>O relatório era de 2014, mas não esperamos que tenha melhorado.</p>
+
+    <p>Isso mostra que as leis que exigem que os produtos obtenham o 
consentimento
+formal dos usuários antes de coletar dados pessoais são totalmente
+inadequadas. E o que acontece se um usuário recusar o consentimento?
+Provavelmente, a TV dirá: “Sem seu consentimento para rastrear, a TV não
+funcionará.”</p>
+
+    <p>Leis adequadas diriam que as TVs não têm permissão para relatar o 
que o
+usuário assiste – sem exceções!</p>
+  </li>
+
+  <li id="M201405200">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><i lang="en">Spyware</i> nas TVs “inteligentes” da LG <a
+href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html";>
+relata o que o usuário assiste e a opção para desligar isso não tem
+efeito</a>. (O fato de a transmissão relatar um erro 404 realmente não
+significa nada; o servidor poderia salvar esses dados de qualquer 
maneira.)</p> 
+
+    <p>Pior ainda, ela <a
+href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/";>
+bisbilhota outros dispositivos na rede local do usuário</a>.</p>
+
+    <p>Mais tarde, a LG disse que instalou um patch para impedir isso, mas 
qualquer
+produto pode espionar dessa forma.</p>
+
+    <p>Enquanto isso, TVs da LG <a
+href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>
+fazem muita espionagem de qualquer maneira</a>.</p>
+  </li>
+
+  <li id="M201212170">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2012-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p id="break-security-smarttv"><a
+href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html";><em>Crackers</em>
+encontraram uma maneira de quebrar a segurança em uma TV 
“inteligente”</a> e
+use sua câmera para assistir as pessoas que estão assistindo TV.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInCameras">Câmeras</h4>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M201901100">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os dispositivos de “segurança” Amazon Ring <a
+href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/";>
+enviam o vídeo que eles capturam para os servidores da Amazon</a>, os quais
+armazenam-o a longo prazo.</p>
+
+    <p>Em muitos casos, o vídeo mostra todo mundo que chega perto de, ou 
meramente
+passa por, a porta frontal do usuário.</p>
+
+    <p>O artigo se concentra em como o Ring costumava permitir que 
funcionários
+individuais assistissem aos vídeos livremente. Parece que a Amazon tentou
+evitar esse abuso secundário, mas o abuso primário – de que a Amazon 
obtém o
+vídeo – a Amazon espera que a sociedade se conforme.</p>
+  </li>
+
+  <li id="M201810300">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Quase todas as “câmeras de segurança residencial” <a
+href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/";>
+fornecem ao fabricante uma cópia não criptografada de tudo que elas
+veem</a>. “Câmeras de insegurança residencial” seria um nome melhor!</p>
+
+    <p>Quando Consumer Reports testaram-nas, sugeriu que esses fabricantes
+prometessem não ver o conteúdo dos vídeos. Isso não é segurança para sua
+casa. Segurança significa garantir que eles não consigam ver através de sua
+câmera.</p>
+  </li>
+
+  <li id="M201603220">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Mais de 70 marcas de câmeras de vigilância conectadas em rede têm <a
+href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html";>
+bugs de segurança que permitem que qualquer um assista através delas</a>.</p>
+  </li>
+
+  <li id="M201511250">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A câmera “inteligente” Nest Cam está <a
+href="http://www.bbc.com/news/technology-34922712";>sempre assistindo</a>,
+mesmo quando o “dono” desliga-a.</p>
+
+    <p>Um dispositivo “inteligente” significa que o fabricante o está 
usando para
+ser mais esperto que você.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInToys">Brinquedos</h4>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M201711244">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Furby Connect tem um <a
+href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>
+<em>backdoor</em> universal</a>. Se o produto enviado não atua como um
+dispositivo de escuta, as alterações remotas no código certamente podem
+convertê-lo em um.</p>
+  </li>
+
+  <li id="M201711100">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um brinquedo sexual de controle remoto foi encontrado para fazer <a
+href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei";>gravações
+de áudio da conversa entre dois usuários</a>.</p>
+  </li>
+
+  <li id="M201703140">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um vibrador computadorizado <a
+href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack";>
+estava bisbilhotando seus usuários por meio do aplicativo privativo de
+controle</a>.</p>
+
+    <p>O aplicativo estava relatando a temperatura do vibrador minuto a minuto 
(ou
+seja, indiretamente, se estava cercado pelo corpo de uma pessoa), bem como a
+frequência de vibração.</p>
+
+    <p>Observe a resposta proposta totalmente inadequada: um padrão de 
rotulagem
+com o qual os fabricantes fariam declarações sobre seus produtos, em vez de
+software livre que os usuários poderiam verificar e alterar.</p>
+
+    <p>A empresa que fez o vibrador <a
+href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit";>
+foi processada por coletar muitas informações pessoais sobre como as pessoas
+o usaram</a>.</p>
+
+    <p>A declaração da empresa de que estava tornando os dados anônimos 
pode ser
+verdadeira, mas isso realmente não importa. Se tivesse vendido os dados para
+um corretor de dados, o corretor de dados teria sido capaz de descobrir quem
+era o usuário.</p>
+
+    <p>Na sequência desta ação judicial, <a
+href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits";>
+a empresa foi condenada a pagar um total de C$4m</a> a seus consumidores.</p>
+  </li>
+
+  <li id="M201702280">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Brinquedos da “CloudPets” com microfones <a
+href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults";>
+vazaram conversas das crianças para o fabricante</a>. Adivinha só! <a
+href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings";>
+<em>Crackers</em> encontraram uma forma de acessar os dados</a> coletados
+pelo bisbilhotamento do fabricante.</p>
+
+    <p>Que o fabricante e o FBI pudessem ouvir essas conversas era 
inaceitável por
+si só.</p>
+  </li>
+
+  <li id="M201612060">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os brinquedos “inteligente” brinquedos My Friend Cayla e i-Que 
transmitem <a
+href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws";>conversas
+de crianças para Nuance Communications</a>, a empresa de reconhecimento de
+voz com sede nos EUA.</p>
+
+    <p>Esses brinquedos também contêm vulnerabilidades de segurança 
importantes; Os
+<em>crackers</em> podem controlar remotamente os brinquedos com um telefone
+celular. Isso permitiria aos <em>crackers</em> ouvir a fala de uma criança e
+até falar para os próprios brinquedos.</p>
+  </li>
+
+  <li id="M201502180">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Barbie <a
+href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673";>vai
+espionar crianças e adultos</a>.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInDrones">Drones</h4>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInDrones">#SpywareInDrones</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M201708040">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Enquanto você usa um drone da DJI para bisbilhotar outras pessoas, DJI 
está,
+em muitos casos, <a
+href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity";>bisbilhotando
+você</a>.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareAtHome">Outros appliances</h4><span 
class="anchor-reference-id">(<a
+href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M202009270">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Muitos empregadores estão usando software não livre, incluindo software de
+videoconferência, para <a
+href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance";>
+vigiar e monitorar a equipe que trabalha em casa</a>. Se o programa informar
+se você está “ativo” isso é, na verdade, um recurso de vigilância 
malicioso.</p>
+  </li>
+
+  <li id="M202008030">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Google Nest <a
+href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/";>
+está assumindo o ADT</a>. O Google enviou uma atualização de software para
+seus alto-falantes usando seu <em>backdoor</em> <a
+href="https://www.protocol.com/google-smart-speaker-alarm-adt";> que escuta
+coisas como alarmes de fumaça</a> e notifica seu telefone de que um alarme
+está acontecendo. Isso significa que os dispositivos agora ouvem mais do que
+apenas as palavras de ativação. O Google diz que a atualização do software
+foi enviada prematuramente e por acidente e que estava planejando divulgar
+esse novo recurso e oferecê-lo aos clientes que pagam por ele.</p>
+  </li>
+
+  <li id="M202006300">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>“Bossware” é um <em>malware</em> que os chefes <a
+href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers";>
+coagem os funcionários a instalar em seus próprios computadores</a>, para
+que os chefes possam espioná-los.</p>
+
+    <p>Isso mostra por que exigir o “consentimento” não é uma base 
adequada para
+proteger a privacidade digital. O patrão pode coagir a maioria dos
+trabalhadores a consentir em quase qualquer coisa, até mesmo na provável
+exposição a doenças contagiosas que podem ser fatais. Softwares como esse
+deveriam ser ilegais e os patrões que os exigem deveriam ser processados por
+eles.</p>
+  </li>
+
+  <li id="M201911190">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Amazon Ring amarrado à Internet tinha uma vulnerabilidade de segurança 
que
+permitia aos invasores <a
+href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password";>
+acessar a senha de WiFi do usuário</a> e bisbilhotar a casa através de
+dispositivos de vigilância conectados.</p>
+
+    <p>O conhecimento da senha do WiFi não seria suficiente para realizar uma
+vigilância significativa se os dispositivos implementassem segurança
+adequada, incluindo criptografia. Mas muitos dispositivos com software
+privativo não possuem isso. Obviamente, eles também são usados por seus
+fabricantes para bisbilhotamento.</p>
+  </li>
+
+  <li id="M201907210">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Google “Assistente” grava as conversas dos usuários <a
+href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/";>quando
+não deveria ouvir</a>. Assim, quando um dos subcontratantes do Google
+divulga mil gravações de voz confidenciais, os usuários foram facilmente
+identificados a partir dessas gravações.</p>
+
+    <p>Como o Google “Assistente” usa software privativo, não há como 
ver ou
+controlar o que ele grava ou envia.</p>
+
+    <p>Em vez de tentar controlar melhor o uso de gravações, o Google não 
deve
+gravar ou ouvir a voz da pessoa. Deve receber apenas comandos que o usuário
+deseja enviar para algum serviço do Google.</p>
+  </li>
+
+  <li id="M201905061">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Amazon Alexa coleta muito mais informações dos usuários do que o 
necessário
+para seu funcionamento correto (hora, local, gravações feitas sem uma
+solicitação legítima) e as envia para os servidores da Amazon, que os
+armazenam indefinidamente. Pior ainda, a Amazon encaminha para empresas
+terceirizadas. Assim, mesmo que os usuários solicitem a exclusão de seus
+dados dos servidores da Amazon, <a
+href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php";>
+os dados permanecem em outros servidores</a>, onde eles podem ser acessados
+por empresas de publicidade e agências governamentais. Em outras palavras,
+excluir as informações coletadas não cancela o erro de coletá-las.</p>
+
+    <p>Os dados coletados por dispositivos como o termostato Nest, as luzes
+conectadas a Philips Hue, o abridor de garagem Chamberlain MyQ e os
+alto-falantes da Sonos também são armazenados por mais tempo do que o
+necessário nos servidores aos quais os dispositivos estão ligados. Além
+disso, eles são disponibilizados para a Alexa. Como resultado, a Amazon tem
+uma imagem muito precisa da vida dos usuários em casa, não apenas no
+presente, mas no passado (e, quem sabe, no futuro também?)</p>
+  </li>
+
+  <li id="M201904240">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Alguns dos comandos dos usuários para o serviço da Alexa são <a
+href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html";>
+gravados para que os funcionários da Amazon ouçam</a>. Os assistentes de voz
+do Google e da Apple fazem coisas semelhantes.</p>
+
+    <p>Uma fração da equipe de atendimento da Alexa tem acesso a <a
+href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788";>
+locais e outros dados pessoais</a>.</p>
+
+    <p>Como o programa cliente não é livre, e o processamento de dados é 
feito “<a
+href="/philosophy/words-to-avoid.html#CloudComputing">na nuvem</a>” (uma
+maneira tranquilizadora de dizer “não vamos lhe dizer como e onde é 
feito”),
+os usuários não têm como saber o que acontece com as gravações, a menos 
que
+espiões humanos <a
+href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033";>
+quebrem seus acordos de não divulgação</a>.</p>
+  </li>
+
+  <li id="M201902080">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os <a href="https://boingboing.net/2019/02/08/inkjet-dystopias.html";>
+cartuchos de “assinatura de tinta” têm DRM que se comunica constantemente
+com os servidores HP</a> para garantir que o usuário ainda esteja pagando
+pela assinatura e não imprima mais páginas do que o pago.</p>
+
+    <p>Mesmo que o programa de assinatura de tinta possa ser mais barato em 
alguns
+casos específicos, ela espiona os usuários e envolve restrições totalmente
+inaceitáveis no uso de cartuchos de tinta que, de outra forma, estariam
+funcionando.</p>
+  </li>
+
+  <li id="M201808120">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os <em>crackers</em> encontraram uma maneira de quebrar a segurança de um
+dispositivo da Amazon e <a
+href="https://boingboing.net/2018/08/12/alexa-bob-carol.html";> transformá-lo
+em um dispositivo de escuta</a> para eles.</p>
+
+    <p>Foi muito difícil para eles fazerem isso. O trabalho seria muito mais 
fácil
+para a Amazon. E se algum governo, como a China ou os Estados Unidos,
+dissesse à Amazon para fazer isso, ou parar de vender o produto naquele
+país, você acha que a Amazon teria fibra moral para dizer não?</p>
+
+    <p><small>(Estes <em>crackers</em> são provavelmente hackers também, 
mas, por
+favor, <a href="https://stallman.org/articles/on-hacking.html";> não use
+“hacking” como sinônimo “quebra de segurança”</a>.)</small></p>
+  </li>
+
+  <li id="M201804140">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Uma empresa de seguro médico <a
+href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next";>
+oferece uma escova de dentes eletrônica grátis que bisbilhota o usuário,
+enviando dados de uso pela Internet</a>.</p>
+  </li>
+
+  <li id="M201706204">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Muitos produtos “inteligente” são projetados <a
+href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022";>
+para ouvir todos em casa, a todo momento</a>.</p>
+
+    <p>A prática tecnológica de hoje não inclui nenhuma maneira de fazer um
+dispositivo que pode obedecer aos seus comandos de voz sem potencialmente
+espionar você. Mesmo se estiver sem ar, pode estar guardando registros sobre
+você para exame posterior.</p>
+  </li>
+
+  <li id="M201407170">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p id="nest-thermometers">Termostatos do Nest enviam <a
+href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack";>muitos dados
+sobre o usuário</a>.</p>
+  </li>
+
+  <li id="M201310260">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm";>
+Computadores alugados foram programados para espionar seus locatários</a>.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareOnWearables">Tecnologias vestíveis</h4>
+  <span class="anchor-reference-id">(<a
+href="#SpywareOnWearables">#SpywareOnWearables</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M201807260">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>As roupas da Tommy Hilfiger <a
+href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers";>vão
+monitorar a frequência com que as pessoas as usam</a>.</p>
+
+    <p>Isso vai ensinar o povo-gado a achar normal que as empresas monitorem 
todos
+os aspectos do que fazem.</p>
+  </li>
+</ul>
+
+
+<h5 id="SpywareOnSmartWatches">Relógios “inteligentes”</h5>
+
+<ul class="blurbs">
+  <li id="M202009100">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Relógios com capacidade para acesso à Internet com software privativo são
+<em>malware</em>, violando a privacidade das pessoas (especialmente das
+crianças). Além disso, eles têm muitas falhas de segurança. Eles <a
+href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/";>
+permitem que invasores de segurança (e pessoas não autorizadas) acessem</a>
+o relógio.</p>
+
+    <p>Assim, pessoas mal-intencionadas não autorizadas podem interceptar
+comunicações entre pais e filhos e falsificar mensagens de e para o relógio,
+possivelmente colocando a criança em perigo.</p>
+
+    <p><small>(Note que este artigo usa indevidamente a palavra “<a
+href="/philosophy/words-to-avoid.html#Hacker">hackers</a>” para significar
+<em>“crackers”</em>.)</small></p>
+  </li>
+
+  <li id="M201603020">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um “relógio inteligente” muito barato vem com um aplicativo Android <a
+href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/";>
+que se conecta a um site não identificado na China</a>.</p>
+
+    <p>O artigo diz que isso é um <em>backdoor</em>, mas isso pode ser um
+mal-entendido. No entanto, é certamente vigilância, pelo menos.</p>
+  </li>
+
+  <li id="M201407090">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um relógio “inteligente” da LG foi projetado para <a
+href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html";>
+relatar sua localização a outra pessoa e também transmitir 
conversas</a>.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInVehicles">Veículos</h4>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M202105130">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a href="https://gizmodo.com/get-ready-for-in-car-ads-1846888390";>A Ford
+está planejando forçar anúncios sobre motoristas de carros</a>, com a
+possibilidade de o dono pagar a mais para desligá-los. O sistema
+provavelmente também impõe vigilância aos motoristas.</p>
+  </li>
+
+  <li id="M202008181">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os novos carros da Toyota <a
+href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/";> farão
+upload de dados para a AWS para ajudar a criar prêmios de seguro
+personalizados</a> com base no comportamento do motorista.</p>
+
+    <p>Antes de comprar um carro “conectado”, certifique-se de desconectar 
a antena
+de celular e a antena de GPS dele. Se você deseja navegação GPS, obtenha um
+navegador separado que executa software livre e funciona com Open Street
+Map.</p>
+  </li>
+
+  <li id="M201912171">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Agora, a maioria dos carros modernos <a
+href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html";>
+registram e enviam vários tipos de dados ao fabricante</a>. Para o usuário,
+o acesso aos dados é quase impossível, pois envolve estudar o código do
+computador do carro, que está sempre oculto e funcionando com software
+privativo.</p>
+  </li>
+
+  <li id="M201903290">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os carros da Tesla coletam muitos dados pessoais e, <a
+href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html";>
+quando eles vão para um ferro velho, os dados pessoais do motorista vai com
+eles</a>.</p>
+  </li>
+
+  <li id="M201902011">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O recurso FordPass Connect de alguns veículos da Ford tem <a
+href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html";>
+acesso quase completo à rede interna dos carros</a>. Ele está constantemente
+conectado à rede de telefonia celular e envia à Ford uma grande quantidade
+de dados, incluindo a localização do carro. Esse recurso funciona mesmo
+quando a chave de ignição é removida e os usuários relatam que não podem
+desativá-lo.</p>
+
+    <p>Se você possui um desses carros, conseguiu quebrar a conectividade
+desconectando o modem celular ou envolvendo a antena em papel alumínio?</p>
+  </li>
+
+  <li id="M201811300">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Na China, é obrigatório que os carros elétricos sejam equipados com um
+terminal que <a
+href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca";> transfira
+dados técnicos, incluindo localização de carros, para uma plataforma
+administrada pelo governo</a>. Na prática, os <a
+href="/proprietary/proprietary-surveillance.html#car-spying"> fabricantes
+coletam esses dados</a> como parte de sua própria espionagem e os encaminham
+para a plataforma administrada pelo governo.</p>
+  </li>
+
+  <li id="M201810230">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A GM <a href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html";>
+rastreou as escolhas de programas de rádio</a> em seus carros 
“conectados”,
+minuto a minuto.</p>
+
+    <p>A GM não obteve o consentimento dos usuários, mas poderia ter 
conseguido
+isso facilmente ao entrar no contrato que os usuários assinam para algum
+serviço digital ou outro. Um requisito para consentimento não é efetivamente
+nenhuma proteção.</p>
+
+    <p>Os carros também podem coletar muitos outros dados: escutando você,
+observando você, seguindo seus movimentos, rastreando os celulares dos
+passageiros. <em>Toda</em> coleta de dados deve ser proibida.</p>
+
+    <p>Mas se você realmente quiser estar seguro, devemos nos certificar de 
que o
+hardware do carro não pode coletar nenhum desses dados, ou que o software é
+livre, por isso sabemos que ele não coletará nenhum desses dados.</p>
+  </li>
+
+  <li id="M201711230">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Aplicativos de direção com tecnologia de IA podem <a
+href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move";>
+rastrear todos os seus movimentos</a>.</p>
+  </li>
+
+  <li id="M201607160">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p id="car-spying">Carros computadorizados com software não livre são <a
+href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html";>
+dispositivos de bisbilhotamento</a>.</p>
+  </li>
+
+  <li id="M201602240">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p id="nissan-modem">O Nissan Leaf possui um modem de telefone celular 
integrado que permite
+efetivamente que qualquer pessoa <a
+href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/";>
+acesse seus computadores remotamente e faça alterações em várias
+configurações</a>.</p>
+
+    <p>Isso é fácil de fazer porque o sistema não possui autenticação 
quando
+acessado através do modem. No entanto, mesmo que solicitasse autenticação,
+você não poderia ter certeza de que a Nissan não tem acesso. O software do
+carro é privativo, <a
+href="/philosophy/free-software-even-more-important.html">o que significa
+que exige fé cega de seus usuários</a>.</p>
+
+    <p>Mesmo que ninguém se conecte ao carro remotamente, o modem do celular
+permite que a companhia telefônica rastreie os movimentos do carro o tempo
+todo; no entanto, é possível remover fisicamente o modem do telefone
+celular.</p>
+  </li>
+
+  <li id="M201306140">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Carros da Tesla permitem que a empresa extraia dados remotamente e determine
+a localização do carro a qualquer momento. (Consulte a Seção 2, 
parágrafos b
+e c da <a
+href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf";>
+declaração de privacidade</a>.) A empresa diz que não armazena essas
+informações, mas se o estado ordena que ela obtenha os dados e os entregue,
+o estado pode armazená-los.</p>
+  </li>
+
+  <li id="M201303250">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p id="records-drivers">Software privativo em carros <a
+href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/";>
+registra informações sobre os movimentos dos motoristas</a>, que é
+disponibilizado a montadoras, seguradoras e outros.</p>
+
+    <p>O caso dos sistemas de cobrança de pedágio, mencionado neste artigo, 
não é
+realmente uma questão de vigilância privativa. Esses sistemas são uma
+invasão de privacidade intolerável e devem ser substituídos por sistemas de
+pagamento anônimos, mas a invasão não é feita por <em>malware</em>. Os
+outros casos mencionados são feitos por <em>malware</em> privativo no 
carro.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInVR">Realidade virtual</h4>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInVR">#SpywareInVR</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M202008182">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os <i lang="en">headsets</i> Oculus <a
+href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october";>
+exigem que os usuários identifiquem para o Facebook</a>. Isso dará ao
+Facebook liberdade para bisbilhotar os usuários Oculus de forma
+generalizada.</p>
+  </li>
+
+  <li id="M201612230">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Um equipamento de realidade virtual (VR), medindo cada movimento leve, cria
+o potencial para a vigilância mais íntima de todos os tempos. Tudo o que é
+preciso para tornar este potencial real <a
+href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/";>é
+um software tão malicioso quanto muitos outros programas listados nesta
+página</a>.</p>
+
+    <p>Você pode apostar que o Facebook implementará a vigilância máxima 
possível
+nos dispositivos Oculus Rift. A moral é: nunca confie em um sistema de
+realidade virtual com software não livre.</p>
+  </li>
+</ul>
+
+
+
+<div class="big-section">
+  <h3 id="SpywareOnTheWeb"><i lang="en">Spyware</i> na web</h3>
+  <span class="anchor-reference-id">(<a
+href="#SpywareOnTheWeb">#SpywareOnTheWeb</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<p>Além disso, muitos sites espionam seus visitantes. Os sites não são
+programas, portanto, <a
+href="/philosophy/network-services-arent-free-or-nonfree.html"> não faz
+sentido chamá-los de “livres“ ou “privativos”</a>, mas a vigilância 
é um
+abuso da mesma forma.</p>
+
+<ul class="blurbs">
+  <li id="M201904210">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A partir de abril de 2019, <a
+href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk";>não
+é mais possível desativar uma característica indesejável de rastreamento 
sem
+escrúpulos</a> que <a
+href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing";>denuncia
+usuários quando eles seguem links de ping</a> no Apple Safari, Google
+Chrome, Opera, Microsoft Edge e também no Microsoft Edge que será baseado no
+Chromium.</p>
+  </li>
+
+  <li id="M201901101">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Até 2015, qualquer tweet que listasse uma tag geográfica <a
+href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/";>
+enviou a localização precisa do GPS para o servidor do Twitter</a>. Ainda
+contém essas localizações GPS.</p>
+  </li>
+
+  <li id="M201805170">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O programa Storyful <a
+href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch";>espia
+os repórteres que o usam</a>.</p>
+  </li>
+
+  <li id="M201701060">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-01</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Quando uma página usa Disqus para comentários, o software privativo Disqus
+<a
+href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook";>carrega
+um pacote de software do Facebook no navegador de cada visitante anônimo da
+página e disponibiliza a URL da página para o Facebook</a>.</p>
+  </li>
+
+  <li id="M201612064">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Vendas online, com rastreamento e vigilância de clientes, <a
+href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices";>permite
+que as empresas mostrem preços diferentes para diferentes pessoas</a>. A
+maior parte do rastreamento é feita gravando as interações com os
+servidores, mas o software privativo contribui.</p>
+  </li>
+
+  <li id="M201405140">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2014-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/";>
+O Microsoft SkyDrive permite que a NSA examine diretamente os dados dos
+usuários</a>.</p>
+  </li>
+
+  <li id="M201210240">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2012-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Muitos sites denunciam seus visitantes às redes de anúncio que rastreiam 
os
+usuários. Dos 1000 principais sites, <a
+href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/";>84%
+(até 17 de maio de 2012) alimentava seus visitantes com cookies de
+terceiros, permitindo que outros sites os rastreassem</a>.</p>
+  </li>
+
+  <li id="M201208210">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2012-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Muitos sites relatam todos os visitantes do Google usando o serviço Google
+Analytics, que <a
+href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/";>
+informa ao Google o endereço IP e a página que foi visitada</a>.</p>
+  </li>
+
+  <li id="M201200000">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+[2012]</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Muitos sites tentam coletar catálogos de endereços de usuários (a lista 
do
+usuário com números de telefone ou endereços de e-mail de outras
+pessoas). Isso viola a privacidade dessas outras pessoas.</p>
+  </li>
+
+  <li id="M201110040">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2011-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Páginas que contêm botões de “Curtir” <a
+href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html";>
+permitem que o Facebook rastreie os visitantes dessas páginas</a> – até
+mesmo os usuários que não têm contas no Facebook.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInJavaScript">JavaScript</h4>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInJavaScript">#SpywareInJavaScript</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M201811270">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Muitos sites usam código JavaScript <a
+href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
+para bisbilhotar informações que usuários digitaram em um formulário, mas
+não enviaram</a>, para aprender sua identidade. Alguns estão <a
+href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege";>
+sendo processados</a> por isso.</p>
+
+    <p>As funcionalidades de chat de alguns serviços ao consumidor usam o 
mesmo
+tipo de <em>malware</em> para <a
+href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119";>
+ler o que o usuário está digitando antes de ser enviado</a>.</p>
+  </li>
+
+  <li id="M201807190">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A British Airways usou <a
+href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security";>JavaScript
+não livre em seu site para dar a outras empresas dados pessoais sobre seus
+clientes</a>.</p>
+  </li>
+
+  <li id="M201712300">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Algum <em>malware</em> JavaScript <a
+href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research";>
+rouba nomes de usuário de gerenciadores de senha baseados em 
navegador</a>.</p>
+  </li>
+
+  <li id="M201711150">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-11</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Alguns sites enviam código JavaScript para coletar todas as entradas do
+usuário, <a
+href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/";>que
+pode então ser usado para reproduzir toda a sessão</a>.</p>
+
+    <p>Se você usar o LibreJS, ele bloqueará o código JavaScript 
malicioso.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInFlash">Flash</h4>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInFlash">#SpywareInFlash</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M201310110">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-10</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Flash e JavaScript são usados para <a
+href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/";>
+dispositivos de “impressão digital”</a> para identificar usuários.</p>
+  </li>
+
+  <li id="M201003010">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2010-03</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O <a
+href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/";>
+recurso de cookies do Flash Player ajuda os sites a rastrear os
+visitantes</a>.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInChrome">Chrome</h4>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInChrome">#SpywareInChrome</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M201906220">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Google Chrome é um <a
+href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/";>
+instrumento de vigilância</a>. Ele permite que milhões de rastreadores
+invadam os computadores dos usuários e relatem os sites que eles visitaram
+para empresas de dados e de anúncios, antes de mais nada para o Google. Além
+disso, se os usuários têm uma conta do Gmail, o Chrome automaticamente
+registra-os para o navegador para um perfilamento mais conveniente. No
+Android, o Chrome também relata sua localização para o Google.</p>
+
+    <p>A melhor forma de escapar da vigilância é trocar para o <a
+href="/software/icecat/">IceCat</a>, uma versão modificada do Firefox com
+várias alterações para proteger a privacidade dos usuários.</p>
+  </li>
+
+  <li id="M201704131">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2017-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Chromebooks de baixo custo para escolas estão <a
+href="https://www.eff.org/wp/school-issued-devices-and-student-privacy";>
+coletando muito mais dados sobre os alunos do que o necessário e armazenam
+indefinidamente</a>. Pais e alunos reclamam da falta de transparência por
+parte dos serviços educacionais e das escolas, da dificuldade de optar por
+esses serviços e da falta de políticas adequadas de privacidade, entre
+outras coisas.</p>
+
+    <p>Mas reclamar não é suficiente. Pais, alunos e professores devem 
perceber que
+o software que o Google usa para espionar os alunos não é livre, então eles
+não podem verificar o que realmente faz. O único remédio é persuadir
+funcionários da escola a <a href="/education/edu-schools.html"> usarem
+exclusivamente software livre</a> tanto para a educação quanto para a
+administração da escola. Se a escola for gerida localmente, os pais e
+professores podem obrigar os seus representantes no Diretoria da Escola a
+recusar o orçamento, a menos que a escola inicie uma mudança para o software
+livre. Se a educação for administrada em todo o país, eles precisam
+convencer os legisladores (por exemplo, através de organizações de software
+livre, partidos políticos, etc.) a migrar as escolas públicas para o
+software livre.</p>
+  </li>
+
+  <li id="M201507280">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-07</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Google Chrome torna mais fácil para uma extensão fazer <a
+href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/";>bisbilhotamento
+total na navegação do usuário</a>, e muitos deles o fazem.</p>
+  </li>
+
+  <li id="M201506180">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2015-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Google Chrome inclui um módulo que <a
+href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/";>
+ativa microfones e transmite áudio para seus servidores</a>.</p>
+  </li>
+
+  <li id="M201308040">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2013-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Google Chrome <a
+href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/";> espia o
+histórico do navegador, afiliações</a> e outros softwares instalados.</p>
+  </li>
+
+  <li id="M200809060">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2008-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Google Chrome contém um <i lang="en">key logger</i> que <a
+href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/";>
+envia ao Google todas as URLs digitadas</a>, uma tecla por vez.</p>
+  </li>
+</ul>
+
+
+
+<div class="big-section">
+  <h3 id="SpywareInNetworks"><i lang="en">Spyware</i> em redes</h3>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInNetworks">#SpywareInNetworks</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul class="blurbs">
+  <li id="M202105060">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://me2ba.org/me2ba-product-testing-spotlight-report-published-data-sharing-in-primary-secondary-school-mobile-apps-2/";>60%
+dos aplicativos escolares estão enviando dados dos alunos para terceiros
+potencialmente de alto risco</a>, colocando os alunos e possivelmente todos
+os outros funcionários da escola sob vigilância. Isso é possível com o uso
+de programas inseguros e privativos feitos por empresas com fome de dados.</p>
+
+    <p><small>Observe que o fato de os alunos consentirem ou não com isso não
+justifica a vigilância a que são impostos.</small></p>
+  </li>
+
+  <li id="M202105030">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O governo dos Estados Unidos está considerando <a
+href="https://www.infosecurity-magazine.com/news/private-companies-may-spy-on/";>formar
+uma parceria com empresas privadas para monitorar cidadãos americanos
+atividade online e comunicações digitais</a>.</p>
+
+    <p>O que cria a oportunidade de tentar isso é o fato de que essas 
empresas já
+estão bisbilhotando as atividades privadas dos usuários. Isso, por sua vez,
+é devido ao uso que as pessoas fazem de softwares não livres que bisbilhotam
+e de serviços on-line que bisbilhotam.</p>
+  </li>
+
+  <li id="M202102160">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Google <a
+href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16";>entregou
+dados pessoais de manifestantes e ativistas indianos à polícia indiana </a>,
+o que levou à prisão deles. Os policiais solicitaram o endereço IP e o local
+onde o documento foi elaborado e, com essas informações, identificaram
+manifestantes e ativistas.</p>
+  </li>
+
+  <li id="M202012250">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O programa de supervisão de exames online HonorLock é uma ferramenta de
+vigilância que <a
+href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps";>rastreia
+alunos e coleta dados</a> como rosto, carteira de habilitação e informações
+de rede, entre outros, em flagrante violação da privacidade dos alunos.</p>
+
+    <p>Impedir que os alunos trapaceiem não deve ser uma desculpa para 
executar
+<em>malware</em>/<em>spyware</em> em seus computadores, e é bom que os
+alunos estejam protestando. Mas suas petições negligenciam uma questão
+crucial, a saber, a injustiça de ser forçado a executar um software não
+gratuito para obter educação.</p>
+  </li>
+
+  <li id="M202009070">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-09</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Enquanto o mundo ainda luta contra o coronavírus do COVID-19, muitas <a
+href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/";>pessoas
+estão em perigo de vigilância</a> e seus computadores estão infectados com
+<em>malware</em> como resultado da instalação de software privativo.</p>
+  </li>
+
+  <li id="M202004301">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2020-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os programas privativos Google Meet, Microsoft Teams e WebEx <a
+href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/";>estão
+coletando dados pessoais e dados identificáveis</a>, incluindo a duração de
+uma chamada, quem está participando da chamada e os endereços IP de todos os
+participantes. Por experiência, isso pode até prejudicar fisicamente os
+usuários, se essas empresas entregarem os dados aos governos.</p>
+  </li>
+
+  <li id="M201905281">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-05</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>A Microsoft <a
+href="https://answers.microsoft.com/pt-br/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08";>força
+as pessoas a fornecerem seu número de telefone</a> para poder criar uma
+conta na rede da empresa. Além de maltratar seus usuários fornecendo
+software não livre, a Microsoft está rastreando suas vidas fora do
+computador e viola sua privacidade.</p>
+  </li>
+
+  <li id="M201902040">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2019-02</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>O Google convida as pessoas a <a
+href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss";>
+permitir que o Google monitore o uso do telefone e todo o uso da Internet em
+suas casas, para um pagamento extravagante de US$ 20</a>.</p>
+
+    <p>Esta não é uma funcionalidade maliciosa de um programa com outra 
finalidade;
+este é o único propósito do software, e o Google diz isso. Mas o Google diz
+isso de uma forma que incentiva a maioria das pessoas a ignorar os
+detalhes. Isso, acreditamos, faz com que seja adequado listar aqui.</p>
+  </li>
+
+  <li id="M201808131">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p><a
+href="https://www.theverge.com/2018/8/13/17684660/google-turn-off-location-history-data";>O
+Google vai rastrear as pessoas mesmo se elas desativarem o histórico de
+localização</a>, usando o Google Maps, atualizações do tempo e pesquisas no
+navegador. O Google basicamente usa qualquer atividade do aplicativo para
+rastrear pessoas.</p>
+  </li>
+
+  <li id="M201808130">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2018-08</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Desde o início de 2017, <a
+href="https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/";>telefones
+Android têm coletado os endereços de torres de celular próximas</a>, mesmo
+quando os serviços de localização estão desativados, e o envio desses dados
+de volta ao Google.</p>
+  </li>
+
+  <li id="M201606030">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2016-06</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Investigação mostra <a
+href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml";>GCHQ
+usando empresas dos EUA, NSA contorna as restrições de vigilância
+doméstica</a>.</p>
+
+    <p>Especificamente, ela pode coletar os e-mails de membros do Parlamento 
dessa
+forma, porque eles os passam pela Microsoft.</p>
+  </li>
+
+  <li id="M201212290">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2012-12</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Os telefones IP Cisco TNP são <a
+href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html";>
+dispositivos espiões</a>.</p>
+  </li>
+</ul>
+</div>
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!--#include virtual="/proprietary/proprietary-menu.pt-br.html" -->
+<!--#include virtual="/server/footer.pt-br.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Envie perguntas em geral sobre a FSF e o GNU para <a
+href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>. Também existem <a
+href="/contact/">outros meios de contatar</a> a FSF. Links quebrados e
+outras correções ou sugestões podem ser enviadas para <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+A equipe de traduções para o português brasileiro se esforça para oferecer
+traduções precisas e de boa qualidade, mas não estamos isentos de erros. Por
+favor, envie seus comentários e sugestões em geral sobre as traduções para
+<a
+href="mailto:web-translators@gnu.org";>&lt;web-translators@gnu.org&gt;</a>.
+</p><p>Consulte o <a href="/server/standards/README.translations.html">Guia
+para as traduções</a> para mais informações sobre a coordenação e a
+contribuição com traduções das páginas deste site.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright &copy; 2015-2021 Free Software Foundation, Inc.</p>
+
+<p>Esta página está licenciada sob uma licença <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/deed.pt_BR";>Creative
+Commons Atribuição 4.0 Internacional</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.pt-br.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+A tradução das páginas na seção Proprietary teve a contribuição de:
+Cassiano Reinert Novais dos Santos <a
+href="mailto:caco@posteo.net";>&lt;caco@posteo.net&gt;</a> e
+Rafael Fontenelle <a
+href="mailto:rafaelff@gnome.org";>&lt;rafaelff@gnome.org&gt;</a>.</div>
+
+<p class="unprintable"><!-- timestamp start -->
+Última atualização:
+
+$Date: 2021/06/26 14:00:00 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: po/proprietary-addictions.pt-br-en.html
===================================================================
RCS file: po/proprietary-addictions.pt-br-en.html
diff -N po/proprietary-addictions.pt-br-en.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-addictions.pt-br-en.html     26 Jun 2021 14:00:01 -0000      
1.1
@@ -0,0 +1,416 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+<title>Proprietary Addictions
+- GNU Project - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+ <!--#include virtual="/proprietary/po/proprietary-addictions.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /></a>&nbsp;/
+ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/
+ By type&nbsp;/
+</p>
+</div>
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Proprietary Addictions</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.</p>
+
+<p>This typically takes the form of malicious functionalities.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>This page deals with malicious functionalities that are added to
+some programs for the sole purpose of luring users into more and more
+frequent and intensive use of the program, with the risk of getting
+addicted.</p>
+
+<div class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.</p>
+</div>
+
+<h3 id="addictiveness">How software is made addictive</h3>
+
+<h4 id="games">Games</h4>
+
+ <p id="M209900000">Many games are designed to
+    keep gamers compulsively playing&mdash;and spending
+    money on the game. To achieve this result, developers use <a
+    
href="http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html";>
+    techniques that derive from behavioral and brain research</a>:</p>
+
+    <dl class="compact"><dt>The Skinner Box</dt>
+      <dd>An environment in which the user is trained
+      to &ldquo;push the lever&ldquo;, i.e. do a certain action over and
+      over again in order to get a reward. This is also known as
+      &ldquo;grinding.&rdquo;</dd>
+
+      <dt>Virtual food pellets</dt>
+      <dd>Items that have nothing to do with the game itself, but are
+      valuable to gamers because of the work required to obtain them
+      (e.g., EverQuest); some people will end up collecting them for the
+      sake of collecting.</dd>
+
+      <dt>Random rewards</dt>
+      <dd>They turn the game into the equivalent of a slot machine (e.g.,
+      World of Warcraft, ZT Online).</dd>
+
+      <dt>Elaborate cycles</dt>
+      <dd>Gamers' behavior can be &ldquo;shaped&rdquo; by making cycles
+      (progress from one level to the next) slower and slower, designing
+      complex tasks that are difficult to get out of (e.g. World of
+      Warcraft), or conversely dividing them up in small chunks to avoid
+      frustration (e.g., New Super Mario Bros.Wii).</dd>
+
+      <dt>Decay of game assets</dt>
+      <dd>This makes it necessary for a gamer to keep playing, without
+      vacations, simply to avoid losing what they have earned so far
+      (e.g., Farmville, Ultima Online, Animal Crossing).</dd>
+    </dl>
+
+ <p>Games such as World of Warcraft, which are considered very addictive,
+    use several of these techniques.</p>
+
+ <p>There are even more elaborate ways to get users addicted to a game.</p>
+ <ul>
+    <li>&ldquo;Loot boxes&rdquo; are a direct
+    application of the random reward mechanism, and their addictiveness
+    is enhanced by seductive animation. They are <a
+    
href="https://www.pcgamer.com/behind-the-addictive-psychology-and-seductive-art-of-loot-boxes/";>
+    akin to gambling</a>.</li>
+
+    <li id="gacha"><a
+    href="https://wikipedia.org/wiki/Gacha_game";><i>Gacha</i></a> systems,
+    widely used by Japanese games since 2010, may be considered the
+    ancestors of loot boxes. A <i>gacha</i> is the virtual equivalent of
+    a capsule-toy vending machine. Its addictiveness is based on random
+    rewards, and also on the basic instinct of people to collect items.</li>
+
+    <li>The developers of gratis
+    mobile games apply the techniques described above to <a
+    href="https://www.psychguides.com/interact/the-psychology-of-freemium/";>
+    turn their products into slot machines</a>. This is clearly
+    described in an infographic. The revenue generated by these games
+    is directly related to the number of strongly addicted gamers
+    (called &ldquo;whales&rdquo;) and to the amount of money they are
+    willing to spend. Thus developers carefully study the behavior of
+    millions of users to increase the addictiveness of their games.</li>
+ </ul>
+
+ <p><small>(Unfortunately, the last two articles use &ldquo;free&rdquo; to
+    mean &ldquo;zero price.&rdquo;  We recommend saying &ldquo;gratis&rdquo;
+    instead.)</small></p>
+
+ <p>However, the addictiveness of a game is
+    only one of the determinants of addiction. Equally important are the
+    psychological make-up and life circumstances of the gamer. Gaming
+    addiction, like other addictions, is a form of mental escape from an
+    unrewarding life. The sad truth is that, in the long run, it leads
+    to an even worse life.</p>
+
+ <p><small><em>Note:</em>&nbsp;
+    We are not gamers. If you think we have misunderstood
+    some point, or have suggestions for making this text
+    clearer or more correct, please send them to &lt;<a
+    href="mailto:webmasters@gnu.org";>webmasters@gnu.org</a>&gt;.</small></p>
+
+<h4 id="gambling">Online gambling</h4>
+
+ <p id="M201902220">Online gambling services (and their nonfree
+    client programs) are <a
+    
href="https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-dangerous-than-fobts-study-finds";>
+    designed to be addictive</a>, much like on-line games. They achieve 
+    this with various different malfunctionalities, often in combination.</p>
+
+    <p>Many of these malfunctionalities are implemented by the server and
+    the client program together. In some cases, there is no honest way that
+    the client program could counteract the nastiness&mdash;for instance,
+    when the server manipulates amounts won in order to get the user
+    addicted, the only way the client program could block that is to pretend
+    the win did not happen. But users would not want that modification.</p>
+
+ <p>However, modification of the client program could cover up some
+    addictive behaviors without losing the user anything.</p>
+
+<h4 id="social-networks">Social networks</h4>
+
+ <p>The major social networks are continuously optimizing their design to <a
+    
href="https://medium.com/thrive-global/how-technology-hijacks-peoples-minds-from-a-magician-and-google-s-design-ethicist-56d62ef5edf3";>
+    grab users' attention</a> by taking advantage of the psychological
+    vulnerabilities described above, eventually leading some to addiction.
+    For these people, a phone becomes the equivalent of a slot machine.
+    Many of the addictive features (menu, &ldquo;likes,&rdquo; photo tagging,
+    autoplay, etc.) are built into the client software, and can't be
+    removed because the software is proprietary.</p>
+   
+ <p id="M201803210">Thus, some social networking apps <a
+    href="https://www.jeffbullas.com/facebook-creates-addiction/";>try to
+    merge into your daily
+    routine</a> by exploiting social pressure and your natural desire for
+    socialization, converting habitual gestures into thorough addiction. As
+    already noted for games, addictiveness is essentially based on random
+    rewards. In the present case, the rewards are messages from friends
+    and followers, &ldquo;likes,&rdquo; news, interesting videos, etc. The
+    software is designed to trigger users' desire for these rewards,
+    and keep this desire alive as long as possible.</p>
+
+ <ul>
+      <li>By default, notifications are sent every time a new item comes
+      in, instead of, say, once a day. They are associated with sounds or
+      vibrations which make them even more compelling. (Remember Pavlov's
+      experiments with rats.) These triggers are often opt-out, and many
+      users don't try to turn them off. They are most effective when the
+      app is installed on a mobile device which is always on and never
+      leaves the user. As a side effect, they may contribute to the <a
+      
href="https://www.psychologytoday.com/us/blog/reading-between-the-headlines/201307/smartphone-addiction";>
+      addictiveness of &ldquo;smart&rdquo; phones</a>.</li>
+
+      <li>Users are served selected material
+      that is likely to interest   them, based on <a
+      
href="https://theconversation.com/facebook-is-killing-democracy-with-its-personality-profiling-data-93611";>
+      profiling</a>. (This paves the way to <a
+      href="/proprietary/proprietary-manipulation.html">manipulation</a>,
+      by the way.)</li>
+
+      <li>The app interface is designed to make   users
+      stay on the site as long as possible, using <a
+      
href="https://uxplanet.org/ux-infinite-scrolling-vs-pagination-1030d29376f1";>
+      infinite scrolling</a> for example.</li>
+
+      <li>The company that owns the social network tries
+      to cover   users' needs as extensively as possible, by <a
+      
href="https://en.wikipedia.org/wiki/List_of_mergers_and_acquisitions_by_Facebook";>
+      acquiring other companies</a> if needed. Once users
+      have concentrated   most of their online activities and
+      a lot of their personal data on   a single platform (or
+      a set of platforms that belong to the same   group), they find it <a
+      
href="https://www.theguardian.com/lifeandstyle/2018/jan/01/antisocial-media-why-decided-cut-back-facebook-instagram";>
+      almost impossible to leave</a>. And even if they wanted to, they
+      would have a hard time digging out the relevant options, and the
+      app would aggressively nag them to stay.</li>
+    </ul>
+
+ <p>A good way to minimize the risk of addiction, short of avoiding
+    social media altogether, is to turn off notifications and leave as
+    little as possible of your own data on the platform.</p>
+
+
+<h3 id="proprietary-addictions">Examples of addictive software</h3>
+
+<ul class="blurbs">
+  <li id="M202010220">
+    <!--#set var="DATE" value='<small class="date-tag">2020-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The addictive Genshin Impact relentlessly <a
+    
href="https://www.theguardian.com/games/2020/oct/22/genshin-impact-video-game-slowly-taking-over-the-world";>coerces
+    players to spend money by overwhelming the game play with loot
+    boxes</a>.</p>
+  </li>
+
+  <li id="M202003110">
+    <!--#set var="DATE" value='<small class="date-tag">2020-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Roblox (among many other games)
+    created anti-features which sucker children into <a
+    
href="https://www.theguardian.com/money/2020/mar/11/my-kids-spent-600-on-their-ipads-without-my-knowledge";>
+    utilizing third-party payment services without authorization.</a></p>
+  </li>
+
+  <li id="M201907090">
+    <!--#set var="DATE" value='<small class="date-tag">2019-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Resourceful children figured out how to <a
+    href="https://www.bbc.co.uk/news/technology-48908766";> empty their
+    parents' bank account</a> buying packs of special players for an
+    Electronic Arts soccer game.</p>
+
+    <p>The random element of these packs (also called &ldquo;loot
+    boxes&rdquo;) makes the game <a
+    href="/proprietary/proprietary-addictions#addictiveness">
+    strongly addictive</a>, but the fact that players
+    are pressured to spend more in order to get ahead of their
+    competitors further qualifies it as <em>predatory</em>. 
+    Note that Belgium <a
+    
href="https://www.rockpapershotgun.com/2019/01/29/fifa-ultimate-team-packs-blocked-in-belgium/";>
+    made these loot boxes illegal</a> in 2018.</p>
+
+    <p>The only good reason to have a copy of such a proprietary
+    game is to study it for free software development.</p>
+  </li>
+
+  <li id="M201809210">
+    <!--#set var="DATE" value='<small class="date-tag">2018-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Clash of Clans is a good example of a gratis mobile game that its
+    developers <a href="https://gamerant.com/clash-of-clans-addiction/";>
+    made very addictive</a> for a large proportion of its users&mdash;and
+    turned into a cash machine for themselves&mdash;by using <a
+    href="/proprietary/proprietary-addictions.html#addictiveness">
+    psychological manipulation techniques</a>.</p>
+
+    <p><small>(The article uses &ldquo;free&rdquo; to mean &ldquo;zero
+    price,&rdquo; which is a usage we should avoid. We recommend saying
+    &ldquo;gratis&rdquo; instead.)</small></p>
+  </li>
+
+  <li id="M201612290">
+    <!--#set var="DATE" value='<small class="date-tag">2016-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>In the game Fruit Pop, the player buys boosts with coins to get
+    a high score. The player gets coins at the end of each game, and can
+    buy more coins with real money.</p>
+
+    <p>Getting a higher score once leads the player to desire higher
+    score again later. But the higher score resulting from the boost <a
+    
href="https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-economic-ideas/";>does
+    not give the player more coins, and does not help the player get
+    a higher score in subsequent games</a>. To get that, the player
+    will need a boost frequently, and usually has to pay real money
+    for that. Since boosts are exciting and entertaining, the player is
+    subtly pushed to purchase more coins with real money to get boosts,
+    and it can develop into a costly habit.</p>
+  </li>
+
+  <li id="M201604040">
+    <!--#set var="DATE" value='<small class="date-tag">2016-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Many popular mobile games include a random-reward system called
+    <a href="#gacha"><i>gacha</i></a> which is especially effective on
+    children. One variant of gacha was declared illegal in Japan in 2012,
+    but the other variants are still <a
+    
href="https://www.forbes.com/sites/olliebarder/2016/04/04/japanese-mobile-gaming-still-cant-shake-off-the-spectre-of-exploitation/";>
+    luring players into compulsively spending</a> inordinate amounts of
+    money on virtual toys.</p>
+  </li>
+
+  <li id="M201507290">
+    <!--#set var="DATE" value='<small class="date-tag">2015-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Game Of War: Fire Age is an iPhone game with <a
+    
href="http://www.cracked.com/personal-experiences-1762-5-reasons-i-lost-249000-iphone-game.html";>
+    addictive features</a> which are based on <a
+    href="/proprietary/proprietary-addictions.html#addictiveness">behavioral
+    manipulation techniques</a>, compounded with group emulation. After a
+    fairly easy start, the game slows down and becomes more difficult,
+    so gamers are led to spend more and more money in order to keep up
+    with their group. And if they stop playing for a while, the equipment
+    they invested in gets destroyed by the &ldquo;enemy&rdquo; unless
+    they buy an expensive &ldquo;shield&rdquo; to protect it. This game
+    is also deceptive, as it uses confusing menus and complex stats to
+    obfuscate true monetary costs.</p>
+  </li>
+
+  <li id="M201504210">
+    <!--#set var="DATE" value='<small class="date-tag">2015-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Runescape is a popular online game with some <a
+    
href="https://www.reddit.com/r/runescape/comments/33cd8g/question_why_is_runescape_so_addicting/";>
+    addictive features</a> derived from <a
+    href="/proprietary/proprietary-addictions.html#addictiveness">
+    behavioral manipulation techniques</a>. Certain
+    repetitive aspects of the game, like <a
+    href="https://en.wikipedia.org/wiki/Grinding_(video_games)">
+    grinding</a>, can be minimised by becoming a paying member, and can
+    thus encourage children and impressionable people to spend money on
+    the game.</p>
+  </li>
+</ul>
+</div>
+
+</div>
+<!--#include virtual="/proprietary/proprietary-menu.html" -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Please send general FSF &amp; GNU inquiries to
+<a href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.  Broken links and other corrections or suggestions can be sent
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and contributing translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/";>Creative
+Commons Attribution 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2021/06/26 14:00:01 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: po/proprietary-back-doors.pt-br-en.html
===================================================================
RCS file: po/proprietary-back-doors.pt-br-en.html
diff -N po/proprietary-back-doors.pt-br-en.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-back-doors.pt-br-en.html     26 Jun 2021 14:00:01 -0000      
1.1
@@ -0,0 +1,917 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+<title>Proprietary Back Doors - GNU Project - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+ <!--#include virtual="/proprietary/po/proprietary-back-doors.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /></a>&nbsp;/
+ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/
+ By type&nbsp;/
+</p>
+</div>
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Proprietary Back Doors</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.</p>
+
+<p>This typically takes the form of malicious functionalities.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>Some malicious functionalities are mediated by <a
+href="/proprietary/proprietary.html#f1">back doors</a>.  Here are
+examples of programs that contain one or several of those, classified
+according to what the back door is known to have the power to do.
+Back doors that allow full control over the programs which contain them
+are said to be &ldquo;universal.&rdquo;</p>
+
+<div class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.</p>
+</div>
+
+<div id="TOC" class="toc-inline">
+<h3>Back-door functionalities</h3>
+<ul>
+  <li><a href="#spy">Spying</a></li>
+  <li><a href="#alter-data">Altering user's data or settings</a></li>
+  <li><a href="#install-delete">Installing, deleting or disabling 
programs</a></li>
+  <li><a href="#universal">Full control</a></li>
+  <li><a href="#other">Other/undefined</a></li>
+</ul>
+</div>
+
+<h3 id='spy'>Spying</h3>
+
+<ul class="blurbs">
+  <li id="M202008030">
+    <!--#set var="DATE" value='<small class="date-tag">2020-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Google Nest <a
+    
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/";>
+    is taking over ADT</a>. Google sent out a software
+    update to its speaker devices using their back door <a
+    href="https://www.protocol.com/google-smart-speaker-alarm-adt";> that
+    listens for things like smoke alarms</a> and then notifies your phone
+    that an alarm is happening. This means the devices now listen for more
+    than just their wake words. Google says the software update was sent
+    out prematurely and on accident and Google was planning on disclosing
+    this new feature and offering it to customers who pay for it.</p>
+  </li>
+
+  <li id="M201706200.2">
+    <!--#set var="DATE" value='<small class="date-tag">2017-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p id="InternetCameraBackDoor">Many models of Internet-connected
+    cameras contain a glaring back door&mdash;they have login
+    accounts with hard-coded passwords, which can't be changed, and <a
+    
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/";>
+    there is no way to delete these accounts either</a>.</p>
+
+    <p>Since these accounts with hard-coded passwords are impossible
+    to delete, this problem is not merely an insecurity; it amounts to
+    a back door that can be used by the manufacturer (and
+    government) to spy on users.</p>
+  </li>
+
+  <li id="M201701130">
+    <!--#set var="DATE" value='<small class="date-tag">2017-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>WhatsApp has a feature that <a
+    
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/";>
+    has been described as a &ldquo;back door&rdquo;</a> because it would
+    enable governments to nullify its encryption.</p>
+
+    <p>The developers say that it wasn't intended as a back door, and that
+    may well be true. But that leaves the crucial question of whether it
+    functions as one. Because the program is nonfree, we cannot check by
+    studying it.</p>
+  </li>
+
+  <li id="M201512280">
+    <!--#set var="DATE" value='<small class="date-tag">2015-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Microsoft has <a
+    
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
+    backdoored its disk encryption</a>.</p>
+  </li>
+
+  <li id="M201409220">
+    <!--#set var="DATE" value='<small class="date-tag">2014-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple can, and regularly does, <a
+    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>
+    remotely extract some data from iPhones for the state</a>.</p>
+
+    <p>This may have improved with <a
+    
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/";>
+    iOS 8 security improvements</a>; but <a
+    href="https://firstlook.org/theintercept/2014/09/22/apple-data/";>
+    not as much as Apple claims</a>.</p>
+  </li>
+</ul>
+
+
+<h3 id='alter-data'>Altering user's data or settings</h3>
+
+<ul class="blurbs">
+  <li id="M201905060">
+    <!--#set var="DATE" value='<small class="date-tag">2019-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>BlizzCon 2019 imposed a <a
+    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/";>
+    requirement to run a proprietary phone app</a> to be allowed into
+    the event.</p>
+
+    <p>This app is a spyware that can snoop on a lot of
+    sensitive data, including user's location and contact list, and has <a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/";>
+    near-complete control</a> over the phone.</p>
+  </li>
+
+  <li id="M201809140">
+    <!--#set var="DATE" value='<small class="date-tag">2018-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Android has a <a
+    
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change";>
+    back door for remotely changing &ldquo;user&rdquo; settings</a>.</p>
+
+    <p>The article suggests it might be a universal back door, but this
+    isn't clear.</p>
+  </li>
+
+  <li id="M201607284">
+    <!--#set var="DATE" value='<small class="date-tag">2016-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Dropbox app for Macintosh <a
+    
href="https://web.archive.org/web/20180124123506/http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/";>
+    takes control of user interface items after luring the user into
+    entering an admin password</a>.</p>
+  </li>
+
+  <li id="M201604250">
+    <!--#set var="DATE" value='<small class="date-tag">2016-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A pregnancy test controller application not only can <a
+    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security";>
+    spy on many sorts of data in the phone, and in server accounts,
+    it can alter them too</a>.</p>
+  </li>
+
+  <li id="M201512074">
+    <!--#set var="DATE" value='<small class="date-tag">2015-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html";>
+    Some D-Link routers</a> have a back door for changing settings in a
+    dlink of an eye.</p>
+
+    <p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/";> The TP-Link
+    router has a back door</a>.</p>
+
+    <p><a href="https://github.com/elvanderb/TCP-32764";>Many models of
+    routers have back doors</a>.</p>
+  </li>
+
+  <li id="M201511244">
+    <!--#set var="DATE" value='<small class="date-tag">2015-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Google has long had <a
+    
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted";>a
+    back door to remotely unlock an Android device</a>, unless its disk
+    is encrypted (possible since Android 5.0 Lollipop, but still not
+    quite the default).</p>
+  </li>
+
+  <li id="M201511194">
+    <!--#set var="DATE" value='<small class="date-tag">2015-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Caterpillar vehicles come with <a
+    
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it";>
+    a back door to shutoff the engine</a> remotely.</p>
+  </li>
+
+  <li id="M201509160">
+    <!--#set var="DATE" value='<small class="date-tag">2015-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Modern gratis game cr&hellip;apps <a
+    
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/";>
+    collect a wide range of data about their users and their users'
+    friends and associates</a>.</p>
+
+    <p>Even nastier, they do it through ad networks that merge the data
+    collected by various cr&hellip;apps and sites made by different
+    companies.</p>
+
+    <p>They use this data to manipulate people to buy things, and hunt for
+    &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
+    use a back door to manipulate the game play for specific players.</p>
+
+    <p>While the article describes gratis games, games that cost money
+    can use the same tactics.</p>
+  </li>
+
+  <li id="M201403120.1">
+    <!--#set var="DATE" value='<small class="date-tag">2014-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p id="samsung"><a
+    
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor";>
+    Samsung Galaxy devices running proprietary Android versions come with
+    a back door</a> that provides remote access to the files stored on
+    the device.</p>
+  </li>
+
+  <li id="M201210220">
+    <!--#set var="DATE" value='<small class="date-tag">2012-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p id="swindle-eraser">The Amazon
+    Kindle-Swindle has a back door that has been used to <a
+    
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
+    remotely erase books</a>.  One of the books erased was
+    <cite>1984</cite>, by George Orwell.</p>
+
+    <p>Amazon responded to criticism by saying it
+    would delete books only following orders from the
+    state.  However, that policy didn't last.  In 2012 it <a
+    
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html";>
+    wiped a user's Kindle-Swindle and deleted her account</a>, then
+    offered her kafkaesque &ldquo;explanations.&rdquo;</p>
+
+    <p>Do other ebook readers have back doors in their nonfree software? We
+    don't know, and we have no way to find out.  There is no reason to
+    assume that they don't.</p>
+  </li>
+
+  <li id="M201011220">
+    <!--#set var="DATE" value='<small class="date-tag">2010-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The iPhone has a back door for <a
+    
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>
+    remote wipe</a>.  It's not always enabled, but users are led into
+    enabling it without understanding.</p>
+  </li>
+</ul>
+
+
+<h3 id='install-delete'>Installing, deleting or disabling programs</h3>
+
+<ul class="blurbs">
+  <li id="M202012020">
+    <!--#set var="DATE" value='<small class="date-tag">2020-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Adobe Flash Player <a
+    href="https://www.adobe.com/products/flashplayer/end-of-life.html";>
+    has a universal back door</a> which lets Adobe control
+    the software and, for example, disable it whenever it
+    wants. Adobe will block Flash content from running in Flash Player
+    beginning January 12, 2021, which indicates that they have access to
+    every Flash Player through a back door.</p>
+
+    <p>The back door won't be dangerous in the future, as it'll disable
+    a proprietary program and make users delete the software, but it
+    was an injustice for many years. Users should have deleted Flash Player
+    even before its end of life.</p>
+  </li>
+
+  <li id="M202007020">
+    <!--#set var="DATE" value='<small class="date-tag">2020-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>BMW is trying to <a
+    
href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates";>lock
+    certain features of its cars, and force people to pay to use part of
+    the car they already bought</a>. This is done through forced update
+    of the car software via a radio-operated back door.</p>
+  </li>
+
+  <li id="M201908270">
+    <!--#set var="DATE" value='<small class="date-tag">2019-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A very popular app found in the
+    Google Play store contained a module that was designed to <a
+    
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/";>secretly
+    install malware on the user's computer</a>. The app developers
+    regularly used it to make the computer download and execute any code
+    they wanted.</p>
+
+    <p>This is a concrete example of what users are exposed to when they
+    run nonfree apps. They can never be completely sure that a nonfree
+    app is safe.</p>
+  </li>
+
+  <li id="M201907100">
+    <!--#set var="DATE" value='<small class="date-tag">2019-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple appears to say that <a
+    href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/";>
+    there is a back door in MacOS</a> for automatically updating some
+    (all?) apps.</p>
+
+    <p>The specific change described in the article was not
+    malicious&mdash;it protected users from surveillance by third
+    parties&mdash;but that is a separate question.</p>
+  </li>
+
+  <li id="M201811100">
+    <!--#set var="DATE" value='<small class="date-tag">2018-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Corel Paintshop Pro has a <a
+    
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/";>
+    back door that can make it cease to function</a>.</p>
+
+    <p>The article is full of confusions, errors and biases that we have
+    an obligation to expose, given that we are making a link to them.</p>
+
+    <ul>
+    <li>Getting a patent does not &ldquo;enable&rdquo; a company to do
+    any particular thing in its products. What it does enable the company
+    to do is sue other companies if they do some particular thing in
+    their products.</li>
+
+    <li>A company's policies about when to attack users through a back
+    door are beside the point. Inserting the back door is wrong in the
+    first place, and using the back door is always wrong too. No software
+    developer should have that power over users.</li>
+
+    <li>&ldquo;<a
+    href="/philosophy/words-to-avoid.html#Piracy">Piracy</a>&rdquo; means
+    attacking ships. Using that word to refer to sharing copies is a smear;
+    please don't smear sharing.</li>
+
+    <li><p>The idea of &ldquo;protecting our IP&rdquo; is
+    total confusion. The term &ldquo;IP&rdquo; itself is a <a
+    href="/philosophy/not-ipr.html">bogus generalization about things
+    that have nothing in common</a>.</p>
+
+    <p>In addition, to speak of &ldquo;protecting&rdquo; that bogus
+    generalization is a separate absurdity. It's like calling the cops
+    because neighbors' kids are playing on your front yard, and saying
+    that you're &ldquo;protecting the boundary line&rdquo;. The kids can't do 
harm
+    to the boundary line, not even with a jackhammer, because it is an
+    abstraction and can't be affected by physical action.</p></li>
+    </ul>
+  </li>
+
+  <li id="M201804010">
+    <!--#set var="DATE" value='<small class="date-tag">2018-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Some &ldquo;Smart&rdquo; TVs automatically <a
+    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928";>
+    load downgrades that install a surveillance app</a>.</p>
+
+    <p>We link to the article for the facts it presents. It
+    is too bad that the article finishes by advocating the
+    moral weakness of surrendering to Netflix. The Netflix app <a
+    href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+    malware too</a>.</p>
+  </li>
+
+  <li id="M201511090">
+    <!--#set var="DATE" value='<small class="date-tag">2015-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Baidu's proprietary Android library, Moplus, has a back door that <a
+    
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made";>
+    can &ldquo;upload files&rdquo; as well as forcibly install
+    apps</a>.</p>
+
+    <p>It is used by 14,000 Android applications.</p>
+  </li>
+
+  <li id="M201112080">
+    <!--#set var="DATE" value='<small class="date-tag">2011-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p> In addition to its <a href="#windows-update">universal back
+    door</a>, Windows 8 has a back door for <a
+    
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html";>
+    remotely deleting apps</a>.</p>
+
+    <p>You might well decide to let a security service that you trust
+    remotely <em>deactivate</em> programs that it considers malicious.
+    But there is no excuse for <em>deleting</em> the programs, and you
+    should have the right to decide whom (if anyone) to trust in this
+    way.</p>
+  </li>
+
+  <li id="M201103070">
+    <!--#set var="DATE" value='<small class="date-tag">2011-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>In Android, <a
+    
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html";>
+    Google has a back door to remotely delete apps</a>. (It was in a
+    program called GTalkService, which seems since then to have been
+    merged into Google Play.)</p>
+
+    <p>Google can also <a
+    
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";>
+    forcibly and remotely install apps</a> through GTalkService.  This is
+    not equivalent to a universal back door, but permits various dirty
+    tricks.</p>
+
+    <p>Although Google's <em>exercise</em> of this power has not been
+    malicious so far, the point is that nobody should have such power,
+    which could also be used maliciously.  You might well decide to
+    let a security service remotely <em>deactivate</em> programs that
+    it considers malicious.  But there is no excuse for allowing it to
+    <em>delete</em> the programs, and you should have the right to decide
+    who (if anyone) to trust in this way.</p>
+  </li>
+
+  <li id="M200808110">
+    <!--#set var="DATE" value='<small class="date-tag">2008-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The iPhone has a back door <a
+    
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html";>
+    that allows Apple to remotely delete apps</a> which Apple considers
+    &ldquo;inappropriate&rdquo;.  Jobs said it's OK for Apple to have
+    this power because of course we can trust Apple.</p>
+  </li>
+</ul>
+
+
+<h3 id='universal'>Full control</h3>
+
+<ul class="blurbs">
+  <li id="M202102180">
+    <!--#set var="DATE" value='<small class="date-tag">2021-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Microsoft is <a
+    
href="https://uk.pcmag.com/operating-systems/131798/microsoft-starts-automatically-removing-flash-from-windows";>forcibly
+    removing the Flash player from computers running Windows 10</a>, using
+    <a href="/proprietary/proprietary-back-doors.html#windows-update">a
+    universal backdoor in Windows</a>.</p>
+
+    <p>The fact that Flash has been <a
+    href="/proprietary/proprietary-back-doors.html#M202012020">disabled
+    by Adobe</a> is no excuse for this abuse of power. The nature of
+    proprietary software, such as Microsoft Windows, gives the developers
+    power to impose their decisions on users. Free software on the other
+    hand empowers users to make their own decisions.</p>
+  </li>
+
+  <li id="M202011230">
+    <!--#set var="DATE" value='<small class="date-tag">2020-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Some Wavelink and JetStream wifi routers have
+    universal back doors that enable unauthenticated
+    users to remotely control not only the routers, but
+    also any devices connected to the network. There is evidence that <a
+    
href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/";>
+    this vulnerability is actively exploited</a>.</p>
+
+    <p>If you consider buying a router, we encourage you to get one
+    that <a href="https://ryf.fsf.org/categories/routers";>runs on free
+    software</a>. Any attempts at introducing malicious functionalities in
+    it (e.g., through a firmware update) will be detected by the community,
+    and soon corrected.</p>
+
+    <p>If unfortunately you own a router that runs on
+    proprietary software, don't panic! You may be able to
+    replace its firmware with a free operating system such as <a
+    href="https://librecmc.org";>libreCMC</a>. If you don't know how,
+    you can get help from a nearby GNU/Linux user group.</p>
+  </li>
+
+  <li id="M202011060">
+    <!--#set var="DATE" value='<small class="date-tag">2020-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A new app published by Google <a
+    
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/";>lets
+    banks and creditors deactivate people's Android devices</a> if they
+    fail to make payments. If someone's device gets deactivated, it will
+    be limited to basic functionality, such as emergency calling and
+    access to settings.</p>
+  </li>
+
+  <li id="M202007010">
+    <!--#set var="DATE" value='<small class="date-tag">2020-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>BMW will remotely <a
+    href="https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/";>
+    enable and disable functionality in cars</a> through a universal
+    back door.</p>
+  </li>
+
+  <li id="M202004130">
+    <!--#set var="DATE" value='<small class="date-tag">2020-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The <a href="https://www.google.com/mobile/android/market-tos.html";>
+    Google Play Terms of Service</a> insist that the user of Android accept
+    the presence of universal back doors in apps released by Google.</p>
+
+    <p>This does not tell us whether any of Google's apps currently
+    contains a universal back door, but that is a secondary question.
+    In moral terms, demanding that people accept in advance certain bad
+    treatment is equivalent to actually doing it.  Whatever condemnation
+    the latter deserves, the former deserves the same.</p>
+  </li>
+
+  <li id="M202001090">
+    <!--#set var="DATE" value='<small class="date-tag">2020-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Android phones subsidized by the US government come with <a
+    
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/";>
+    preinstalled adware and a back door for forcing installation of
+    apps</a>.</p>
+
+    <p>The adware is in a modified version of an
+    essential system configuration app. The back door is a
+    surreptitious addition to a program whose stated purpose is to be a <a
+    
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/";>
+    universal back door for firmware</a>.</p>
+
+    <p>In other words, a program whose raison d'être is malicious has
+    a secret secondary malicious purpose. All this is in addition to the
+    malware of Android itself.</p>
+  </li>
+
+  <li id="M201910130.1">
+    <!--#set var="DATE" value='<small class="date-tag">2019-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Chinese Communist Party's <a
+    href="/proprietary/proprietary-surveillance.html#M201910130">
+    &ldquo;Study the Great Nation&rdquo; app</a> was found to contain <a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962";>
+    a back-door allowing developers to run any code they wish</a> in the
+    users' phone, as &ldquo;superusers.&rdquo;</p>
+
+    <p>Note: The <a
+    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html";>
+    Washington Post version of the article</a> (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;</p>
+  </li>
+
+  <li id="M201908220">
+    <!--#set var="DATE" value='<small class="date-tag">2019-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>ChromeBooks are programmed for obsolescence:
+    ChromeOS has a universal back door that is used for updates and <a
+    
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/";>
+    ceases to operate at a predefined date</a>. From then on, there
+    appears to be no support whatsoever for the computer.</p>
+
+    <p>In other words, when you stop getting screwed by the back door,
+    you start getting screwed by the obsolescence.</p>
+  </li>
+
+  <li id="M201902011">
+    <!--#set var="DATE" value='<small class="date-tag">2019-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The FordPass Connect feature of some Ford vehicles has <a
+    
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html";>
+    near-complete access to the internal car network</a>. It is constantly
+    connected to the cellular phone network and sends Ford a lot of data,
+    including car location. This feature operates even when the ignition
+    key is removed, and users report that they can't disable it.</p>
+
+    <p>If you own one of these cars, have you succeeded in breaking the
+    connectivity by disconnecting the cellular modem, or wrapping the
+    antenna in aluminum foil?</p>
+  </li>
+
+  <li id="M201812300">
+    <!--#set var="DATE" value='<small class="date-tag">2018-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>New GM cars <a
+    href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html";>
+    offer the feature of a universal back door</a>.</p>
+
+    <p>Every nonfree program offers the user zero security against its
+    developer. With this malfeature, GM has explicitly made things even
+    worse.</p>
+  </li>
+
+  <li id="M201711244">
+    <!--#set var="DATE" value='<small class="date-tag">2017-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Furby Connect has a <a
+    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>
+    universal back door</a>. If the product as shipped doesn't act as a
+    listening device, remote changes to the code could surely convert it
+    into one.</p>
+  </li>
+
+  <li id="M201711010">
+    <!--#set var="DATE" value='<small class="date-tag">2017-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Sony has brought back its robotic pet Aibo, this time <a
+    
href="https://www.vice.com/en/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet";>
+    with a universal back door, and tethered to a server that requires
+    a subscription</a>.</p>
+  </li>
+
+  <li id="M201709090.1">
+    <!--#set var="DATE" value='<small class="date-tag">2017-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Tesla used software to limit the part of the battery
+    that was available to customers in some cars, and <a
+    
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/";>
+    a universal back door in the software</a> to temporarily increase
+    this limit.</p>
+
+    <p>While remotely allowing car &ldquo;owners&rdquo; to use the
+    whole battery capacity did not do them any harm, the same back
+    door would permit Tesla (perhaps under the command of some
+    government) to remotely order the car to use none of its battery. Or
+    perhaps to drive its passenger to a torture prison.</p>
+  </li>
+
+  <li id="M201702060.1">
+    <!--#set var="DATE" value='<small class="date-tag">2017-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Vizio &ldquo;smart&rdquo; TVs <a
+    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen";>
+    have a universal back door</a>.</p>
+  </li>
+
+  <li id="M201609130">
+    <!--#set var="DATE" value='<small class="date-tag">2016-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Xiaomi phones come with <a
+    
href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/";>
+    a universal back door in the application processor, for Xiaomi's
+    use</a>.</p>
+
+    <p>This is separate from <a href="#universal-back-door-phone-modem">the
+    universal back door in the modem processor that the local phone
+    company can use</a>.</p>
+  </li>
+
+  <li id="M201608171">
+    <!--#set var="DATE" value='<small class="date-tag">2016-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p id="windows-update">Microsoft
+    Windows has a universal back door through which <a
+    
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183";>
+    any change whatsoever can be imposed on the users</a>.</p>
+
+    <p>This was <a
+    
href="https://web.archive.org/web/20200219180230/http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
+    reported in 2007</a> for XP and Vista, and it seems
+    that Microsoft used the same method to push the <a
+    href="/proprietary/malware-microsoft.html#windows10-forcing">
+    Windows 10 downgrade</a> to computers running Windows 7 and 8.</p>
+
+    <p>In Windows 10, the universal back door
+    is no longer hidden; all &ldquo;upgrades&rdquo; will be <a
+    
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/";>
+    forcibly and immediately imposed</a>.</p>
+  </li>
+
+  <li id="M201606060">
+    <!--#set var="DATE" value='<small class="date-tag">2016-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Amazon Echo appears to have a universal back door, since <a
+    href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates";>
+    it installs &ldquo;updates&rdquo; automatically</a>.</p>
+
+    <p>We have found nothing explicitly documenting the lack of any way
+    to disable remote changes to the software, so we are not completely
+    sure there isn't one, but this seems pretty clear.</p>
+  </li>
+
+  <li id="M201412180">
+    <!--#set var="DATE" value='<small class="date-tag">2014-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor";>
+    A Chinese version of Android has a universal back door</a>. Nearly
+    all models of mobile phones have a <a 
href="#universal-back-door-phone-modem">
+    universal back door in the modem chip</a>. So why did Coolpad bother
+    to introduce another? Because this one is controlled by Coolpad.</p>
+  </li>
+
+  <li id="M201311300">
+    <!--#set var="DATE" value='<small class="date-tag">2013-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/";>
+    Some applications come with MyFreeProxy, which is a universal back
+    door</a> that can download programs and run them.</p>
+  </li>
+
+  <li id="M201202280">
+    <!--#set var="DATE" value='<small class="date-tag">2012-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>ChromeOS has a universal back
+    door. At least, Google says it does&mdash;in <a
+    href="https://www.google.com/intl/en/chromebook/termsofservice.html";>
+    section 4 of the EULA</a>.</p>
+  </li>
+
+  <li id="M200700000.1">
+    <!--#set var="DATE" value='<small class="date-tag">[2007]</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>In addition to its <a href="#swindle-eraser">book
+    eraser</a>, the Kindle-Swindle has a <a
+    
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090";>
+    universal back door</a>.</p>
+  </li>
+
+  <li id="M200612050">
+    <!--#set var="DATE" value='<small class="date-tag">2006-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p id="universal-back-door-phone-modem">Almost every phone's communication
+    processor has a universal back door which is <a
+    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>
+    often used to make a phone transmit all conversations it hears</a>. See
+    <a 
href="/proprietary/malware-mobiles.html#universal-back-door-phone-modem">Malware
+    in Mobile Devices</a> for more info.</p>
+  </li>
+</ul>
+
+
+<h3 id='other'>Other or undefined</h3>
+
+<ul class="blurbs">
+  <li id="M201711204">
+    <!--#set var="DATE" value='<small class="date-tag">2017-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Intel's intentional &ldquo;management engine&rdquo; back door has <a
+    
href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/";>
+    unintended back doors</a> too.</p>
+  </li>
+
+  <li id="M201609240">
+    <!--#set var="DATE" value='<small class="date-tag">2016-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A Capcom's Street Fighter V update <a
+    href="https://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/";>
+    installed a driver that could be used as a back door by
+    any application installed on a Windows computer</a>, but was <a
+    
href="https://www.rockpapershotgun.com/2016/09/24/street-fighter-v-removes-new-anti-crack";>
+    immediately rolled back</a> in response to public outcry.</p>
+  </li>
+
+  <li id="M201511260">
+    <!--#set var="DATE" value='<small class="date-tag">2015-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Dell computers, shipped with
+    Windows, had a bogus root certificate that <a
+    
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/";>
+    allowed anyone (not just Dell) to remotely authorize any software to
+    run</a> on the computer.</p>
+  </li>
+
+  <li id="M201511198">
+    <!--#set var="DATE" value='<small class="date-tag">2015-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>ARRIS cable modem has a <a
+    
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1";>
+    back door in the back door</a>.</p>
+  </li>
+
+  <li id="M201510200">
+    <!--#set var="DATE" value='<small class="date-tag">2015-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>&ldquo;Self-encrypting&rdquo; disk drives
+    do the encryption with proprietary firmware so you
+    can't trust it.  Western Digital's &ldquo;My Passport&rdquo; drives <a
+    
href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption";>
+    have a back door</a>.</p>
+  </li>
+
+  <li id="M201504090">
+    <!--#set var="DATE" value='<small class="date-tag">2015-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Mac OS X had an <a
+    
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
+    intentional local back door for 4 years</a>, which could be exploited
+    by attackers to gain root privileges.</p>
+  </li>
+
+  <li id="M201309110">
+    <!--#set var="DATE" value='<small class="date-tag">2013-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Here is a big problem whose details are still secret: <a
+    href="http://mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/";>
+    The FBI asks lots of companies to put back doors in proprietary
+    programs</a>. We don't know of specific cases where this was done,
+    but every proprietary program for encryption is a possibility.</p>
+  </li>
+
+  <li id="M201308230">
+    <!--#set var="DATE" value='<small class="date-tag">2013-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The German government <a
+    
href="https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/";>veers
+    away from Windows 8 computers with TPM 2.0</a> (<a
+    
href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa";>original
+    article in German</a>), due to potential back
+    door capabilities of the TPM 2.0 chip.</p>
+  </li>
+
+  <li id="M201307300">
+    <!--#set var="DATE" value='<small class="date-tag">2013-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Here is a suspicion that
+    we can't prove, but is worth thinking about: <a
+    
href="https://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI";>
+    Writable microcode for Intel and AMD microprocessors</a> may be a
+    vehicle for the NSA to invade computers, with the help of Microsoft,
+    say respected security experts.</p>
+  </li>
+
+  <li id="M201307114">
+    <!--#set var="DATE" value='<small class="date-tag">2013-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>HP &ldquo;storage appliances&rdquo; that
+    use the proprietary &ldquo;Left Hand&rdquo;
+    operating system have back doors that give HP <a
+    
href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/";>
+    remote login access</a> to them.  HP claims that this does not
+    give HP access to the customer's data, but if the back door allows
+    installation of software changes, a change could be installed that
+    would give access to the customer's data.</p>
+  </li>
+</ul>
+
+<div class="column-limit"></div>
+
+<p>The EFF has other examples of the <a
+href="https://www.eff.org/deeplinks/2015/02/who-really-owns-your-drones";>
+use of back doors</a>.</p>
+</div>
+
+</div>
+<!--#include virtual="/proprietary/proprietary-menu.html" -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Please send general FSF &amp; GNU inquiries to
+<a href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.  Broken links and other corrections or suggestions can be sent
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and contributing translations
+of this article.</p>
+</div>
+
+<p>Copyright &copy; 2014-2021 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/";>Creative
+Commons Attribution 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2021/06/26 14:00:01 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: po/proprietary-censorship.pt-br-en.html
===================================================================
RCS file: po/proprietary-censorship.pt-br-en.html
diff -N po/proprietary-censorship.pt-br-en.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-censorship.pt-br-en.html     26 Jun 2021 14:00:01 -0000      
1.1
@@ -0,0 +1,221 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+<title>Proprietary Censorship - GNU Project - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+ <!--#include virtual="/proprietary/po/proprietary-censorship.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /></a>&nbsp;/
+ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/
+ By type&nbsp;/
+</p>
+</div>
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Proprietary Censorship</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.</p>
+
+<p>This typically takes the form of malicious functionalities.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>One kind of malicious functionality is censorship of what
+users can access.  Here are examples of programs which do this.
+We have a <a
+href="/proprietary/proprietary-jails.html#about-page">separate
+list of proprietary systems that censor installation</a> of
+application programs (we call them &ldquo;jails&rdquo;).</p>
+
+<p>Selling products designed as platforms for a
+company to impose censorship ought to be forbidden by law, but it
+isn't.</p>
+
+<div class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.</p>
+</div>
+
+<h3 id="apple">Apple</h3>
+
+<p>Apple mainly uses iOS, which is a typical jail, to impose censorship
+through the Apple Store. Please refer to <a
+href="/proprietary/proprietary-jails.html#apple">Proprietary Jails</a>
+for more information.</p>
+
+<h3 id="google">Google</h3>
+
+<ul class="blurbs">
+  <li id="M201703160">
+    <!--#set var="DATE" value='<small class="date-tag">2017-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Google <a
+    
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts";>
+    offers censorship software</a>, ostensibly for parents to put into
+    their children's computers.</p>
+  </li>
+
+  <li id="M201701180">
+    <!--#set var="DATE" value='<small class="date-tag">2017-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>On Windows and MacOS, Chrome <a
+    
href="https://sites.google.com/a/chromium.org/dev/developers/extensions-deployment-faq";>
+    disables extensions</a> that are not hosted in the Chrome Web
+    Store.</p>
+
+    <p>For example, an extension was <a
+    
href="https://web.archive.org/web/20170120094917/https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/";>
+    banned from the Chrome Web Store, and permanently disabled</a> on
+    more than 40,000 computers.</p>
+  </li>
+
+  <li id="M201602030">
+    <!--#set var="DATE" value='<small class="date-tag">2016-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones";>
+    Google censored installation of Samsung's ad-blocker</a> on Android
+    phones, saying that blocking ads is &ldquo;interference&rdquo; with
+    the sites that advertise (and surveil users through ads).</p>
+
+    <p>The ad-blocker is proprietary software, just like the program
+    (Google Play) that Google used to deny access to install it. Using
+    a nonfree program gives the owner power over you, and Google has
+    exercised that power.</p>
+
+    <p>Google's censorship, unlike that of Apple, is not total: Android
+    allows users to install apps in other ways. You can install free
+    programs from f-droid.org.</p>
+  </li>
+</ul>
+
+
+<h3 id="consoles">Game consoles</h3>
+
+<ul class="blurbs">
+  <li id="M201408290">
+    <!--#set var="DATE" value='<small class="date-tag">2014-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The <a
+    
href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/";>
+    Nintendo 3DS</a> censors web browsing; it is possible to turn off
+    the censorship, but that requires identifying oneself to pay, which
+    is a form of surveillance.</p>
+  </li>
+</ul>
+
+
+<h3 id="online-conferencing">Online conferencing</h3>
+<ul class="blurbs">
+  <li id="M202006120">
+    <!--#set var="DATE" value='<small class="date-tag">2020-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The company behind Zoom does not only deny
+    users' computer freedom by developing this piece
+    of nonfree software, it also violates users' civil rights by <a
+    
href="https://www.theverge.com/2020/6/12/21288995/zoom-blocking-feature-chinese-government-censorship";>banning
+    events and censoring users</a> to serve the agenda of governments.</p>
+
+    <p>Freedom respecting programs such as <a
+    href="https://directory.fsf.org/wiki/Jitsi";>Jitsi</a> or BigBlueButton
+    can be used instead, better still if installed in a server controlled
+    by its users.</p>
+  </li>
+</ul>
+</div>
+
+</div>
+<!--#include virtual="/proprietary/proprietary-menu.html" -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Please send general FSF &amp; GNU inquiries to
+<a href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.  Broken links and other corrections or suggestions can be sent
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and contributing translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright &copy; 2014-2021 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/";>Creative
+Commons Attribution 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2021/06/26 14:00:01 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: po/proprietary-coverups.pt-br-en.html
===================================================================
RCS file: po/proprietary-coverups.pt-br-en.html
diff -N po/proprietary-coverups.pt-br-en.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-coverups.pt-br-en.html       26 Jun 2021 14:00:01 -0000      
1.1
@@ -0,0 +1,142 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+<title>Proprietary Coverups
+- GNU Project - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+ <!--#include virtual="/proprietary/po/proprietary-coverups.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /></a>&nbsp;/
+ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/
+ By type&nbsp;/
+</p>
+</div>
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Proprietary Coverups</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.</p>
+
+<p>This typically takes the form of malicious functionalities.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>This page lists instances where proprietary software had a bug,
+and the developers converted it into a malicious functionality by
+trying to cover up the existence of the bug.</p>
+
+<div class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.</p>
+</div>
+
+<div class="column-limit" id="proprietary-coverups"></div>
+
+<ul class="blurbs">
+  <li id="M201612120">
+    <!--#set var="DATE" value='<small class="date-tag">2016-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Price Waterhouse Coopers tried
+    to suppress knowledge of a security flaw by <a
+    
href="http://www.zdnet.com/article/pwc-sends-security-researchers-cease-and-desist-letter-instead-of-fixing-security-flaw/";>
+    making legal threats against the security company that found
+    it</a>.</p>
+  </li>
+</ul>
+</div>
+
+</div>
+<!--#include virtual="/proprietary/proprietary-menu.html" -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Please send general FSF &amp; GNU inquiries to
+<a href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.  Broken links and other corrections or suggestions can be sent
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and contributing translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright &copy; 2017-2021 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/";>Creative
+Commons Attribution 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2021/06/26 14:00:01 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: po/proprietary-deception.pt-br-en.html
===================================================================
RCS file: po/proprietary-deception.pt-br-en.html
diff -N po/proprietary-deception.pt-br-en.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-deception.pt-br-en.html      26 Jun 2021 14:00:01 -0000      
1.1
@@ -0,0 +1,242 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+<title>Proprietary Deception
+- GNU Project - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+ <!--#include virtual="/proprietary/po/proprietary-deception.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /></a>&nbsp;/
+ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/
+ By type&nbsp;/
+</p>
+</div>
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Proprietary Deception</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.</p>
+
+<p>This typically takes the form of malicious functionalities.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>Deception is a malicious functionality that makes the program
+dishonest or conceals trickery. Here are examples of such
+malicious functionalities. Cases of deception that involve taking
+people's money are listed in <a
+href="/proprietary/proprietary-fraud.html#main-heading">
+Proprietary Fraud</a>.</p>
+
+<div class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.</p>
+</div>
+
+<div class="column-limit" id="proprietary-deception"></div>
+
+<ul class="blurbs">
+  <li id="M202011050">
+    <!--#set var="DATE" value='<small class="date-tag">2020-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>HP tricked users into installing
+    a mischievous update in their printers that <a
+    
href="https://www.eff.org/deeplinks/2020/11/ink-stained-wretches-battle-soul-digital-freedom-taking-place-inside-your-printer";>made
+    the devices reject all third-party ink cartridges</a>.</p>
+  </li>
+
+  <li id="M202002020">
+    <!--#set var="DATE" value='<small class="date-tag">2020-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Many Android apps fool their users by asking
+    them to decide what permissions to give the program, and then <a
+    
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/";>
+    bypassing these permissions</a>.</p>
+
+    <p>The Android system is supposed to prevent data leaks by running apps
+    in isolated sandboxes, but developers have found ways to access the
+    data by other means, and there is nothing the user can do to stop
+    them from doing so, since both the system and the apps are nonfree.</p>
+  </li>
+
+  <li id="M201904150">
+    <!--#set var="DATE" value='<small class="date-tag">2019-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p id="M201509210">Volkswagen programmed its car engine computers to <a
+    
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions";>
+    detect the Environmental Protection Agency's emission tests</a>, and
+    run dirty the rest of the time. In real driving, the cars exceeded
+    emissions standards by a factor of up to 35.</p>
+
+    <p>Using free software would not have stopped Volkswagen from
+    programming it this way, but would have made it harder to conceal,
+    and given the users the possibility of correcting the deception.</p>
+
+    <p>Former executives of Volkswagen are being <a
+    
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison";>
+    sued over this fraud</a>.</p>
+  </li>
+
+  <li id="M201903281">
+    <!--#set var="DATE" value='<small class="date-tag">2019-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>OfficeMax cheated customers by <a
+    
href="https://arstechnica.com/tech-policy/2019/03/office-depot-tricked-people-into-buying-pc-support-with-fake-virus-scans/";>
+    using proprietary &ldquo;PC Health Check&rdquo; software</a> rigged
+    to give false results, deceiving the customer into thinking per
+    computer was infected and buy unneeded support services from the
+    company.</p>
+  </li>
+
+  <li id="M201902041.2">
+    <!--#set var="DATE" value='<small class="date-tag">2019-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Twenty nine &ldquo;beauty camera&rdquo; apps that used to
+    be on Google Play had one or more malicious functionalities, such as <a
+    
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/";>
+    stealing users' photos instead of &ldquo;beautifying&rdquo; them</a>,
+    pushing unwanted and often malicious ads on users, and redirecting
+    them to phishing sites that stole their credentials. Furthermore,
+    the user interface of most of them was designed to make uninstallation
+    difficult.</p>
+
+    <p>Users should of course uninstall these dangerous apps if they
+    haven't yet, but they should also stay away from nonfree apps in
+    general. <em>All</em> nonfree apps carry a potential risk because
+    there is no easy way of knowing what they really do.</p>
+  </li>
+
+  <li id="M201611060">
+    <!--#set var="DATE" value='<small class="date-tag">2016-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969";>
+    Audi's proprietary software used a simple method to cheat on emissions
+    tests</a>: to activate a special low-emission gearshifting mode until
+    the first time the car made a turn.</p>
+  </li>
+
+  <li id="M201609010">
+    <!--#set var="DATE" value='<small class="date-tag">2016-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Many proprietary programs secretly <a
+    
href="https://www.theregister.co.uk/2016/08/05/payperinstall_study/";>install
+    other proprietary programs that the users don't want</a>.</p>
+  </li>
+
+  <li id="M201607140">
+    <!--#set var="DATE" value='<small class="date-tag">2016-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The proprietor of the Pokémon Go game <a
+    
href="https://www.theguardian.com/technology/2016/jul/14/pokemon-go-sponsored-locations-restaurants-business";>
+    invites restaurants and other businesses to pay to have the game lure
+    people there</a>.</p>
+  </li>
+
+  <li id="M201511110">
+    <!--#set var="DATE" value='<small class="date-tag">2015-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A top-ranking proprietary Instagram client promising
+    to tell users who's been watching their pictures was in reality <a
+    
href="http://www.theguardian.com/technology/2015/nov/11/top-ranking-free-app-stole-instagram-passwords";>stealing
+    their credentials</a>, advertising itself on their feed, and posting
+    images without their consent.</p>
+  </li>
+</ul>
+</div>
+
+</div>
+<!--#include virtual="/proprietary/proprietary-menu.html" -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Please send general FSF &amp; GNU inquiries to
+<a href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.  Broken links and other corrections or suggestions can be sent
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and contributing translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright &copy; 2015-2021 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/";>Creative
+Commons Attribution 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2021/06/26 14:00:01 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: po/proprietary-drm.pt-br-en.html
===================================================================
RCS file: po/proprietary-drm.pt-br-en.html
diff -N po/proprietary-drm.pt-br-en.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-drm.pt-br-en.html    26 Jun 2021 14:00:01 -0000      1.1
@@ -0,0 +1,513 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+<title>Proprietary DRM - GNU Project - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+<!--#include virtual="/proprietary/po/proprietary-drm.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /></a>&nbsp;/
+ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/
+ By type&nbsp;/
+</p>
+</div>
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Proprietary DRM</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.</p>
+
+<p>This typically takes the form of malicious functionalities.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>Here are examples of proprietary programs and systems that
+implement <em>digital restrictions management</em> (DRM):
+functionalities designed intentionally to restrict what users can do.
+These functionalities are also called <em>digital handcuffs</em>.
+</p>
+
+<p>DRM is reinforced by
+<a 
href="http://www.theguardian.com/technology/blog/2014/feb/05/digital-rights-management";>
+censorship laws</a> that ban software (and hardware) that can break
+the handcuffs.  Instead of these laws, DRM itself ought to be illegal.
+Please support our campaign
+to <a href="http://DefectiveByDesign.org/";>abolish DRM</a>.
+</p>
+
+<div class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.</p>
+</div>
+
+<div class="column-limit" id="proprietary-drm"></div>
+
+<ul class="blurbs">
+  <li id="M202105300">
+    <!--#set var="DATE" value='<small class="date-tag">2021-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.theguardian.com/technology/2021/may/30/gadgets-have-stopped-working-together-interoperability-apple";>Apple
+    is systematically undermining interoperability</a>. At the hardware
+    level, it does this via nonstandard plugs, buses and networks. At
+    the software level, it does this by not letting the user have any
+    data except within one app.</p>
+  </li>
+
+  <li id="M202103100">
+    <!--#set var="DATE" value='<small class="date-tag">2021-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Amazon's monopoly and DRM is <a
+    
href="https://www.washingtonpost.com/technology/2021/03/10/amazon-library-ebook-monopoly/";>stopping
+    public libraries from lending e-books and
+    audiobooks</a>. Amazon became powerful in e-book world by <a
+    href="/philosophy/why-call-it-the-swindle.html">Swindle</a>,
+    and is now misusing its power and violates people's rights using
+    <a href="https://www.defectivebydesign.org";>Digital Restrictions
+    Management</a>.</p>
+
+    <p>The article is written in a way that endorses DRM in general, which
+    is unacceptable. <a href="/proprietary/proprietary-drm.html">DRM is
+    an injustice to people</a>.</p>
+  </li>
+
+  <li id="M202010180">
+    <!--#set var="DATE" value='<small class="date-tag">2020-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Microsoft is <a
+    
href="https://www.slashgear.com/windows-10-users-are-grumpy-over-forced-updates-and-unwanted-apps-18643135/";>forcing
+    Windows users</a> to <a
+    
href="https://support.microsoft.com/en-us/windows/manage-updates-in-windows-10-643e9ea7-3cf6-7da6-a25c-95d4f7f099fe";>install
+    upgrades it pushes</a> using <a
+    href="/proprietary/proprietary-back-doors.html#windows-update">its
+    universal back doors</a>. These upgrades can do various harms to
+    users such as restricting computers from some functions and/or forcing
+    users to defenselessly do whatever Microsoft tells them to do.</p>
+  </li>
+
+  <li id="M201908150">
+    <!--#set var="DATE" value='<small class="date-tag">2019-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple is putting DRM on iPhone
+    batteries, and the system proprietary software <a
+    
href="https://www.vice.com/en/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair";>turns
+    off certain features when batteries are replaced other than by
+    Apple.</a></p>
+  </li>
+
+  <li id="M201904040">
+    <!--#set var="DATE" value='<small class="date-tag">2019-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Ebooks &ldquo;bought&rdquo; from Microsoft's store check that
+    their DRM is valid by connecting to the store every time their
+    &ldquo;owner&rdquo; wants to read them. Microsoft is going to close
+    this store, <a href="https://www.bbc.com/news/technology-47810367";>
+    bricking all DRM'ed ebooks it has ever &ldquo;sold&rdquo;</a>. (The
+    article additionally highlights the pitfalls of DRM.)</p>
+
+    <p>This is another proof that a DRM-encumbered product doesn't belong
+    to the person who bought it. Microsoft said it will refund customers,
+    but this is no excuse for selling them restricted books.</p>
+  </li>
+
+  <li id="M201902080">
+    <!--#set var="DATE" value='<small class="date-tag">2019-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The HP <a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html";>
+    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
+    communicates with HP servers</a> to make sure the user is still
+    paying for the subscription, and hasn't printed more pages than were
+    paid for.</p>
+
+    <p>Even though the ink subscription program may be cheaper in some
+    specific cases, it spies on users, and involves totally unacceptable
+    restrictions in the use of ink cartridges that would otherwise be in
+    working order.</p>
+  </li>
+
+  <li id="M201810150">
+    <!--#set var="DATE" value='<small class="date-tag">2018-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Printer manufacturers are very innovative&mdash;at blocking the
+    use of independent replacement ink cartridges. Their &ldquo;security
+    upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a
+    
href="https://www.vice.com/en/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates";>
+    HP and Epson have done this</a>.</p>
+  </li>
+
+  <li id="M201806250">
+    <!--#set var="DATE" value='<small class="date-tag">2018-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The game Metal Gear Rising for
+    MacOS was tethered to a server.  The company <a
+    
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm";>
+    shut down the server, and all copies stopped working</a>.</p>
+  </li>
+
+  <li id="M201711250">
+    <!--#set var="DATE" value='<small class="date-tag">2017-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The DMCA and the EU Copyright Directive make it <a
+    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html";>
+    illegal to study how iOS cr&hellip;apps spy on users</a>, because
+    this would require circumventing the iOS DRM.</p>
+  </li>
+
+  <li id="M201705150">
+    <!--#set var="DATE" value='<small class="date-tag">2017-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Google now allows Android
+    apps to detect whether a device has been rooted, <a
+    
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/";>and
+    refuse to install if so</a>. The Netflix app uses this ability to
+    enforce DRM by refusing to install on rooted Android devices.</p>
+
+    <p>Update: Google <i>intentionally</i> changed Android so that apps <a
+    
href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/";>can
+    detect rooted devices and refuse to run on them</a>. The Netflix app
+    is proprietary malware, and one shouldn't use it. However, that does
+    not make what Google has done any less wrong.</p>
+  </li>
+
+  <li id="M201704130">
+    <!--#set var="DATE" value='<small class="date-tag">2017-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a href="https://itstillworks.com/kindle-drm-17841.html";>
+    The Amazon Kindle has DRM</a>.  That article is flawed in that it
+    fails to treat DRM as an ethical question; it takes for granted that
+    whatever Amazon might do to its users is legitimate.  It refers to
+    DRM as digital &ldquo;rights&rdquo; management, which is the spin
+    term used to promote DRM.  Nonetheless it serves as a reference for
+    the facts.</p>
+
+    <p>We refer to that product as the <a
+    href="/philosophy/why-call-it-the-swindle.html"> Amazon Swindle</a>
+    because of this and <a href="/philosophy/ebooks.html"> other malicious
+    functionalities</a>.</p>
+  </li>
+
+  <li id="M201704070">
+    <!--#set var="DATE" value='<small class="date-tag">2017-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p id="iphone7-sabotage">The
+    iPhone 7 contains DRM specifically designed to <a
+    
href="https://www.vice.com/en/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock";>
+    brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it</a>.
+    &ldquo;Unauthorized&rdquo; essentially means anyone besides Apple.</p>
+
+    <p><small>(The article uses the term &ldquo;lock&rdquo;
+    to describe the DRM, but we prefer to use the term <a
+    href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
+    handcuffs</a>.)</small></p>
+  </li>
+
+  <li id="M201702020">
+    <!--#set var="DATE" value='<small class="date-tag">2017-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>DRM-restricted files can be used to <a
+    
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users";>
+    identify people browsing through Tor</a>. The vulnerability exists
+    only if you use Windows.</p>
+  </li>
+
+  <li id="M201701300">
+    <!--#set var="DATE" value='<small class="date-tag">2017-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Chrome <a
+    
href="http://boingboing.net/2017/01/30/google-quietly-makes-optiona.html";>implements
+    DRM</a>. So does Chromium, through nonfree software that is effectively
+    part of it.</p>
+
+    <p><a
+    
href="https://bugs.chromium.org/p/chromium/issues/detail_ezt?id=686430";>More
+    information</a>.</p>
+  </li>
+
+  <li id="M201609200">
+    <!--#set var="DATE" value='<small class="date-tag">2016-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>HP's firmware downgrade <a
+    
href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update";>imposed
+    DRM on some printers, which now refuse to function with third-party
+    ink cartridges</a>.</p>
+  </li>
+
+  <li id="M201605200">
+    <!--#set var="DATE" value='<small class="date-tag">2016-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Oculus Rift games now have <a
+    
href="https://www.vice.com/en/article/vv77ea/new-oculus-drm-cross-platform";>
+    DRM meant to prevent running them on other systems</a>.</p>
+  </li>
+
+  <li id="M201601100">
+    <!--#set var="DATE" value='<small class="date-tag">2016-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The <a
+    href="http://michaelweinberg.org/post/137045828005/free-the-cube";>
+    &ldquo;Cube&rdquo; 3D printer was designed with DRM</a>: it
+    won't accept third-party printing materials.  It is the Keurig of
+    printers.  Now it is being discontinued, which means that eventually
+    authorized materials won't be available and the printers may become
+    unusable.</p>
+
+    <p>With a <a
+    href="http://www.fsf.org/resources/hw/endorsement/aleph-objects";>
+    printer that gets the Respects Your Freedom</a>, this problem would
+    not even be a remote possibility.</p>
+
+    <p>How pitiful that the author of that article says that there was
+    &ldquo;nothing wrong&rdquo; with designing the device to restrict
+    users in the first place.  This is like putting a &ldquo;cheat me and
+    mistreat me&rdquo; sign on your chest.  We should know better: we
+    should condemn all companies that take advantage of people like him. 
+    Indeed, it is the acceptance of their unjust practice that teaches
+    people to be doormats.</p>
+  </li>
+
+  <li id="M201512260">
+    <!--#set var="DATE" value='<small class="date-tag">2015-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.vice.com/en/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017";>
+    Apple uses DRM software to prevent people from charging an iThing
+    with a generic USB cable</a>.</p>
+  </li>
+
+  <li id="M201512140">
+    <!--#set var="DATE" value='<small class="date-tag">2015-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Philips &ldquo;smart&rdquo; lightbulbs had initially been
+    designed to interact with other companies' smart light bulbs, but <a
+    
href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml";>
+    later the company updated the firmware to disallow
+    interoperability</a>.</p>
+
+    <p>If a product is &ldquo;smart&rdquo;, and you didn't build it,
+    it is cleverly serving its manufacturer <em>against you</em>.</p>
+  </li>
+
+  <li id="M201501030">
+    <!--#set var="DATE" value='<small class="date-tag">2015-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p id="netflix-app-geolocation-drm">The Netflix Android app <a
+    
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/";>
+    forces the use of Google DNS</a>. This is one of the methods that
+    Netflix uses to enforce the geolocation restrictions dictated by the
+    movie studios.</p>
+  </li>
+
+  <li id="M201410080.1">
+    <!--#set var="DATE" value='<small class="date-tag">2014-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Adobe made &ldquo;Digital Editions,&rdquo;
+    the e-reader used by most US libraries, spy on the user <a
+    
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/";>for
+    the sake of DRM.</a></p>
+  </li>
+
+  <li id="M201311130">
+    <!--#set var="DATE" value='<small class="date-tag">2013-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-consumers-crazy";>
+    DRM in cars will drive consumers crazy</a>.</p>
+  </li>
+
+  <li id="M201310070">
+    <!--#set var="DATE" value='<small class="date-tag">2013-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p id="bluray"><a
+    
href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up";>
+    DVDs and Bluray disks have DRM</a>.</p>
+
+    <p>That page uses spin terms that favor DRM, including <a
+    href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
+    digital &ldquo;rights&rdquo; management</a> and <a
+    
href="/philosophy/words-to-avoid.html#Protection">&ldquo;protect&rdquo;</a>,
+    and it claims that &ldquo;artists&rdquo; (rather than companies)
+    are primarily responsible for putting digital restrictions management
+    into these disks.  Nonetheless, it is a reference for the facts.</p>
+
+    <p>Every Bluray disk (with few, rare exceptions) has DRM&mdash;so
+    don't use Bluray disks!</p>
+  </li>
+
+  <li id="M201102250">
+    <!--#set var="DATE" value='<small class="date-tag">2011-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Android <a
+    
href="https://developer.android.com/reference/android/drm/package-summary.html";>
+    contains facilities specifically to support DRM</a>.</p>
+  </li>
+
+  <li id="M201002180">
+    <!--#set var="DATE" value='<small class="date-tag">2010-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>DRM does more nastiness to published works than merely stopping
+    people from looking at and/or copying them. Even when it allows you to
+    look, it harasses you in many ways. Cory Doctorow's article presents
+    <a href="https://boingboing.net/2010/02/18/infographic-buying-d.html";>
+    DVDs as an example</a>.</p>
+
+    <p>We condemn the propaganda term &ldquo;pirate&rdquo; when it
+    is applied to people that share copies. Many of these DVDs are
+    made and distributed commercially; in reference to that practice,
+    &ldquo;pirate&rdquo; might be partly justified. But not when they
+    protect users from harassment.</p>
+
+    <p>The fundamental cause of this harassment, and the fundamental
+    wrong of the DRM in DVDs, is the requirement to use nonfree software
+    to play the DVD. Fortunately we have free replacement software.</p>
+  </li>
+
+  <li id="M200811210">
+    <!--#set var="DATE" value='<small class="date-tag">2008-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm";>
+    DRM (digital restrictions mechanisms) in MacOS</a>. This article
+    focuses on the fact that a new model of Macbook introduced a
+    requirement for monitors to have malicious hardware, but DRM software
+    in MacOS is involved in activating the hardware. The software for
+    accessing iTunes is also responsible.</p>
+  </li>
+
+  <li id="M200803040">
+    <!--#set var="DATE" value='<small class="date-tag">2008-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://en.wikipedia.org/wiki/High-bandwidth_Digital_Content_Protection";>
+    HDCP</a> is a DRM system that encrypts video and audio data from
+    the processor to the monitor. It is implemented mainly in hardware,
+    but the system software also participates, which makes it qualify
+    as malware.</p>
+
+    <p>Besides controlling users, HDCP denies their fair-use rights and
+    causes numerous practical problems.</p>
+  </li>
+
+  <li id="M200802190">
+    <!--#set var="DATE" value='<small class="date-tag">2008-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    href="https://www.eff.org/deeplinks/2008/02/adobe-pushes-drm-flash";>
+    DRM in Flash Player</a>.</p>
+  </li>
+
+  <li id="M200708130.1">
+    <!--#set var="DATE" value='<small class="date-tag">2007-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>DRM
+    in Windows</a>, introduced to cater to <a
+    href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks. 
+    (The article talks about how the same malware would later be
+    introduced in MacOS.  That had not been done at the time, but it was
+    done subsequently.)</p>
+  </li>
+
+  <li id="M200703310">
+    <!--#set var="DATE" value='<small class="date-tag">2007-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>iTunes videos have DRM, which allows Apple to <a
+    href="https://en.wikipedia.org/wiki/FairPlay";>dictate where its
+    customers can watch the videos they purchased</a>.</p>
+  </li>
+</ul>
+</div>
+
+</div>
+<!--#include virtual="/proprietary/proprietary-menu.html" -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Please send general FSF &amp; GNU inquiries to
+<a href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.  Broken links and other corrections or suggestions can be sent
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and contributing translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright &copy; 2014-2021 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/";>Creative
+Commons Attribution 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2021/06/26 14:00:01 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: po/proprietary-fraud.pt-br-en.html
===================================================================
RCS file: po/proprietary-fraud.pt-br-en.html
diff -N po/proprietary-fraud.pt-br-en.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-fraud.pt-br-en.html  26 Jun 2021 14:00:01 -0000      1.1
@@ -0,0 +1,147 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+<title>Proprietary Fraud - GNU Project - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+ <!--#include virtual="/proprietary/po/proprietary-fraud.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /></a>&nbsp;/
+ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/
+ By type&nbsp;/
+</p>
+</div>
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Proprietary Fraud</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.</p>
+
+<p>This typically takes the form of malicious functionalities.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+  <p>Here are some examples of proprietary software that defrauds
+  users&mdash;taking their money by trickery.</p>
+
+<div class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.</p>
+</div>
+
+<div class="column-limit" id="proprietary-fraud"></div>
+
+<ul class="blurbs">
+  <li id="M201908160">
+    <!--#set var="DATE" value='<small class="date-tag">2019-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A game published on Facebook <a
+    
href="https://www.revealnews.org/article/so-your-child-racked-up-unwanted-credit-card-charges-playing-video-games-now-what/";>aimed
+    at leading children to spend</a> large amounts of their parents'
+    money without explaining it to them.</p>
+  </li>
+
+  <li id="M201401190">
+    <!--#set var="DATE" value='<small class="date-tag">2014-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Some proprietary <a
+    
href="http://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases";>
+    games lure children to spend their parents' money</a>.</p>
+  </li>
+</ul>
+</div>
+
+</div>
+<!--#include virtual="/proprietary/proprietary-menu.html" -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Please send general FSF &amp; GNU inquiries to
+<a href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.  Broken links and other corrections or suggestions can be sent
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and contributing translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/";>Creative
+Commons Attribution 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2021/06/26 14:00:01 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: po/proprietary-incompatibility.pt-br-en.html
===================================================================
RCS file: po/proprietary-incompatibility.pt-br-en.html
diff -N po/proprietary-incompatibility.pt-br-en.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-incompatibility.pt-br-en.html        26 Jun 2021 14:00:01 
-0000      1.1
@@ -0,0 +1,190 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+<title>Proprietary Incompatibility
+- GNU Project - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+ <!--#include virtual="/proprietary/po/proprietary-incompatibility.translist" 
-->
+<!--#include virtual="/server/banner.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /></a>&nbsp;/
+ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/
+ By type&nbsp;/
+</p>
+</div>
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Proprietary Incompatibility</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.</p>
+
+<p>This typically takes the form of malicious functionalities.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>One of these malicious functionalities is the deliberate
+incompatibility of a program with third party software that operates on
+the same data types.</p>
+
+<p>A fairly common sort of incompatibility is the use of secret formats
+or protocols. This directly blocks or hinders users from switching to
+any other program&mdash;and, in particular, from switching to free
+software which can liberate the device the software runs on.</p>
+
+<p>Apart from being deliberately anticompetitive, secret formats put users'
+digital data at risk. For instance, retrieval of old data will become very
+difficult if support for the proprietary software that can read it is
+discontinued.</p>
+
+<p>Another sort of incompatibility occurs when a system makes some 
+important operation which would be necessary for migrating data to any
+other system so cumbersome or so slow that it isn't doable for more than
+a small amount of data.</p>
+
+<p>More generally, the major tech companies tend to impose <a
+href="https://www.eff.org/deeplinks/2019/07/interoperability-fix-internet-not-tech-companies";>
+artificial restrictions</a> on the interoperability of their products to
+monopolize the market, and this is often achieved through proprietary
+malware.</p>
+
+<div class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.</p>
+</div>
+
+<div class="column-limit" id="proprietary-incompatibility"></div>
+
+<ul class="blurbs">
+  <li id="M201803300">
+    <!--#set var="DATE" value='<small class="date-tag">2018-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>In MacOS and iOS, the procedure for <a
+    
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac";>
+    converting images from the Photos format</a> to a free format is so
+    tedious and time-consuming that users just give up if they have a
+    lot of them.</p>
+  </li>
+
+  <li id="M201802120">
+    <!--#set var="DATE" value='<small class="date-tag">2018-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple devices lock users in <a
+    
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347";>
+    solely to Apple services</a> by being designed to be incompatible
+    with all other options, ethical or unethical.</p>
+  </li>
+
+  <li id="M201605044">
+    <!--#set var="DATE" value='<small class="date-tag">2016-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>iWork (office software that runs on MacOS,
+    iOS and iCloud) uses secret formats and <a
+    href="https://en.wikipedia.org/wiki/IWork";>provides no means of
+    converting them to or from Open Document Formats</a>. iWork
+    formats have changed several times since they were first
+    introduced. This may have had the effect of thwarting <a
+    href="https://github.com/obriensp/iWorkFileFormat";>reverse engineering
+    efforts</a>, thus preventing free software from fully supporting
+    them.</p>
+
+    <p>iWork formats are considered <a
+    
href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&amp;modificationDate=1459873751000&amp;api=v2";>
+    unfit for document preservation</a>.</p>
+  </li>
+</ul>
+</div>
+
+</div>
+<!--#include virtual="/proprietary/proprietary-menu.html" -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Please send general FSF &amp; GNU inquiries to
+<a href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.  Broken links and other corrections or suggestions can be sent
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and contributing translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright &copy; 2018-2021 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/";>Creative
+Commons Attribution 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2021/06/26 14:00:01 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: po/proprietary-insecurity.pt-br-en.html
===================================================================
RCS file: po/proprietary-insecurity.pt-br-en.html
diff -N po/proprietary-insecurity.pt-br-en.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-insecurity.pt-br-en.html     26 Jun 2021 14:00:01 -0000      
1.1
@@ -0,0 +1,1149 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+<title>Proprietary Insecurity
+- GNU Project - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+ <!--#include virtual="/proprietary/po/proprietary-insecurity.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /></a>&nbsp;/
+ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/
+ By type&nbsp;/
+</p>
+</div>
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Proprietary Insecurity</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.</p>
+
+<p>This typically takes the form of malicious functionalities.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>This page lists clearly established cases of insecurity in
+proprietary software that has grave consequences or is otherwise
+noteworthy. Even though most of these security flaws are unintentional,
+thus are not malicious functionalities in a strict sense, we report
+them to show that proprietary software is not immune to bugs, and is
+often quite sloppy.</p>
+
+<p>All complex programs, whether free or proprietary, contain bugs. What
+makes bugs more dangerous in proprietary software is that users are
+<em>helpless to fix any security problems that arise</em>.  Keeping
+the users helpless is what's culpable about proprietary software.</p>
+
+<div class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.</p>
+</div>
+
+<div class="column-limit" id="proprietary-insecurity"></div>
+
+<ul class="blurbs">
+  <li id="M202106030">
+    <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/";>TikTok
+    apps collect biometric identifiers and biometric information from
+    users' smartphones</a>. The company behind it does whatever it wants
+    and collects whatever data it can.</p>
+  </li>
+
+  <li id="M202105240">
+    <!--#set var="DATE" value='<small class="date-tag">2021-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/";>Apple
+    is moving its Chinese customers' iCloud data to a datacenter controlled
+    by the Chinese government</a>. Apple is already storing the encryption
+    keys on these servers, obeying Chinese authority, making all Chinese
+    user data available to the government.</p>
+  </li>
+
+  <li id="M202105040">
+    <!--#set var="DATE" value='<small class="date-tag">2021-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A motorcycle company named Klim is selling airbag
+    vests with different payment methods, one of them is through a <a
+    
href="https://www.vice.com/en/article/93yyyd/this-motorcycle-airbag-vest-will-stop-working-if-you-miss-a-payment";>proprietary
+    subscription-based option that will block the vest from inflating if
+    the payments don't go through</a>.</p>
+
+    <p>They say there is a 30-days grace period if you miss a payment
+    but the grace period is no excuse to the insecurity.</p>
+  </li>
+
+  <li id="M202105030">
+    <!--#set var="DATE" value='<small class="date-tag">2021-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The United States' government is reportedly considering <a
+    
href="https://www.infosecurity-magazine.com/news/private-companies-may-spy-on/";>teaming
+    up with private companies to monitor American citizens' private online
+    activity and digital communications</a>.</p>
+
+    <p>What creates the opportunity to try this is the fact that these
+    companies are already snooping on users' private activities. That
+    in turn is due to people's use of nonfree software which snoops,
+    and online dis-services which snoop.</p>
+  </li>
+
+  <li id="M202104090">
+    <!--#set var="DATE" value='<small class="date-tag">2021-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A zero-day vulnerability in Zoom which <a
+    
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/";>can
+    be used to launch remote code execution (RCE) attacks</a> has been
+    disclosed by researchers. The researchers demonstrated a three-bug
+    attack chain that caused an RCE on a target machine, all this without
+    any form of user interaction.</p>
+  </li>
+
+  <li id="M202103090">
+    <!--#set var="DATE" value='<small class="date-tag">2021-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a 
href="https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams";>Over
 150 thousand security cameras that used Verkada
+    company's proprietary software are cracked</a> by a major security
+    breach. Crackers have had access to security archives of various
+    gyms, hospitals, jails, schools, and police stations that have used
+    Verdaka's cameras.</p>
+
+    <p><a href="/philosophy/surveillance-vs-democracy.html">It is injustice
+    to the public</a> for gyms, stores, hospitals, jails, and schools to
+    hand &ldquo;security&rdquo; footage to a company from which the government 
can
+    collect it at any time, without even telling them.</p>
+
+    <p><small>Please note that the article
+    wrongly refers to crackers as &ldquo;<a
+    
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
+  </li>
+
+  <li id="M202103050">
+    <!--#set var="DATE" value='<small class="date-tag">2021-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>At least 30 thousand organizations
+    in the United States are newly &ldquo;<a
+    href="/philosophy/words-to-avoid.html#Hacker">cracked</a>&rdquo; via <a
+    
href="https://krebsonsecurity.com/2021/03/at-least-30000-u-s-organizations-newly-hacked-via-holes-in-microsofts-email-software/";>holes
+    in Microsoft's proprietary email software, named Microsoft 365</a>. It
+    is unclear whether there are other holes and vulnerabilities in the
+    program or not but history and experience tells us it wouldn't be
+    the last disaster with proprietary programs.</p>
+  </li>
+
+  <li id="M202102110">
+    <!--#set var="DATE" value='<small class="date-tag">2021-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Researchers at the security firm SentinelOne discovered a <a
+    
href="https://www.wired.com/story/windows-defender-vulnerability-twelve-years/";>security
+    flaw in proprietary program Microsoft Windows Defender that lurked
+    undetected for 12 years</a>. If the program was free (as in freedom),
+    more people would have had a chance to notice the problem, therefore,
+    it could've been fixed a lot sooner.</p>
+  </li>
+
+  <li id="M202101110">
+    <!--#set var="DATE" value='<small class="date-tag">2021-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A cracker <a
+    
href="https://www.vice.com/en/article/m7apnn/your-cock-is-mine-now-hacker-locks-internet-connected-chastity-cage-demands-ransom";>took
+    control of people's internet-connected chastity cages and demanded
+    ransom</a>. The chastity cages are being controlled by a proprietary
+    app (mobile program).</p>
+
+    <p><small>(Please note that the article
+    wrongly refers to crackers as "<a
+    href="/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p>
+  </li>
+
+  <li id="M202012200">
+    <!--#set var="DATE" value='<small class="date-tag">2020-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Commercial crackware can <a
+    
href="https://www.theguardian.com/technology/2020/dec/20/iphones-vulnerable-to-hacking-tool-for-months-researchers-say";>
+    get passwords out of an iMonster</a>, use the microphone and camera,
+    and other things.</p>
+  </li>
+
+  <li id="M202012190">
+    <!--#set var="DATE" value='<small class="date-tag">2020-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.washingtonpost.com/technology/2020/12/18/zoom-helped-china-surveillance/";>
+    A Zoom executive carried out snooping and censorship for
+    China</a>.</p>
+
+    <p>This abuse of Zoom's power shows how dangerous that power is. The
+    root problem is not the surveillance and censorship, but rather the
+    power that Zoom has. It gets that power partly from the use of its
+    server, but also partly from the nonfree client program.</p>
+  </li>
+
+  <li id="M202012150">
+    <!--#set var="DATE" value='<small class="date-tag">2020-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>United States officials are facing
+    one of biggest crackings against them in years, when <a
+    
href="https://www.theguardian.com/technology/2020/dec/15/orion-hack-solar-winds-explained-us-treasury-commerce-department";>malicious
+    code was sneaked into SolarWinds' proprietary software named
+    Orion</a>. Crackers got access to networks when users downloaded
+    a tainted software update. Crackers were able to monitor internal
+    emails at some of the top agencies in the US.</p>
+
+    <p><small>(Please note that the article
+    wrongly refers to crackers as "<a
+    href="/philosophy/words-to-avoid.html#Hacker">hackers</a>".)</small></p>
+  </li>
+
+  <li id="M202012070">
+    <!--#set var="DATE" value='<small class="date-tag">2020-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Baidu apps were <a
+    
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/";>
+    caught collecting sensitive personal data</a> that can be used for
+    lifetime tracking of users, and putting them in danger. More than 1.4
+    billion people worldwide are affected by these proprietary apps, and
+    users' privacy is jeopardized by this surveillance tool. Data collected
+    by Baidu may be handed over to the Chinese government, possibly
+    putting Chinese people in danger.</p>
+  </li>
+
+  <li id="M202011120">
+    <!--#set var="DATE" value='<small class="date-tag">2020-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple has <a
+    href="https://sneak.berlin/20201112/your-computer-isnt-yours";>implemented
+    a malware in its computers that imposes surveillance</a> on users
+    and reports users' computing to Apple.</p>
+
+    <p>The reports are even unencrypted and they've been leaking this
+    data for two years already. This malware is reporting to Apple what
+    user opens what program at what time. It also gives Apple
+    power to sabotage users' computing.</p>
+  </li>
+
+  <li id="M202010120">
+    <!--#set var="DATE" value='<small class="date-tag">2020-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Samsung is forcing its smartphone users in Hong Kong (and Macau) <a
+    
href="https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-dns-service-upon-hong-kong-wifi-users/";>to
+    use a public DNS in Mainland China</a>, using software update released
+    in September 2020, which causes many unease and privacy concerns.</p>
+  </li>
+
+  <li id="M202008110">
+    <!--#set var="DATE" value='<small class="date-tag">2020-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>TikTok <a
+    
href="https://boingboing.net/2020/08/11/tiktok-exploited-android-secur.html";>
+    exploited an Android vulnerability</a> to obtain user MAC
+    addresses.</p>
+  </li>
+
+  <li id="M202006160">
+    <!--#set var="DATE" value='<small class="date-tag">2020-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C";>
+    A disasterous security bug</a> touches millions of products in the
+    Internet of Stings.</p>
+
+    <p>As a result, anyone can sting the user, not only the
+    manufacturer.</p>
+  </li>
+
+  <li id="M202004270">
+    <!--#set var="DATE" value='<small class="date-tag">2020-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The proprietary program Microsoft Teams' insecurity <a
+    
href="https://www.forbes.com/sites/thomasbrewster/2020/04/27/your-whole-companys-microsoft-teams-data-couldve-been-stolen-with-an-evil-gif";>could
+    have let a malicious GIF steal user data from Microsoft Teams
+    accounts</a>, possibly across an entire company, and taken control
+    of &ldquo;an organization's entire roster of Teams accounts.&rdquo;</p>
+  </li>
+
+  <li id="M202004150">
+    <!--#set var="DATE" value='<small class="date-tag">2020-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Riot Games' new anti-cheat is malware; <a
+    
href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver";>runs
+    on system boot at kernel level</a> on Windows. It is insecure software
+    that increases the attack surface of the operating system.</p>
+  </li>
+
+  <li id="M201912170">
+    <!--#set var="DATE" value='<small class="date-tag">2019-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Some security breakers (wrongly referred in this article as <a
+    href="/philosophy/words-to-avoid.html#Hacker">&ldquo;hackers&rdquo;</a>)
+    managed to interfere the Amazon Ring proprietary system, and <a
+    
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>access
+    its camera, speakers and microphones</a>.</p>
+  </li>
+
+  <li id="M201911190">
+    <!--#set var="DATE" value='<small class="date-tag">2019-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers to <a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password";>
+    access the user's wifi password</a>, and snoop on the household
+    through connected surveillance devices.</p>
+
+    <p>Knowledge of the wifi password would not be sufficient to carry
+    out any significant surveillance if the devices implemented proper
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they are also used by their
+    manufacturers for snooping.</p>
+  </li>
+
+  <li id="M201908310">
+    <!--#set var="DATE" value='<small class="date-tag">2019-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A series of vulnerabilities <a
+    
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/";>found
+    in iOS allowed attackers to gain access to sensitive information
+    including private messages, passwords, photos and contacts stored on
+    the user's iMonster</a>.</p>
+
+    <p>The deep insecurity of iMonsters is even more pertinent given that
+    Apple's proprietary software makes users totally dependent on Apple
+    for even a modicum of security.  It also means that the devices do
+    not even try to offer security against Apple itself.</p>
+  </li>
+
+  <li id="M201908020">
+    <!--#set var="DATE" value='<small class="date-tag">2019-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Out of 21 gratis Android antivirus apps
+    that were tested by security researchers, eight <a
+    
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/";>
+    failed to detect a test virus</a>. All of them asked for dangerous
+    permissions or contained advertising trackers, with seven being more
+    risky than the average of the 100 most popular Android apps.</p>
+
+    <p><small>(Note that the article refers to these proprietary apps as
+    &ldquo;free&rdquo;. It should have said &ldquo;gratis&rdquo;
+    instead.)</small></p>
+  </li>
+
+  <li id="M201907080">
+    <!--#set var="DATE" value='<small class="date-tag">2019-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Many Android apps can track
+    users' movements even when the user says <a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location";>
+    not to allow them access to locations</a>.</p>
+
+    <p>This involves an apparently unintentional weakness in Android,
+    exploited intentionally by malicious apps.</p>
+  </li>
+
+  <li id="M201905150">
+    <!--#set var="DATE" value='<small class="date-tag">2019-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Users caught in the jail of an iMonster are <a
+    href="https://boingboing.net/2019/05/15/brittle-security.html";> sitting
+    ducks for other attackers</a>, and the app censorship prevents security
+    companies from figuring out how those attacks work.</p>
+
+    <p>Apple's censorship of apps is fundamentally unjust, and would be
+    inexcusable even if it didn't lead to security threats as well.</p>
+  </li>
+
+  <li id="M201903210">
+    <!--#set var="DATE" value='<small class="date-tag">2019-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Medtronics Conexus Telemetry Protocol has <a
+    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/";>
+    two vulnerabilities that affect several models of implantable
+    defibrillators</a> and the devices they connect to.</p>
+
+    <p>This protocol has been around since 2006, and similar
+    vulnerabilities were discovered in an earlier Medtronics communication
+    protocol in 2008. Apparently, nothing was done by the company to
+    correct them. This means you can't rely on proprietary software
+    developers to fix bugs in their products.</p>
+  </li>
+
+  <li id="M201902270">
+    <!--#set var="DATE" value='<small class="date-tag">2019-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Ring (now Amazon) doorbell camera is designed so that the
+    manufacturer (now Amazon) can watch all the time. Now it turns out
+    that <a
+    
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>
+    anyone else can also watch, and fake videos too</a>.</p>
+
+    <p>The third party vulnerability is presumably
+    unintentional and Amazon will probably fix it. However, we
+    do not expect Amazon to change the design that <a
+    href="/proprietary/proprietary-surveillance.html#M201901100">allows
+    Amazon to watch</a>.</p>
+  </li>
+
+  <li id="M201809240">
+    <!--#set var="DATE" value='<small class="date-tag">2018-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Researchers have discovered how to <a
+    
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co";>
+    hide voice commands in other audio</a>, so that people cannot hear
+    them, but Alexa and Siri can.</p>
+  </li>
+
+  <li id="M201808130">
+    <!--#set var="DATE" value='<small class="date-tag">2018-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Since the beginning of 2017, <a
+    
href="https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/";>Android
+    phones have been collecting the addresses of nearby cellular
+    towers</a>, even when location services are disabled, and sending
+    that data back to Google.</p>
+  </li>
+
+  <li id="M201808120">
+    <!--#set var="DATE" value='<small class="date-tag">2018-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Crackers found a way to break the security of an Amazon device,
+    and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html";>
+    turn it into a listening device</a> for them.</p>
+
+    <p>It was very difficult for them to do this. The job would be much
+    easier for Amazon. And if some government such as China or the US
+    told Amazon to do this, or cease to sell the product in that country,
+    do you think Amazon would have the moral fiber to say no?</p>
+
+    <p><small>(These crackers are probably hackers too, but please <a
+    href="https://stallman.org/articles/on-hacking.html";> don't use
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;</a>.)</small></p>
+  </li>
+
+  <li id="M201807100">
+    <!--#set var="DATE" value='<small class="date-tag">2018-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Siri, Alexa, and all the other voice-control systems can be <a
+    
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa";>
+    hijacked by programs that play commands in ultrasound that humans
+    can't hear</a>.</p>
+  </li>
+
+  <li id="M201807020">
+    <!--#set var="DATE" value='<small class="date-tag">2018-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Some Samsung phones randomly <a
+    
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages";>send
+    photos to people in the owner's contact list</a>.</p>
+  </li>
+
+  <li id="M201712240">
+    <!--#set var="DATE" value='<small class="date-tag">2017-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>One of the dangers of the &ldquo;internet of stings&rdquo;
+    is that, if you lose your internet service, you also <a
+    
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/";>
+    lose control of your house and appliances</a>.</p>
+
+    <p>For your safety, don't use any appliance with a connection to the
+    real internet.</p>
+  </li>
+
+  <li id="M201711204">
+    <!--#set var="DATE" value='<small class="date-tag">2017-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Intel's intentional &ldquo;management engine&rdquo; back door has <a
+    
href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/";>
+    unintended back doors</a> too.</p>
+  </li>
+
+  <li id="M201711200">
+    <!--#set var="DATE" value='<small class="date-tag">2017-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Amazon recently invited consumers to be suckers and <a
+    
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo";>
+    allow delivery staff to open their front doors</a>. Wouldn't you know
+    it, the system has a grave security flaw.</p>
+  </li>
+
+  <li id="M201709290">
+    <!--#set var="DATE" value='<small class="date-tag">2017-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Bad security in some cars makes it possible to <a
+    href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937";>
+    remotely activate the airbags</a>.</p>
+  </li>
+
+  <li id="M201709200">
+    <!--#set var="DATE" value='<small class="date-tag">2017-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A &ldquo;smart&rdquo; intravenous pump
+    designed for hospitals is connected to the internet. Naturally <a
+    
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml";>
+    its security has been cracked</a>.</p>
+
+    <p><small>(Note that this article misuses the term <a
+    href="/philosophy/words-to-avoid.html#Hacker">&ldquo;hackers&rdquo;</a>
+    referring to crackers.)</small></p>
+  </li>
+
+  <li id="M201708280">
+    <!--#set var="DATE" value='<small class="date-tag">2017-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The bad security in many Internet of Stings devices allows <a
+    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml";>ISPs
+    to snoop on the people that use them</a>.</p>
+
+    <p>Don't be a sucker&mdash;reject all the stings.</p>
+
+    <p><small>(It is unfortunate that the article uses the term <a
+    
href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.)</small></p>
+  </li>
+
+  <li id="M201706200.1">
+    <!--#set var="DATE" value='<small class="date-tag">2017-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Many models of Internet-connected cameras <a
+    href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
+    have backdoors</a>.</p>
+
+    <p>That is a malicious functionality, but in addition it
+    is a gross insecurity since anyone, including malicious crackers, <a
+    
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/";>can
+    find those accounts and use them to get into users' cameras</a>.</p>
+  </li>
+
+  <li id="M201706050">
+    <!--#set var="DATE" value='<small class="date-tag">2017-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p id="intel-me-10-year-vulnerability">Intel's
+    CPU backdoor&mdash;the Intel Management Engine&mdash;had a <a
+    
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/";>major
+    security vulnerability for 10 years</a>.</p>
+
+    <p>The vulnerability allowed a cracker to access
+    the computer's Intel Active Management Technology (AMT) <a
+    
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/";>
+    web interface with an empty password and gave administrative
+    access</a> to access the computer's keyboard, mouse, monitor among
+    other privileges.</p>
+
+    <p>It does not help that in newer Intel processors, it is impossible
+    to turn off the Intel Management Engine. Thus, even users who are
+    proactive about their security can do nothing to protect themselves
+    besides using machines that don't come with the backdoor.</p>
+  </li>
+
+  <li id="M201705250">
+    <!--#set var="DATE" value='<small class="date-tag">2017-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The proprietary code that runs pacemakers,
+    insulin pumps, and other medical devices is <a
+    href="http://www.bbc.co.uk/news/technology-40042584";> full of gross
+    security faults</a>.</p>
+  </li>
+
+  <li id="M201705160">
+    <!--#set var="DATE" value='<small class="date-tag">2017-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
+    pre-installed on 28 models of HP laptops logged the user's keystroke
+    to a file in the filesystem. Any process with access to the filesystem
+    or the MapViewOfFile API could gain access to the log. Furthermore, <a
+    
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt";>according
+    to modzero</a> the &ldquo;information-leak via Covert Storage Channel
+    enables malware authors to capture keystrokes without taking the risk
+    of being classified as malicious task by AV heuristics&rdquo;.</p>
+  </li>
+
+  <li id="M201705120">
+    <!--#set var="DATE" value='<small class="date-tag">2017-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Exploits of bugs in Windows, which were developed by the NSA
+    and then leaked by the Shadowbrokers group, are now being used to <a
+    
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/";>attack
+    a great number of Windows computers with ransomware</a>.</p>
+  </li>
+
+  <li id="M201704050">
+    <!--#set var="DATE" value='<small class="date-tag">2017-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Many Android devices <a
+    
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/";>
+    can be hijacked through their Wi-Fi chips</a> because of a bug in
+    Broadcom's non-free firmware.</p>
+  </li>
+
+  <li id="M201703270">
+    <!--#set var="DATE" value='<small class="date-tag">2017-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>When Miele's Internet of
+    Stings hospital disinfectant dishwasher is <a
+    
href="https://www.vice.com/en/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit";>
+    connected to the Internet, its security is crap</a>.</p>
+
+    <p>For example, a cracker can gain access to the dishwasher's
+    filesystem, infect it with malware, and force the dishwasher to launch
+    attacks on other devices in the network. Since these dishwashers are
+    used in hospitals, such attacks could potentially put hundreds of
+    lives at risk.</p>
+  </li>
+
+  <li id="M201703070">
+    <!--#set var="DATE" value='<small class="date-tag">2017-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The CIA exploited existing vulnerabilities
+    in &ldquo;smart&rdquo; TVs and phones to design a malware that <a
+    
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html";>
+    spies through their microphones and cameras while making them appear
+    to be turned off</a>. Since the spyware sniffs signals, it bypasses
+    encryption.</p>
+  </li>
+
+  <li id="M201702200">
+    <!--#set var="DATE" value='<small class="date-tag">2017-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>If you buy a used &ldquo;smart&rdquo;
+    car, house, TV, refrigerator, etc., usually <a
+    
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html";>the
+    previous owners can still remotely control it</a>.</p>
+  </li>
+
+  <li id="M201702170">
+    <!--#set var="DATE" value='<small class="date-tag">2017-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The mobile apps for communicating <a
+    
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/";>with
+    a smart but foolish car have very bad security</a>.</p>
+
+    <p>This is in addition to the fact that the car contains a cellular
+    modem that tells big brother all the time where it is.  If you own
+    such a car, it would be wise to disconnect the modem so as to turn
+    off the tracking.</p>
+  </li>
+
+  <li id="M201701271">
+    <!--#set var="DATE" value='<small class="date-tag">2017-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A cracker would be able to <a
+    href="https://uploadvr.com/hackable-webcam-oculus-sensor-be-aware/";>
+    turn the Oculus Rift sensors into spy cameras</a> after breaking into
+    the computer they are connected to.</p>
+
+    <p><small>(Unfortunately, the article <a
+    href="/philosophy/words-to-avoid.html#Hacker">improperly refers
+    to crackers as &ldquo;hackers&rdquo;</a>.)</small></p>
+  </li>
+
+  <li id="M201701270">
+    <!--#set var="DATE" value='<small class="date-tag">2017-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Samsung phones <a
+    
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/";>have
+    a security hole that allows an SMS message to install
+    ransomware</a>.</p>
+  </li>
+
+  <li id="M201701130">
+    <!--#set var="DATE" value='<small class="date-tag">2017-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>WhatsApp has a feature that <a
+    
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/";>
+    has been described as a &ldquo;back door&rdquo;</a> because it would
+    enable governments to nullify its encryption.</p>
+
+    <p>The developers say that it wasn't intended as a back door, and that
+    may well be true. But that leaves the crucial question of whether it
+    functions as one. Because the program is nonfree, we cannot check by
+    studying it.</p>
+  </li>
+
+  <li id="M201612060.1">
+    <!--#set var="DATE" value='<small class="date-tag">2016-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que can be <a
+    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws";>remotely
+    controlled with a mobile phone</a>; physical access is not
+    necessary. This would enable crackers to listen in on a child's
+    conversations, and even speak into the toys themselves.</p>
+
+    <p>This means a burglar could speak into the toys and ask the child
+    to unlock the front door while Mommy's not looking.</p>
+  </li>
+
+  <li id="M201610230">
+    <!--#set var="DATE" value='<small class="date-tag">2016-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>4G LTE phone networks are drastically insecure. They can be <a
+    
href="https://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/";>
+    taken over by third parties and used for man-in-the-middle
+    attacks</a>.</p>
+  </li>
+
+  <li id="M201608110">
+    <!--#set var="DATE" value='<small class="date-tag">2016-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Due to weak security, <a
+    
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844";>it
+    is easy to open the doors of 100 million cars built by
+    Volkswagen</a>.</p>
+  </li>
+
+  <li id="M201608080">
+    <!--#set var="DATE" value='<small class="date-tag">2016-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Ransomware <a
+    
href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/";>
+    has been developed for a thermostat that uses proprietary
+    software</a>.</p>
+  </li>
+
+  <li id="M201608020">
+    <!--#set var="DATE" value='<small class="date-tag">2016-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A <a
+    
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/";>flaw
+    in Internet Explorer and Edge</a> allows an attacker to retrieve
+    Microsoft account credentials, if the user is tricked into visiting
+    a malicious link.</p>
+  </li>
+
+  <li id="M201607290">
+    <!--#set var="DATE" value='<small class="date-tag">2016-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/";>&ldquo;Deleted&rdquo;
+    WhatsApp messages are not entirely deleted</a>. They can be recovered
+    in various ways.</p>
+  </li>
+
+  <li id="M201607220">
+    <!--#set var="DATE" value='<small class="date-tag">2016-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A vulnerability in Apple's Image I/O API allowed an attacker to <a
+    
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple";>execute
+    malicious code from any application which uses this API to render a
+    certain kind of image file</a>.</p>
+  </li>
+
+  <li id="M201607190">
+    <!--#set var="DATE" value='<small class="date-tag">2016-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A bug in a proprietary ASN.1 library, used
+    in cell phone towers as well as cell phones and routers, <a
+    
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover";>allows
+    taking control of those systems</a>.</p>
+  </li>
+
+  <li id="M201606290">
+    <!--#set var="DATE" value='<small class="date-tag">2016-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Antivirus programs have so many errors that <a
+    
href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374";>they
+    may make security worse</a>.</p>
+
+    <p>GNU/Linux does not need antivirus software.</p>
+  </li>
+
+  <li id="M201605020">
+    <!--#set var="DATE" value='<small class="date-tag">2016-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Samsung's &ldquo;Smart Home&rdquo; has a big security hole; <a
+    
href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/";>
+    unauthorized people can remotely control it</a>.</p>
+
+    <p>Samsung claims that this is an &ldquo;open&rdquo; platform so the
+    problem is partly the fault of app developers. That is clearly true
+    if the apps are proprietary software.</p>
+
+    <p>Anything whose name is &ldquo;Smart&rdquo; is most likely going
+    to screw you.</p>
+  </li>
+
+  <li id="M201604120">
+    <!--#set var="DATE" value='<small class="date-tag">2016-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A bug in the iThings Messages app <a
+    
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/";>allowed
+    a malicious web site to extract all the user's messaging
+    history</a>.</p>
+  </li>
+
+  <li id="M201604110">
+    <!--#set var="DATE" value='<small class="date-tag">2016-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Malware was found on <a
+    
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html";>
+    security cameras available through Amazon</a>.</p>
+
+    <p>A camera that records locally on physical media, and has no network
+    connection, does not threaten people with surveillance&mdash;neither
+    by watching people through the camera, nor through malware in the
+    camera.</p>
+  </li>
+
+  <li id="M201603220">
+    <!--#set var="DATE" value='<small class="date-tag">2016-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Over 70 brands of network-connected surveillance cameras have <a
+    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html";>
+    security bugs that allow anyone to watch through them</a>.</p>
+  </li>
+
+  <li id="M201603100">
+    <!--#set var="DATE" value='<small class="date-tag">2016-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Many proprietary payment apps <a
+    
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data";>transmit
+    personal data in an insecure way</a>. However,
+    the worse aspect of these apps is that <a
+    href="/philosophy/surveillance-vs-democracy.html">payment is not
+    anonymous</a>.</p>
+  </li>
+
+  <li id="M201602240">
+    <!--#set var="DATE" value='<small class="date-tag">2016-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p id="nissan-modem">The Nissan Leaf has a built-in
+    cell phone modem which allows effectively anyone to <a
+    href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/";>
+    access its computers remotely and make changes in various
+    settings</a>.</p>
+
+    <p>That's easy to do because the system has no authentication
+    when accessed through the modem.  However, even if it asked
+    for authentication, you couldn't be confident that Nissan
+    has no access.  The software in the car is proprietary, <a
+    href="/philosophy/free-software-even-more-important.html">which means
+    it demands blind faith from its users</a>.</p>
+
+    <p>Even if no one connects to the car remotely, the cell phone modem
+    enables the phone company to track the car's movements all the time;
+    it is possible to physically remove the cell phone modem, though.</p>
+  </li>
+
+  <li id="M201510210">
+    <!--#set var="DATE" value='<small class="date-tag">2015-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>FitBit fitness trackers have a <a
+    
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/";>
+    Bluetooth vulnerability</a> that allows attackers to send malware
+    to the devices, which can subsequently spread to computers and other
+    FitBit trackers that interact with them.</p>
+  </li>
+
+  <li id="M201510200">
+    <!--#set var="DATE" value='<small class="date-tag">2015-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>&ldquo;Self-encrypting&rdquo; disk drives
+    do the encryption with proprietary firmware so you
+    can't trust it.  Western Digital's &ldquo;My Passport&rdquo; drives <a
+    
href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption";>
+    have a back door</a>.</p>
+  </li>
+
+  <li id="M201508120">
+    <!--#set var="DATE" value='<small class="date-tag">2015-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Security researchers discovered a <a
+    
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text";>
+    vulnerability in diagnostic dongles used for vehicle tracking and
+    insurance</a> that let them take remote control of a car or lorry
+    using an SMS.</p>
+  </li>
+
+  <li id="M201507214">
+    <!--#set var="DATE" value='<small class="date-tag">2015-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Crackers were able to <a
+    
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/";>
+    take remote control of the Jeep</a> &ldquo;connected car&rdquo;. They
+    could track the car, start or stop the engine, and activate or
+    deactivate the brakes, and more.</p>
+
+    <p>We expect that Chrysler and the NSA can do this too.</p>
+
+    <p>If you own a car that contains a phone modem, it would be a good
+    idea to deactivate this.</p>
+  </li>
+
+  <li id="M201506080">
+    <!--#set var="DATE" value='<small class="date-tag">2015-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Due to bad security in a drug pump, crackers could use it to <a
+    
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/";>
+    kill patients</a>.</p>
+  </li>
+
+  <li id="M201505294">
+    <!--#set var="DATE" value='<small class="date-tag">2015-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html";>
+    Many smartphone apps use insecure authentication methods when storing
+    your personal data on remote servers</a>. This leaves personal
+    information like email addresses, passwords, and health information
+    vulnerable. Because many of these apps are proprietary it makes it
+    hard to impossible to know which apps are at risk.</p>
+  </li>
+
+  <li id="M201505050">
+    <!--#set var="DATE" value='<small class="date-tag">2015-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Hospira infusion pumps, which are used
+    to administer drugs to a patient, were rated &ldquo;<a
+    
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/";>least
+    secure IP device I've ever seen</a>&rdquo; by a security
+    researcher.</p>
+
+    <p>Depending on what drug is being infused, the insecurity could open
+    the door to murder.</p>
+  </li>
+
+  <li id="M201504090">
+    <!--#set var="DATE" value='<small class="date-tag">2015-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Mac OS X had an <a
+    
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
+    intentional local back door for 4 years</a>, which could be exploited
+    by attackers to gain root privileges.</p>
+  </li>
+
+  <li id="M201405190">
+    <!--#set var="DATE" value='<small class="date-tag">2014-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>An app to prevent &ldquo;identity theft&rdquo;
+    (access to personal data) by storing users' data on a special server <a
+    
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/";>was
+    deactivated by its developer</a> which had discovered a security
+    flaw.</p>
+
+    <p>That developer seems to be conscientious about protecting personal
+    data from third parties in general, but it can't protect that data
+    from the state.  Quite the contrary: confiding your data to someone
+    else's server, if not first encrypted by you with free software,
+    undermines your rights.</p>
+  </li>
+
+  <li id="M201404250">
+    <!--#set var="DATE" value='<small class="date-tag">2014-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Lots of <a
+    href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/";>
+    hospital equipment has lousy security</a>, and it can be fatal.</p>
+  </li>
+
+  <li id="M201402210">
+    <!--#set var="DATE" value='<small class="date-tag">2014-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The <a
+    
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/";>insecurity
+    of WhatsApp</a> makes eavesdropping a snap.</p>
+  </li>
+
+  <li id="M201312290">
+    <!--#set var="DATE" value='<small class="date-tag">2013-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a href="http://www.bunniestudios.com/blog/?p=3554";> Some flash
+    memories have modifiable software</a>, which makes them vulnerable
+    to viruses.</p>
+
+    <p>We don't call this a &ldquo;back door&rdquo; because it is normal
+    that you can install a new system in a computer, given physical access
+    to it.  However, memory sticks and cards should not be modifiable in
+    this way.</p>
+  </li>
+
+  <li id="M201312040">
+    <!--#set var="DATE" value='<small class="date-tag">2013-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/";>
+    Point-of-sale terminals running Windows were taken over</a> and
+    turned into a botnet for the purpose of collecting customers' credit
+    card numbers.</p>
+  </li>
+
+  <li id="M201311120">
+    <!--#set var="DATE" value='<small class="date-tag">2013-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html";>
+    The NSA can tap data in smart phones, including iPhones,
+    Android, and BlackBerry</a>.  While there is not much
+    detail here, it seems that this does not operate via
+    the universal back door that we know nearly all portable
+    phones have. It may involve exploiting various bugs.  There are <a
+    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>
+    lots of bugs in the phones' radio software</a>.</p>
+  </li>
+
+  <li id="M201309054">
+    <!--#set var="DATE" value='<small class="date-tag">2013-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>The
+    NSA has put back doors into nonfree encryption software</a>. We don't
+    know which ones they are, but we can be sure they include some widely
+    used systems.  This reinforces the point that you can never trust
+    the security of nonfree software.</p>
+  </li>
+
+  <li id="M201309050">
+    <!--#set var="DATE" value='<small class="date-tag">2013-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The FTC punished a company for making webcams with <a
+    
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html";>
+    bad security so that it was easy for anyone to watch through
+    them</a>.</p>
+  </li>
+
+  <li id="M201308060">
+    <!--#set var="DATE" value='<small class="date-tag">2013-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a href="http://spritesmods.com/?art=hddhack&amp;page=6";>
+    Replaceable nonfree software in disk drives can be written by a
+    nonfree program</a>. This makes any system vulnerable to persistent
+    attacks that normal forensics won't detect.</p>
+  </li>
+
+  <li id="M201307270">
+    <!--#set var="DATE" value='<small class="date-tag">2013-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p> It is possible to <a
+    
href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/";>
+    kill people by taking control of medical
+    implants by radio</a>.  More information in <a
+    href="http://www.bbc.co.uk/news/technology-17631838";>BBC
+    News</a> and <a
+    
href="https://ioactive.com/broken-hearts-how-plausible-was-the-homeland-pacemaker-hack/";>
+    IOActive Labs Research blog</a>.</p>
+  </li>
+
+  <li id="M201307260">
+    <!--#set var="DATE" value='<small class="date-tag">2013-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/";>
+    &ldquo;Smart homes&rdquo;</a> turn out to be stupidly vulnerable to
+    intrusion.</p>
+  </li>
+
+  <li id="M201212170">
+    <!--#set var="DATE" value='<small class="date-tag">2012-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p id="break-security-smarttv"><a
+    
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html";>
+    Crackers found a way to break security on a &ldquo;smart&rdquo; TV</a>
+    and use its camera to watch the people who are watching TV.</p>
+  </li>
+
+  <li id="M201103110">
+    <!--#set var="DATE" value='<small class="date-tag">2011-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>It is possible to <a
+    
href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/";>
  
+    take control of some car computers through malware in music files</a>. 
+    Also <a
+    href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0";>
+    by radio</a>. More information in <a
+    href="http://www.autosec.org/faq.html";> Automotive Security And
+    Privacy Center</a>.</p>
+  </li>
+</ul>
+</div>
+
+</div>
+<!--#include virtual="/proprietary/proprietary-menu.html" -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Please send general FSF &amp; GNU inquiries to
+<a href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.  Broken links and other corrections or suggestions can be sent
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and contributing translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright &copy; 2013, 2015-2021 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/";>Creative
+Commons Attribution 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2021/06/26 14:00:01 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: po/proprietary-interference.pt-br-en.html
===================================================================
RCS file: po/proprietary-interference.pt-br-en.html
diff -N po/proprietary-interference.pt-br-en.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-interference.pt-br-en.html   26 Jun 2021 14:00:01 -0000      
1.1
@@ -0,0 +1,442 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+<title>Proprietary Interference - GNU Project - Free Software 
Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+ <!--#include virtual="/proprietary/po/proprietary-interference.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /></a>&nbsp;/
+ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/
+ By type&nbsp;/
+</p>
+</div>
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Proprietary Interference</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.</p>
+
+<p>This typically takes the form of malicious functionalities.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>One kind of malicious functionality mediates developer's interference
+into the use of the software. This page describes how various proprietary
+programs harass or annoy the user, or cause trouble for the user.  These
+actions are like <a
+href="/proprietary/proprietary-sabotage#about-page">sabotage</a>, but the
+word &ldquo;sabotage&rdquo; is too strong for them.
+</p>
+
+<div class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write to <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.</p>
+</div>
+
+<div class="column-limit" id="proprietary-interference"></div>
+
+<ul class="blurbs">
+  <li id="M202105300">
+    <!--#set var="DATE" value='<small class="date-tag">2021-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.theguardian.com/technology/2021/may/30/gadgets-have-stopped-working-together-interoperability-apple";>Apple
+    is systematically undermining interoperability</a>. At the hardware
+    level, it does this via nonstandard plugs, buses and networks. At
+    the software level, it does this by not letting the user have any
+    data except within one app.</p>
+  </li>
+
+  <li id="M202105130">
+    <!--#set var="DATE" value='<small class="date-tag">2021-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    href="https://gizmodo.com/get-ready-for-in-car-ads-1846888390";>Ford
+    is planning to force ads on drivers in cars</a>, with the ability for
+    the owner to pay extra to turn them off. The system probably imposes
+    surveillance on drivers too.</p>
+  </li>
+
+  <li id="M202104060">
+    <!--#set var="DATE" value='<small class="date-tag">2021-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The <a
+    
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/";>WeddingWire
+    app saves people's wedding photos forever and hands over data
+    to others</a>, giving users no control over their personal 
+    information/data. The app also sometimes shows old photos and
+    memories to users, without giving them any control over this
+    either.</p>
+  </li>
+
+  <li id="M202102180">
+    <!--#set var="DATE" value='<small class="date-tag">2021-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Microsoft is <a
+    
href="https://uk.pcmag.com/operating-systems/131798/microsoft-starts-automatically-removing-flash-from-windows";>forcibly
+    removing the Flash player from computers running Windows 10</a>, using
+    <a href="/proprietary/proprietary-back-doors.html#windows-update">a
+    universal backdoor in Windows</a>.</p>
+
+    <p>The fact that Flash has been <a
+    href="/proprietary/proprietary-back-doors.html#M202012020">disabled
+    by Adobe</a> is no excuse for this abuse of power. The nature of
+    proprietary software, such as Microsoft Windows, gives the developers
+    power to impose their decisions on users. Free software on the other
+    hand empowers users to make their own decisions.</p>
+  </li>
+
+  <li id="M202010180">
+    <!--#set var="DATE" value='<small class="date-tag">2020-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Microsoft is <a
+    
href="https://www.slashgear.com/windows-10-users-are-grumpy-over-forced-updates-and-unwanted-apps-18643135/";>forcing
+    Windows users</a> to <a
+    
href="https://support.microsoft.com/en-us/windows/manage-updates-in-windows-10-643e9ea7-3cf6-7da6-a25c-95d4f7f099fe";>install
+    upgrades it pushes</a> using <a
+    href="/proprietary/proprietary-back-doors.html#windows-update">its
+    universal back doors</a>. These upgrades can do various harms to
+    users such as restricting computers from some functions and/or forcing
+    users to defenselessly do whatever Microsoft tells them to do.</p>
+  </li>
+
+  <li id="M202005250">
+    <!--#set var="DATE" value='<small class="date-tag">2020-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Tesla's cars have a <a
+    href="/proprietary/proprietary-back-doors.html#M201709090.1">
+    universal remote back door</a>.  Tesla used it to <a
+    
href="https://www.theverge.com/2020/2/6/21127243/tesla-model-s-autopilot-disabled-remotely-used-car-update";>
+    disable the autopilot features</a> on people's cars to make them pay
+    extra for re-enabling the features.</p>
+
+    <p>This kind of malfeature is only possible with proprietary
+    software&mdash;free software is controlled by its users who wouldn't
+    let do such things to them.</p>
+  </li>
+
+  <li id="M202004150">
+    <!--#set var="DATE" value='<small class="date-tag">2020-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Riot Games' new anti-cheat is malware; <a
+    
href="https://www.extremetech.com/gaming/309320-riot-games-new-anti-cheat-system-runs-at-system-boot-uses-kernel-driver";>runs
+    on system boot at kernel level</a> on Windows. It is insecure software
+    that increases the attack surface of the operating system.</p>
+  </li>
+
+  <li id="M201912170">
+    <!--#set var="DATE" value='<small class="date-tag">2019-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Some security breakers (wrongly referred in this article as <a
+    href="/philosophy/words-to-avoid.html#Hacker">&ldquo;hackers&rdquo;</a>)
+    managed to interfere the Amazon Ring proprietary system, and <a
+    
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras";>access
+    its camera, speakers and microphones</a>.</p>
+  </li>
+
+  <li id="M201908150">
+    <!--#set var="DATE" value='<small class="date-tag">2019-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple is putting DRM on iPhone
+    batteries, and the system proprietary software <a
+    
href="https://www.vice.com/en/article/59nz3k/apple-is-locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair";>turns
+    off certain features when batteries are replaced other than by
+    Apple.</a></p>
+  </li>
+
+  <li id="M201901230">
+    <!--#set var="DATE" value='<small class="date-tag">2019-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Google is modifying Chromium so that <a
+    
href="https://tech.slashdot.org/story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-will-break-content-blocking-extensions-including-various-ad-blockers";>
+    extensions won't be able to alter or block whatever the page
+    contains</a>. Users could conceivably reverse the change in a fork
+    of Chromium, but surely Chrome (nonfree) will have the same change,
+    and users can't fix it there.</p>
+  </li>
+
+  <li id="M201901110">
+    <!--#set var="DATE" value='<small class="date-tag">2019-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Samsung phones come preloaded with <a
+    
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook";>
+    a version of the Facebook app that can't be deleted</a>. <a
+    
href="https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-app";>
+    Facebook claims this is a stub</a> which doesn't do anything, but we
+    have to take their word for it, and there is the permanent risk that
+    the app will be activated by an automatic update.</p>
+
+    <p>Preloading crapware along with a nonfree operating system is common
+    practice, but by making the crapware undeletable, Facebook and Samsung (<a
+    class="not-a-duplicate"
+    
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook";>among
 others</a>)
+    are going one step further in their hijacking of users' devices.</p>
+  </li>
+
+  <li id="M201809120">
+    <!--#set var="DATE" value='<small class="date-tag">2018-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>One version of Windows 10 <a
+    
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/";>
+    harangues users if they try to install Firefox (or Chrome)</a>.</p>
+  </li>
+
+  <li id="M201807310">
+    <!--#set var="DATE" value='<small class="date-tag">2018-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A nonfree video game, available through the nonfree Steam client, <a
+    
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-";>
+    included a &ldquo;miner&rdquo;</a>, i.e. an executable that hijacks
+    the CPU in users' computers to mine a cryptocurrency.</p>
+  </li>
+
+  <li id="M201805080">
+    <!--#set var="DATE" value='<small class="date-tag">2018-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A cracker used an exploit in outdated software to <a
+    
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito";>
+    inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. This
+    type of malware hijacks the computer's processor to mine a
+    cryptocurrency.</p>
+
+    <p><small>(Note that the article refers to the infected software
+    as &ldquo;content management system&rdquo;. A better term would be
+    &ldquo;<a href="/philosophy/words-to-avoid.html#Content">website
+    revision system</a>&rdquo;.)</small></p>
+
+    <p>Since the miner was a nonfree JavaScript program,
+    visitors wouldn't have been affected if they had used <a
+    href="/software/librejs/index.html">LibreJS</a>. Some
+    browser extensions that <a
+    
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/";>
+    specifically block JavaScript miners</a> are also available.</p>
+  </li>
+
+  <li id="M201804180">
+    <!--#set var="DATE" value='<small class="date-tag">2018-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Pearson's proprietary educational software <a
+    
href="https://gizmodo.com/pearson-embedded-a-social-psychological-experiment-in-s-1825367784";>
+    did an experiment on real students</a>, treating students differently
+    to observe the results.</p>
+  </li>
+
+  <li id="M201803190">
+    <!--#set var="DATE" value='<small class="date-tag">2018-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Microsoft is planning to make Windows <a
+    
href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox";>
+    impose use of its browser, Edge, in certain circumstances</a>.</p>
+
+    <p>The reason Microsoft can force things on users is that Windows
+    is nonfree.</p>
+  </li>
+
+  <li id="M201712060">
+    <!--#set var="DATE" value='<small class="date-tag">2017-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Learn how <a
+    
href="https://web.archive.org/web/20170319013045/https://www.huffingtonpost.com/joseph-farrell/the-fascinating-psycholog_b_6076502.html";>
+    gratis-to-play-and-not-win-much games manipulate their useds
+    psychologically</a>.</p>
+
+    <p>These manipulative behaviors are malicious functionalities, and they
+    are possible because the game is proprietary. If it were free, people
+    could publish a non-manipulative version and play that instead.</p>
+  </li>
+
+  <li id="M201703170">
+    <!--#set var="DATE" value='<small class="date-tag">2017-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Windows displays <a
+    
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer";>
+    intrusive ads for Microsoft products and its partners'
+    products</a>.</p>
+
+    <p>The article's author starts from the premise that Microsoft has
+    a right to control what Windows does to users, as long as it doesn't
+    go &ldquo;too far&rdquo;. We disagree.</p>
+  </li>
+
+  <li id="M201701110">
+    <!--#set var="DATE" value='<small class="date-tag">2017-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>An upgrade package for Acrobat Reader <a
+    
href="https://www.bleepingcomputer.com/news/software/adobe-acrobat-reader-dc-update-installs-chrome-browser-extension/";>silently
+    alters Chrome</a>.</p>
+  </li>
+
+  <li id="M201612140">
+    <!--#set var="DATE" value='<small class="date-tag">2016-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Microsoft Telemetry Compatibility service <a
+    
href="https://answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs";>
+    drastically reduces the performances of machines running
+    Windows&nbsp;10</a>, and can't be disabled easily.</p>
+  </li>
+
+  <li id="M201608170">
+    <!--#set var="DATE" value='<small class="date-tag">2016-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p> After <a 
href="/proprietary/malware-microsoft.html#windows10-forcing">forcing the 
download of Windows 10</a>
+    on computers that were running Windows 7 and 8, Microsoft <a
+    
href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
+    repeatedly switched on a flag that urged users to
+    &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned
+    it off, in the hope that some day they would fail to say no.
+    To do this, Microsoft used <a
+    
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/";>
+    malware techniques</a>.</p>
+
+    <p>A detailed <a
+    
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
+    analysis of Microsoft's scheme</a> is available on the Electronic
+    Frontier Foundation's website.</p>
+  </li>
+
+  <li id="M201603090">
+    <!--#set var="DATE" value='<small class="date-tag">2016-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Microsoft has made companies'
+    Windows machines managed by the company's sysadmins <a
+    
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html";>harangue
+    users to complain to the sysadmins about not &ldquo;upgrading&rdquo;
+    to Windows 10</a>.</p>
+  </li>
+
+  <li id="M201601160">
+    <!--#set var="DATE" value='<small class="date-tag">2016-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Microsoft has <a
+    
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake";>desupported
+    all future Intel CPUs for Windows 7 and 8</a>. Those
+    machines will be stuck with the nastier Windows 10.  <a
+    
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825";>
+    AMD and Qualcomm CPUs, too</a>.</p>
+
+    <p>Of course, Windows 7 and 8 are unethical too, because they are
+    proprietary software.  But this example of Microsoft's wielding its
+    power demonstrates the power it holds.</p>
+
+    <p>Free software developers also stop maintaining old versions of
+    their programs, but this is not unfair to users because the users of
+    free software have control over it.  If it is important enough to you,
+    you and other users can hire someone to support the old version on
+    your future platforms.</p>
+  </li>
+
+  <li id="M201510220">
+    <!--#set var="DATE" value='<small class="date-tag">2015-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Adobe nonfree software may halt
+    all other work and freeze a computer <a
+    href="http://shallowsky.com/blog/gimp/non-free-software-surprises.html";>
+    to perform a license check</a>, at a random time every 30 days.</p>
+  </li>
+
+  <li id="M201506260">
+    <!--#set var="DATE" value='<small class="date-tag">2015-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Oracle made a deal with Yahoo; Oracle's nonfree Java plug-in will <a
+    
href="http://searchengineland.com/yahoo-signs-deal-with-oracle-to-attract-new-users-via-java-installs-224097";>
+    change the user's initial web page, and default search engine, to
+    Yahoo</a> unless the user intervenes to stop it.</p>
+  </li>
+</ul>
+</div>
+
+</div>
+<!--#include virtual="/proprietary/proprietary-menu.html" -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Please send general FSF &amp; GNU inquiries to
+<a href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.  Broken links and other corrections or suggestions can be sent
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and contributing translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright &copy; 2015-2021 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/";>Creative
+Commons Attribution 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2021/06/26 14:00:01 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: po/proprietary-jails.pt-br-en.html
===================================================================
RCS file: po/proprietary-jails.pt-br-en.html
diff -N po/proprietary-jails.pt-br-en.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-jails.pt-br-en.html  26 Jun 2021 14:00:01 -0000      1.1
@@ -0,0 +1,412 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+<title>Proprietary Jails - GNU Project - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+ <!--#include virtual="/proprietary/po/proprietary-jails.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /></a>&nbsp;/
+ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/
+ By type&nbsp;/
+</p>
+</div>
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Proprietary Jails</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.</p>
+
+<p>This typically takes the form of malicious functionalities.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>The &ldquo;jails&rdquo; are malicious operating systems that are
+designed to impose censorship of which applications the user can install.
+The <a href="http://i.imgur.com/ZRViDum.jpg";>image of the iPrison</a>
+illustrates this issue.</p>
+<!-- embed http://i.imgur.com/ZRViDum.jpg here -->
+<!-- Linking to it. Not possible to embed due to licensing. See RT #887471 -->
+
+<p>These systems are platforms for censorship imposed by the company
+that owns the system.  Selling products designed as platforms for a
+company to impose censorship ought to be forbidden by law, but it
+isn't.</p>
+
+<p>This page lists a few jails, along with some of the methods they use
+to censor apps, and includes specific examples of apps that were blocked
+using this censorship power.</p>
+
+<div class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.</p>
+</div>
+
+<div id="TOC" class="toc-inline">
+<ul>
+  <li>&nbsp;<a href="#apple">Apple</a>&nbsp;</li>
+  <li>&nbsp;<a href="#microsoft">Microsoft</a>&nbsp;</li>
+  <li>&nbsp;<a href="#consoles">Game&nbsp;consoles</a>&nbsp;</li>
+</ul>
+</div>
+
+<h3 id="apple">Apple</h3>
+
+<ul class="blurbs">
+  <li id="M201904080">
+    <!--#set var="DATE" value='<small class="date-tag">2019-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple plans to require that <a
+    
href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/";>
+    all application software for MacOS be approved by Apple first</a>.</p>
+
+    <p>Offering a checking service as an option could be
+    useful and would not be wrong.  Requiring users to get
+    Apple's approval is tyranny. Apple says the check will
+    only look for malware (not counting the malware that is <a
+    href="/proprietary/malware-apple.html#TOC">part of
+    the operating system</a>), but Apple could change that policy step
+    by step.  Or perhaps Apple will define malware to include any app
+    that China does not like.</p>
+
+    <p>For free software, this means users will need to get Apple's
+    approval after compilation.  This amounts to a system of surveilling
+    the use of free programs.</p>
+  </li>
+
+  <li id="M200803070">
+    <!--#set var="DATE" value='<small class="date-tag">2008-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046";>
+    iOS, the operating system of the Apple iThings, is the prototype
+    of a jail</a>.  It was Apple that introduced the practice of
+    designing general purpose computers with censorship of application
+    programs.</p>
+
+    <p>Here is an article about the <a
+    href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/";>
+    code signing</a> that the iThings use to lock up the user.</p>
+
+    <p>Curiously, Apple is beginning to allow limited passage through the
+    walls of the iThing jail: users can now install apps built from
+    source code, provided the source code is written in Swift.  Users
+    cannot do this freely because they are required to identify
+    themselves. <a href="https://developer.apple.com/xcode/";>Here
+    are details</a>. While this is a crack in the prison walls, it is not
+    big enough to mean that the iThings are no longer jails.</p>
+  </li>
+</ul>
+
+<h4 id="apple-censorship">Examples of censorship by Apple jails</h4>
+
+<ul class="blurbs">
+  <li id="M202008300">
+    <!--#set var="DATE" value='<small class="date-tag">2020-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple is <a
+    
href="https://www.theguardian.com/technology/2020/aug/30/this-isnt-the-1990s-apple-under-pressure-from-app-developers";>
+    putting the squeeze on all business</a> conducted through apps
+    for iMonsters.</p>
+
+    <p>This is a symptom of a very big injustice: that Apple has the
+    power to decide what software can be installed on an iMonster.
+    That it is a jail.</p>
+  </li>
+
+  <li id="M201910100">
+    <!--#set var="DATE" value='<small class="date-tag">2019-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple has <a
+    
href="https://www.theguardian.com/world/2019/oct/10/hong-kong-protests-apple-pulls-tracking-app-after-china-criticism";>
+    banned the app that Hong Kong protesters use to communicate</a>.</p>
+
+    <p>Obeying the &ldquo;local laws&rdquo; about what people can do with
+    software is no excuse for censoring what software people can use.</p>
+  </li>
+
+  <li id="M201910070">
+    <!--#set var="DATE" value='<small class="date-tag">2019-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple <a
+    
href="https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-hong-kong.html";>
+    censors the Taiwan flag in iOS</a> on behalf of the Chinese
+    government. When the region is set to Hong Kong, this flag is not
+    visible in the emoji selection widget but is still accessible. When the
+    region is set to mainland China, all attempts to display it will result
+    in the &ldquo;empty emoji&rdquo; icon as if the flag never existed.</p>
+
+    <p>Thus, not only does Apple use the App Store as an instrument
+    of censorship, it also uses the iThing operating system for that
+    purpose.</p>
+  </li>
+
+  <li id="M201905150">
+    <!--#set var="DATE" value='<small class="date-tag">2019-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Users caught in the jail of an iMonster are <a
+    href="https://boingboing.net/2019/05/15/brittle-security.html";> sitting
+    ducks for other attackers</a>, and the app censorship prevents security
+    companies from figuring out how those attacks work.</p>
+
+    <p>Apple's censorship of apps is fundamentally unjust, and would be
+    inexcusable even if it didn't lead to security threats as well.</p>
+  </li>
+
+  <li id="M201710130">
+    <!--#set var="DATE" value='<small class="date-tag">2017-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple is <a
+    
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet";>
+    censoring apps for the US government too</a>. Specifically, it is
+    deleting apps developed by Iranians.</p>
+
+    <p>The root of these wrongs is in Apple. If Apple had not designed
+    the iMonsters to let Apple censor applications, Apple would not have
+    had the power to stop users from installing whatever kind of apps.</p>
+  </li>
+
+  <li id="M201707290">
+    <!--#set var="DATE" value='<small class="date-tag">2017-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple <a
+    
href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html";>
+    deleted several VPNs from its app store for China</a>, thus using its
+    own censorship power to strengthen that of the Chinese government.</p>
+  </li>
+
+  <li id="M201701064">
+    <!--#set var="DATE" value='<small class="date-tag">2017-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple used its censorship system to enforce Russian surveillance <a
+    
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0";>
+    by blocking distribution of the LinkedIn app in Russia</a>.</p>
+
+    <p>This is ironic because LinkedIn is a surveillance system itself.
+    While subjecting its users to its own surveillance, it tries to
+    protect its users from Russian surveillance, and is therefore subject
+    to Russian censorship.</p>
+
+    <p>However, the point here is the wrong of Apple's censorship of
+    apps.</p>
+  </li>
+
+  <li id="M201701050">
+    <!--#set var="DATE" value='<small class="date-tag">2017-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple used its censorship system to enforce China's censorship <a
+    
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china";>
+    by blocking distribution of the New York Times app</a>.</p>
+  </li>
+
+  <li id="M201605190">
+    <!--#set var="DATE" value='<small class="date-tag">2016-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple censors games, <a
+    
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game";>
+    banning some games from the cr&hellip;app store</a> because of which
+    political points they suggest. Some political points are apparently
+    considered acceptable.</p>
+  </li>
+
+  <li id="M201509290">
+    <!--#set var="DATE" value='<small class="date-tag">2015-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/";>
+    banned a program from the App Store</a> because its developers
+    committed the enormity of disassembling some iThings.</p>
+  </li>
+
+  <li id="M201509230">
+    <!--#set var="DATE" value='<small class="date-tag">2015-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>As of 2015, Apple <a
+    
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights";>
+    systematically bans apps that endorse abortion rights or would help
+    women find abortions</a>.</p>
+
+    <p>This particular political slant <a
+    
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions";>
+    affects other Apple services</a>.</p>
+  </li>
+
+  <li id="M201506250">
+    <!--#set var="DATE" value='<small class="date-tag">2015-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple has banned iThing
+    applications that show the confederate flag.  <a
+    
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html";>
+    Not only those that use it as a symbol of racism</a>, but even
+    strategic games that use it to represent confederate army units
+    fighting in the Civil War.</p>
+
+    <p>This ludicrous rigidity illustrates the point that Apple should
+    not be allowed to censor apps.  Even if Apple carried out this act of
+    censorship with some care, it would still be wrong.  Whether racism
+    is bad, whether educating people about drone attacks is bad, are not
+    the real issue.  Apple should not have the power to impose its views
+    about either of these questions, or any other.</p>
+  </li>
+
+  <li id="M201412110">
+    <!--#set var="DATE" value='<small class="date-tag">2014-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans";>
+    More examples of Apple's arbitrary and inconsistent censorship</a>.</p>
+  </li>
+
+  <li id="M201405250">
+    <!--#set var="DATE" value='<small class="date-tag">2014-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple used this censorship power in 2014 to <a
+    
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html";>
+    ban all bitcoin apps</a> for the iThings for a time.  It also <a
+    
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/";>
+    banned a game about growing marijuana</a>, while permitting games
+    about other crimes such as killing people.  Perhaps Apple considers
+    killing more acceptable than marijuana.</p>
+  </li>
+
+  <li id="M201402070">
+    <!--#set var="DATE" value='<small class="date-tag">2014-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple rejected an app that displayed the locations
+    of US drone assassinations, giving various excuses. Each
+    time the developers fixed one &ldquo;problem&rdquo;, Apple
+    complained about another.  After the fifth rejection, Apple <a
+    href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/";>
+    admitted it was censoring the app based on the subject matter</a>.</p>
+  </li>
+</ul>
+
+
+<h3 id="microsoft">Microsoft</h3>
+
+<ul class="blurbs">
+  <li id="M201706130">
+    <!--#set var="DATE" value='<small class="date-tag">2017-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Windows 10 S was a jail: <a
+    
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison";>
+    only programs from the Windows Store could be
+    installed and executed</a>. It was however possible to <a
+    
href="https://www.theverge.com/2017/6/13/15789998/microsoft-windows-10-s-upgrade-windows-10-pro-guide";>
+    upgrade to Windows 10 Pro</a>. The successor of Windows
+    10 S is a special configuration of Windows 10 called <a
+    
href="https://support.microsoft.com/en-us/windows/windows-10-in-s-mode-faq-851057d6-1ee9-b9e5-c30b-93baebeebc85";>
+    S mode</a>. The major difference with Windows 10 S is that there is
+    an easy way to switch out of S mode.</p>
+  </li>
+
+  <li id="M201210080">
+    <!--#set var="DATE" value='<small class="date-tag">2012-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://web.archive.org/web/20190917162027/https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html";>
+    Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a
+    jail</a>.</p>
+  </li>
+</ul>
+
+
+<h3 id="consoles">Game consoles</h3>
+
+<p>No game can run on the console unless the console's manufacturer
+has authorized it.  Alas, we can't find a article to cite as a reference
+for this fact.  Please inform us if you know of one.</p>
+</div>
+
+</div>
+<!--#include virtual="/proprietary/proprietary-menu.html" -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Please send general FSF &amp; GNU inquiries to
+<a href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.  Broken links and other corrections or suggestions can be sent
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and contributing translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright &copy; 2014-2021 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/";>Creative
+Commons Attribution 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2021/06/26 14:00:01 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: po/proprietary-manipulation.pt-br-en.html
===================================================================
RCS file: po/proprietary-manipulation.pt-br-en.html
diff -N po/proprietary-manipulation.pt-br-en.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-manipulation.pt-br-en.html   26 Jun 2021 14:00:01 -0000      
1.1
@@ -0,0 +1,222 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+<title>Proprietary Manipulation
+- GNU Project - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+ <!--#include virtual="/proprietary/po/proprietary-manipulation.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /></a>&nbsp;/
+ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/
+ By type&nbsp;/
+</p>
+</div>
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Proprietary Manipulation</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.</p>
+
+<p>This typically takes the form of malicious functionalities.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>Manipulation of users is one of these malicious functionalities.
+Here are examples of programs that are designed to do this by taking
+advantage of human psychology.</p>
+
+<p>We have a special page for <a
+href="/proprietary/proprietary-addictions.html">Addictive programs</a>,
+which also take advantage of human psychology, but in a much more
+elaborate and dangerous way.</p>
+
+<div class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write to <a
+href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.</p>
+</div>
+
+<div class="column-limit" id="proprietary-manipulation"></div>
+
+<ul class="blurbs">
+  <li id="M202102190">
+    <!--#set var="DATE" value='<small class="date-tag">2021-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Prodigy maths game played in schools
+    at no cost entices students to play it at home, where <a
+    
href="https://www.theguardian.com/technology/2021/feb/19/maths-app-targeting-uk-schools-is-criticised-over-premium-model";>
+    the company tries to lure them into paying for a premium
+    subscription</a> in exchange for mere cosmetic features that, at
+    school, underline the socioeconomic gap between those who can afford
+    it and those who can't.</p>
+
+    <p>The strategy of <a href="/education/edu-schools.html">using
+    schools as a fishing pool for customers</a> is a common practice
+    traditionally adopted by nonfree software companies.</p>
+  </li>
+
+  <li id="M202007020">
+    <!--#set var="DATE" value='<small class="date-tag">2020-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>BMW is trying to <a
+    
href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates";>lock
+    certain features of its cars, and force people to pay to use part of
+    the car they already bought</a>. This is done through forced update
+    of the car software via a radio-operated back door.</p>
+  </li>
+
+  <li id="M201905300">
+    <!--#set var="DATE" value='<small class="date-tag">2019-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Femm &ldquo;fertility&rdquo; app is secretly a <a
+    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners";>
+    tool for propaganda</a> by natalist Christians.  It spreads distrust
+    for contraception.</p>
+
+    <p>It snoops on users, too, as you must expect from nonfree
+    programs.</p>
+  </li>
+
+  <li id="M201904260">
+    <!--#set var="DATE" value='<small class="date-tag">2019-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Jibo robot toys were tethered to the manufacturer's server,
+    and <a href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648";>
+    the company made them all cease to work</a> by shutting down that
+    server.</p>
+
+    <p>The shutdown might ironically be good for their users, since the
+    product was designed to manipulate people by presenting a phony
+    semblance of emotions, and was most certainly spying on them.</p>
+  </li>
+
+  <li id="M201809121">
+    <!--#set var="DATE" value='<small class="date-tag">2018-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Tiny Lab Productions, along with online ad businesses run
+    by Google, Twitter and three other companies are facing a lawsuit <a
+    
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html";>for
+    violating people's privacy by collecting their data from mobile games
+    and handing over these data to other companies/advertisers</a>.</p>
+  </li>
+
+  <li id="M201808131">
+    <!--#set var="DATE" value='<small class="date-tag">2018-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.theverge.com/2018/8/13/17684660/google-turn-off-location-history-data";>Google
+    will track people even if people turn off location history</a>, using
+    Google Maps, weather updates, and browser searches. Google basically
+    uses any app activity to track people.</p>
+  </li>
+
+  <li id="M201308290">
+    <!--#set var="DATE" value='<small class="date-tag">2013-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>&ldquo;Dark patterns&rdquo; are <a
+    
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>user
+    interfaces designed to mislead users, or make option settings hard
+    to find</a>.</p>
+
+    <p>This allows a company such as Apple to say, &ldquo;We allow users
+    to turn this off&rdquo; while ensuring that few will understand how
+    to actually turn it off.</p>
+  </li>
+</ul>
+</div>
+
+</div>
+<!--#include virtual="/proprietary/proprietary-menu.html" -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Please send general FSF &amp; GNU inquiries to
+<a href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.  Broken links and other corrections or suggestions can be sent
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and contributing translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/";>Creative
+Commons Attribution 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2021/06/26 14:00:01 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>
+

Index: po/proprietary-obsolescence.pt-br-en.html
===================================================================
RCS file: po/proprietary-obsolescence.pt-br-en.html
diff -N po/proprietary-obsolescence.pt-br-en.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-obsolescence.pt-br-en.html   26 Jun 2021 14:00:01 -0000      
1.1
@@ -0,0 +1,235 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+<title>Proprietary Obsolescence - GNU Project - Free Software 
Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+ <!--#include virtual="/proprietary/po/proprietary-obsolescence.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /></a>&nbsp;/
+ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/
+ By type&nbsp;/
+</p>
+</div>
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Proprietary Obsolescence</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.</p>
+
+<p>This typically takes the form of malicious functionalities.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>Programmed obsolescence is one of the malicious functionalities that
+may be designed into proprietary software.</p>
+
+<p>Computer technology inevitably has an environmental impact, but
+proprietary software makes it worse because it is often designed to lead
+or pressure users to discard devices sooner because support for them has
+ceased, or to discard defective hardware which could have been made
+repairable.</p>
+
+<p>Here are examples of proprietary programs that make hardware devices
+prematurely obsolete.</p>
+
+<div class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.</p>
+</div>
+
+<div class="column-limit" id="proprietary-obsolescence"></div>
+
+<ul class="blurbs">
+  <li id="M202101040">
+    <!--#set var="DATE" value='<small class="date-tag">2021-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The personal finance management software &ldquo;Quicken&rdquo; <a
+    href="https://www.quicken.com/support/quicken-discontinuation-policy";>
+    has a discontinuation policy, a.k.a. planned obsolescence</a>, which is
+    an injustice to users. A free (as in freedom) program would let users
+    control the software. But when you use a proprietary software,
+    you won't be in control.</p>
+  </li>
+
+  <li id="M201908220">
+    <!--#set var="DATE" value='<small class="date-tag">2019-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>ChromeBooks are programmed for obsolescence:
+    ChromeOS has a universal back door that is used for updates and <a
+    
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/";>
+    ceases to operate at a predefined date</a>. From then on, there
+    appears to be no support whatsoever for the computer.</p>
+
+    <p>In other words, when you stop getting screwed by the back door,
+    you start getting screwed by the obsolescence.</p>
+  </li>
+
+  <li id="M201903250">
+    <!--#set var="DATE" value='<small class="date-tag">2019-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The British supermarket Tesco sold tablets which were tethered
+    to Tesco's server for reinstalling default settings.  Tesco <a
+    
href="https://www.theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix";>
+    turned off the server for old models</a>, so now if you try to
+    reinstall the default settings, it bricks them instead.</p>
+  </li>
+
+  <li id="M201810240">
+    <!--#set var="DATE" value='<small class="date-tag">2018-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple and Samsung deliberately <a
+    
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones";>degrade
+    the performance of older phones to force users to buy their newer
+    phones</a>.</p>
+  </li>
+
+  <li id="M201706060">
+    <!--#set var="DATE" value='<small class="date-tag">2017-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple will stop <a
+    
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete";>fixing
+    bugs for older model iThings</a>.</p>
+
+    <p>Meanwhile, Apple stops people from fixing problems themselves;
+    that's the nature of proprietary software.</p>
+  </li>
+
+  <li id="M201604050">
+    <!--#set var="DATE" value='<small class="date-tag">2016-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Revolv is a device that managed &ldquo;smart home&rdquo;
+    operations: switching lights, operate motion sensors, regulating
+    temperature, etc.  Its proprietary software depends on a remote server
+    to do these tasks.  On May 15th, 2016, Google/Alphabet <a
+    
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be";>intentionally
+    broke it by shutting down the server</a>.</p>
+
+    <p>If it were free software, users would have the ability to make it
+    work again, differently, and then have a freedom-respecting home
+    instead of a &ldquo;smart&rdquo; home. Don't let proprietary software
+    control your devices and turn them into $300 out-of-warranty
+    bricks. Insist on self-contained computers that run free software!</p>
+  </li>
+
+  <li id="M201601100">
+    <!--#set var="DATE" value='<small class="date-tag">2016-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The <a
+    href="http://michaelweinberg.org/post/137045828005/free-the-cube";>
+    &ldquo;Cube&rdquo; 3D printer was designed with DRM</a>: it
+    won't accept third-party printing materials.  It is the Keurig of
+    printers.  Now it is being discontinued, which means that eventually
+    authorized materials won't be available and the printers may become
+    unusable.</p>
+
+    <p>With a <a
+    href="http://www.fsf.org/resources/hw/endorsement/aleph-objects";>
+    printer that gets the Respects Your Freedom</a>, this problem would
+    not even be a remote possibility.</p>
+
+    <p>How pitiful that the author of that article says that there was
+    &ldquo;nothing wrong&rdquo; with designing the device to restrict
+    users in the first place.  This is like putting a &ldquo;cheat me and
+    mistreat me&rdquo; sign on your chest.  We should know better: we
+    should condemn all companies that take advantage of people like him. 
+    Indeed, it is the acceptance of their unjust practice that teaches
+    people to be doormats.</p>
+  </li>
+</ul>
+</div>
+
+</div>
+<!--#include virtual="/proprietary/proprietary-menu.html" -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Please send general FSF &amp; GNU inquiries to
+<a href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.  Broken links and other corrections or suggestions can be sent
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and contributing translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright &copy; 2019, 2020, 2021 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/";>Creative
+Commons Attribution 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2021/06/26 14:00:01 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: po/proprietary-sabotage.pt-br-en.html
===================================================================
RCS file: po/proprietary-sabotage.pt-br-en.html
diff -N po/proprietary-sabotage.pt-br-en.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-sabotage.pt-br-en.html       26 Jun 2021 14:00:01 -0000      
1.1
@@ -0,0 +1,851 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+<title>Proprietary Sabotage - GNU Project - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+<!--#include virtual="/proprietary/po/proprietary-sabotage.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /></a>&nbsp;/
+ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/
+ By type&nbsp;/
+</p>
+</div>
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Proprietary Sabotage</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.</p>
+
+<p>This typically takes the form of malicious functionalities.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>Some malicious functionalities mediate sabotage, i.e. abusive
+interference of the developer into the use of the software, with harmful
+consequences for the users. Examples of such situations are listed below.</p>
+
+<div class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.</p>
+</div>
+
+<div class="column-limit" id="proprietary-sabotage"></div>
+
+<ul class="blurbs">
+  <li id="M202105040">
+    <!--#set var="DATE" value='<small class="date-tag">2021-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A motorcycle company named Klim is selling airbag
+    vests with different payment methods, one of them is through a <a
+    
href="https://www.vice.com/en/article/93yyyd/this-motorcycle-airbag-vest-will-stop-working-if-you-miss-a-payment";>proprietary
+    subscription-based option that will block the vest from inflating if
+    the payments don't go through</a>.</p>
+
+    <p>They say there is a 30-days grace period if you miss a payment
+    but the grace period is no excuse to the insecurity.</p>
+  </li>
+
+  <li id="M202011120">
+    <!--#set var="DATE" value='<small class="date-tag">2020-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple has <a
+    href="https://sneak.berlin/20201112/your-computer-isnt-yours";>implemented
+    a malware in its computers that imposes surveillance</a> on users
+    and reports users' computing to Apple.</p>
+
+    <p>The reports are even unencrypted and they've been leaking this
+    data for two years already. This malware is reporting to Apple what
+    user opens what program at what time. It also gives Apple
+    power to sabotage users' computing.</p>
+  </li>
+
+  <li id="M202011060">
+    <!--#set var="DATE" value='<small class="date-tag">2020-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A new app published by Google <a
+    
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/";>lets
+    banks and creditors deactivate people's Android devices</a> if they
+    fail to make payments. If someone's device gets deactivated, it will
+    be limited to basic functionality, such as emergency calling and
+    access to settings.</p>
+  </li>
+
+  <li id="M202010120">
+    <!--#set var="DATE" value='<small class="date-tag">2020-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Samsung is forcing its smartphone users in Hong Kong (and Macau) <a
+    
href="https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-dns-service-upon-hong-kong-wifi-users/";>to
+    use a public DNS in Mainland China</a>, using software update released
+    in September 2020, which causes many unease and privacy concerns.</p>
+  </li>
+
+  <li id="M202008182">
+    <!--#set var="DATE" value='<small class="date-tag">2020-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Oculus headsets <a
+    
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october";>require
+    users to identify themselves to Facebook</a>. This will give Facebook
+    free rein to pervasively snoop on Oculus users.</p>
+  </li>
+
+  <li id="M202007270">
+    <!--#set var="DATE" value='<small class="date-tag">2020-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Mellow sous-vide cooker is
+    tethered to a server. The company suddenly <a
+    
href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/";>
+    turned this tethering into a subscription</a>, forbidding users from
+    taking advantage of the &ldquo;advanced features&rdquo; of the cooker
+    unless they pay a monthly fee.</p>
+  </li>
+
+  <li id="M201912090">
+    <!--#set var="DATE" value='<small class="date-tag">2019-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>iMonsters and Android phones,
+    when used for work, give employers powerful <a
+    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy";>
+    snooping and sabotage capabilities</a> if they install their own
+    software on the device.  Many employers demand to do this.  For the
+    employee, this is simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.</p>
+  </li>
+
+  <li id="M201910071">
+    <!--#set var="DATE" value='<small class="date-tag">2019-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Adobe has <a
+    
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order/";>
+    cancelled the software subscriptions of all users in
+    Venezuela</a>. This demonstrates how a requirement for subscription can be
+    turned into a tool for sabotage.</p>
+  </li>
+
+  <li id="M201909160">
+    <!--#set var="DATE" value='<small class="date-tag">2019-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Tesla users claim Tesla <a
+    
href="https://www.reuters.com/article/us-tesla-battery/tesla-owner-lawsuit-claims-software-update-fraudulently-cut-battery-capacity-idUSKCN1UY2TW";>force-installed
+    software to cut down on battery range</a>, rather than replace the
+    defective batteries. Tesla did this to avoid having to run their
+    warranty.</p>
+
+    <p>This means that proprietary software can potentially be a way to
+    commit perjury with impunity.</p>
+  </li>
+
+  <li id="M201908130">
+    <!--#set var="DATE" value='<small class="date-tag">2019-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>When Apple suspects a user of fraud, it
+    judges the case secretly and presents the verdict
+    as a fait accompli.  The punishment to a user found guilty <a
+    
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/";>is
+    being cut off for life, which more-or-less cripples the user's Apple
+    devices forever</a>.  There is no appeal.</p>
+  </li>
+
+  <li id="M201904041">
+    <!--#set var="DATE" value='<small class="date-tag">2019-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Microsoft has been  <a
+    
href="https://borncity.com/win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/";>
+    force-installing a &ldquo;remediation&rdquo;
+    program</a> on computers running certain
+    versions of Windows 10. Remediation, in Microsoft's view, means <a
+    
href="https://support.microsoft.com/en-us/topic/kb4023057-update-for-windows-10-update-service-components-fccad0ca-dc10-2e46-9ed1-7e392450fb3a";>
+    tampering with users' settings and files</a>, notably to
+    &ldquo;repair&rdquo; any components of the updating system that users
+    may have intentionally disabled, and thus regain full power over
+    them. Microsoft repeatedly pushed faulty versions of this program to
+    users' machines, causing numerous problems, some of which <a
+    
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/";>
+    critical</a>.</p>
+
+    <p>This exemplifies the arrogant and manipulative attitude
+    that proprietary software developers have learned to adopt
+    toward the people they are supposedly serving. Migrate to a <a
+    href="/distros/free-distros.html">free operating system</a> if you
+    can!</p>
+
+    <p>If your employer makes you run Windows, tell the financial
+    department how this wastes your time dealing with endless connections
+    and premature hardware failures.</p>
+  </li>
+
+  <li id="M201904040">
+    <!--#set var="DATE" value='<small class="date-tag">2019-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Ebooks &ldquo;bought&rdquo; from Microsoft's store check that
+    their DRM is valid by connecting to the store every time their
+    &ldquo;owner&rdquo; wants to read them. Microsoft is going to close
+    this store, <a href="https://www.bbc.com/news/technology-47810367";>
+    bricking all DRM'ed ebooks it has ever &ldquo;sold&rdquo;</a>. (The
+    article additionally highlights the pitfalls of DRM.)</p>
+
+    <p>This is another proof that a DRM-encumbered product doesn't belong
+    to the person who bought it. Microsoft said it will refund customers,
+    but this is no excuse for selling them restricted books.</p>
+  </li>
+
+  <li id="M201903250">
+    <!--#set var="DATE" value='<small class="date-tag">2019-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The British supermarket Tesco sold tablets which were tethered
+    to Tesco's server for reinstalling default settings.  Tesco <a
+    
href="https://www.theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix";>
+    turned off the server for old models</a>, so now if you try to
+    reinstall the default settings, it bricks them instead.</p>
+  </li>
+
+  <li id="M201902041">
+    <!--#set var="DATE" value='<small class="date-tag">2019-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Twenty nine &ldquo;beauty camera&rdquo; apps that used to be
+    on Google Play had one or more malicious functionalities, such
+    as stealing users' photos instead of &ldquo;beautifying&rdquo; them, <a
+    
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/";>
+    pushing unwanted and often malicious ads on users, and redirecting them
+    to phishing sites</a> that stole their credentials. Furthermore, the
+    user interface of most of them was designed to make uninstallation
+    difficult.</p>
+
+    <p>Users should of course uninstall these dangerous apps if they
+    haven't yet, but they should also stay away from nonfree apps in
+    general. <em>All</em> nonfree apps carry a potential risk because
+    there is no easy way of knowing what they really do.</p>
+  </li>
+
+  <li id="M201811020">
+    <!--#set var="DATE" value='<small class="date-tag">2018-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Foundry's graphics software <a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/";>
+    reports information to identify who is running it</a>. The result is
+    often a legal threat demanding a lot of money.</p>
+
+    <p>The fact that this is used for repression of forbidden sharing
+    makes it even more vicious.</p>
+
+    <p>This illustrates that making unauthorized copies of nonfree software
+    is not a cure for the injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.</p>
+  </li>
+
+  <li id="M201810240">
+    <!--#set var="DATE" value='<small class="date-tag">2018-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple and Samsung deliberately <a
+    
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones";>degrade
+    the performance of older phones to force users to buy their newer
+    phones</a>.</p>
+  </li>
+
+  <li id="M201810150">
+    <!--#set var="DATE" value='<small class="date-tag">2018-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Printer manufacturers are very innovative&mdash;at blocking the
+    use of independent replacement ink cartridges. Their &ldquo;security
+    upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a
+    
href="https://www.vice.com/en/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates";>
+    HP and Epson have done this</a>.</p>
+  </li>
+
+  <li id="M201807050">
+    <!--#set var="DATE" value='<small class="date-tag">2018-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Jawbone fitness tracker was tethered to a proprietary phone
+    app.  In 2017, the company shut down and made the app stop working. <a
+    
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which";>All
+    the existing trackers stopped working forever</a>.</p>
+
+    <p>The article focuses on a further nasty fillip, that sales of the
+    broken devices continued. But we think that is a secondary issue;
+    it made the nasty consequences extend to some additional people.
+    The fundamental wrong was to design the devices to depend on something
+    else that didn't respect users' freedom.</p>
+  </li>
+
+  <li id="M201806250">
+    <!--#set var="DATE" value='<small class="date-tag">2018-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The game Metal Gear Rising for
+    MacOS was tethered to a server.  The company <a
+    
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm";>
+    shut down the server, and all copies stopped working</a>.</p>
+  </li>
+
+  <li id="M201805310">
+    <!--#set var="DATE" value='<small class="date-tag">2018-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple has <a
+    
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia";>blocked
+    Telegram from upgrading its app for a month</a>.</p>
+
+    <p>This evidently has to do with Russia's command to Apple to block
+    Telegram in Russia.</p>
+
+    <p>The Telegram client is free software on other platforms, but not on
+    iThings. Since <a href="/proprietary/proprietary-jails.html#apple">they
+    are jails</a>, they don't permit any app to be free software.</p>
+  </li>
+
+  <li id="M201711080">
+    <!--#set var="DATE" value='<small class="date-tag">2017-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Logitech will sabotage
+    all Harmony Link household control devices by <a
+    
href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/";>
+    turning off the server through which the products' supposed owners
+    communicate with them</a>.</p>
+
+    <p>The owners suspect this is to pressure them to buy a newer model. If
+    they are wise, they will learn, rather, to distrust any product that
+    requires users to talk with them through some specialized service.</p>
+  </li>
+
+  <li id="M201710044">
+    <!--#set var="DATE" value='<small class="date-tag">2017-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
+    
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html";>
+    changes the file system from HFS+  to APFS</a>, which cannot be
+    accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
+  </li>
+
+  <li id="M201710040.1">
+    <!--#set var="DATE" value='<small class="date-tag">2017-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Canary home surveillance
+    camera has been sabotaged by its manufacturer, <a
+    
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change";>
+    turning off many features unless the user starts paying for a
+    subscription</a>.</p>
+
+    <p>With manufacturers like these, who needs security breakers?</p>
+
+    <p>The purchasers should learn the larger lesson and reject connected
+    appliances with embedded proprietary software. Every such product is
+    a temptation to commit sabotage.</p>
+  </li>
+
+  <li id="M201709090">
+    <!--#set var="DATE" value='<small class="date-tag">2017-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Tesla used software to limit customers to using just <a
+    
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/";>part
+    of the battery of some cars</a>.</p>
+  </li>
+
+  <li id="M201708230">
+    <!--#set var="DATE" value='<small class="date-tag">2017-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Sonos <a
+    
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/";>
+    told all its customers, &ldquo;Agree&rdquo;
+    to snooping or the product will stop working</a>.  <a
+    
href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/";>
+    Another article</a> says they won't forcibly change the software, but
+    people won't be able to get any upgrades and eventually it will
+    stop working.</p>
+  </li>
+
+  <li id="M201706060">
+    <!--#set var="DATE" value='<small class="date-tag">2017-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple will stop <a
+    
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete";>fixing
+    bugs for older model iThings</a>.</p>
+
+    <p>Meanwhile, Apple stops people from fixing problems themselves;
+    that's the nature of proprietary software.</p>
+  </li>
+
+  <li id="M201705180">
+    <!--#set var="DATE" value='<small class="date-tag">2017-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Bird and rabbit pets were implemented for Second
+    Life by a company that tethered their food to a server.  <a
+    
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying";>
+    It shut down the server and the pets more or less died</a>.</p>
+  </li>
+
+  <li id="M201704194">
+    <!--#set var="DATE" value='<small class="date-tag">2017-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Microsoft has made Windows 7
+    and 8 cease to function on certain new computers, <a
+    
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that";>effectively
+    forcing their owners to switch to Windows 10</a>.</p>
+  </li>
+
+  <li id="M201704134">
+    <!--#set var="DATE" value='<small class="date-tag">2017-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Microsoft <a
+    
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/";>
+    has dropped support for Windows 7 and 8 on recent processors</a>
+    in a big hurry.</p>
+
+    <p>It makes no difference what legitimate reasons Microsoft might
+    have for not doing work to support them. If it doesn't want to do
+    this work, it should let users do the work.</p>
+  </li>
+
+  <li id="M201704120">
+    <!--#set var="DATE" value='<small class="date-tag">2017-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Anova sabotaged users' cooking devices
+    with a downgrade that tethered them to a remote server. <a
+    
href="https://web.archive.org/web/20170415145520/https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/";>Unless
+    users create an account on Anova's servers, their cookers won't
+    function</a>.</p>
+  </li>
+
+  <li id="M201704070">
+    <!--#set var="DATE" value='<small class="date-tag">2017-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p id="iphone7-sabotage">The
+    iPhone 7 contains DRM specifically designed to <a
+    
href="https://www.vice.com/en/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock";>
+    brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it</a>.
+    &ldquo;Unauthorized&rdquo; essentially means anyone besides Apple.</p>
+
+    <p><small>(The article uses the term &ldquo;lock&rdquo;
+    to describe the DRM, but we prefer to use the term <a
+    href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
+    handcuffs</a>.)</small></p>
+  </li>
+
+  <li id="M201612200">
+    <!--#set var="DATE" value='<small class="date-tag">2016-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The developer of Ham Radio Deluxe <a
+    
href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml";>sabotaged
+    a customer's installation as punishment for posting a negative
+    review</a>.</p>
+
+    <p>Most proprietary software companies don't use their power so
+    harshly, but it is an injustice that they all <em>have</em> such
+    power.</p>
+  </li>
+
+  <li id="M201609200">
+    <!--#set var="DATE" value='<small class="date-tag">2016-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>HP's firmware downgrade <a
+    
href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update";>imposed
+    DRM on some printers, which now refuse to function with third-party
+    ink cartridges</a>.</p>
+  </li>
+
+  <li id="M201606270">
+    <!--#set var="DATE" value='<small class="date-tag">2016-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p id="windows10-forcing">In its efforts to trick users of Windows
+    7 and 8 into installing all-spying Windows 10 against their
+    will, Microsoft forced their computers to <a
+    
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1";>
+    silently download&hellip; the whole of Windows 10</a>! Apparently,
+    this was done through a <a
+    href="/proprietary/proprietary-back-doors.html#windows-update">
+    universal back door</a>. Not only did the unwanted downloads <a
+    
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/";>
+    jeopardize important operations in regions of the world with poor
+    connectivity</a>, but many of the people who let installation proceed
+    found out that this &ldquo;upgrade&rdquo; was in fact a <a
+    
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
+    downgrade</a>.</p>
+  </li>
+
+  <li id="M201606080">
+    <!--#set var="DATE" value='<small class="date-tag">2016-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple <a
+    
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/";>
+    stops users from fixing the security bugs in Quicktime for Windows</a>,
+    while refusing to fix them itself.</p>
+  </li>
+
+  <li id="M201606010">
+    <!--#set var="DATE" value='<small class="date-tag">2016-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Once Microsoft has tricked a user
+    into accepting installation of Windows 10, <a
+    
href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/";>they
+    find that they are denied the option to cancel or even postpone the
+    imposed date of installation</a>.</p>
+
+    <p>This demonstrates what we've said for years: using proprietary
+    software means letting someone have power over you, and you're going
+    to get screwed sooner or later.</p>
+  </li>
+
+  <li id="M201605040">
+    <!--#set var="DATE" value='<small class="date-tag">2016-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Apple Music client program <a
+    
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/";>scans
+    the user's file system for music files, copies them to an Apple server,
+    and deletes them</a>.</p>
+  </li>
+
+  <li id="M201604050">
+    <!--#set var="DATE" value='<small class="date-tag">2016-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Revolv is a device that managed &ldquo;smart home&rdquo;
+    operations: switching lights, operate motion sensors, regulating
+    temperature, etc.  Its proprietary software depends on a remote server
+    to do these tasks.  On May 15th, 2016, Google/Alphabet <a
+    
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be";>intentionally
+    broke it by shutting down the server</a>.</p>
+
+    <p>If it were free software, users would have the ability to make it
+    work again, differently, and then have a freedom-respecting home
+    instead of a &ldquo;smart&rdquo; home. Don't let proprietary software
+    control your devices and turn them into $300 out-of-warranty
+    bricks. Insist on self-contained computers that run free software!</p>
+  </li>
+
+  <li id="M201602050">
+    <!--#set var="DATE" value='<small class="date-tag">2016-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>iOS version 9 for iThings <a
+    
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair";>sabotages
+    them irreparably if they were repaired by someone other than
+    Apple</a>. Apple eventually backed off from this policy under
+    criticism from the users. However, it has not acknowledged that this
+    was wrong.</p>
+  </li>
+
+  <li id="M201601310">
+    <!--#set var="DATE" value='<small class="date-tag">2016-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>FTDI's proprietary driver
+    for its USB-to-serial chips has been designed to <a
+    
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/";>sabotage
+    alternative compatible chips</a>
+    so that they no longer work. Microsoft is <a
+    
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again";>installing
+    this automatically</a> as an &ldquo;upgrade&rdquo;.</p>
+  </li>
+
+  <li id="M201512140">
+    <!--#set var="DATE" value='<small class="date-tag">2015-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Philips &ldquo;smart&rdquo; lightbulbs had initially been
+    designed to interact with other companies' smart light bulbs, but <a
+    
href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml";>
+    later the company updated the firmware to disallow
+    interoperability</a>.</p>
+
+    <p>If a product is &ldquo;smart&rdquo;, and you didn't build it,
+    it is cleverly serving its manufacturer <em>against you</em>.</p>
+  </li>
+
+  <li id="M201511244">
+    <!--#set var="DATE" value='<small class="date-tag">2015-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Google has long had <a
+    
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted";>a
+    back door to remotely unlock an Android device</a>, unless its disk
+    is encrypted (possible since Android 5.0 Lollipop, but still not
+    quite the default).</p>
+  </li>
+
+  <li id="M201511240">
+    <!--#set var="DATE" value='<small class="date-tag">2015-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Windows 10 &ldquo;upgrades&rdquo; <a
+    
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/";>
+    delete applications</a> without asking permission.</p>
+  </li>
+
+  <li id="M201510020">
+    <!--#set var="DATE" value='<small class="date-tag">2015-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple forced millions of iThings to <a
+    href="https://discussions.apple.com/thread/7256669?tstart=0";>download
+    a system upgrade without asking the users</a>. Apple did not
+    forcibly install the upgrade but the downloading alone caused lots
+    of trouble.</p>
+  </li>
+
+  <li id="M201509220">
+    <!--#set var="DATE" value='<small class="date-tag">2015-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
+    Lenovo stealthily installed crapware and spyware via
+    BIOS</a> on Windows installs.  Note that the specific
+    sabotage method Lenovo used did not affect GNU/Linux; also, a
+    &ldquo;clean&rdquo; Windows install is not really clean since <a
+    href="/proprietary/malware-microsoft.html">Microsoft puts in its
+    own malware</a>.</p>
+  </li>
+
+  <li id="M201504300">
+    <!--#set var="DATE" value='<small class="date-tag">2015-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Vizio <a
+    href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";>
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
+    users watch</a>.  The TVs did not do that when first sold.</p>
+  </li>
+
+  <li id="M201504090">
+    <!--#set var="DATE" value='<small class="date-tag">2015-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Mac OS X had an <a
+    
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
+    intentional local back door for 4 years</a>, which could be exploited
+    by attackers to gain root privileges.</p>
+  </li>
+
+  <li id="M201503260">
+    <!--#set var="DATE" value='<small class="date-tag">2015-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://web.archive.org/web/20191205010621/https://www.computerworld.com/article/3423768/windows-xp--end-of-an-era--end-of-an-error.html";>Microsoft
+    cut off security fixes for Windows XP, except to some big users that
+    pay exorbitantly</a>.</p>
+
+    <p>Microsoft is going to <a
+    
href="https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/";>
+    cut off support for some Internet Explorer versions</a> in the same
+    way.</p>
+
+    <p>A person or company has the right to cease to work on a particular
+    program; the wrong here is Microsoft does this after having made the
+    users dependent on Microsoft, because they are not free to ask anyone
+    else to work on the program for them.</p>
+  </li>
+
+  <li id="M201503210">
+    <!--#set var="DATE" value='<small class="date-tag">2015-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Amazon <a
+    
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml";>
+    downgraded the software in users' Swindles</a> so that those already
+    rooted would cease to function at all.</p>
+  </li>
+
+  <li id="M201412040">
+    <!--#set var="DATE" value='<small class="date-tag">2014-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple <a
+    
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs";>
+    deleted from iPods the music that users had got from internet music
+    stores that competed with iTunes</a>.</p>
+  </li>
+
+  <li id="M201410130">
+    <!--#set var="DATE" value='<small class="date-tag">2014-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.eff.org/deeplinks/2014/10/nintendo-updates-take-wii-u-hostage-until-you-agree-new-legal-terms";>Nintendo
+    remotely sabotaged all Wiis, making them refuse to work unless the
+    user agrees to a new EULA</a>.</p>
+
+    <p>We can be quite sure this EULA is unjust because injustice is the
+    only motive for imposing an EULA.</p>
+  </li>
+
+  <li id="M201405200.1">
+    <!--#set var="DATE" value='<small class="date-tag">2014-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>LG <a
+    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>
+    disabled network features</a> on <em>previously purchased</em>
+    &ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG begin
+    to snoop on them and distribute their personal data.</p>
+  </li>
+
+  <li id="M201401190">
+    <!--#set var="DATE" value='<small class="date-tag">2014-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Some proprietary <a
+    
href="http://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases";>
+    games lure children to spend their parents' money</a>.</p>
+  </li>
+
+  <li id="M201309054">
+    <!--#set var="DATE" value='<small class="date-tag">2013-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>The
+    NSA has put back doors into nonfree encryption software</a>. We don't
+    know which ones they are, but we can be sure they include some widely
+    used systems.  This reinforces the point that you can never trust
+    the security of nonfree software.</p>
+  </li>
+
+  <li id="M201306220">
+    <!--#set var="DATE" value='<small class="date-tag">2013-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>Microsoft
+    informs the NSA of bugs in Windows before fixing them</a>.</p>
+  </li>
+
+  <li id="M201305060">
+    <!--#set var="DATE" value='<small class="date-tag">2013-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Adobe applications have time bombs: they <a
+    
href="http://techcrunch.com/2013/05/06/adobe-goes-all-in-with-subscription-based-creative-cloud-will-stop-selling-regular-cs-licenses-shrink-wrapped-boxes/";>
+    stop working after a certain time</a>, after which the user
+    must pay to extend the time.</p>
+
+    <p>Once there was a problem with the servers
+    that these programs use to check who has paid, and <a
+    
href="https://web.archive.org/web/20150120010845/http://www.macuser.co.uk/9015-adobe-creative-cloud-outage-leaves-adobe-users-locked-out";>
+    the applications refused to work for anyone</a>.</p>
+  </li>
+
+  <li id="M201301280">
+    <!--#set var="DATE" value='<small class="date-tag">2013-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Oracle's nonfree Java plug-in for browsers <a
+    
href="http://www.zdnet.com/article/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates/";>sneakily
+    installs other annoying proprietary software</a>.</p>
+
+    <p>That article disregards all other bad things
+    about proprietary software.  For instance, it regards
+    the inclusion of proprietary Flash Player (which has a <a
+    
href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/";>surveillance
+    feature</a> and DRM) in Chrome as a good thing.  Chrome is a
+    proprietary browser with a universal back door.</p>
+
+    <p>We don't agree with the article's views on those issues, but we
+    present it as a factual reference.</p>
+
+    <p>In 2014, <a
+    
href="https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html";>
+    Oracle insisted on continuing this practice</a>.</p>
+  </li>
+
+  <li id="M201003300">
+    <!--#set var="DATE" value='<small class="date-tag">2010-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Sony <a
+    
href="https://www.eff.org/deeplinks/2010/03/sony-steals-feature-from-your-playstation-3";>sabotaged
+    the Playstation 3</a> with a firmware downgrade that removed the
+    feature that allowed users to run GNU/Linux on it.</p>
+
+    <p>Sony subsequently sent police after Geohot, after he cracked the
+    code that blocked users from changing the firmware, and we responded by
+    calling for a <a href="http://boycottsony.org";>boycott of Sony</a>.</p>
+
+    <p>In a court settlement Sony is <a
+    
href="http://arstechnica.com/tech-policy/2016/06/if-you-used-to-run-linux-on-your-ps3-you-could-get-55-from-sony/";>
+    now paying for the sabotage</a>.</p>
+  </li>
+
+  <li id="M200709270">
+    <!--#set var="DATE" value='<small class="date-tag">2007-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.computerworld.com/article/2541250/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html";>
+    An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
+    unlocked</a>.  The &ldquo;upgrade&rdquo; also deactivated applications
+    not approved by <a href="/proprietary/proprietary-jails.html">Apple
+    censorship</a>.  All this was apparently intentional.</p>
+  </li>
+</ul>
+</div>
+
+</div>
+<!--#include virtual="/proprietary/proprietary-menu.html" -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Please send general FSF &amp; GNU inquiries to
+<a href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.  Broken links and other corrections or suggestions can be sent
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and contributing translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright &copy; 2013, 2015-2021 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/";>Creative
+Commons Attribution 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2021/06/26 14:00:01 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: po/proprietary-subscriptions.pt-br-en.html
===================================================================
RCS file: po/proprietary-subscriptions.pt-br-en.html
diff -N po/proprietary-subscriptions.pt-br-en.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-subscriptions.pt-br-en.html  26 Jun 2021 14:00:01 -0000      
1.1
@@ -0,0 +1,240 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+<title>Proprietary Subscriptions
+- GNU Project - Free Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+ <!--#include virtual="/proprietary/po/proprietary-subscriptions.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /></a>&nbsp;/
+ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/
+ By type&nbsp;/
+</p>
+</div>
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Proprietary Subscriptions</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.</p>
+
+<p>This typically takes the form of malicious functionalities.</p>
+<hr class="full-width" />
+</div>
+
+<div class="article">
+<p>It sounds simple to say that a certain program &ldquo;requires a
+subscription.&rdquo;  What that means concretely is that it contains a
+time bomb, so that it will refuse to operate after that date.  Or else
+it is <a href="/proprietary/proprietary-tethers.html#about-page">tethered
+to a server</a>, and that server checks the date.  Either one is a
+malicious functionality.</p>
+
+<p>Examples of software subscriptions that harmed users directly are
+given below.</p>
+
+<div class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.</p>
+</div>
+
+<div class="column-limit" id="proprietary-subscriptions"></div>
+
+<ul class="blurbs">
+  <li id="M202008180">
+    <!--#set var="DATE" value='<small class="date-tag">2020-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple can remotely <a
+    
href="https://www.theguardian.com/games/2020/aug/18/apple-sets-deadline-in-feud-with-fortnite-maker-epic-games";>
+    cut off any developer's access to the tools for developing software</a>
+    for iOS or MacOS.</p>
+
+    <p>Epic (Apple's target in this example)
+    makes nonfree games which have their own <a
+    
href="https://ekgaming.com/2019/03/17/is-the-epic-games-store-spying-on-your-computer/";>
+    malicious features</a>, but that doesn't make it acceptable for Apple
+    to have this sort of power.</p>
+  </li>
+
+  <li id="M202007020">
+    <!--#set var="DATE" value='<small class="date-tag">2020-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>BMW is trying to <a
+    
href="https://www.theverge.com/2020/7/2/21311332/bmw-in-car-purchase-heated-seats-software-over-the-air-updates";>lock
+    certain features of its cars, and force people to pay to use part of
+    the car they already bought</a>. This is done through forced update
+    of the car software via a radio-operated back door.</p>
+  </li>
+
+  <li id="M201910071">
+    <!--#set var="DATE" value='<small class="date-tag">2019-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Adobe has <a
+    
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order/";>
+    cancelled the software subscriptions of all users in
+    Venezuela</a>. This demonstrates how a requirement for subscription can be
+    turned into a tool for sabotage.</p>
+  </li>
+
+  <li id="M201902080">
+    <!--#set var="DATE" value='<small class="date-tag">2019-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The HP <a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html";>
+    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
+    communicates with HP servers</a> to make sure the user is still
+    paying for the subscription, and hasn't printed more pages than were
+    paid for.</p>
+
+    <p>Even though the ink subscription program may be cheaper in some
+    specific cases, it spies on users, and involves totally unacceptable
+    restrictions in the use of ink cartridges that would otherwise be in
+    working order.</p>
+  </li>
+
+  <li id="M201711010">
+    <!--#set var="DATE" value='<small class="date-tag">2017-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Sony has brought back its robotic pet Aibo, this time <a
+    
href="https://www.vice.com/en/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet";>
+    with a universal back door, and tethered to a server that requires
+    a subscription</a>.</p>
+  </li>
+
+  <li id="M201710040.1">
+    <!--#set var="DATE" value='<small class="date-tag">2017-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Canary home surveillance
+    camera has been sabotaged by its manufacturer, <a
+    
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change";>
+    turning off many features unless the user starts paying for a
+    subscription</a>.</p>
+
+    <p>With manufacturers like these, who needs security breakers?</p>
+
+    <p>The purchasers should learn the larger lesson and reject connected
+    appliances with embedded proprietary software. Every such product is
+    a temptation to commit sabotage.</p>
+  </li>
+
+  <li id="M201507150">
+    <!--#set var="DATE" value='<small class="date-tag">2015-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Microsoft Office forces users <a
+    
href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>to
+    subscribe to Office 365 to be able to create/edit documents</a>.</p>
+  </li>
+
+  <li id="M201402200">
+    <!--#set var="DATE" value='<small class="date-tag">2014-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.scientificamerican.com/article/adobe-software-subscription-model-means-you-cant-own-your-software/";>
+    Adobe tools require a subscription</a>.  Adobe also tried to <a
+    
href="http://chocolateandvodka.com/2014/02/20/adobe-creative-cloud-subscription-warning/";>
+    rip people off by making the subscriptions annual</a>, but that is
+    a secondary issue compared with the basic wrong of the time bomb.
+    When a program proprietary, and even malware, don't get distracted
+    by the secondary issues like price.</p>
+
+    <p><small>(Please don't repeat the marketing term &ldquo;Creative
+    Cloud&rdquo; except to express revulsion for it.  The <a
+    href="/philosophy/words-to-avoid.html#CloudComputing"> term
+    &ldquo;cloud&rdquo; is designed to cloud users' minds</a>.)</small></p>
+  </li>
+</ul>
+</div>
+
+</div>
+<!--#include virtual="/proprietary/proprietary-menu.html" -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Please send general FSF &amp; GNU inquiries to
+<a href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.  Broken links and other corrections or suggestions can be sent
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and contributing translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright &copy; 2016-2021 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/";>Creative
+Commons Attribution 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2021/06/26 14:00:01 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: po/proprietary-surveillance.pt-br-en.html
===================================================================
RCS file: po/proprietary-surveillance.pt-br-en.html
diff -N po/proprietary-surveillance.pt-br-en.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-surveillance.pt-br-en.html   26 Jun 2021 14:00:01 -0000      
1.1
@@ -0,0 +1,3505 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.96 -->
+<!--#set var="DISABLE_TOP_ADDENDUM" value="yes" -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit <ul class="blurbs">!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+<title>Proprietary Surveillance - GNU Project - Free Software 
Foundation</title>
+<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
+<style type="text/css" media="screen,print"><!--
+.pict {
+    width: 18em;
+    margin: 2em auto;
+}
+.pict p {
+    font-size: .9em;
+}
+@media (min-width: 46em) {
+    .pict {
+        width: 18em;
+        float: right;
+        margin: .3em 0 1em 2em;
+    }
+}
+--></style>
+<!-- GNUN: localize URL /graphics/dog.small.jpg -->
+<!--#include virtual="/proprietary/po/proprietary-surveillance.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<div class="nav">
+<a id="side-menu-button" class="switch" href="#navlinks">
+ <img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" />
+</a>
+
+<p class="breadcrumb">
+ <a href="/"><img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /></a>&nbsp;/
+ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/
+ By type&nbsp;/
+</p>
+</div>
+<!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/top-addendum.html" -->
+<div style="clear: both"></div>
+<div id="last-div" class="reduced-width">
+<h2>Proprietary Surveillance</h2>
+
+<div class="infobox">
+<hr class="full-width" />
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.</p>
+
+<p>This typically takes the form of malicious functionalities.</p>
+<hr class="full-width" />
+</div>
+
+<div id="surveillance" class="pict">
+<a href="/graphics/dog.html">
+<img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the 
three ads that popped up on his computer screen..." /></a>
+<p>&ldquo;How did they find out I'm a dog?&rdquo;</p>
+</div>
+
+<div class="article">
+<p>A common malicious functionality is to snoop on the user.  This page
+records <strong>clearly established cases of proprietary software that
+spies on or tracks users</strong>.  Manufacturers even refuse
+to <a 
href="https://techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/";>say
+whether they snoop on users for the state</a>.</p>
+
+<p>All appliances and applications that are tethered to a specific
+server are snoopers by nature.  We do not list them here because they
+have their own page: <a
+href="/proprietary/proprietary-tethers.html#about-page">Proprietary
+    Tethers</a>.</p>
+
+<p>There is a similar site named <a 
href="https://spyware.neocities.org";>Spyware Watchdog</a> that classifies 
spyware programs, so that users can be more aware that they are installing 
spyware.</p>
+
+<div class="important" style="clear: both">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.</p>
+</div>
+
+<div id="TOC" class="toc-inline">
+    <h3 id="TableOfContents">Table of Contents</h3>
+    <h4><a href="#Introduction">Introduction</a></h4>
+    <h4><a href="#OSSpyware">Spyware in Laptops and Desktops</a></h4>
+    <ul>
+      <li><a href="#SpywareInWindows">Windows</a></li>
+      <li><a href="#SpywareInMacOS">MacOS</a></li>
+      <li><a href="#SpywareInBIOS">BIOS</a></li>
+    </ul>
+    <h4><a href="#SpywareOnMobiles">Spyware on Mobiles</a></h4>
+    <ul>
+      <li><a href="#SpywareInTelephones">All &ldquo;Smart&rdquo; 
Phones</a></li>
+      <li><a href="#SpywareIniThings">iThings</a></li>
+      <li><a href="#SpywareInAndroid">Android Telephones</a></li>
+      <li><a href="#SpywareInElectronicReaders">E-Readers</a></li>
+     </ul>
+    <h4><a href="#SpywareInApplications">Spyware in Applications</a></h4>
+    <ul>
+      <li><a href="#SpywareInDesktopApps">Desktop Apps</a></li>
+      <li><a href="#SpywareInMobileApps">Mobile Apps</a></li>
+      <li><a href="#SpywareInSkype">Skype</a></li>
+      <li><a href="#SpywareInGames">Games</a></li>
+    </ul>
+    <h4><a href="#SpywareInEquipment">Spyware in Connected Equipment</a></h4>
+    <ul>
+      <li><a href="#SpywareInTVSets">TV Sets</a></li>
+      <li><a href="#SpywareInCameras">Cameras</a></li>
+      <li><a href="#SpywareInToys">Toys</a></li>
+      <li><a href="#SpywareInDrones">Drones</a></li>
+      <li><a href="#SpywareAtHome">Other Appliances</a></li>
+      <li><a href="#SpywareOnWearables">Wearables</a>
+        <ul>
+          <li><a href="#SpywareOnSmartWatches">&ldquo;Smart&rdquo; 
Watches</a></li>
+        </ul>
+      </li>
+      <li><a href="#SpywareInVehicles">Vehicles</a></li>
+      <li><a href="#SpywareInVR">Virtual Reality</a></li>
+    </ul>
+    <h4><a href="#SpywareOnTheWeb">Spyware on the Web</a></h4>
+    <ul>
+      <li><a href="#SpywareInChrome">Chrome</a></li>
+      <li><a href="#SpywareInJavaScript">JavaScript</a></li>
+      <li><a href="#SpywareInFlash">Flash</a></li>
+    </ul>
+    <h4><a href="#SpywareInNetworks">Spyware in Networks</a></h4>
+</div>
+
+<div class="big-section">
+  <h3 id="Introduction">Introduction</h3>
+</div>
+<div style="clear: left;"></div>
+
+<p>For decades, the Free Software movement has been denouncing the
+abusive surveillance machine of
+<a href="/proprietary/proprietary.html">proprietary software</a>
+companies such as
+<a href="/proprietary/malware-microsoft.html">Microsoft</a>
+and
+<a href="/proprietary/malware-apple.html">Apple</a>.
+
+In the recent years, this tendency to watch people has spread across
+industries, not only in the software business, but also in the
+hardware.  Moreover, it also spread dramatically away from the
+keyboard, in the mobile computing industry, in the office, at home, in
+transportation systems, and in the classroom.</p>
+
+<h4 id="AggregateInfoCollection">Aggregate or anonymized data</h4>
+
+<p>Many companies, in their privacy policy, have a clause that claims
+they share aggregate, non-personally identifiable information with
+third parties/partners. Such claims are worthless, for several
+reasons:</p>
+
+<ul>
+    <li>They could change the policy at any time.</li>
+    <li>They can twist the words by distributing an &ldquo;aggregate&rdquo; of
+        &ldquo;anonymized&rdquo; data which can be reidentified and attributed 
to
+        individuals.</li>
+    <li>The raw data they don't normally distribute can be taken by
+        data breaches.</li>
+    <li>The raw data they don't normally distribute can be taken by
+        subpoena.</li>
+</ul>
+
+<p>Therefore, we must not be distracted by companies' statements of
+what they will <em>do</em> with the data they collect. The wrong is that
+they collect it at all.</p>
+
+<h4 id="LatestAdditions">Latest additions</h4>
+
+<p>Entries in each category are in reverse chronological order, based
+on the dates of publication of linked articles.
+The latest additions are listed on the <a
+href="/proprietary/proprietary.html#latest">main page</a> of the
+Malware section.</p>
+
+
+
+<div class="big-section">
+  <h3 id="OSSpyware">Spyware in Laptops and Desktops</h3>
+  <span class="anchor-reference-id">(<a 
href="#OSSpyware">#OSSpyware</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+  <h4 id="SpywareInWindows">Windows</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInWindows">#SpywareInWindows</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M201912160">
+    <!--#set var="DATE" value='<small class="date-tag">2019-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Microsoft is <a
+    
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/";>tricking
+    users to create an account on their network</a> to be able to install
+    and use the Windows operating system, which is malware. The account can
+    be used for surveillance and/or violating people's rights in many ways,
+    such as turning their purchased software to a subscription product.</p>
+  </li>
+
+  <li id="M201712110">
+    <!--#set var="DATE" value='<small class="date-tag">2017-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>HP's proprietary operating system <a
+    href="http://www.bbc.com/news/technology-42309371";>includes a
+    proprietary keyboard driver with a key logger in it</a>.</p>
+  </li>
+
+  <li id="M201710134">
+    <!--#set var="DATE" value='<small class="date-tag">2017-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Windows 10 telemetry program sends information to Microsoft about
+    the user's computer and their use of the computer.</p>
+
+    <p>Furthermore, for users who installed the
+    fourth stable build of Windows 10, called the
+    &ldquo;Creators Update,&rdquo; Windows maximized the surveillance <a
+    
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law";>
+    by force setting the telemetry mode to &ldquo;Full&rdquo;</a>.</p>
+
+    <p>The <a
+    
href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level";>
+    &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows
+    engineers to access, among other things, registry keys <a
+    
href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)">
+    which can contain sensitive information like administrator's login
+    password</a>.</p>
+  </li>
+
+  <li id="M201702020">
+    <!--#set var="DATE" value='<small class="date-tag">2017-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>DRM-restricted files can be used to <a
+    
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users";>
+    identify people browsing through Tor</a>. The vulnerability exists
+    only if you use Windows.</p>
+  </li>
+
+  <li id="M201611240">
+    <!--#set var="DATE" value='<small class="date-tag">2016-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>By default, Windows 10 <a
+    
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties";>sends
+    debugging information to Microsoft, including core dumps</a>. Microsoft
+    now distributes them to another company.</p>
+  </li>
+
+  <li id="M201608170.1">
+    <!--#set var="DATE" value='<small class="date-tag">2016-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>In order to increase Windows 10's install base, Microsoft <a 
class="not-a-duplicate" 
+    
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
+    blatantly disregards user choice and privacy</a>.</p>
+  </li>
+
+  <li id="M201603170">
+    <!--#set var="DATE" value='<small class="date-tag">2016-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security";>
+    Windows 10 comes with 13 screens of snooping options</a>, all enabled
+    by default, and turning them off would be daunting to most users.</p>
+  </li>
+
+  <li id="M201601050">
+    <!--#set var="DATE" value='<small class="date-tag">2016-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>It appears <a
+    
href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/";>
+    Windows 10 sends data to Microsoft about what applications are
+    running</a>.</p>
+  </li>
+
+  <li id="M201512280">
+    <!--#set var="DATE" value='<small class="date-tag">2015-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Microsoft has <a
+    
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
+    backdoored its disk encryption</a>.</p>
+  </li>
+
+  <li id="M201511264">
+    <!--#set var="DATE" value='<small class="date-tag">2015-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A downgrade to Windows 10 deleted surveillance-detection
+    applications.  Then another downgrade inserted a general spying
+    program.  Users noticed this and complained, so Microsoft renamed it <a
+    
href="https://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/";>
+    to give users the impression it was gone</a>.</p>
+
+    <p>To use proprietary software is to invite such treatment.</p>
+  </li>
+
+  <li id="M201508180">
+    <!--#set var="DATE" value='<small class="date-tag">2015-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://web.archive.org/web/20150905163414/http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping";>
+    Intel devices will be able to listen for speech all the time, even
+    when &ldquo;off.&rdquo;</a></p>
+  </li>
+
+  <li id="M201508130">
+    <!--#set var="DATE" value='<small class="date-tag">2015-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/";>
+    Windows 10 sends identifiable information to Microsoft</a>, even if
+    a user turns off its Bing search and Cortana features, and activates
+    the privacy-protection settings.</p>
+  </li>
+
+  <li id="M201507300">
+    <!--#set var="DATE" value='<small class="date-tag">2015-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Windows 10 <a
+    
href="https://web.archive.org/web/20180923125732/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/";>
+    ships with default settings that show no regard for the privacy of
+    its users</a>, giving Microsoft the &ldquo;right&rdquo; to snoop on
+    the users' files, text input, voice input, location info, contacts,
+    calendar records and web browsing history, as well as automatically
+    connecting the machines to open hotspots and showing targeted ads.</p>
+
+    <p>We can suppose Microsoft looks at users' files for the US government
+    on demand, though the &ldquo;privacy policy&rdquo; does not explicitly
+    say so. Will it look at users' files for the Chinese government
+    on demand?</p>
+  </li>
+
+  <li id="M201506170">
+    <!--#set var="DATE" value='<small class="date-tag">2015-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Microsoft uses Windows 10's &ldquo;privacy policy&rdquo;
+    to overtly impose a &ldquo;right&rdquo; to look at
+    users' files at any time. Windows 10 full disk encryption <a
+    
href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/";>
+    gives Microsoft a key</a>.</p>
+
+    <p>Thus, Windows is overt malware in regard to surveillance, as in
+    other issues.</p>
+
+    <p>The unique &ldquo;advertising ID&rdquo; for each user enables
+    other companies to track the browsing of each specific user.</p>
+
+    <p>It's as if Microsoft has deliberately chosen to make Windows 10
+    maximally evil on every dimension; to make a grab for total power
+    over anyone that doesn't drop Windows now.</p>
+  </li>
+
+  <li id="M201410040">
+    <!--#set var="DATE" value='<small class="date-tag">2014-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>It only gets worse with time.  <a
+    
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html";>
+    Windows 10 requires users to give permission for total snooping</a>,
+    including their files, their commands, their text input, and their
+    voice input.</p>
+  </li>
+
+  <li id="M201401150">
+    <!--#set var="DATE" value='<small class="date-tag">2014-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p id="baidu-ime"><a
+    
href="https://www.techrepublic.com/blog/asian-technology/japanese-government-warns-baidu-ime-is-spying-on-users/";>
+    Baidu's Japanese-input and Chinese-input apps spy on users</a>.</p>
+  </li>
+
+  <li id="M201307080">
+    <!--#set var="DATE" value='<small class="date-tag">2013-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Spyware in older versions of Windows: <a
+    href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
+    Windows Update snoops on the user</a>. <a
+    
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>
+    Windows 8.1 snoops on local searches</a>. And there's a <a
+    href="http://www.marketoracle.co.uk/Article40836.html";> secret NSA
+    key in Windows</a>, whose functions we don't know.</p>
+  </li>
+</ul>
+
+
+<p>Microsoft's snooping on users did not start with Windows 10.
+   There's a lot more <a href="/proprietary/malware-microsoft.html">
+   Microsoft malware</a>.</p>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInMacOS">MacOS</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInMacOS">#SpywareInMacOS</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M202011120">
+    <!--#set var="DATE" value='<small class="date-tag">2020-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple has <a
+    href="https://sneak.berlin/20201112/your-computer-isnt-yours";>implemented
+    a malware in its computers that imposes surveillance</a> on users
+    and reports users' computing to Apple.</p>
+
+    <p>The reports are even unencrypted and they've been leaking this
+    data for two years already. This malware is reporting to Apple what
+    user opens what program at what time. It also gives Apple
+    power to sabotage users' computing.</p>
+  </li>
+
+  <li id="M201809070">
+    <!--#set var="DATE" value='<small class="date-tag">2018-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Adware Doctor, an ad blocker for MacOS, <a
+    
href="https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history";>reports
+    the user's browsing history</a>.</p>
+  </li>
+
+  <li id="M201411040">
+    <!--#set var="DATE" value='<small class="date-tag">2014-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple has made various <a
+    
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud";>
+    MacOS programs send files to Apple servers without asking
+    permission</a>.  This exposes the files to Big Brother and perhaps
+    to other snoops.</p>
+
+    <p>It also demonstrates how you can't trust proprietary software,
+    because even if today's version doesn't have a malicious functionality,
+    tomorrow's version might add it. The developer won't remove the
+    malfeature unless many users push back hard, and the users can't
+    remove it themselves.</p>
+  </li>
+
+  <li id="M201410300">
+    <!--#set var="DATE" value='<small class="date-tag">2014-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p> MacOS automatically <a
+    
href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/";>
+    sends to Apple servers unsaved documents being edited</a>. The
+    things you have not decided to save are <a
+    
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/";>
+    even more sensitive</a> than the things you have stored in files.</p>
+  </li>
+
+  <li id="M201410220">
+    <!--#set var="DATE" value='<small class="date-tag">2014-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple admits the <a
+    
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/";>
+    spying in a search facility</a>, but there's a lot <a
+    href="https://github.com/fix-macosx/yosemite-phone-home";> more snooping
+    that Apple has not talked about</a>.</p>
+  </li>
+
+  <li id="M201410200">
+    <!--#set var="DATE" value='<small class="date-tag">2014-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Various operations in <a
+    
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540";>
+    the latest MacOS send reports to Apple</a> servers.</p>
+  </li>
+
+  <li id="M201401100.1">
+    <!--#set var="DATE" value='<small class="date-tag">2014-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
+    Spotlight search</a> sends users' search terms to Apple.</p>
+  </li>
+</ul>
+
+
+<p>There's a lot more <a href="#SpywareIniThings">iThing spyware</a>, and
+<a href="/proprietary/malware-apple.html">Apple malware</a>.</p>
+
+
+<div class="big-subsection">
+  <span id="SpywareAtLowLevel"></span>
+  <h4 id="SpywareInBIOS">BIOS</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M201509220">
+    <!--#set var="DATE" value='<small class="date-tag">2015-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
+    Lenovo stealthily installed crapware and spyware via
+    BIOS</a> on Windows installs.  Note that the specific
+    sabotage method Lenovo used did not affect GNU/Linux; also, a
+    &ldquo;clean&rdquo; Windows install is not really clean since <a
+    href="/proprietary/malware-microsoft.html">Microsoft puts in its
+    own malware</a>.</p>
+  </li>
+</ul>
+
+
+
+<div class="big-section">
+  <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+  <span class="anchor-reference-id">(<a 
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+  <h4 id="SpywareInTelephones">All &ldquo;Smart&rdquo; Phones</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M202106170">
+    <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-health-apps-harvest-user-data-global-study-shows";>Almost
+    all proprietary health apps harvest users' data</a>, including
+    sensitive health information, tracking identifiers, and cookies to
+    track user activities. Some of these applications are tracking users
+    across different platforms.</p>
+  </li>
+
+  <li id="M202102200">
+    <!--#set var="DATE" value='<small class="date-tag">2021-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The proprietary program Clubhouse
+    is malware and a privacy disaster. Clubhouse <a
+    
href="https://www.theguardian.com/commentisfree/2021/feb/20/why-hot-new-social-app-clubhouse-spells-nothing-but-trouble";>collects
+    people's personal data such as recordings of people's
+    conversations</a>, and, as a secondary problem, does not encrypt them,
+    which shows a bad security part of the issue.</p>
+
+    <p>A user's unique Clubhouse ID number and chatroom ID are transmitted
+    in plaintext, and Agora (the company behind the app) would likely
+    have access to users' raw audio, potentially providing access to
+    the Chinese government.</p>
+
+    <p>Even with good security of data transmission, collecting personal
+    data of people is wrong and a violation of people's privacy rights.</p>
+  </li>
+
+  <li id="M202101080">
+    <!--#set var="DATE" value='<small class="date-tag">2021-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a
+    
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/";>forcing
+    its users to hand over sensitive personal data</a> to its parent
+    company. This increases Facebook's power over users, and further
+    jeopardizes people's privacy and security.</p>
+
+    <p>Instead of WhatsApp you can use <a
+    href="https://directory.fsf.org/wiki/Jami";>GNU Jami</a>, which is
+    free software and will not collect your data.</p>
+  </li>
+
+  <li id="M202006260">
+    <!--#set var="DATE" value='<small class="date-tag">2020-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Most apps are malware, but
+    Trump's campaign app, like Modi's campaign app, is <a
+    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/";>
+    especially nasty malware, helping companies snoop on users as well
+    as snooping on them itself</a>.</p>
+
+    <p>The article says that Biden's app has a less manipulative overall
+    approach, but that does not tell us whether it has functionalities we
+    consider malicious, such as sending data the user has not explicitly
+    asked to send.</p>
+  </li>
+
+  <li id="M201809121">
+    <!--#set var="DATE" value='<small class="date-tag">2018-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Tiny Lab Productions, along with online ad businesses run
+    by Google, Twitter and three other companies are facing a lawsuit <a
+    
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html";>for
+    violating people's privacy by collecting their data from mobile games
+    and handing over these data to other companies/advertisers</a>.</p>
+  </li>
+
+  <li id="M201601110">
+    <!--#set var="DATE" value='<small class="date-tag">2016-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The natural extension of monitoring
+    people through &ldquo;their&rdquo; phones is <a
+    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html";>
+    proprietary software to make sure they can't &ldquo;fool&rdquo;
+    the monitoring</a>.</p>
+  </li>
+
+  <li id="M201510050">
+    <!--#set var="DATE" value='<small class="date-tag">2015-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>According to Edward Snowden, <a
+    href="http://www.bbc.com/news/uk-34444233";>agencies can take over
+    smartphones</a> by sending hidden text messages which enable
+    them to turn the phones on and off, listen to the microphone,
+    retrieve geo-location data from the GPS, take photographs, read
+    text messages, read call, location and web browsing history, and
+    read the contact list. This malware is designed to disguise itself
+    from investigation.</p>
+  </li>
+
+  <li id="M201311120">
+    <!--#set var="DATE" value='<small class="date-tag">2013-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html";>
+    The NSA can tap data in smart phones, including iPhones,
+    Android, and BlackBerry</a>.  While there is not much
+    detail here, it seems that this does not operate via
+    the universal back door that we know nearly all portable
+    phones have. It may involve exploiting various bugs.  There are <a
+    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>
+    lots of bugs in the phones' radio software</a>.</p>
+  </li>
+
+  <li id="M201307000">
+    <!--#set var="DATE" value='<small class="date-tag">2013-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Portable phones with GPS <a
+    
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers";>
+    will send their GPS location on remote command, and users cannot stop
+    them</a>. (The US says it will eventually require all new portable phones
+    to have GPS.)</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareIniThings">iThings</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M202105240">
+    <!--#set var="DATE" value='<small class="date-tag">2021-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/";>Apple
+    is moving its Chinese customers' iCloud data to a datacenter controlled
+    by the Chinese government</a>. Apple is already storing the encryption
+    keys on these servers, obeying Chinese authority, making all Chinese
+    user data available to the government.</p>
+  </li>
+
+  <li id="M202009183">
+    <!--#set var="DATE" value='<small class="date-tag">2020-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Facebook <a
+    
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html";>snoops
+    on Instagram</a> users by surreptitously turning on the device's
+    camera.</p>
+  </li>
+
+  <li id="M202004200">
+    <!--#set var="DATE" value='<small class="date-tag">2020-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple whistleblower Thomas Le Bonniec reports that Apple
+    made a practice of surreptitiously activating the Siri software to <a
+    
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf";>
+    record users' conversations when they had not activated Siri</a>.
+    This was not just occasional, it was systematic practice.</p>
+
+    <p>His job was to listen to these recordings, in a group that made
+    transcripts of them. He does not believes that Apple has ceased this
+    practice.</p>
+
+    <p>The only reliable way to prevent this is, for the program that
+    controls access to the microphone to decide when the user has
+    &ldquo;activated&rdquo; any service, to be free software, and the
+    operating system under it free as well. This way, users could make
+    sure Apple can't listen to them.</p>
+  </li>
+
+  <li id="M201910131">
+    <!--#set var="DATE" value='<small class="date-tag">2019-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Safari occasionally <a
+    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/";>
+    sends browsing data from Apple devices in China to the Tencent Safe
+    Browsing service</a>, to check URLs that possibly correspond to
+    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
+    with the Chinese government, its Safe Browsing black list most certainly
+    contains the websites of political opponents. By linking the requests
+    originating from single IP addresses, the government can identify
+    dissenters in China and Hong Kong, thus endangering their lives.</p>
+  </li>
+
+  <li id="M201905280">
+    <!--#set var="DATE" value='<small class="date-tag">2019-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>In spite of Apple's supposed commitment to
+    privacy, iPhone apps contain trackers that are busy at night <a
+    
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html";>
+    sending users' personal information to third parties</a>.</p>
+
+    <p>The article mentions specific examples: Microsoft OneDrive,
+    Intuit's Mint, Nike, Spotify, The Washington Post, The Weather
+    Channel (owned by IBM), the crime-alert service Citizen, Yelp
+    and DoorDash. But it is likely that most nonfree apps contain
+    trackers. Some of these send personally identifying data such as phone
+    fingerprint, exact location, email address, phone number or even
+    delivery address (in the case of DoorDash). Once this information
+    is collected by the company, there is no telling what it will be
+    used for.</p>
+  </li>
+
+  <li id="M201711250">
+    <!--#set var="DATE" value='<small class="date-tag">2017-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The DMCA and the EU Copyright Directive make it <a
+    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html";>
+    illegal to study how iOS cr&hellip;apps spy on users</a>, because
+    this would require circumventing the iOS DRM.</p>
+  </li>
+
+  <li id="M201709210">
+    <!--#set var="DATE" value='<small class="date-tag">2017-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>In the latest iThings system,
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way <a
+    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off";>
+    doesn't really turn them off</a>.  A more advanced way really does turn
+    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
+    know you want to be spied on&rdquo;.</p>
+  </li>
+
+  <li id="M201702150">
+    <!--#set var="DATE" value='<small class="date-tag">2017-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple proposes <a
+    
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen";>a
+    fingerprint-scanning touch screen</a>&mdash;which would mean no way
+    to use it without having your fingerprints taken. Users would have
+    no way to tell whether the phone is snooping on them.</p>
+  </li>
+
+  <li id="M201611170">
+    <!--#set var="DATE" value='<small class="date-tag">2016-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>iPhones <a
+    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/";>send
+    lots of personal data to Apple's servers</a>.  Big Brother can get
+    them from there.</p>
+  </li>
+
+  <li id="M201609280">
+    <!--#set var="DATE" value='<small class="date-tag">2016-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The iMessage app on iThings <a
+    
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/";>tells
+    a server every phone number that the user types into it</a>; the
+    server records these numbers for at least 30 days.</p>
+  </li>
+
+  <li id="M201509240">
+    <!--#set var="DATE" value='<small class="date-tag">2015-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>iThings automatically upload to Apple's servers all the photos
+    and videos they make.</p>
+
+    <blockquote><p> iCloud Photo Library stores every photo and video you
+    take, and keeps them up to date on all your devices. Any edits you
+    make are automatically updated everywhere. [&hellip;] </p></blockquote>
+
+    <p>(From <a href="https://www.apple.com/icloud/photos/";>Apple's iCloud
+    information</a> as accessed on 24 Sep 2015.) The iCloud feature is
+    <a href="https://support.apple.com/en-us/HT202033";>activated by the
+    startup of iOS</a>. The term &ldquo;cloud&rdquo; means &ldquo;please
+    don't ask where.&rdquo;</p>
+
+    <p>There is a way to
+    <a href="https://support.apple.com/en-us/HT201104";> deactivate
+    iCloud</a>, but it's active by default so it still counts as a
+    surveillance functionality.</p>
+
+    <p>Unknown people apparently took advantage of this to <a
+    
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence";>get
+    nude photos of many celebrities</a>. They needed to break Apple's
+    security to get at them, but NSA can access any of them through <a
+    
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+  </li>
+
+  <li id="M201409220">
+    <!--#set var="DATE" value='<small class="date-tag">2014-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apple can, and regularly does, <a
+    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>
+    remotely extract some data from iPhones for the state</a>.</p>
+
+    <p>This may have improved with <a
+    
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/";>
+    iOS 8 security improvements</a>; but <a
+    href="https://firstlook.org/theintercept/2014/09/22/apple-data/";>
+    not as much as Apple claims</a>.</p>
+  </li>
+
+  <li id="M201407230">
+    <!--#set var="DATE" value='<small class="date-tag">2014-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services";>
+    Several &ldquo;features&rdquo; of iOS seem to exist
+    for no possible purpose other than surveillance</a>.  Here is the <a
+    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf";>
+    Technical presentation</a>.</p>
+  </li>
+
+  <li id="M201401100">
+    <!--#set var="DATE" value='<small class="date-tag">2014-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The <a class="not-a-duplicate"
+    
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
+    iBeacon</a> lets stores determine exactly where the iThing is, and
+    get other info too.</p>
+  </li>
+
+  <li id="M201312300">
+    <!--#set var="DATE" value='<small class="date-tag">2013-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep";>
+    Either Apple helps the NSA snoop on all the data in an iThing, or it
+    is totally incompetent</a>.</p>
+  </li>
+
+  <li id="M201308080">
+    <!--#set var="DATE" value='<small class="date-tag">2013-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The iThing also <a
+    
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/";>
+    tells Apple its geolocation</a> by default, though that can be
+    turned off.</p>
+  </li>
+
+  <li id="M201210170">
+    <!--#set var="DATE" value='<small class="date-tag">2012-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>There is also a feature for web sites to track users, which is <a
+    
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/";>
+    enabled by default</a>.  (That article talks about iOS 6, but it is
+    still true in iOS 7.)</p>
+  </li>
+
+  <li id="M201204280">
+    <!--#set var="DATE" value='<small class="date-tag">2012-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Users cannot make an Apple ID (<a
+    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id";>necessary
+    to install even gratis apps</a>) without giving a valid
+    email address and receiving the verification code Apple sends
+    to it.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInAndroid">Android Telephones</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInAndroid">#SpywareInAndroid</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M202012070">
+    <!--#set var="DATE" value='<small class="date-tag">2020-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Baidu apps were <a
+    
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/";>
+    caught collecting sensitive personal data</a> that can be used for
+    lifetime tracking of users, and putting them in danger. More than 1.4
+    billion people worldwide are affected by these proprietary apps, and
+    users' privacy is jeopardized by this surveillance tool. Data collected
+    by Baidu may be handed over to the Chinese government, possibly
+    putting Chinese people in danger.</p>
+  </li>
+
+  <li id="M202010120">
+    <!--#set var="DATE" value='<small class="date-tag">2020-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Samsung is forcing its smartphone users in Hong Kong (and Macau) <a
+    
href="https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-dns-service-upon-hong-kong-wifi-users/";>to
+    use a public DNS in Mainland China</a>, using software update released
+    in September 2020, which causes many unease and privacy concerns.</p>
+  </li>
+
+  <li id="M202004300">
+    <!--#set var="DATE" value='<small class="date-tag">2020-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Xiaomi phones <a
+    
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/";>report
+    many actions the user takes</a>: starting an app, looking at a folder,
+    visiting a website, listening to a song.  They send device identifying
+    information too.</p>
+
+    <p>Other nonfree programs snoop too. For instance, Spotify and
+    other streaming dis-services make a dossier about each user, and <a
+    href="/malware/proprietary-surveillance.html#M201508210"> they make
+    users identify themselves to pay</a>.  Out, out, damned Spotify!</p>
+
+    <p>Forbes exonerates the same wrongs when the culprits are not Chinese,
+    but we condemn this no matter who does it.</p>
+  </li>
+
+  <li id="M201812060">
+    <!--#set var="DATE" value='<small class="date-tag">2018-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Facebook's app got &ldquo;consent&rdquo; to <a
+    
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent";>
+    upload call logs automatically from Android phones</a> while disguising
+    what the &ldquo;consent&rdquo; was for.</p>
+  </li>
+
+  <li id="M201811230">
+    <!--#set var="DATE" value='<small class="date-tag">2018-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>An Android phone was observed to track location even while
+    in airplane mode. It didn't send the location data while in
+    airplane mode.  Instead, <a
+    
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/";>
+    it saved up the data, and sent them all later</a>.</p>
+  </li>
+
+  <li id="M201711210">
+    <!--#set var="DATE" value='<small class="date-tag">2017-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Android tracks location for Google <a
+    
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml";>
+    even when &ldquo;location services&rdquo; are turned off, even when
+    the phone has no SIM card</a>.</p>
+  </li>
+
+  <li id="M201611150">
+    <!--#set var="DATE" value='<small class="date-tag">2016-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Some portable phones <a
+    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html";>are
+    sold with spyware sending lots of data to China</a>.</p>
+  </li>
+
+  <li id="M201609140">
+    <!--#set var="DATE" value='<small class="date-tag">2016-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Google Play (a component of Android) <a
+    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg";>
+    tracks the users' movements without their permission</a>.</p>
+
+    <p>Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself to completely stop the tracking.  This is
+    yet another example of nonfree software pretending to obey the user,
+    when it's actually doing something else.  Such a thing would be almost
+    unthinkable with free software.</p>
+  </li>
+
+  <li id="M201507030">
+    <!--#set var="DATE" value='<small class="date-tag">2015-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Samsung phones come with <a
+    
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/";>apps
+    that users can't delete</a>, and they send so much data that their
+    transmission is a substantial expense for users.  Said transmission,
+    not wanted or requested by the user, clearly must constitute spying
+    of some kind.</p>
+  </li>
+
+  <li id="M201403120">
+    <!--#set var="DATE" value='<small class="date-tag">2014-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a href="/proprietary/proprietary-back-doors.html#samsung">
+    Samsung's back door</a> provides access to any file on the system.</p>
+  </li>
+
+  <li id="M201308010">
+    <!--#set var="DATE" value='<small class="date-tag">2013-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Spyware in Android phones (and Windows? laptops): The Wall Street
+    Journal (in an article blocked from us by a paywall) reports that <a
+    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj";>
+    the FBI can remotely activate the GPS and microphone in Android phones
+    and laptops</a> (presumably Windows laptops).  Here is <a
+    href="http://cryptome.org/2013/08/fbi-hackers.htm";>more info</a>.</p>
+  </li>
+
+  <li id="M201307280">
+    <!--#set var="DATE" value='<small class="date-tag">2013-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Spyware is present in some Android devices when they are
+    sold.  Some Motorola phones, made when this company was owned
+    by Google, use a modified version of Android that <a
+    href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html";>
+    sends personal data to Motorola</a>.</p>
+  </li>
+
+  <li id="M201307250">
+    <!--#set var="DATE" value='<small class="date-tag">2013-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A Motorola phone <a
+    
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/";>
+    listens for voice all the time</a>.</p>
+  </li>
+
+  <li id="M201302150">
+    <!--#set var="DATE" value='<small class="date-tag">2013-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Google Play intentionally sends app developers <a
+    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116";>
+    the personal details of users that install the app</a>.</p>
+
+    <p>Merely asking the &ldquo;consent&rdquo; of users is not enough to
+    legitimize actions like this.  At this point, most users have stopped
+    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
+    they are &ldquo;consenting&rdquo; to.  Google should clearly and
+    honestly identify the information it collects on users, instead of
+    hiding it in an obscurely worded EULA.</p>
+
+    <p>However, to truly protect people's privacy, we must prevent Google
+    and other companies from getting this personal information in the
+    first place!</p>
+  </li>
+
+  <li id="M201111170">
+    <!--#set var="DATE" value='<small class="date-tag">2011-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Some manufacturers add a <a
+    
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/";>
+    hidden general surveillance package such as Carrier IQ</a>.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInElectronicReaders">E-Readers</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M201603080">
+    <!--#set var="DATE" value='<small class="date-tag">2016-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>E-books can contain JavaScript code, and <a
+    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds";>
+    sometimes this code snoops on readers</a>.</p>
+  </li>
+
+  <li id="M201410080">
+    <!--#set var="DATE" value='<small class="date-tag">2014-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Adobe made &ldquo;Digital Editions,&rdquo;
+    the e-reader used by most US libraries, <a
+    
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/";>
+    send lots of data to Adobe</a>.  Adobe's &ldquo;excuse&rdquo;: it's
+    needed to check DRM!</p>
+  </li>
+
+  <li id="M201212030">
+    <!--#set var="DATE" value='<small class="date-tag">2012-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Spyware in many e-readers&mdash;not only the Kindle: <a
+    href="https://www.eff.org/pages/reader-privacy-chart-2012";> they
+    report even which page the user reads at what time</a>.</p>
+  </li>
+</ul>
+
+
+
+<div class="big-section">
+  <h3 id="SpywareInApplications">Spyware in Applications</h3>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInApplications">#SpywareInApplications</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+  <h4 id="SpywareInDesktopApps">Desktop Apps</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M202011260">
+    <!--#set var="DATE" value='<small class="date-tag">2020-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Microsoft's Office 365 suite enables employers <a
+    
href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance";>to
+    snoop on each employee</a>. After
+    a public outburst, Microsoft stated that <a
+    
href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance";>it
+    would remove this capability</a>. Let's hope so.</p>
+  </li>
+
+  <li id="M201912190">
+    <!--#set var="DATE" value='<small class="date-tag">2019-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Some Avast and AVG extensions
+    for Firefox and Chrome were found to <a
+    
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome";>
+    snoop on users' detailed browsing habits</a>. Mozilla and Google
+    removed the problematic extensions from their stores, but this shows
+    once more how unsafe nonfree software can be. Tools that are supposed
+    to protect a proprietary system are, instead, infecting it with
+    additional malware (the system itself being the original malware).</p>
+  </li>
+
+  <li id="M201811020">
+    <!--#set var="DATE" value='<small class="date-tag">2018-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Foundry's graphics software <a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/";>
+    reports information to identify who is running it</a>. The result is
+    often a legal threat demanding a lot of money.</p>
+
+    <p>The fact that this is used for repression of forbidden sharing
+    makes it even more vicious.</p>
+
+    <p>This illustrates that making unauthorized copies of nonfree software
+    is not a cure for the injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.</p>
+  </li>
+</ul>
+
+<div class="big-subsection">
+  <h4 id="SpywareInMobileApps">Mobile Apps</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M202106030">
+    <!--#set var="DATE" value='<small class="date-tag">2021-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/";>TikTok
+    apps collect biometric identifiers and biometric information from
+    users' smartphones</a>. The company behind it does whatever it wants
+    and collects whatever data it can.</p>
+  </li>
+
+  <li id="M202104060">
+    <!--#set var="DATE" value='<small class="date-tag">2021-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The <a
+    
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/";>WeddingWire
+    app saves people's wedding photos forever and hands over data
+    to others</a>, giving users no control over their personal 
+    information/data. The app also sometimes shows old photos and
+    memories to users, without giving them any control over this
+    either.</p>
+  </li>
+
+  <li id="M202102010">
+    <!--#set var="DATE" value='<small class="date-tag">2021-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Many cr&hellip;apps, developed by various
+    companies for various organizations, do <a
+    href="https://www.expressvpn.com/digital-security-lab/investigation-xoth";>
+    location tracking unknown to those companies and those
+    organizations</a>.  It's actually some widely used libraries that do
+    the tracking.</p>
+
+    <p>What's unusual here is that proprietary software developer A tricks
+    proprietary software developers B1 &hellip; B50 into making platforms for
+    A to mistreat the end user.</p>
+  </li>
+
+  <li id="M202003260">
+    <!--#set var="DATE" value='<small class="date-tag">2020-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Apple iOS version of Zoom <a
+    
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account";>is
+    sending users' data to Facebook</a> even if the user doesn't have
+    a Facebook account. According to the article, Zoom and Facebook
+    don't even mention this surveillance on their privacy policy page,
+    making this an obvious violation of people's privacy even in their
+    own terms.</p>
+  </li>
+
+  <li id="M202003010">
+    <!--#set var="DATE" value='<small class="date-tag">2020-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Alipay Health Code app
+    estimates whether the user has Covid-19 and <a
+    
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html";>
+    tells the cops directly</a>.</p>
+  </li>
+
+  <li id="M202001290">
+    <!--#set var="DATE" value='<small class="date-tag">2020-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Amazon Ring app does <a
+    
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report";>
+    surveillance for other companies as well as for Amazon</a>.</p>
+  </li>
+
+  <li id="M201912220">
+    <!--#set var="DATE" value='<small class="date-tag">2019-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The ToToc messaging app seems to be a <a
+    href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html";>
+    spying tool for the government of the United Arab Emirates</a>.
+    Any nonfree program could be doing this, and that is a good
+    reason to use free software instead.</p>
+
+    <p><small>Note: this article uses the word &ldquo;free&rdquo; in
+    the sense of &ldquo;gratis.&rdquo;</small></p>
+  </li>
+
+  <li id="M201912090">
+    <!--#set var="DATE" value='<small class="date-tag">2019-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>iMonsters and Android phones,
+    when used for work, give employers powerful <a
+    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy";>
+    snooping and sabotage capabilities</a> if they install their own
+    software on the device.  Many employers demand to do this.  For the
+    employee, this is simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.</p>
+  </li>
+
+  <li id="M201910130">
+    <!--#set var="DATE" value='<small class="date-tag">2019-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it <a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962";>
+    access to the phone's microphone, photos, text messages, contacts, and
+    internet history</a>, and the Android version was found to contain a
+    back-door allowing developers to run any code they wish in the users'
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
+    app is mandatory at some workplaces.</p>
+
+    <p>Note: The <a
+    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html";>
+    Washington Post version of the article</a> (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;</p>
+  </li>
+
+  <li id="M201909091">
+    <!--#set var="DATE" value='<small class="date-tag">2019-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Facebook app <a
+    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/";>
+    tracks users even when it is turned off</a>, after tricking them
+    into giving the app broad permissions in order to use one of its
+    functionalities.</p>
+  </li>
+
+  <li id="M201909090">
+    <!--#set var="DATE" value='<small class="date-tag">2019-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Some nonfree period-tracking apps including MIA Fem and Maya <a
+    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem";>
+    send intimate details of users' lives to Facebook</a>.</p>
+  </li>
+
+  <li id="M201909060">
+    <!--#set var="DATE" value='<small class="date-tag">2019-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Keeping track of who downloads a proprietary
+    program is a form of surveillance.  There is a
+    proprietary program for adjusting a certain telescopic rifle sight. <a
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/";>
+    A US prosecutor has demanded the list of all the 10,000 or more people
+    who have installed it</a>.</p>
+
+    <p>With a free program there would not be a list of who has installed
+    it.</p>
+  </li>
+
+  <li id="M201907081">
+    <!--#set var="DATE" value='<small class="date-tag">2019-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Many unscrupulous mobile-app developers keep finding ways to <a
+    
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/";>
+    bypass user's settings</a>, regulations, and privacy-enhancing features
+    of the operating system, in order to gather as much private data as
+    they possibly can.</p>
+
+    <p>Thus, we can't trust rules against spying.  What we can trust is
+    having control over the software we run.</p>
+  </li>
+
+  <li id="M201907080">
+    <!--#set var="DATE" value='<small class="date-tag">2019-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Many Android apps can track
+    users' movements even when the user says <a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location";>
+    not to allow them access to locations</a>.</p>
+
+    <p>This involves an apparently unintentional weakness in Android,
+    exploited intentionally by malicious apps.</p>
+  </li>
+
+  <li id="M201905300">
+    <!--#set var="DATE" value='<small class="date-tag">2019-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Femm &ldquo;fertility&rdquo; app is secretly a <a
+    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners";>
+    tool for propaganda</a> by natalist Christians.  It spreads distrust
+    for contraception.</p>
+
+    <p>It snoops on users, too, as you must expect from nonfree
+    programs.</p>
+  </li>
+
+  <li id="M201905060">
+    <!--#set var="DATE" value='<small class="date-tag">2019-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>BlizzCon 2019 imposed a <a
+    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/";>
+    requirement to run a proprietary phone app</a> to be allowed into
+    the event.</p>
+
+    <p>This app is a spyware that can snoop on a lot of
+    sensitive data, including user's location and contact list, and has <a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/";>
+    near-complete control</a> over the phone.</p>
+  </li>
+
+  <li id="M201904131">
+    <!--#set var="DATE" value='<small class="date-tag">2019-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Data collected by menstrual and pregnancy monitoring apps is often <a
+    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance";>
+    available to employers and insurance companies</a>. Even though the
+    data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
+    traced back to the woman who uses the app.</p>
+
+    <p>This has harmful implications for women's rights to equal employment
+    and freedom to make their own pregnancy choices. Don't use
+    these apps, even if someone offers you a reward to do so. A
+    free-software app that does more or less the same thing without
+    spying on you is available from <a
+    href="https://search.f-droid.org/?q=menstr";>F-Droid</a>, and <a
+    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f";>
+    a new one is being developed</a>.</p>
+  </li>
+
+  <li id="M201904130">
+    <!--#set var="DATE" value='<small class="date-tag">2019-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Google tracks the movements of Android phones and iPhones
+    running Google apps, and sometimes <a
+    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html";>
+    saves the data for years</a>.</p>
+
+    <p>Nonfree software in the phone has to be responsible for sending
+    the location data to Google.</p>
+  </li>
+
+  <li id="M201903251">
+    <!--#set var="DATE" value='<small class="date-tag">2019-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Many Android phones come with a huge number of <a
+    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html";>
+    preinstalled nonfree apps that have access to sensitive data without
+    users' knowledge</a>. These hidden apps may either call home with
+    the data, or pass it on to user-installed apps that have access to
+    the network but no direct access to the data. This results in massive
+    surveillance on which the user has absolutely no control.</p>
+  </li>
+
+  <li id="M201903201">
+    <!--#set var="DATE" value='<small class="date-tag">2019-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A study of 24 &ldquo;health&rdquo; apps found that 19 of them <a
+    
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows";>
+    send sensitive personal data to third parties</a>, which can use it
+    for invasive advertising or discriminating against people in poor
+    medical condition.</p>
+
+    <p>Whenever user &ldquo;consent&rdquo; is sought, it is buried in
+    lengthy terms of service that are difficult to understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.</p>
+  </li>
+
+  <li id="M201902230">
+    <!--#set var="DATE" value='<small class="date-tag">2019-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Facebook offered a convenient proprietary
+    library for building mobile apps, which also <a
+    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html";>
+    sent personal data to Facebook</a>. Lots of companies built apps that
+    way and released them, apparently not realizing that all the personal
+    data they collected would go to Facebook as well.</p>
+
+    <p>It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.</p>
+  </li>
+
+  <li id="M201902140">
+    <!--#set var="DATE" value='<small class="date-tag">2019-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The AppCensus database gives information on <a
+    href="https://www.appcensus.mobi";> how Android apps use and
+    misuse users' personal data</a>. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) transmit the <a
+    href="/proprietary/proprietary-surveillance.html#M201812290">
+    Advertising ID</a> to other companies, and <a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/";>
+    18,000 (23% of the total) link this ID to hardware identifiers</a>,
+    so that users cannot escape tracking by resetting it.</p>
+
+    <p>Collecting hardware identifiers is in apparent violation of
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry to take action. This proves
+    that the policies of a development platform are ineffective at
+    preventing nonfree software developers from including malware in
+    their programs.</p>
+  </li>
+
+  <li id="M201902060">
+    <!--#set var="DATE" value='<small class="date-tag">2019-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Many nonfree apps have a surveillance feature for <a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/";>
+    recording all the users' actions</a> in interacting with the app.</p>
+  </li>
+
+  <li id="M201902041.1">
+    <!--#set var="DATE" value='<small class="date-tag">2019-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Twenty nine &ldquo;beauty camera&rdquo; apps that used to
+    be on Google Play had one or more malicious functionalities, such as <a
+    
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/";>
+    stealing users' photos</a> instead of &ldquo;beautifying&rdquo; them,
+    pushing unwanted and often malicious ads on users, and redirecting
+    them to phishing sites that stole their credentials. Furthermore,
+    the user interface of most of them was designed to make uninstallation
+    difficult.</p>
+
+    <p>Users should of course uninstall these dangerous apps if they
+    haven't yet, but they should also stay away from nonfree apps in
+    general. <em>All</em> nonfree apps carry a potential risk because
+    there is no easy way of knowing what they really do.</p>
+  </li>
+
+  <li id="M201902010">
+    <!--#set var="DATE" value='<small class="date-tag">2019-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>An investigation of the 150 most popular
+    gratis VPN apps in Google Play found that <a
+    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/";>
+    25% fail to protect their users' privacy</a> due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions in their
+    source code&mdash;often used for invasive advertising&mdash;that could
+    potentially also be used to spy on users. Other technical flaws were
+    found as well.</p>
+
+    <p>Moreover, a previous investigation had found that <a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/";>half of
+    the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
+
+    <p><small>(It is unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are <em>not</em> <a
+    href="/philosophy/free-sw.html">free software</a>.)</small></p>
+  </li>
+
+  <li id="M201901050">
+    <!--#set var="DATE" value='<small class="date-tag">2019-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Weather Channel app <a
+    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling";>
+    stored users' locations to the company's server</a>. The company is
+    being sued, demanding that it notify the users of what it will do
+    with the data.</p>
+
+    <p>We think that lawsuit is about a side issue. What the company does
+    with the data is a secondary issue. The principal wrong here is that
+    the company gets that data at all.</p>
+
+    <p><a
+    
href="https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps";>
+    Other weather apps</a>, including Accuweather and WeatherBug, are
+    tracking people's locations.</p> 
+  </li>
+
+  <li id="M201812290">
+    <!--#set var="DATE" value='<small class="date-tag">2018-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Around 40% of gratis Android apps <a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report";>
+    report on the user's actions to Facebook</a>.</p>
+
+    <p>Often they send the machine's &ldquo;advertising ID,&rdquo; so that
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities in the app; others only say that the user is
+    using that app, but that alone is often quite informative.</p>
+
+    <p>This spying occurs regardless of whether the user has a Facebook
+    account.</p>
+  </li>
+
+  <li id="M201810244">
+    <!--#set var="DATE" value='<small class="date-tag">2018-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Some Android apps <a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/";>
+    track the phones of users that have deleted them</a>.</p>
+  </li>
+
+  <li id="M201808030">
+    <!--#set var="DATE" value='<small class="date-tag">2018-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Some Google apps on Android <a
+    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile";>
+    record the user's location even when users disable &ldquo;location
+    tracking&rdquo;</a>.</p>
+
+    <p>There are other ways to turn off the other kinds of location
+    tracking, but most users will be tricked by the misleading control.</p>
+  </li>
+
+  <li id="M201806110">
+    <!--#set var="DATE" value='<small class="date-tag">2018-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Spanish football streaming app <a
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html";>tracks
+    the user's movements and listens through the microphone</a>.</p>
+
+    <p>This makes them act as spies for licensing enforcement.</p>
+
+    <p>We expect it implements DRM, too&mdash;that there is no way to save
+    a recording. But we can't be sure from the article.</p>
+
+    <p>If you learn to care much less about sports, you will benefit in
+    many ways. This is one more.</p>
+  </li>
+
+  <li id="M201804160">
+    <!--#set var="DATE" value='<small class="date-tag">2018-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>More than <a
+    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy";>50%
+    of the 5,855 Android apps studied by researchers were found to snoop
+    and collect information about its users</a>.  40% of the apps were
+    found to insecurely snitch on its users.  Furthermore, they could
+    detect only some methods of snooping, in these proprietary apps whose
+    source code they cannot look at.  The other apps might be snooping
+    in other ways.</p>
+
+    <p>This is evidence that proprietary apps generally work against
+    their users.  To protect their privacy and freedom, Android users
+    need to get rid of the proprietary software&mdash;both proprietary
+    Android by <a href="https://replicant.us";>switching to Replicant</a>,
+    and the proprietary apps by getting apps from the free software
+    only <a href="https://f-droid.org/";>F-Droid store</a> that <a
+    href="https://f-droid.org/wiki/page/Antifeatures";> prominently warns
+    the user if an app contains anti-features</a>.</p>
+  </li>
+
+  <li id="M201804020">
+    <!--#set var="DATE" value='<small class="date-tag">2018-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Grindr collects information about <a
+    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status";>
+    which users are HIV-positive, then provides the information to
+    companies</a>.</p>
+
+    <p>Grindr should not have so much information about its users.
+    It could be designed so that users communicate such info to each
+    other but not to the server's database.</p>
+  </li>
+
+  <li id="M201803050">
+    <!--#set var="DATE" value='<small class="date-tag">2018-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The moviepass app and dis-service
+    spy on users even more than users expected. It <a
+    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/";>records
+    where they travel before and after going to a movie</a>.</p>
+
+    <p>Don't be tracked&mdash;pay cash!</p>
+  </li>
+
+  <li id="M201711240">
+    <!--#set var="DATE" value='<small class="date-tag">2017-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Tracking software in popular Android apps
+    is pervasive and sometimes very clever. Some trackers can <a
+    
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/";>
+    follow a user's movements around a physical store by noticing WiFi
+    networks</a>.</p>
+  </li>
+
+  <li id="M201708270">
+    <!--#set var="DATE" value='<small class="date-tag">2017-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Sarahah app <a
+    
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/";>
+    uploads all phone numbers and email addresses</a> in user's address
+    book to developer's server.</p>
+
+    <p><small>(Note that this article misuses the words
+    &ldquo;<a href="/philosophy/free-sw.html">free software</a>&rdquo;
+    referring to zero price.)</small></p>
+  </li>
+
+  <li id="M201707270">
+    <!--#set var="DATE" value='<small class="date-tag">2017-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>20 dishonest Android apps recorded <a
+    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts";>phone
+    calls and sent them and text messages and emails to snoopers</a>.</p>
+
+    <p>Google did not intend to make these apps spy; on the contrary, it
+    worked in various ways to prevent that, and deleted these apps after
+    discovering what they did. So we cannot blame Google specifically
+    for the snooping of these apps.</p>
+
+    <p>On the other hand, Google redistributes nonfree Android apps, and
+    therefore shares in the responsibility for the injustice of their being
+    nonfree. It also distributes its own nonfree apps, such as Google Play,
+    <a href="/philosophy/free-software-even-more-important.html">which
+    are malicious</a>.</p>
+
+    <p>Could Google have done a better job of preventing apps from
+    cheating? There is no systematic way for Google, or Android users,
+    to inspect executable proprietary apps to see what they do.</p>
+
+    <p>Google could demand the source code for these apps, and study
+    the source code somehow to determine whether they mistreat users in
+    various ways. If it did a good job of this, it could more or less
+    prevent such snooping, except when the app developers are clever
+    enough to outsmart the checking.</p>
+
+    <p>But since Google itself develops malicious apps, we cannot trust
+    Google to protect us. We must demand release of source code to the
+    public, so we can depend on each other.</p>
+  </li>
+
+  <li id="M201705230">
+    <!--#set var="DATE" value='<small class="date-tag">2017-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apps for BART <a
+    
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/";>
+    snoop on users</a>.</p>
+
+    <p>With free software apps, users could <em>make sure</em> that they
+    don't snoop.</p>
+
+    <p>With proprietary apps, one can only hope that they don't.</p>
+  </li>
+
+  <li id="M201705040">
+    <!--#set var="DATE" value='<small class="date-tag">2017-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A study found 234 Android apps that track users by <a
+    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/";>listening
+    to ultrasound from beacons placed in stores or played by TV
+    programs</a>.</p>
+  </li>
+
+  <li id="M201704260">
+    <!--#set var="DATE" value='<small class="date-tag">2017-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Faceapp appears to do lots of surveillance, judging by <a
+    
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/";>
+    how much access it demands to personal data in the device</a>.</p>
+  </li>
+
+  <li id="M201704190">
+    <!--#set var="DATE" value='<small class="date-tag">2017-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Users are suing Bose for <a
+    
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/";>
+    distributing a spyware app for its headphones</a>.  Specifically,
+    the app would record the names of the audio files users listen to
+    along with the headphone's unique serial number.</p>
+
+    <p>The suit accuses that this was done without the users' consent.
+    If the fine print of the app said that users gave consent for this,
+    would that make it acceptable? No way! It should be flat out <a
+    href="/philosophy/surveillance-vs-democracy.html"> illegal to design
+    the app to snoop at all</a>.</p>
+  </li>
+
+  <li id="M201704074">
+    <!--#set var="DATE" value='<small class="date-tag">2017-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Pairs of Android apps can collude
+    to transmit users' personal data to servers. <a
+    
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/";>A
+    study found tens of thousands of pairs that collude</a>.</p>
+  </li>
+
+  <li id="M201703300">
+    <!--#set var="DATE" value='<small class="date-tag">2017-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Verizon <a
+    
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones";>
+    announced an opt-in proprietary search app that it will</a> pre-install
+    on some of its phones. The app will give Verizon the same information
+    about the users' searches that Google normally gets when they use
+    its search engine.</p>
+
+    <p>Currently, the app is <a
+    
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware";>
+    being pre-installed on only one phone</a>, and the user must
+    explicitly opt-in before the app takes effect. However, the app
+    remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.</p>
+  </li>
+
+  <li id="M201701210">
+    <!--#set var="DATE" value='<small class="date-tag">2017-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Meitu photo-editing app <a
+    
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/";>sends
+    user data to a Chinese company</a>.</p>
+  </li>
+
+  <li id="M201611280">
+    <!--#set var="DATE" value='<small class="date-tag">2016-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Uber app tracks <a
+    
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/";>clients'
+    movements before and after the ride</a>.</p>
+
+    <p>This example illustrates how &ldquo;getting the user's
+    consent&rdquo; for surveillance is inadequate as a protection against
+    massive surveillance.</p>
+  </li>
+
+  <li id="M201611160">
+    <!--#set var="DATE" value='<small class="date-tag">2016-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A <a
+    
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf";>
+    research paper</a> that investigated the privacy and security of
+    283 Android VPN apps concluded that &ldquo;in spite of the promises
+    for privacy, security, and anonymity given by the majority of VPN
+    apps&mdash;millions of users may be unawarely subject to poor security
+    guarantees and abusive practices inflicted by VPN apps.&rdquo;</p>
+
+    <p>Following is a non-exhaustive list, taken from the research paper,
+    of some proprietary VPN apps that track users and infringe their
+    privacy:</p>
+
+    <dl class="compact">
+      <dt>SurfEasy</dt>
+      <dd>Includes tracking libraries such as NativeX and Appflood,
+      meant to track users and show them targeted ads.</dd>
+
+      <dt>sFly Network Booster</dt>
+      <dd>Requests the <code>READ_SMS</code> and <code>SEND_SMS</code>
+      permissions upon installation, meaning it has full access to users'
+      text messages.</dd>
+
+      <dt>DroidVPN and TigerVPN</dt>
+      <dd>Requests the <code>READ_LOGS</code> permission to read logs
+      for other apps and also core system logs. TigerVPN developers have
+      confirmed this.</dd>
+
+      <dt>HideMyAss</dt>
+      <dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
+      may turn them over to the UK government if requested.</dd>
+
+      <dt>VPN Services HotspotShield</dt>
+      <dd>Injects JavaScript code into the HTML pages returned to the
+      users. The stated purpose of the JS injection is to display ads. Uses
+      roughly five tracking libraries. Also, it redirects the user's
+      traffic through valueclick.com (an advertising website).</dd>
+
+      <dt>WiFi Protector VPN</dt>
+      <dd>Injects JavaScript code into HTML pages, and also uses roughly
+      five tracking libraries. Developers of this app have confirmed that
+      the non-premium version of the app does JavaScript injection for
+      tracking the user and displaying ads.</dd>
+    </dl>
+  </li>
+
+  <li id="M201609210">
+    <!--#set var="DATE" value='<small class="date-tag">2016-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Google's new voice messaging app <a
+    
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google";>logs
+    all conversations</a>.</p>
+  </li>
+
+  <li id="M201606050">
+    <!--#set var="DATE" value='<small class="date-tag">2016-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Facebook's new Magic Photo app <a
+    
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/";>
+    scans your mobile phone's photo collections for known faces</a>,
+    and suggests you circulate the picture you take according to who is
+    in the frame.</p>
+
+    <p>This spyware feature seems to require online access to some
+    known-faces database, which means the pictures are likely to be
+    sent across the wire to Facebook's servers and face-recognition
+    algorithms.</p>
+
+    <p>If so, none of Facebook users' pictures are private anymore,
+    even if the user didn't &ldquo;upload&rdquo; them to the service.</p>
+  </li>
+
+  <li id="M201605310">
+    <!--#set var="DATE" value='<small class="date-tag">2016-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Facebook's app listens all the time, <a
+    
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html";>to
+    snoop on what people are listening to or watching</a>. In addition,
+    it may be analyzing people's conversations to serve them with targeted
+    advertisements.</p>
+  </li>
+
+  <li id="M201604250">
+    <!--#set var="DATE" value='<small class="date-tag">2016-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A pregnancy test controller application not only can <a
+    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security";>
+    spy on many sorts of data in the phone, and in server accounts,
+    it can alter them too</a>.</p>
+  </li>
+
+  <li id="M201601130">
+    <!--#set var="DATE" value='<small class="date-tag">2016-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Apps that include <a
+    
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/";>
+    Symphony surveillance software snoop on what radio and TV programs
+    are playing nearby</a>.  Also on what users post on various sites
+    such as Facebook, Google+ and Twitter.</p>
+  </li>
+
+  <li id="M201511190">
+    <!--#set var="DATE" value='<small class="date-tag">2015-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>&ldquo;Cryptic communication,&rdquo;
+    unrelated to the app's functionality, was <a
+    href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119";>
+    found in the 500 most popular gratis Android apps</a>.</p>
+
+    <p>The article should not have described these apps as
+    &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
+    to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;</p>
+
+    <p>The article takes for granted that the usual analytics tools are
+    legitimate, but is that valid? Software developers have no right to
+    analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
+    that snoop are just as wrong as any other snooping.</p>
+  </li>
+
+  <li id="M201510300">
+    <!--#set var="DATE" value='<small class="date-tag">2015-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>More than 73% and 47% of mobile applications, for Android and iOS
+    respectively <a href="https://techscience.org/a/2015103001/";>hand over
+    personal, behavioral and location information</a> of their users to
+    third parties.</p>
+  </li>
+
+  <li id="M201508210">
+    <!--#set var="DATE" value='<small class="date-tag">2015-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Like most &ldquo;music screaming&rdquo; disservices, Spotify is
+    based on proprietary malware (DRM and snooping). In August 2015 it <a
+    
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy";>
+    demanded users submit to increased snooping</a>, and some are starting
+    to realize that it is nasty.</p>
+
+    <p>This article shows the <a
+    
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/";>
+    twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
+    users better</a>&mdash;never mind whether they want that. This is a
+    typical example of the attitude of the proprietary software industry
+    towards those they have subjugated.</p>
+
+    <p>Out, out, damned Spotify!</p>
+  </li>
+
+  <li id="M201506264">
+    <!--#set var="DATE" value='<small class="date-tag">2015-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf";>
+    A study in 2015</a> found that 90% of the top-ranked gratis proprietary
+    Android apps contained recognizable tracking libraries. For the paid
+    proprietary apps, it was only 60%.</p>
+
+    <p>The article confusingly describes gratis apps as
+    &ldquo;free&rdquo;, but most of them are not in fact <a
+    href="/philosophy/free-sw.html">free software</a>.  It also uses the
+    ugly word &ldquo;monetize&rdquo;. A good replacement for that word
+    is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.</p>
+  </li>
+
+  <li id="M201505060">
+    <!--#set var="DATE" value='<small class="date-tag">2015-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Gratis Android apps (but not <a
+    href="/philosophy/free-sw.html">free software</a>) connect to 100 <a
+    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites";>tracking
+    and advertising</a> URLs, on the average.</p>
+  </li>
+
+  <li id="M201504060">
+    <!--#set var="DATE" value='<small class="date-tag">2015-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Widely used <a
+    
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/";>proprietary
+    QR-code scanner apps snoop on the user</a>. This is in addition to
+    the snooping done by the phone company, and perhaps by the OS in
+    the phone.</p>
+
+    <p>Don't be distracted by the question of whether the app developers
+    get users to say &ldquo;I agree&rdquo;. That is no excuse for
+    malware.</p>
+  </li>
+
+  <li id="M201411260">
+    <!--#set var="DATE" value='<small class="date-tag">2014-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Many proprietary apps for mobile devices
+    report which other apps the user has installed.  <a
+    href="http://techcrunch.com/2014/11/26/twitter-app-graph/";>Twitter
+    is doing this in a way that at least is visible and optional</a>. Not
+    as bad as what the others do.</p>
+  </li>
+
+  <li id="M201401150.1">
+    <!--#set var="DATE" value='<small class="date-tag">2014-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Simeji keyboard is a smartphone version of Baidu's <a
+    href="/proprietary/proprietary-surveillance.html#baidu-ime">spying <abbr
+    title="Input Method Editor">IME</abbr></a>.</p>
+  </li>
+
+  <li id="M201312270">
+    <!--#set var="DATE" value='<small class="date-tag">2013-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The nonfree Snapchat app's principal purpose is to restrict the
+    use of data on the user's computer, but it does surveillance too: <a
+    
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers";>
+    it tries to get the user's list of other people's phone
+    numbers</a>.</p>
+  </li>
+
+  <li id="M201312060">
+    <!--#set var="DATE" value='<small class="date-tag">2013-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Brightest Flashlight app <a
+    
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers";>
+    sends user data, including geolocation, for use by companies</a>.</p>
+
+    <p>The FTC criticized this app because it asked the user to
+    approve sending personal data to the app developer but did not ask
+    about sending it to other companies.  This shows the weakness of
+    the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
+    surveillance: why should a flashlight app send any information to
+    anyone? A free software flashlight app would not.</p>
+  </li>
+
+  <li id="M201212100">
+    <!--#set var="DATE" value='<small class="date-tag">2012-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>FTC says most mobile apps for children don't respect privacy: <a
+    
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/";>
+    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInSkype">Skype</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M201908151">
+    <!--#set var="DATE" value='<small class="date-tag">2019-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Skype refuses to say whether it can <a
+    
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html";>eavesdrop
+    on calls</a>.</p>
+
+    <p>That almost certainly means it can do so.</p>
+  </li>
+
+  <li id="M201307110">
+    <!--#set var="DATE" value='<small class="date-tag">2013-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Skype contains <a
+    
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/";>spyware</a>.
+    Microsoft changed Skype <a
+    
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data";>
+    specifically for spying</a>.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInGames">Games</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInGames">#SpywareInGames</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M202010221">
+    <!--#set var="DATE" value='<small class="date-tag">2020-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Microsoft is imposing its
+    surveillance on the game of Minecraft by <a
+    
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java";>requiring
+    every player to open an account on Microsoft's network</a>. Microsoft
+    has bought the game and will merge all accounts into its network,
+    which will give them access to people's data.</p>
+
+    <p>Minecraft players <a
+    href="https://directory.fsf.org/wiki/Minetest";>can play Minetest</a>
+    instead. The essential advantage of Minetest is that it is free
+    software, meaning it respects the user's computer freedom. As a bonus,
+    it offers more options.</p>
+  </li>
+
+  <li id="M201908210">
+    <!--#set var="DATE" value='<small class="date-tag">2019-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Microsoft recorded users of Xboxes and had <a
+    
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana";>
+    human workers listen to the recordings</a>.</p>
+
+    <p>Morally, we see no difference between having human workers listen and
+    having speech-recognition systems listen.  Both intrude on privacy.</p>
+  </li>
+
+  <li id="M201806240">
+    <!--#set var="DATE" value='<small class="date-tag">2018-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Red Shell is a spyware that
+    is found in many proprietary games. It <a
+    
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/";>
+    tracks data on users' computers and sends it to third parties</a>.</p>
+  </li>
+
+  <li id="M201804144">
+    <!--#set var="DATE" value='<small class="date-tag">2018-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>ArenaNet surreptitiously installed a spyware
+    program along with an update to the massive
+    multiplayer game Guild Wars 2.  The spyware allowed ArenaNet <a
+    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave";>
+    to snoop on all open processes running on its user's computer</a>.</p>
+  </li>
+
+  <li id="M201711070">
+    <!--#set var="DATE" value='<small class="date-tag">2017-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The driver for a certain gaming keyboard <a
+    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html";>sends
+    information to China</a>.</p>
+  </li>
+
+  <li id="M201512290">
+    <!--#set var="DATE" value='<small class="date-tag">2015-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Many <a
+    
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/";>
+    video game consoles snoop on their users and report to the
+    internet</a>&mdash;even what their users weigh.</p>
+
+    <p>A game console is a computer, and you can't trust a computer with
+    a nonfree operating system.</p>
+  </li>
+
+  <li id="M201509160">
+    <!--#set var="DATE" value='<small class="date-tag">2015-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Modern gratis game cr&hellip;apps <a
+    
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/";>
+    collect a wide range of data about their users and their users'
+    friends and associates</a>.</p>
+
+    <p>Even nastier, they do it through ad networks that merge the data
+    collected by various cr&hellip;apps and sites made by different
+    companies.</p>
+
+    <p>They use this data to manipulate people to buy things, and hunt for
+    &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
+    use a back door to manipulate the game play for specific players.</p>
+
+    <p>While the article describes gratis games, games that cost money
+    can use the same tactics.</p>
+  </li>
+
+  <li id="M201401280">
+    <!--#set var="DATE" value='<small class="date-tag">2014-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Angry Birds <a
+    
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html";>
+    spies for companies, and the NSA takes advantage
+    to spy through it too</a>.  Here's information on <a
+    
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html";>
+    more spyware apps</a>.</p>
+
+    <p><a
+    
href="https://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data";>
+    More about NSA app spying</a>.</p>
+  </li>
+
+  <li id="M200510200">
+    <!--#set var="DATE" value='<small class="date-tag">2005-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Blizzard Warden is a hidden
+    &ldquo;cheating-prevention&rdquo; program that <a
+    href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware";>
+    spies on every process running on a gamer's computer and sniffs a
+    good deal of personal data</a>, including lots of activities which
+    have nothing to do with cheating.</p>
+  </li>
+</ul>
+
+
+
+<div class="big-section">
+  <h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul class="blurbs">
+  <li id="M202101050">
+    <!--#set var="DATE" value='<small class="date-tag">2021-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Most Internet connected devices in Mozilla's <a
+    href="https://foundation.mozilla.org/en/privacynotincluded";>&ldquo;Privacy
+    Not Included&rdquo;</a> list <a
+    
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell";>are
+    designed to snoop on users</a> even if they meet
+    Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
+    design of the program running on some of these devices <a
+    
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster";>makes
+    the user susceptible to be snooped and exploited by crackers as
+    well</a>.</p>
+  </li>
+
+  <li id="M201708280">
+    <!--#set var="DATE" value='<small class="date-tag">2017-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The bad security in many Internet of Stings devices allows <a
+    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml";>ISPs
+    to snoop on the people that use them</a>.</p>
+
+    <p>Don't be a sucker&mdash;reject all the stings.</p>
+
+    <p><small>(It is unfortunate that the article uses the term <a
+    
href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.)</small></p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInTVSets">TV Sets</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+</div>
+
+<p>Emo Phillips made a joke: The other day a woman came up to me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.</p>
+
+<ul class="blurbs">
+  <li id="M202010282">
+    <!--#set var="DATE" value='<small class="date-tag">2020-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>TV manufacturers are turning to produce only
+    &ldquo;Smart&rdquo; TV sets (which include spyware) that <a
+    href="https://frame.work/blog/in-defense-of-dumb-tvs";>it's now very
+    hard to find a TV that doesn't spy on you</a>.</p>
+
+    <p>It appears that those manufacturers business model is not to produce
+    TV and sell them for money, but to collect your personal data and
+    (possibly) hand over them to others for benefit.</p>
+  </li>
+
+  <li id="M202006250">
+    <!--#set var="DATE" value='<small class="date-tag">2020-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>TV manufacturers are able to <a
+    
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/";>snoop
+    every second of what the user is watching</a>. This is illegal due to
+    the Video Privacy Protection Act of 1988, but they're circumventing
+    it through EULAs.</p>
+  </li>
+
+  <li id="M201901070">
+    <!--#set var="DATE" value='<small class="date-tag">2019-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Vizio TVs <a
+    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019";>
+    collect &ldquo;whatever the TV sees,&rdquo;</a> in the own words of the 
company's
+    CTO, and this data is sold to third parties. This is in return for
+    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
+    lower retail prices.</p>
+
+    <p>What is supposed to make this spying acceptable, according to him,
+    is that it is opt-in in newer models. But since the Vizio software is
+    nonfree, we don't know what is actually happening behind the scenes,
+    and there is no guarantee that all future updates will leave the
+    settings unchanged.</p>
+
+    <p>If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV, for that
+    matter), the easiest way to make sure it isn't spying on you is
+    to disconnect it from the Internet, and use a terrestrial antenna
+    instead. Unfortunately, this is not always possible. Another option,
+    if you are technically oriented, is to get your own router (which can
+    be an old computer running completely free software), and set up a
+    firewall to block connections to Vizio's servers. Or, as a last resort,
+    you can replace your TV with another model.</p>
+  </li>
+
+  <li id="M201804010">
+    <!--#set var="DATE" value='<small class="date-tag">2018-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Some &ldquo;Smart&rdquo; TVs automatically <a
+    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928";>
+    load downgrades that install a surveillance app</a>.</p>
+
+    <p>We link to the article for the facts it presents. It
+    is too bad that the article finishes by advocating the
+    moral weakness of surrendering to Netflix. The Netflix app <a
+    href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+    malware too</a>.</p>
+  </li>
+
+  <li id="M201702060">
+    <!--#set var="DATE" value='<small class="date-tag">2017-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Vizio &ldquo;smart&rdquo; <a
+    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen";>TVs
+    report everything that is viewed on them, and not just broadcasts and
+    cable</a>. Even if the image is coming from the user's own computer,
+    the TV reports what it is. The existence of a way to disable the
+    surveillance, even if it were not hidden as it was in these TVs,
+    does not legitimize the surveillance.</p>
+  </li>
+
+  <li id="M201511130">
+    <!--#set var="DATE" value='<small class="date-tag">2015-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Some web and TV advertisements play inaudible
+    sounds to be picked up by proprietary malware running
+    on other devices in range so as to determine that they
+    are nearby.  Once your Internet devices are paired with
+    your TV, advertisers can correlate ads with Web activity, and other <a
+    
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/";>
+    cross-device tracking</a>.</p>
+  </li>
+
+  <li id="M201511060">
+    <!--#set var="DATE" value='<small class="date-tag">2015-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Vizio goes a step further than other TV
+    manufacturers in spying on their users: their <a
+    
href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you";>
+    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
+    link them your IP address</a> so that advertisers can track you
+    across devices.</p>
+
+    <p>It is possible to turn this off, but having it enabled by default
+    is an injustice already.</p>
+  </li>
+
+  <li id="M201511020">
+    <!--#set var="DATE" value='<small class="date-tag">2015-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Tivo's alliance with Viacom adds 2.3 million households
+    to the 600 millions social media profiles the company
+    already monitors. Tivo customers are unaware they're
+    being watched by advertisers. By combining TV viewing
+    information with online social media participation, Tivo can now <a
+    href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102";>
+    correlate TV advertisement with online purchases</a>, exposing all
+    users to new combined surveillance by default.</p>
+  </li>
+
+  <li id="M201507240">
+    <!--#set var="DATE" value='<small class="date-tag">2015-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Vizio &ldquo;smart&rdquo; TVs recognize and <a
+    href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/";>track
+    what people are watching</a>, even if it isn't a TV channel.</p>
+  </li>
+
+  <li id="M201505290">
+    <!--#set var="DATE" value='<small class="date-tag">2015-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Verizon cable TV <a
+    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/";>
+    snoops on what programs people watch, and even what they wanted to
+    record</a>.</p>
+  </li>
+
+  <li id="M201504300">
+    <!--#set var="DATE" value='<small class="date-tag">2015-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Vizio <a
+    href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";>
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
+    users watch</a>.  The TVs did not do that when first sold.</p>
+  </li>
+
+  <li id="M201502090">
+    <!--#set var="DATE" value='<small class="date-tag">2015-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Samsung &ldquo;Smart&rdquo; TV <a
+    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm";>
+    transmits users' voice on the internet to another company, Nuance</a>.
+    Nuance can save it and would then have to give it to the US or some
+    other government.</p>
+
+    <p>Speech recognition is not to be trusted unless it is done by free
+    software in your own computer.</p>
+
+    <p>In its privacy policy, Samsung explicitly confirms that <a
+    
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs";>voice
+    data containing sensitive information will be transmitted to third
+    parties</a>.</p>
+  </li>
+
+  <li id="M201411090">
+    <!--#set var="DATE" value='<small class="date-tag">2014-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Amazon &ldquo;Smart&rdquo; TV is <a
+    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance";>
+    snooping all the time</a>.</p>
+  </li>
+
+  <li id="M201409290">
+    <!--#set var="DATE" value='<small class="date-tag">2014-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>More or less all &ldquo;smart&rdquo; TVs <a
+    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/";>spy
+    on their users</a>.</p>
+
+    <p>The report was as of 2014, but we don't expect this has got
+    better.</p>
+
+    <p>This shows that laws requiring products to get users' formal
+    consent before collecting personal data are totally inadequate.
+    And what happens if a user declines consent? Probably the TV will
+    say, &ldquo;Without your consent to tracking, the TV will not
+    work.&rdquo;</p>
+
+    <p>Proper laws would say that TVs are not allowed to report what the
+    user watches&mdash;no exceptions!</p>
+  </li>
+
+  <li id="M201405200">
+    <!--#set var="DATE" value='<small class="date-tag">2014-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Spyware in LG &ldquo;smart&rdquo; TVs <a
+    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html";>
+    reports what the user watches, and the switch to turn this off has
+    no effect</a>.  (The fact that the transmission reports a 404 error
+    really means nothing; the server could save that data anyway.)</p> 
+
+    <p>Even worse, it <a
+    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/";>
+    snoops on other devices on the user's local network</a>.</p>
+
+    <p>LG later said it had installed a patch to stop this, but any
+    product could spy this way.</p>
+
+    <p>Meanwhile, LG TVs <a
+    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>
+    do lots of spying anyway</a>.</p>
+  </li>
+
+  <li id="M201212170">
+    <!--#set var="DATE" value='<small class="date-tag">2012-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p id="break-security-smarttv"><a
+    
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html";>
+    Crackers found a way to break security on a &ldquo;smart&rdquo; TV</a>
+    and use its camera to watch the people who are watching TV.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInCameras">Cameras</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M201901100">
+    <!--#set var="DATE" value='<small class="date-tag">2019-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Amazon Ring &ldquo;security&rdquo; devices <a
+    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/";>
+    send the video they capture to Amazon servers</a>, which save it
+    long-term.</p>
+
+    <p>In many cases, the video shows everyone that comes near, or merely
+    passes by, the user's front door.</p>
+
+    <p>The article focuses on how Ring used to let individual employees look
+    at the videos freely.  It appears Amazon has tried to prevent that
+    secondary abuse, but the primary abuse&mdash;that Amazon gets the
+    video&mdash;Amazon expects society to surrender to.</p>
+  </li>
+
+  <li id="M201810300">
+    <!--#set var="DATE" value='<small class="date-tag">2018-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Nearly all &ldquo;home security cameras&rdquo; <a
+    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/";>
+    give the manufacturer an unencrypted copy of everything they
+    see</a>. &ldquo;Home insecurity camera&rdquo; would be a better
+    name!</p>
+
+    <p>When Consumer Reports tested them, it suggested that these
+    manufacturers promise not to look at what's in the videos. That's not
+    security for your home. Security means making sure they don't get to
+    see through your camera.</p>
+  </li>
+
+  <li id="M201603220">
+    <!--#set var="DATE" value='<small class="date-tag">2016-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Over 70 brands of network-connected surveillance cameras have <a
+    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html";>
+    security bugs that allow anyone to watch through them</a>.</p>
+  </li>
+
+  <li id="M201511250">
+    <!--#set var="DATE" value='<small class="date-tag">2015-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Nest Cam &ldquo;smart&rdquo; camera is <a
+    href="http://www.bbc.com/news/technology-34922712";>always watching</a>,
+    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;</p>
+
+    <p>A &ldquo;smart&rdquo; device means the manufacturer is using it
+    to outsmart you.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInToys">Toys</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M201711244">
+    <!--#set var="DATE" value='<small class="date-tag">2017-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Furby Connect has a <a
+    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>
+    universal back door</a>. If the product as shipped doesn't act as a
+    listening device, remote changes to the code could surely convert it
+    into one.</p>
+  </li>
+
+  <li id="M201711100">
+    <!--#set var="DATE" value='<small class="date-tag">2017-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A remote-control sex toy was found to make <a
+    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei";>audio
+    recordings of the conversation between two users</a>.</p>
+  </li>
+
+  <li id="M201703140">
+    <!--#set var="DATE" value='<small class="date-tag">2017-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A computerized vibrator <a
+    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack";>
+    was snooping on its users through the proprietary control app</a>.</p>
+
+    <p>The app was reporting the temperature of the vibrator minute by
+    minute (thus, indirectly, whether it was surrounded by a person's
+    body), as well as the vibration frequency.</p>
+
+    <p>Note the totally inadequate proposed response: a labeling
+    standard with which manufacturers would make statements about their
+    products, rather than free software which users could have checked
+    and changed.</p>
+
+    <p>The company that made the vibrator <a
+    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit";>
+    was sued for collecting lots of personal information about how people
+    used it</a>.</p>
+
+    <p>The company's statement that it was anonymizing the data may be
+    true, but it doesn't really matter. If it had sold the data to a data
+    broker, the data broker would have been able to figure out who the
+    user was.</p>
+
+    <p>Following this lawsuit, <a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits";>
+    the company has been ordered to pay a total of C$4m</a> to its
+    customers.</p>
+  </li>
+
+  <li id="M201702280">
+    <!--#set var="DATE" value='<small class="date-tag">2017-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>&ldquo;CloudPets&rdquo; toys with microphones <a
+    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults";>
+    leak childrens' conversations to the manufacturer</a>. Guess what? <a
+    
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings";>
+    Crackers found a way to access the data</a> collected by the
+    manufacturer's snooping.</p>
+
+    <p>That the manufacturer and the FBI could listen to these
+    conversations was unacceptable by itself.</p>
+  </li>
+
+  <li id="M201612060">
+    <!--#set var="DATE" value='<small class="date-tag">2016-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit <a
+    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws";>children's
+    conversations to Nuance Communications</a>, a speech recognition
+    company based in the U.S.</p>
+
+    <p>Those toys also contain major security vulnerabilities; crackers
+    can remotely control the toys with a mobile phone. This would enable
+    crackers to listen in on a child's speech, and even speak into the
+    toys themselves.</p>
+  </li>
+
+  <li id="M201502180">
+    <!--#set var="DATE" value='<small class="date-tag">2015-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Barbie <a
+    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673";>is
+    going to spy on children and adults</a>.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInDrones">Drones</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M201708040">
+    <!--#set var="DATE" value='<small class="date-tag">2017-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>While you're using a DJI drone
+    to snoop on other people, DJI is in many cases <a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity";>snooping
+    on you</a>.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareAtHome">Other Appliances</h4><span 
class="anchor-reference-id">(<a href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M202009270">
+    <!--#set var="DATE" value='<small class="date-tag">2020-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Many employers are using nonfree
+    software, including videoconference software, to <a
+    
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance";>
+    surveil and monitor staff working at home</a>. If the program reports
+    whether you are &ldquo;active,&rdquo; that is in effect a malicious
+    surveillance feature.</p>
+  </li>
+
+  <li id="M202008030">
+    <!--#set var="DATE" value='<small class="date-tag">2020-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Google Nest <a
+    
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/";>
+    is taking over ADT</a>. Google sent out a software
+    update to its speaker devices using their back door <a
+    href="https://www.protocol.com/google-smart-speaker-alarm-adt";> that
+    listens for things like smoke alarms</a> and then notifies your phone
+    that an alarm is happening. This means the devices now listen for more
+    than just their wake words. Google says the software update was sent
+    out prematurely and on accident and Google was planning on disclosing
+    this new feature and offering it to customers who pay for it.</p>
+  </li>
+
+  <li id="M202006300">
+    <!--#set var="DATE" value='<small class="date-tag">2020-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>&ldquo;Bossware&rdquo; is malware that bosses <a
+    
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers";>
+    coerce workers into installing in their own computers</a>, so the
+    bosses can spy on them.</p>
+
+    <p>This shows why requiring the user's &ldquo;consent&rdquo; is not
+    an adequate basis for protecting digital privacy.  The boss can coerce
+    most workers into consenting to almost anything, even probable exposure
+    to contagious disease that can be fatal.  Software like this should
+    be illegal and bosses that demand it should be prosecuted for it.</p>
+  </li>
+
+  <li id="M201911190">
+    <!--#set var="DATE" value='<small class="date-tag">2019-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers to <a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password";>
+    access the user's wifi password</a>, and snoop on the household
+    through connected surveillance devices.</p>
+
+    <p>Knowledge of the wifi password would not be sufficient to carry
+    out any significant surveillance if the devices implemented proper
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they are also used by their
+    manufacturers for snooping.</p>
+  </li>
+
+  <li id="M201907210">
+    <!--#set var="DATE" value='<small class="date-tag">2019-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Google &ldquo;Assistant&rdquo; records users' conversations <a
+    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/";>even
+    when it is not supposed to listen</a>. Thus, when one of Google's
+    subcontractors discloses a thousand confidential voice recordings,
+    users were easily identified from these recordings.</p>
+
+    <p>Since Google &ldquo;Assistant&rdquo; uses proprietary software, there 
is no
+    way to see or control what it records or sends.</p>
+
+    <p>Rather than trying to better control the use of recordings, Google
+    should not record or listen to the person's voice.  It should only
+    get commands that the user wants to send to some Google service.</p>
+  </li>
+
+  <li id="M201905061">
+    <!--#set var="DATE" value='<small class="date-tag">2019-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, <a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php";>
+    the data remain on other servers</a>, where they can be accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.</p>
+
+    <p>Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)</p>
+  </li>
+
+  <li id="M201904240">
+    <!--#set var="DATE" value='<small class="date-tag">2019-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Some of users' commands to the Alexa service are <a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html";>
+    recorded for Amazon employees to listen to</a>. The Google and Apple
+    voice assistants do similar things.</p>
+
+    <p>A fraction of the Alexa service staff even has access to <a
+    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788";>
+    location and other personal data</a>.</p>
+
+    <p>Since the client program is nonfree, and data processing is done
+    &ldquo;<a href="/philosophy/words-to-avoid.html#CloudComputing">in
+    the cloud</a>&rdquo; (a soothing way of saying &ldquo;We won't
+    tell you how and where it's done&rdquo;), users have no way
+    to know what happens to the recordings unless human eavesdroppers <a
+    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033";>
+    break their non-disclosure agreements</a>.</p>
+  </li>
+
+  <li id="M201902080">
+    <!--#set var="DATE" value='<small class="date-tag">2019-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The HP <a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html";>
+    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
+    communicates with HP servers</a> to make sure the user is still
+    paying for the subscription, and hasn't printed more pages than were
+    paid for.</p>
+
+    <p>Even though the ink subscription program may be cheaper in some
+    specific cases, it spies on users, and involves totally unacceptable
+    restrictions in the use of ink cartridges that would otherwise be in
+    working order.</p>
+  </li>
+
+  <li id="M201808120">
+    <!--#set var="DATE" value='<small class="date-tag">2018-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Crackers found a way to break the security of an Amazon device,
+    and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html";>
+    turn it into a listening device</a> for them.</p>
+
+    <p>It was very difficult for them to do this. The job would be much
+    easier for Amazon. And if some government such as China or the US
+    told Amazon to do this, or cease to sell the product in that country,
+    do you think Amazon would have the moral fiber to say no?</p>
+
+    <p><small>(These crackers are probably hackers too, but please <a
+    href="https://stallman.org/articles/on-hacking.html";> don't use
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;</a>.)</small></p>
+  </li>
+
+  <li id="M201804140">
+    <!--#set var="DATE" value='<small class="date-tag">2018-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A medical insurance company <a
+    
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next";>
+    offers a gratis electronic toothbrush that snoops on its user by
+    sending usage data back over the Internet</a>.</p>
+  </li>
+
+  <li id="M201706204">
+    <!--#set var="DATE" value='<small class="date-tag">2017-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Lots of &ldquo;smart&rdquo; products are designed <a
+    
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022";>to
+    listen to everyone in the house, all the time</a>.</p>
+
+    <p>Today's technological practice does not include any way of making
+    a device that can obey your voice commands without potentially spying
+    on you.  Even if it is air-gapped, it could be saving up records
+    about you for later examination.</p>
+  </li>
+
+  <li id="M201407170">
+    <!--#set var="DATE" value='<small class="date-tag">2014-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p id="nest-thermometers">Nest thermometers send <a
+    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack";>a lot of
+    data about the user</a>.</p>
+  </li>
+
+  <li id="M201310260">
+    <!--#set var="DATE" value='<small class="date-tag">2013-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm";>
+    Rent-to-own computers were programmed to spy on their renters</a>.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareOnWearables">Wearables</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareOnWearables">#SpywareOnWearables</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M201807260">
+    <!--#set var="DATE" value='<small class="date-tag">2018-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Tommy Hilfiger clothing <a
+    
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers";>will
+    monitor how often people wear it</a>.</p>
+
+    <p>This will teach the sheeple to find it normal that companies
+    monitor every aspect of what they do.</p>
+  </li>
+</ul>
+
+
+<h5 id="SpywareOnSmartWatches">&ldquo;Smart&rdquo; Watches</h5>
+
+<ul class="blurbs">
+  <li id="M202009100">
+    <!--#set var="DATE" value='<small class="date-tag">2020-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Internet-enabled watches with proprietary software
+    are malware, violating people (specially children's)
+    privacy. In addition, they have a lot of security flaws. They <a
+    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/";>
+    permit security breakers (and unauthorized people) to access</a> the 
watch.</p>
+
+    <p>Thus, ill-intentioned unauthorized people can intercept communications 
between parent and child and spoof messages to and from the watch, possibly 
endangering the child.</p>
+
+    <p><small>(Note that this article misuses the word &ldquo;<a
+    href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;
+    to mean &ldquo;crackers.&rdquo;)</small></p>
+  </li>
+
+  <li id="M201603020">
+    <!--#set var="DATE" value='<small class="date-tag">2016-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A very cheap &ldquo;smart watch&rdquo; comes with an Android app <a
+    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/";>
+    that connects to an unidentified site in China</a>.</p>
+
+    <p>The article says this is a back door, but that could be a
+    misunderstanding.  However, it is certainly surveillance, at least.</p>
+  </li>
+
+  <li id="M201407090">
+    <!--#set var="DATE" value='<small class="date-tag">2014-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>An LG &ldquo;smart&rdquo; watch is designed <a
+    
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html";>
+    to report its location to someone else and to transmit conversations
+    too</a>.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInVehicles">Vehicles</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M202105130">
+    <!--#set var="DATE" value='<small class="date-tag">2021-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    href="https://gizmodo.com/get-ready-for-in-car-ads-1846888390";>Ford
+    is planning to force ads on drivers in cars</a>, with the ability for
+    the owner to pay extra to turn them off. The system probably imposes
+    surveillance on drivers too.</p>
+  </li>
+
+  <li id="M202008181">
+    <!--#set var="DATE" value='<small class="date-tag">2020-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>New Toyotas will <a
+    href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/";>
+    upload data to AWS to help create custom insurance premiums</a>
+    based on driver behaviour.</p>
+
+    <p>Before you buy a &ldquo;connected&rdquo; car, make sure you can
+    disconnect its cellular antenna and its GPS antenna.  If you want
+    GPS navigation, get a separate navigator which runs free software
+    and works with Open Street Map.</p>
+  </li>
+
+  <li id="M201912171">
+    <!--#set var="DATE" value='<small class="date-tag">2019-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Most modern cars now <a
+    href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html";>
+    record and send various kinds of data to the manufacturer</a>. For
+    the user, access to the data is nearly impossible, as it involves
+    cracking the car's computer, which is always hidden and running with
+    proprietary software.</p>
+  </li>
+
+  <li id="M201903290">
+    <!--#set var="DATE" value='<small class="date-tag">2019-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Tesla cars collect lots of personal data, and <a
+    
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html";>
+    when they go to a junkyard the driver's personal data goes with
+    them</a>.</p>
+  </li>
+
+  <li id="M201902011">
+    <!--#set var="DATE" value='<small class="date-tag">2019-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The FordPass Connect feature of some Ford vehicles has <a
+    
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html";>
+    near-complete access to the internal car network</a>. It is constantly
+    connected to the cellular phone network and sends Ford a lot of data,
+    including car location. This feature operates even when the ignition
+    key is removed, and users report that they can't disable it.</p>
+
+    <p>If you own one of these cars, have you succeeded in breaking the
+    connectivity by disconnecting the cellular modem, or wrapping the
+    antenna in aluminum foil?</p>
+  </li>
+
+  <li id="M201811300">
+    <!--#set var="DATE" value='<small class="date-tag">2018-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>In China, it is mandatory for electric
+    cars to be equipped with a terminal that <a
+    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca";>
+    transfers technical data, including car location,
+    to a government-run platform</a>. In practice, <a
+    href="/proprietary/proprietary-surveillance.html#car-spying">
+    manufacturers collect this data</a> as part of their own spying, then
+    forward it to the government-run platform.</p>
+  </li>
+
+  <li id="M201810230">
+    <!--#set var="DATE" value='<small class="date-tag">2018-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>GM <a
+    href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html";>
+    tracked the choices of radio programs</a> in its
+    &ldquo;connected&rdquo; cars, minute by minute.</p>
+
+    <p>GM did not get users' consent, but it could have got that easily by
+    sneaking it into the contract that users sign for some digital service
+    or other. A requirement for consent is effectively no protection.</p>
+
+    <p>The cars can also collect lots of other data: listening to you,
+    watching you, following your movements, tracking passengers' cell
+    phones. <em>All</em> such data collection should be forbidden.</p>
+
+    <p>But if you really want to be safe, we must make sure the car's
+    hardware cannot collect any of that data, or that the software
+    is free so we know it won't collect any of that data.</p>
+  </li>
+
+  <li id="M201711230">
+    <!--#set var="DATE" value='<small class="date-tag">2017-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>AI-powered driving apps can <a
+    
href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move";>
+    track your every move</a>.</p>
+  </li>
+
+  <li id="M201607160">
+    <!--#set var="DATE" value='<small class="date-tag">2016-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p id="car-spying">Computerized cars with nonfree software are <a
+    
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html";>
+    snooping devices</a>.</p>
+  </li>
+
+  <li id="M201602240">
+    <!--#set var="DATE" value='<small class="date-tag">2016-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p id="nissan-modem">The Nissan Leaf has a built-in
+    cell phone modem which allows effectively anyone to <a
+    href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/";>
+    access its computers remotely and make changes in various
+    settings</a>.</p>
+
+    <p>That's easy to do because the system has no authentication
+    when accessed through the modem.  However, even if it asked
+    for authentication, you couldn't be confident that Nissan
+    has no access.  The software in the car is proprietary, <a
+    href="/philosophy/free-software-even-more-important.html">which means
+    it demands blind faith from its users</a>.</p>
+
+    <p>Even if no one connects to the car remotely, the cell phone modem
+    enables the phone company to track the car's movements all the time;
+    it is possible to physically remove the cell phone modem, though.</p>
+  </li>
+
+  <li id="M201306140">
+    <!--#set var="DATE" value='<small class="date-tag">2013-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Tesla cars allow the company to extract
+    data remotely and determine the car's location
+    at any time. (See Section 2, paragraphs b and c of the <a
+    
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf";>
+    privacy statement</a>.) The company says it doesn't store this
+    information, but if the state orders it to get the data and hand it
+    over, the state can store it.</p>
+  </li>
+
+  <li id="M201303250">
+    <!--#set var="DATE" value='<small class="date-tag">2013-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p id="records-drivers">Proprietary software in cars <a
+    
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/";>
+    records information about drivers' movements</a>, which is made
+    available to car manufacturers, insurance companies, and others.</p>
+
+    <p>The case of toll-collection systems, mentioned in this article,
+    is not really a matter of proprietary surveillance. These systems
+    are an intolerable invasion of privacy, and should be replaced with
+    anonymous payment systems, but the invasion isn't done by malware. The
+    other cases mentioned are done by proprietary malware in the car.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInVR">Virtual Reality</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInVR">#SpywareInVR</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M202008182">
+    <!--#set var="DATE" value='<small class="date-tag">2020-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Oculus headsets <a
+    
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october";>require
+    users to identify themselves to Facebook</a>. This will give Facebook
+    free rein to pervasively snoop on Oculus users.</p>
+  </li>
+
+  <li id="M201612230">
+    <!--#set var="DATE" value='<small class="date-tag">2016-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>VR equipment, measuring every slight motion,
+    creates the potential for the most intimate
+    surveillance ever. All it takes to make this potential real <a
+    
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/";>is
+    software as malicious as many other programs listed in this
+    page</a>.</p>
+
+    <p>You can bet Facebook will implement the maximum possible
+    surveillance on Oculus Rift devices. The moral is, never trust a VR
+    system with nonfree software in it.</p>
+  </li>
+</ul>
+
+
+
+<div class="big-section">
+  <h3 id="SpywareOnTheWeb">Spyware on the Web</h3>
+  <span class="anchor-reference-id">(<a 
href="#SpywareOnTheWeb">#SpywareOnTheWeb</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<p>In addition, many web sites spy on their visitors.  Web sites are not
+   programs, so it
+   <a href="/philosophy/network-services-arent-free-or-nonfree.html">
+   makes no sense to call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;</a>,
+   but the surveillance is an abuse all the same.</p>
+
+<ul class="blurbs">
+  <li id="M201904210">
+    <!--#set var="DATE" value='<small class="date-tag">2019-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>As of April 2019, it is <a
+    
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/";>no
+    longer possible to disable an
+    unscrupulous tracking anti-feature</a> that <a
+    
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing";>reports
+    users when they follow ping links</a> in Apple Safari, Google Chrome,
+    Opera, Microsoft Edge and also in the upcoming Microsoft Edge that is
+    going to be based on Chromium.</p>
+  </li>
+
+  <li id="M201901101">
+    <!--#set var="DATE" value='<small class="date-tag">2019-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Until 2015, any tweet that listed a geographical tag <a
+    
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/";>
+    sent the precise GPS location to Twitter's server</a>. It still
+    contains these GPS locations.</p>
+  </li>
+
+  <li id="M201805170">
+    <!--#set var="DATE" value='<small class="date-tag">2018-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Storyful program <a
+    
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch";>spies
+    on the reporters that use it</a>.</p>
+  </li>
+
+  <li id="M201701060">
+    <!--#set var="DATE" value='<small class="date-tag">2017-01</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>When a page uses Disqus
+    for comments, the proprietary Disqus software <a
+    
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook";>loads
+    a Facebook software package into the browser of every anonymous visitor
+    to the page, and makes the page's URL available to Facebook</a>.</p>
+  </li>
+
+  <li id="M201612064">
+    <!--#set var="DATE" value='<small class="date-tag">2016-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Online sales, with tracking and surveillance of customers, <a
+    
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices";>enables
+    businesses to show different people different prices</a>. Most of
+    the tracking is done by recording interactions with servers, but
+    proprietary software contributes.</p>
+  </li>
+
+  <li id="M201405140">
+    <!--#set var="DATE" value='<small class="date-tag">2014-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/";>
+    Microsoft SkyDrive allows the NSA to directly examine users'
+    data</a>.</p>
+  </li>
+
+  <li id="M201210240">
+    <!--#set var="DATE" value='<small class="date-tag">2012-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Many web sites rat their visitors to advertising
+    networks that track users.  Of the top 1000 web sites, <a
+    
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/";>84%
+    (as of 5/17/2012) fed their visitors third-party cookies, allowing
+    other sites to track them</a>.</p>
+  </li>
+
+  <li id="M201208210">
+    <!--#set var="DATE" value='<small class="date-tag">2012-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Many web sites report all their visitors
+    to Google by using the Google Analytics service, which <a
+    
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/";>
+    tells Google the IP address and the page that was visited</a>.</p>
+  </li>
+
+  <li id="M201200000">
+    <!--#set var="DATE" value='<small class="date-tag">[2012]</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Many web sites try to collect users' address books (the user's list
+    of other people's phone numbers or email addresses).  This violates
+    the privacy of those other people.</p>
+  </li>
+
+  <li id="M201110040">
+    <!--#set var="DATE" value='<small class="date-tag">2011-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Pages that contain &ldquo;Like&rdquo; buttons <a
+    
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html";>
+    enable Facebook to track visitors to those pages</a>&mdash;even users
+    that don't have Facebook accounts.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInJavaScript">JavaScript</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInJavaScript">#SpywareInJavaScript</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M201811270">
+    <!--#set var="DATE" value='<small class="date-tag">2018-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Many web sites use JavaScript code <a
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
+    to snoop on information that users have typed into a
+    form but not sent</a>, in order to learn their identity. Some are <a
+    
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege";>
+    getting sued</a> for this.</p>
+
+    <p>The chat facilities of some customer services use the same sort of
+    malware to <a
+    
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119";>
+    read what the user is typing before it is posted</a>.</p>
+  </li>
+
+  <li id="M201807190">
+    <!--#set var="DATE" value='<small class="date-tag">2018-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>British Airways used <a
+    
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security";>nonfree
+    JavaScript on its web site to give other companies personal data on
+    its customers</a>.</p>
+  </li>
+
+  <li id="M201712300">
+    <!--#set var="DATE" value='<small class="date-tag">2017-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Some JavaScript malware <a
+    
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research";>
+    swipes usernames from browser-based password managers</a>.</p>
+  </li>
+
+  <li id="M201711150">
+    <!--#set var="DATE" value='<small class="date-tag">2017-11</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Some websites send
+    JavaScript code to collect all the user's input, <a
+    
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/";>which
+    can then be used to reproduce the whole session</a>.</p>
+
+    <p>If you use LibreJS, it will block that malicious JavaScript
+    code.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInFlash">Flash</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M201310110">
+    <!--#set var="DATE" value='<small class="date-tag">2013-10</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Flash and JavaScript are used for <a
+    
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/";>
+    &ldquo;fingerprinting&rdquo; devices</a> to identify users.</p>
+  </li>
+
+  <li id="M201003010">
+    <!--#set var="DATE" value='<small class="date-tag">2010-03</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Flash Player's <a
+    
href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/";>
+    cookie feature helps web sites track visitors</a>.</p>
+  </li>
+</ul>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInChrome">Chrome</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M201906220">
+    <!--#set var="DATE" value='<small class="date-tag">2019-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Google Chrome is an <a
+    
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/";>
+    instrument of surveillance</a>. It lets thousands of trackers invade
+    users' computers and report the sites they visit to advertising and
+    data companies, first of all to Google. Moreover, if users have a
+    Gmail account, Chrome automatically logs them in to the browser for
+    more convenient profiling. On Android, Chrome also reports their
+    location to Google.</p>
+
+    <p>The best way to escape surveillance is to switch to <a
+    href="/software/icecat/">IceCat</a>, a modified version of Firefox
+    with several changes to protect users' privacy.</p>
+  </li>
+
+  <li id="M201704131">
+    <!--#set var="DATE" value='<small class="date-tag">2017-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Low-priced Chromebooks for schools are <a
+    href="https://www.eff.org/wp/school-issued-devices-and-student-privacy";>
+    collecting far more data on students than is necessary, and store
+    it indefinitely</a>. Parents and students complain about the lack
+    of transparency on the part of both the educational services and the
+    schools, the difficulty of opting out of these services, and the lack
+    of proper privacy policies, among other things.</p>
+
+    <p>But complaining is not sufficient. Parents, students and teachers
+    should realize that the software Google uses to spy on students is
+    nonfree, so they can't verify what it really does. The only remedy is
+    to persuade school officials to <a href="/education/edu-schools.html">
+    exclusively use free software</a> for both education and school
+    administration. If the school is run locally, parents and teachers
+    can mandate their representatives at the School Board to refuse the
+    budget unless the school initiates a switch to free software. If
+    education is run nation-wide, they need to persuade legislators
+    (e.g., through free software organizations, political parties,
+    etc.) to migrate the public schools to free software.</p>
+  </li>
+
+  <li id="M201507280">
+    <!--#set var="DATE" value='<small class="date-tag">2015-07</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Google Chrome makes it easy for an extension to do <a
+    
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/";>total
+    snooping on the user's browsing</a>, and many of them do so.</p>
+  </li>
+
+  <li id="M201506180">
+    <!--#set var="DATE" value='<small class="date-tag">2015-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Google Chrome includes a module that <a
+    
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/";>
+    activates microphones and transmits audio to its servers</a>.</p>
+  </li>
+
+  <li id="M201308040">
+    <!--#set var="DATE" value='<small class="date-tag">2013-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Google Chrome <a
+    href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/";>
+    spies on browser history, affiliations</a>, and other installed
+    software.</p>
+  </li>
+
+  <li id="M200809060">
+    <!--#set var="DATE" value='<small class="date-tag">2008-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Google Chrome contains a key logger that <a
+    
href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/";>
+    sends Google every URL typed in</a>, one key at a time.</p>
+  </li>
+</ul>
+
+
+
+<div class="big-section">
+  <h3 id="SpywareInNetworks">Spyware in Networks</h3>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInNetworks">#SpywareInNetworks</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul class="blurbs">
+  <li id="M202105060">
+    <!--#set var="DATE" value='<small class="date-tag">2021-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://me2ba.org/me2ba-product-testing-spotlight-report-published-data-sharing-in-primary-secondary-school-mobile-apps-2/";>60%
+    of school apps are sending student data to potentially high-risk
+    third parties</a>, putting students and possibly all other school
+    workers under surveillance. This is made possible by using unsafe
+    and proprietary programs made by data-hungry corporations.</p>
+
+    <p><small>Please note that whether students consent to this or not,
+    doesn't justify the surveillance they're imposed to.</small></p>
+  </li>
+
+  <li id="M202105030">
+    <!--#set var="DATE" value='<small class="date-tag">2021-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The United States' government is reportedly considering <a
+    
href="https://www.infosecurity-magazine.com/news/private-companies-may-spy-on/";>teaming
+    up with private companies to monitor American citizens' private online
+    activity and digital communications</a>.</p>
+
+    <p>What creates the opportunity to try this is the fact that these
+    companies are already snooping on users' private activities. That
+    in turn is due to people's use of nonfree software which snoops,
+    and online dis-services which snoop.</p>
+  </li>
+
+  <li id="M202102160">
+    <!--#set var="DATE" value='<small class="date-tag">2021-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Google <a
+    
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16";>handed
+    over personal data of Indian protesters and activists to Indian
+    police</a> which led to their arrest. The cops requested the IP
+    address and the location where a document was created and with that
+    information, they identified protesters and activists.</p>
+  </li>
+
+  <li id="M202012250">
+    <!--#set var="DATE" value='<small class="date-tag">2020-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The HonorLock online exam
+    proctoring program is a surveillance tool that <a
+    
href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps";>tracks
+    students and collects data</a> such as face, driving license, and
+    network information, among others, in blatant violation of students'
+    privacy.</p>
+
+    <p>Preventing students from cheating should not be an excuse for
+    running malware/spyware on their computers, and it's good that students
+    are protesting. But their petitions overlook a crucial issue, namely,
+    the injustice of being forced to run nonfree software in order to
+    get an education.</p>
+  </li>
+
+  <li id="M202009070">
+    <!--#set var="DATE" value='<small class="date-tag">2020-09</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>While the world is still
+    struggling with COVID-19 coronavirus, many <a
+    
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/";>people
+    are in danger of surveillance</a> and their computers are infected
+    with malware as a result of installing proprietary software.</p>
+  </li>
+
+  <li id="M202004301">
+    <!--#set var="DATE" value='<small class="date-tag">2020-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Proprietary programs Google Meet, Microsoft Teams, and WebEx <a
+    
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/";>are
+    collecting user's personal and identifiable data</a> including how long
+    a call lasts, who's participating in the call, and the IP addresses
+    of everyone taking part. From experience, this can even harm users
+    physically if those companies hand over data to governments.</p>
+  </li>
+
+  <li id="M201905281">
+    <!--#set var="DATE" value='<small class="date-tag">2019-05</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Microsoft <a
+    
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08";>forces
+    people to give their phone number</a> in order to be able to create an 
account on
+    the company's network. On top of mistreating their users by providing
+    nonfree software, Microsoft is tracking their lives outside the computer 
and
+    violates their privacy.</p>
+  </li>
+
+  <li id="M201902040">
+    <!--#set var="DATE" value='<small class="date-tag">2019-02</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Google invites people to <a
+    
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss";>
+    let Google monitor their phone use, and all internet use in their
+    homes, for an extravagant payment of $20</a>.</p>
+
+    <p>This is not a malicious functionality of a program with some other
+    purpose; this is the software's sole purpose, and Google says so. But
+    Google says it in a way that encourages most people to ignore the
+    details. That, we believe, makes it fitting to list here.</p>
+  </li>
+
+  <li id="M201808131">
+    <!--#set var="DATE" value='<small class="date-tag">2018-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p><a
+    
href="https://www.theverge.com/2018/8/13/17684660/google-turn-off-location-history-data";>Google
+    will track people even if people turn off location history</a>, using
+    Google Maps, weather updates, and browser searches. Google basically
+    uses any app activity to track people.</p>
+  </li>
+
+  <li id="M201808130">
+    <!--#set var="DATE" value='<small class="date-tag">2018-08</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Since the beginning of 2017, <a
+    
href="https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/";>Android
+    phones have been collecting the addresses of nearby cellular
+    towers</a>, even when location services are disabled, and sending
+    that data back to Google.</p>
+  </li>
+
+  <li id="M201606030">
+    <!--#set var="DATE" value='<small class="date-tag">2016-06</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>Investigation Shows <a
+    
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml";>GCHQ
+    Using US Companies, NSA To Route Around Domestic Surveillance
+    Restrictions</a>.</p>
+
+    <p>Specifically, it can collect the emails of members of Parliament
+    this way, because they pass it through Microsoft.</p>
+  </li>
+
+  <li id="M201212290">
+    <!--#set var="DATE" value='<small class="date-tag">2012-12</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>The Cisco TNP IP phones are <a
+    href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html";>
+    spying devices</a>.</p>
+  </li>
+</ul>
+</div>
+
+</div>
+<!--#include virtual="/proprietary/proprietary-menu.html" -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer" role="contentinfo">
+<div class="unprintable">
+
+<p>Please send general FSF &amp; GNU inquiries to
+<a href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.  Broken links and other corrections or suggestions can be sent
+to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:web-translators@gnu.org";>
+        &lt;web-translators@gnu.org&gt;</a>.</p>
+
+        <p>For information on coordinating and contributing translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and contributing translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright &copy; 2015-2021 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/";>Creative
+Commons Attribution 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2021/06/26 14:00:01 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]