[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary proprietary-back-doors.fr.html ...
From: |
GNUN |
Subject: |
www/proprietary proprietary-back-doors.fr.html ... |
Date: |
Tue, 12 Oct 2021 04:33:57 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 21/10/12 04:33:57
Modified files:
proprietary : proprietary-back-doors.fr.html
proprietary-censorship.fr.html
proprietary/po : all.fr.po all.pot all.pt-br.po all.ru.po de.po
es.po fr.po it.po ja.po nl.po pl.po pot
proprietary-back-doors.fr-en.html
proprietary-censorship.fr-en.html
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.pt-br.po
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.tr.po
proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.fr.html?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.fr.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.fr.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pot?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.pt-br.po?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/all.ru.po?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.342&r2=1.343
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.490&r2=1.491
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.606&r2=1.607
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.342&r2=1.343
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.350&r2=1.351
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.343&r2=1.344
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.342&r2=1.343
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.341&r2=1.342
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr-en.html?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.fr-en.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.212&r2=1.213
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.404&r2=1.405
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.223&r2=1.224
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.657&r2=1.658
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.276&r2=1.277
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.416&r2=1.417
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.294&r2=1.295
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.397&r2=1.398
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.336&r2=1.337
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pt-br.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.734&r2=1.735
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.299&r2=1.300
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.316&r2=1.317
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.522&r2=1.523
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.540&r2=1.541
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.309&r2=1.310
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.325&r2=1.326
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.314&r2=1.315
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.308&r2=1.309
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.310&r2=1.311
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.299&r2=1.300
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.326&r2=1.327
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.291&r2=1.292
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.288&r2=1.289
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.456&r2=1.457
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.557&r2=1.558
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.204&r2=1.205
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.258&r2=1.259
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.289&r2=1.290
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.278&r2=1.279
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.426&r2=1.427
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.717&r2=1.718
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.222&r2=1.223
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.224&r2=1.225
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.342&r2=1.343
Patches:
Index: proprietary-back-doors.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.fr.html,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary-back-doors.fr.html 1 Sep 2021 19:32:58 -0000 1.106
+++ proprietary-back-doors.fr.html 12 Oct 2021 08:33:24 -0000 1.107
@@ -170,6 +170,23 @@
<h3 id='alter-data'>Altérer les données ou préférences de
l'utilisateur</h3>
<ul class="blurbs">
+ <li id="M202109220">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2021-09</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Certains téléphones Xiaomi ont une malfonction qui <a
+href="https://www.theguardian.com/world/2021/sep/22/lithuania-tells-citizens-to-throw-out-chinese-phones-over-censorship-concerns">supprime
+par un blip les phrases exprimant des opinions politiques mal considérées en
+Chine</a>. Cet outil de censure est désactivé par défaut dans les
téléphones
+vendus en Europe, mais Xiaomi a une porte dérobée qui lui permet de
+l'activer.</p>
+
+ <p>Voilà à quoi on peut s'attendre quand un appareil est équipé de
logiciel
+privateur qui peut communiquer avec son fabricant.</p>
+ </li>
+
<li id="M201905060">
<!--#set var="DATE" value='<small class="date-tag">
@@ -1169,7 +1186,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2021/09/01 19:32:58 $
+$Date: 2021/10/12 08:33:24 $
<!-- timestamp end -->
</p>
Index: proprietary-censorship.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.fr.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary-censorship.fr.html 1 Jun 2021 09:43:55 -0000 1.49
+++ proprietary-censorship.fr.html 12 Oct 2021 08:33:24 -0000 1.50
@@ -175,6 +175,27 @@
utilisateurs.</p>
</li>
</ul>
+
+<h3 id="other">Autres</h3>
+<ul class="blurbs">
+ <li id="M202109220">
+
+ <!--#set var="DATE" value='<small class="date-tag">
+2021-09</small>'
+ -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Certains téléphones Xiaomi ont une malfonction qui <a
+href="https://www.theguardian.com/world/2021/sep/22/lithuania-tells-citizens-to-throw-out-chinese-phones-over-censorship-concerns">supprime
+par un blip les phrases exprimant des opinions politiques mal considérées en
+Chine</a>. Cet outil de censure est désactivé par défaut dans les
téléphones
+vendus en Europe, mais Xiaomi a une porte dérobée qui lui permet de
+l'activer.</p>
+
+ <p>Voilà à quoi on peut s'attendre quand un appareil est équipé de
logiciel
+privateur qui peut communiquer avec son fabricant.</p>
+ </li>
+</ul>
+
</div>
<div class="translators-notes">
@@ -251,7 +272,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2021/06/01 09:43:55 $
+$Date: 2021/10/12 08:33:24 $
<!-- timestamp end -->
</p>
Index: po/all.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.fr.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- po/all.fr.po 12 Oct 2021 08:10:18 -0000 1.63
+++ po/all.fr.po 12 Oct 2021 08:33:26 -0000 1.64
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
"PO-Revision-Date: 2021-10-12 10:09+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-10-12 08:26+0000\n"
#. type: Content of: <title>
msgid ""
@@ -102,6 +103,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
Index: po/all.pot
===================================================================
RCS file: /web/www/www/proprietary/po/all.pot,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- po/all.pot 12 Oct 2021 07:33:24 -0000 1.33
+++ po/all.pot 12 Oct 2021 08:33:26 -0000 1.34
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -89,6 +89,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a "
+"href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/\">El
"
+"Salvador Dictatorship's Chivo wallet is spyware</a>, it's a proprietary "
+"program that breaks users' freedom and spies on people; demands personal "
+"data such as the national ID number and does face recognition, and it as bad "
+"security for its data. It also asks for almost every malware permission in "
+"people's smart phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a "
"href=\"https://www.techrepublic.com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/\">
"
"added a surveillance API (idle detection API)</a> which lets websites ask "
Index: po/all.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.pt-br.po,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- po/all.pt-br.po 12 Oct 2021 07:33:24 -0000 1.31
+++ po/all.pt-br.po 12 Oct 2021 08:33:26 -0000 1.32
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
"PO-Revision-Date: 2021-06-26 09:39-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -96,6 +96,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
Index: po/all.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/all.ru.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- po/all.ru.po 12 Oct 2021 08:04:09 -0000 1.60
+++ po/all.ru.po 12 Oct 2021 08:33:26 -0000 1.61
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: all.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
"PO-Revision-Date: 2021-04-27 13:06+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -17,6 +17,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-10-12 08:26+0000\n"
#. type: Content of: <title>
msgid ""
@@ -108,6 +109,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
Index: po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.342
retrieving revision 1.343
diff -u -b -r1.342 -r1.343
--- po/de.po 12 Oct 2021 07:33:24 -0000 1.342
+++ po/de.po 12 Oct 2021 08:33:29 -0000 1.343
@@ -677,6 +677,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.490
retrieving revision 1.491
diff -u -b -r1.490 -r1.491
--- po/es.po 12 Oct 2021 07:33:24 -0000 1.490
+++ po/es.po 12 Oct 2021 08:33:30 -0000 1.491
@@ -631,6 +631,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
Index: po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.606
retrieving revision 1.607
diff -u -b -r1.606 -r1.607
--- po/fr.po 12 Oct 2021 08:10:18 -0000 1.606
+++ po/fr.po 12 Oct 2021 08:33:32 -0000 1.607
@@ -525,6 +525,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
Index: po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.342
retrieving revision 1.343
diff -u -b -r1.342 -r1.343
--- po/it.po 12 Oct 2021 07:33:25 -0000 1.342
+++ po/it.po 12 Oct 2021 08:33:34 -0000 1.343
@@ -643,6 +643,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
Index: po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.350
retrieving revision 1.351
diff -u -b -r1.350 -r1.351
--- po/ja.po 12 Oct 2021 07:33:25 -0000 1.350
+++ po/ja.po 12 Oct 2021 08:33:36 -0000 1.351
@@ -486,6 +486,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
Index: po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.343
retrieving revision 1.344
diff -u -b -r1.343 -r1.344
--- po/nl.po 12 Oct 2021 07:33:25 -0000 1.343
+++ po/nl.po 12 Oct 2021 08:33:36 -0000 1.344
@@ -464,6 +464,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
Index: po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.342
retrieving revision 1.343
diff -u -b -r1.342 -r1.343
--- po/pl.po 12 Oct 2021 07:33:25 -0000 1.342
+++ po/pl.po 12 Oct 2021 08:33:38 -0000 1.343
@@ -453,6 +453,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
Index: po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.341
retrieving revision 1.342
diff -u -b -r1.341 -r1.342
--- po/pot 12 Oct 2021 07:33:25 -0000 1.341
+++ po/pot 12 Oct 2021 08:33:40 -0000 1.342
@@ -383,6 +383,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
Index: po/proprietary-back-doors.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr-en.html,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- po/proprietary-back-doors.fr-en.html 1 Sep 2021 19:33:00 -0000
1.96
+++ po/proprietary-back-doors.fr-en.html 12 Oct 2021 08:33:42 -0000
1.97
@@ -147,6 +147,20 @@
<h3 id='alter-data'>Altering user's data or settings</h3>
<ul class="blurbs">
+ <li id="M202109220">
+ <!--#set var="DATE" value='<small class="date-tag">2021-09</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Some Xiaomi phones <a
+
href="https://www.theguardian.com/world/2021/sep/22/lithuania-tells-citizens-to-throw-out-chinese-phones-over-censorship-concerns">have
+ a malfeature to bleep out phrases that express political views
+ China does not like</a>. In phones sold in Europe, Xiaomi leaves
+ this deactivated by default, but has a back door to activate the
+ censorship.</p>
+
+ <p>This is the natural result of having nonfree software in a device
+ that can communicate with the company that made it.</p>
+ </li>
+
<li id="M201905060">
<!--#set var="DATE" value='<small class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -950,7 +964,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/09/01 19:33:00 $
+$Date: 2021/10/12 08:33:42 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-censorship.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.fr-en.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- po/proprietary-censorship.fr-en.html 15 Jul 2021 09:33:32 -0000
1.38
+++ po/proprietary-censorship.fr-en.html 12 Oct 2021 08:33:44 -0000
1.39
@@ -152,6 +152,24 @@
by its users.</p>
</li>
</ul>
+
+<h3 id="other">Other</h3>
+<ul class="blurbs">
+ <li id="M202109220">
+ <!--#set var="DATE" value='<small class="date-tag">2021-09</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Some Xiaomi phones <a
+
href="https://www.theguardian.com/world/2021/sep/22/lithuania-tells-citizens-to-throw-out-chinese-phones-over-censorship-concerns">have
+ a malfeature to bleep out phrases that express political views
+ China does not like</a>. In phones sold in Europe, Xiaomi leaves
+ this deactivated by default, but has a back door to activate the
+ censorship.</p>
+
+ <p>This is the natural result of having nonfree software in a device
+ that can communicate with the company that made it.</p>
+ </li>
+</ul>
+
</div>
</div>
@@ -212,7 +230,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/15 09:33:32 $
+$Date: 2021/10/12 08:33:44 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.212
retrieving revision 1.213
diff -u -b -r1.212 -r1.213
--- po/proprietary-surveillance.de-diff.html 8 Oct 2021 19:34:57 -0000
1.212
+++ po/proprietary-surveillance.de-diff.html 12 Oct 2021 08:33:44 -0000
1.213
@@ -638,24 +638,11 @@
<p>Google did not intend to make these apps spy;</strong></del></span>
<span class="inserted"><ins><em>spyware via
BIOS</a></em></ins></span> on <span
class="inserted"><ins><em>Windows installs. Note that</em></ins></span> the
<span class="removed"><del><strong>contrary, it
- worked in various ways to prevent that, and deleted these apps
- after discovering what they did. So we cannot blame Google
- specifically for the snooping of these apps.</p>
-
- <p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares</strong></del></span> <span
class="inserted"><ins><em>specific
+ worked</strong></del></span> <span class="inserted"><ins><em>specific
sabotage method Lenovo used did not affect GNU/Linux; also, a
“clean” Windows install is not really clean since <a
- href="/proprietary/malware-microsoft.html">Microsoft
puts</em></ins></span> in <span class="removed"><del><strong>the responsibility
for the injustice of their
- being nonfree. It also distributes</strong></del></span> its
- own <span class="removed"><del><strong>nonfree apps, such as
- Google
- Play, <a
href="/philosophy/free-software-even-more-important.html">which
- are malicious</a>.</p>
-
- <p>Could Google have done a better job of preventing apps from
- cheating? There is no systematic way for Google, or Android
- users, to inspect executable</strong></del></span> <span
class="inserted"><ins><em>malware</a>.</p>
+ href="/proprietary/malware-microsoft.html">Microsoft
puts</em></ins></span> in <span class="removed"><del><strong>various ways to
prevent that,</strong></del></span> <span class="inserted"><ins><em>its
+ own malware</a>.</p>
</li>
</ul>
@@ -673,6 +660,35 @@
</div>
<ul class="blurbs">
+ <li id="M202106250">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/">El
+ Salvador Dictatorship's Chivo wallet is spyware</a>, it's a
+ proprietary program that breaks users' freedom</em></ins></span> and <span
class="removed"><del><strong>deleted these apps
+ after discovering what they did. So we cannot blame Google
+ specifically for the snooping of these apps.</p>
+
+ <p>On</strong></del></span> <span class="inserted"><ins><em>spies on
people;
+ demands personal data such as</em></ins></span> the <span
class="removed"><del><strong>other hand, Google redistributes nonfree Android
apps,</strong></del></span> <span class="inserted"><ins><em>national ID
number</em></ins></span> and
+ <span class="removed"><del><strong>therefore shares in the
responsibility</strong></del></span> <span class="inserted"><ins><em>does face
+ recognition, and it as bad security</em></ins></span> for <span
class="removed"><del><strong>the injustice of their
+ being nonfree.</strong></del></span> <span class="inserted"><ins><em>its
data.</em></ins></span> It also <span class="removed"><del><strong>distributes
its own nonfree apps, such as
+ Google
+ Play,</strong></del></span> <span class="inserted"><ins><em>asks for
+ almost every malware permission in people's smart phones.</p>
+
+ <p>The article criticizes it for faults in “data
+ protection”, though</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ are malicious</a>.</p>
+
+ <p>Could Google have done a better job of preventing apps from
+ cheating? There</strong></del></span> <span
class="inserted"><ins><em>href="">“data
protection”</em></ins></span>
+ is <span class="removed"><del><strong>no systematic way for Google, or
Android
+ users,</strong></del></span> <span class="inserted"><ins><em>the wrong
approach</em></ins></span> to <span class="removed"><del><strong>inspect
executable</strong></del></span> <span class="inserted"><ins><em>privacy
anyway</a>.</p>
+ </li>
+
<li id="M202106170">
<!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1295,22 +1311,22 @@
<p>Facebook's app got “consent” to <a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
upload call logs automatically from Android phones</a> while
disguising
- what the “consent” was for.</p>
+ what the “consent” was for.</p></em></ins></span>
</li>
- <li id="M201811230">
+ <span
class="removed"><del><strong><li><p>Android</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201811230">
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>An Android phone was observed to track location even while
in airplane mode. It didn't send the location data while in
airplane mode. Instead, <a
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up the data, and sent them all
later</a>.</p></em></ins></span>
+ it saved up the data, and sent them all later</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Android</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711210">
+ <li id="M201711210">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Android</em></ins></span> tracks location for Google <a
@@ -1554,21 +1570,51 @@
<!--#set var="DATE" value='<small
class="date-tag">2018-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Foundry's graphics software</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app</strong></del></span>
+ announced an opt-in proprietary search app that it will</a>
+ pre-install on some of its phones. The app will give Verizon the
same</strong></del></span>
<span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information to identify who is running it</a>. The result is
- often a legal threat demanding a lot of money.</p>
+ reports</em></ins></span> information <span
class="removed"><del><strong>about the users' searches that Google normally
gets when
+ they use its search engine.</p>
- <p>The fact</em></ins></span> that <span
class="inserted"><ins><em>this is used for repression of forbidden sharing
- makes</em></ins></span> it <span
class="removed"><del><strong>will</a>
- pre-install on some</strong></del></span> <span
class="inserted"><ins><em>even more vicious.</p>
-
- <p>This illustrates that making unauthorized
copies</em></ins></span> of <span class="removed"><del><strong>its phones. The
app will give Verizon</strong></del></span> <span
class="inserted"><ins><em>nonfree software
- is not a cure for</em></ins></span> the <span
class="removed"><del><strong>same
- information about</strong></del></span> <span
class="inserted"><ins><em>injustice of nonfree software. It may avoid
- paying for</em></ins></span> the <span class="inserted"><ins><em>nasty
thing, but cannot make it less nasty.</p>
+ <p>Currently, the app</strong></del></span> <span
class="inserted"><ins><em>to identify who</em></ins></span> is <span
class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and the
+ user must explicitly opt-in before the app takes effect. However, the
+ app remains spyware—an “optional” piece of
spyware</strong></del></span> <span class="inserted"><ins><em>running
it</a>. The result</em></ins></span> is
+ <span class="removed"><del><strong>still spyware.</p>
+ </li>
+
+ <li><p>The Meitu photo-editing
+ app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to</strong></del></span>
+ <span class="inserted"><ins><em>often</em></ins></span> a <span
class="removed"><del><strong>Chinese company</a>.</p></li>
+
+ <li><p>A pregnancy test controller application not only
+ can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts</strong></del></span> <span class="inserted"><ins><em>legal
threat demanding a lot</em></ins></span> of <span
class="removed"><del><strong>data in the phone, and in server
accounts,</strong></del></span> <span class="inserted"><ins><em>money.</p>
+
+ <p>The fact that this is used for repression of forbidden sharing
+ makes</em></ins></span> it <span class="removed"><del><strong>can
+ alter them too</a>.
+ </p></li>
+
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after the
ride</a>.</p></strong></del></span> <span
class="inserted"><ins><em>even more vicious.</p></em></ins></span>
+
+ <p>This <span
class="removed"><del><strong>example</strong></del></span> illustrates <span
class="removed"><del><strong>how “getting the user's consent”
+ for surveillance</strong></del></span> <span
class="inserted"><ins><em>that making unauthorized copies of nonfree
software</em></ins></span>
+ is <span class="removed"><del><strong>inadequate as</strong></del></span>
<span class="inserted"><ins><em>not</em></ins></span> a <span
class="removed"><del><strong>protection against massive
+ surveillance.</p>
+ </li>
+
+ <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></strong></del></span> <span
class="inserted"><ins><em>cure for the injustice of nonfree software. It may
avoid
+ paying for the nasty thing, but cannot make it less
nasty.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>Apps that include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
<h4 id="SpywareInMobileApps">Mobile Apps</h4>
@@ -1581,25 +1627,29 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/">TikTok
- apps collect biometric identifiers and biometric information
from</em></ins></span>
- users' <span class="removed"><del><strong>searches that Google normally
gets when
- they use its search engine.</p>
-
- <p>Currently, the app is</strong></del></span> <span
class="inserted"><ins><em>smartphones</a>. The company behind it does
whatever it wants
- and collects whatever data it can.</p>
+ apps collect biometric identifiers</em></ins></span> and <span
class="removed"><del><strong>TV programs
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>biometric information from
+ users' smartphones</a>. The company behind it does whatever it
wants</em></ins></span>
+ and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>collects whatever data it
can.</p></em></ins></span>
</li>
- <li id="M202104060">
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202104060">
<!--#set var="DATE" value='<small
class="date-tag">2021-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>,</strong></del></span>
+ <p>The</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known
faces</a>,</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/">WeddingWire
- app saves people's wedding photos forever</em></ins></span> and <span
class="removed"><del><strong>the
- user must explicitly opt-in before the</strong></del></span> <span
class="inserted"><ins><em>hands over data
- to others</a>, giving users no control over their personal
- information/data. The</em></ins></span> app <span
class="removed"><del><strong>takes effect. However,</strong></del></span> <span
class="inserted"><ins><em>also sometimes shows old photos and
- memories to users, without giving them any control over this
+ app saves people's wedding photos forever</em></ins></span> and <span
class="removed"><del><strong>suggests you to share the picture you take
according</strong></del></span> <span class="inserted"><ins><em>hands over
data</em></ins></span>
+ to <span class="removed"><del><strong>who
+ is in the frame.</p>
+
+ <p>This spyware feature seems</strong></del></span> <span
class="inserted"><ins><em>others</a>, giving users no control over their
personal
+ information/data. The app also sometimes shows old photos and
+ memories</em></ins></span> to <span class="removed"><del><strong>require
online access</strong></del></span> <span class="inserted"><ins><em>users,
without giving them any control over this
either.</p>
</li>
@@ -1609,33 +1659,34 @@
<p>Many cr…apps, developed by various
companies for various organizations, do <a
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth">
- location tracking unknown to those companies and those
- organizations</a>. It's actually some widely used libraries that
do</em></ins></span>
- the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware</strong></del></span> <span
class="inserted"><ins><em>tracking.</p>
+ location tracking unknown</em></ins></span> to <span
class="inserted"><ins><em>those companies and those
+ organizations</a>. It's actually</em></ins></span> some
+ <span class="removed"><del><strong>known-faces database, which
means</strong></del></span> <span class="inserted"><ins><em>widely used
libraries that do</em></ins></span>
+ the <span class="removed"><del><strong>pictures are
likely</strong></del></span> <span class="inserted"><ins><em>tracking.</p>
- <p>What's unusual here</em></ins></span> is
- <span class="removed"><del><strong>still
spyware.</p></strong></del></span> <span class="inserted"><ins><em>that
proprietary software developer A tricks
+ <p>What's unusual here is that proprietary software developer A
tricks
proprietary software developers B1 … B50 into making platforms for
- A to mistreat the end user.</p></em></ins></span>
- </li>
+ A</em></ins></span> to <span class="removed"><del><strong>be
+ sent across</strong></del></span> <span
class="inserted"><ins><em>mistreat</em></ins></span> the <span
class="removed"><del><strong>wire to Facebook's servers and face-recognition
+ algorithms.</p>
- <span class="removed"><del><strong><li><p>The Meitu photo-editing
- app</strong></del></span>
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>end user.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M202003260">
+ <li id="M202003260">
<!--#set var="DATE" value='<small
class="date-tag">2020-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Apple iOS version of Zoom</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account">is
- sending users'</em></ins></span> data to <span
class="inserted"><ins><em>Facebook</a> even if the user doesn't
have</em></ins></span>
- a <span class="removed"><del><strong>Chinese
company</a>.</p></li>
+ <p>The Apple iOS version</em></ins></span> of <span
class="removed"><del><strong>Facebook</strong></del></span> <span
class="inserted"><ins><em>Zoom <a
+
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account">is
+ sending</em></ins></span> users' <span
class="removed"><del><strong>pictures are private
+ anymore,</strong></del></span> <span class="inserted"><ins><em>data to
Facebook</a></em></ins></span> even if the user <span
class="removed"><del><strong>didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>doesn't have
+ a Facebook account. According</em></ins></span> to the <span
class="removed"><del><strong>service.</p>
+ </li>
- <li><p>A pregnancy test controller application not only
- can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
<span class="inserted"><ins><em>Facebook account. According to the article,
Zoom and Facebook
- don't even mention this surveillance</em></ins></span> on <span
class="removed"><del><strong>many sorts</strong></del></span> <span
class="inserted"><ins><em>their privacy policy page,
- making this an obvious violation</em></ins></span> of <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>people's privacy even</em></ins></span> in <span
class="inserted"><ins><em>their
+ <li><p>Like most “music screaming” disservices,
Spotify
+ is based</strong></del></span> <span class="inserted"><ins><em>article,
Zoom and Facebook
+ don't even mention this surveillance</em></ins></span> on <span
class="removed"><del><strong>proprietary malware (DRM</strong></del></span>
<span class="inserted"><ins><em>their privacy policy page,
+ making this an obvious violation of people's privacy even in their
own terms.</p>
</li>
@@ -1643,225 +1694,239 @@
<!--#set var="DATE" value='<small
class="date-tag">2020-03</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The Alipay Health Code app
- estimates whether</em></ins></span> the <span
class="removed"><del><strong>phone,</strong></del></span> <span
class="inserted"><ins><em>user has Covid-19</em></ins></span> and <span
class="removed"><del><strong>in server accounts, it can
- alter them too</a>.
- </p></li>
-
- <li><p>The Uber app tracks</strong></del></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
+ estimates whether the user has Covid-19</em></ins></span> and <span
class="removed"><del><strong>snooping). In August
+ 2015 it</strong></del></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased snooping</a>, and some
+ are starting to realize that it is nasty.</p>
- <p>This example illustrates how
“getting</strong></del></span>
+ <p>This article shows</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html">
- tells</em></ins></span> the <span class="removed"><del><strong>user's
consent”
- for</strong></del></span> <span class="inserted"><ins><em>cops
directly</a>.</p>
+ tells</em></ins></span> the <span class="inserted"><ins><em>cops
directly</a>.</p>
</li>
<li id="M202001290">
<!--#set var="DATE" value='<small
class="date-tag">2020-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Amazon Ring app does <a
-
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"></em></ins></span>
- surveillance <span class="removed"><del><strong>is
inadequate</strong></del></span> <span class="inserted"><ins><em>for other
companies</em></ins></span> as <span class="removed"><del><strong>a protection
against massive
- surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>well as for
Amazon</a>.</p></em></ins></span>
+ <p>The Amazon Ring app does</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
+ surveillance for other companies</em></ins></span> as <span
class="removed"><del><strong>a way</strong></del></span> <span
class="inserted"><ins><em>well as for Amazon</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Google's new
voice</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201912220">
+ <li id="M201912220">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The ToToc</em></ins></span> messaging app <span
class="inserted"><ins><em>seems to be a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
+ <p>The ToToc messaging app seems</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
+ whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>be</em></ins></span> a <span
class="removed"><del><strong>typical example of</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
+ spying tool for</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>government</em></ins></span> of the <span
class="removed"><del><strong>proprietary software industry towards
+ those they have subjugated.</p>
+
+ <p>Out, out, damned Spotify!</p>
</li>
+ <li><p>Many proprietary apps for mobile devices report which
other
+ apps the user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is</strong></del></span> <span class="inserted"><ins><em>United Arab
Emirates</a>.
+ Any nonfree program could be</em></ins></span> doing <span
class="removed"><del><strong>this in a way</strong></del></span> <span
class="inserted"><ins><em>this, and</em></ins></span> that <span
class="removed"><del><strong>at least</strong></del></span> is <span
class="removed"><del><strong>visible and
+ optional</a>. Not as bad as what</strong></del></span> <span
class="inserted"><ins><em>a good
+ reason to use free software instead.</p>
- <li><p>Apps</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html">
- spying tool for the government of the United Arab Emirates</a>.
- Any nonfree program could be doing this, and</em></ins></span> that <span
class="removed"><del><strong>include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance</strong></del></span> <span
class="inserted"><ins><em>is a good
- reason to use free</em></ins></span> software <span
class="removed"><del><strong>snoop on what radio</strong></del></span> <span
class="inserted"><ins><em>instead.</p>
+ <p><small>Note: this article uses</em></ins></span> the <span
class="removed"><del><strong>others do.</p>
+ </li>
- <p><small>Note: this article uses the word “free”
in
- the sense of “gratis.”</small></p>
+ <li><p>FTC says most mobile apps for children don't respect
privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>word “free” in
+ the sense of
“gratis.”</small></p></em></ins></span>
</li>
- <li id="M201912090">
+ <span
class="removed"><del><strong><li><p>Widely</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201912090">
<!--#set var="DATE" value='<small
class="date-tag">2019-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>iMonsters</em></ins></span> and <span
class="removed"><del><strong>TV programs
- are playing nearby</a>. Also on what users
post</strong></del></span> <span class="inserted"><ins><em>Android phones,
- when used for work, give employers powerful <a
-
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
+ <p>iMonsters and Android phones,
+ when</em></ins></span> used <span class="inserted"><ins><em>for work, give
employers powerful</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
snooping and sabotage capabilities</a> if they install their own
- software</em></ins></span> on <span class="removed"><del><strong>various
sites
- such</strong></del></span> <span class="inserted"><ins><em>the device.
Many employers demand to do this. For the
- employee, this is simply nonfree software,</em></ins></span> as <span
class="removed"><del><strong>Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>fundamentally unjust</em></ins></span>
- and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>as dangerous as any other nonfree
software.</p></em></ins></span>
- </li>
+ software</em></ins></span> on the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>device. Many
employers demand</em></ins></span> to <span class="inserted"><ins><em>do this.
For</em></ins></span> the <span class="removed"><del><strong>snooping done by
the phone company,</strong></del></span>
+ <span class="inserted"><ins><em>employee, this is simply nonfree software,
as fundamentally unjust</em></ins></span>
+ and <span class="removed"><del><strong>perhaps by the OS in the
+ phone.</p>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo</strong></del></span>
+ <p>Don't be distracted by the question of
whether</strong></del></span> <span class="inserted"><ins><em>as dangerous as
any other nonfree software.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201910130">
+ <li id="M201910130">
<!--#set var="DATE" value='<small
class="date-tag">2019-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Chinese Communist Party's “Study
- the Great Nation”</em></ins></span> app <span
class="inserted"><ins><em>requires users to grant it</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access to the</em></ins></span> phone's <span
class="removed"><del><strong>photo collections for known
faces</a>,</strong></del></span> <span
class="inserted"><ins><em>microphone, photos, text messages, contacts, and
- internet history</a>,</em></ins></span> and <span
class="removed"><del><strong>suggests you to share</strong></del></span> the
<span class="removed"><del><strong>picture you take
according</strong></del></span> <span class="inserted"><ins><em>Android version
was found</em></ins></span> to <span class="removed"><del><strong>who
- is</strong></del></span> <span class="inserted"><ins><em>contain a
- back-door allowing developers to run any code they wish</em></ins></span>
in the <span class="removed"><del><strong>frame.</p>
-
- <p>This spyware feature seems to require online access
to</strong></del></span> <span class="inserted"><ins><em>users'
- phone, as “superusers.” Downloading and using this
- app is mandatory at</em></ins></span> some
- <span class="removed"><del><strong>known-faces database, which
means</strong></del></span> <span
class="inserted"><ins><em>workplaces.</p>
+ <p>The Chinese Communist Party's “Study</em></ins></span>
+ the <span class="inserted"><ins><em>Great Nation”</em></ins></span>
app <span class="removed"><del><strong>developers get</strong></del></span>
<span class="inserted"><ins><em>requires</em></ins></span> users to <span
class="removed"><del><strong>say “I agree”. That is no excuse for
malware.</p>
+ </li>
+
+ <li><p>The Brightest Flashlight app
+ <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p>
+
+ <p>The FTC criticized this app because</strong></del></span> <span
class="inserted"><ins><em>grant</em></ins></span> it <span
class="removed"><del><strong>asked</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ access to</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts,
and
+ internet history</a>, and the Android version was
found</em></ins></span> to
+ <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>contain a
+ back-door allowing developers</em></ins></span> to <span
class="inserted"><ins><em>run any code they wish in</em></ins></span> the <span
class="inserted"><ins><em>users'
+ phone, as “superusers.” Downloading and using
this</em></ins></span>
+ app <span class="removed"><del><strong>developer</strong></del></span>
<span class="inserted"><ins><em>is mandatory at some workplaces.</p>
<p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of</em></ins></span> the <span
class="removed"><del><strong>pictures are likely</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated, but
- readable after copy-pasting in a text editor) includes a clarification
- saying that the tests were only performed on the Android version
- of the app, and that, according</em></ins></span> to <span
class="inserted"><ins><em>Apple, “this kind of
- ‘superuser’ surveillance could not</em></ins></span> be
- <span class="removed"><del><strong>sent across</strong></del></span>
<span class="inserted"><ins><em>conducted on
+ Washington Post version of the article</a> (partly
obfuscated,</em></ins></span> but <span class="removed"><del><strong>did not
+ ask about sending it to other companies. This
shows</strong></del></span>
+ <span class="inserted"><ins><em>readable after copy-pasting in a text
editor) includes a clarification
+ saying that</em></ins></span> the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>tests were only performed on the Android
version</em></ins></span>
+ of the <span class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution”</strong></del></span> <span
class="inserted"><ins><em>app, and that, according</em></ins></span> to <span
class="removed"><del><strong>surveillance: why should a
flashlight</strong></del></span> <span class="inserted"><ins><em>Apple,
“this kind of
+ ‘superuser’ surveillance could not be conducted on
Apple's operating system.”</p>
</li>
<li id="M201909091">
<!--#set var="DATE" value='<small
class="date-tag">2019-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Facebook app <a
+ <p>The Facebook</em></ins></span> app <span
class="removed"><del><strong>send any information to anyone? A free software
flashlight</strong></del></span> <span class="inserted"><ins><em><a
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
tracks users even when it is turned off</a>, after tricking them
- into giving</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>app broad permissions in order</em></ins></span> to
<span class="removed"><del><strong>Facebook's servers</strong></del></span>
<span class="inserted"><ins><em>use one of its
- functionalities.</p>
+ into giving the</em></ins></span> app <span
class="removed"><del><strong>would not.</p>
</li>
+</ul>
- <li id="M201909090">
- <!--#set var="DATE" value='<small
class="date-tag">2019-09</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Some nonfree period-tracking apps including MIA
Fem</em></ins></span> and <span class="removed"><del><strong>face-recognition
- algorithms.</p>
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware</strong></del></span> <span
class="inserted"><ins><em>broad permissions</em></ins></span> in <span
class="removed"><del><strong>Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
+
+<ul>
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>Maya <a
-
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
- send intimate details</em></ins></span> of <span
class="removed"><del><strong>Facebook</strong></del></span> users' <span
class="removed"><del><strong>pictures are private
- anymore, even if the user didn't “upload”
them</strong></del></span> <span
class="inserted"><ins><em>lives</em></ins></span> to <span
class="removed"><del><strong>the service.</p></strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p></em></ins></span>
+ <li>
+ <p>A remote-control sex toy was found</strong></del></span> <span
class="inserted"><ins><em>order</em></ins></span> to <span
class="removed"><del><strong>make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings</strong></del></span> <span class="inserted"><ins><em>use
one</em></ins></span> of <span class="removed"><del><strong>the conversation
between two users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>its
+ functionalities.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify</strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>The “smart” toys My Friend Cayla</strong></del></span>
- <span class="inserted"><ins><em><li id="M201909060">
+ <span class="inserted"><ins><em><li id="M201909090">
<!--#set var="DATE" value='<small
class="date-tag">2019-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Keeping track of who downloads a proprietary
- program</em></ins></span> is <span class="removed"><del><strong>based
on</strong></del></span> <span class="inserted"><ins><em>a form of
surveillance. There is a</em></ins></span>
- proprietary <span class="removed"><del><strong>malware (DRM and snooping).
In August
- 2015 it</strong></del></span> <span class="inserted"><ins><em>program
for adjusting a certain telescopic rifle sight.</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
- A US prosecutor has</em></ins></span> demanded <span
class="removed"><del><strong>users submit</strong></del></span> <span
class="inserted"><ins><em>the list of all the 10,000 or more people
+ <p>Some nonfree period-tracking apps including MIA
Fem</em></ins></span> and <span class="removed"><del><strong>i-Que
transmit</strong></del></span> <span
class="inserted"><ins><em>Maya</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
+ send intimate details of users' lives</em></ins></span> to <span
class="removed"><del><strong>Nuance
Communications</a>,</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
+ </li>
+
+ <li id="M201909060">
+ <!--#set var="DATE" value='<small
class="date-tag">2019-09</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Keeping track of who downloads</em></ins></span> a <span
class="removed"><del><strong>speech recognition company based
in</strong></del></span> <span class="inserted"><ins><em>proprietary
+ program is a form of surveillance. There is a
+ proprietary program for adjusting a certain telescopic rifle sight. <a
+
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
+ A US prosecutor has demanded</em></ins></span> the <span
class="removed"><del><strong>U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</strong></del></span> <span
class="inserted"><ins><em>list of all</em></ins></span> the <span
class="removed"><del><strong>toys with</strong></del></span> <span
class="inserted"><ins><em>10,000 or more people
who have installed it</a>.</p>
- <p>With a free program there would not be a list of who has installed
+ <p>With</em></ins></span> a <span
class="removed"><del><strong>mobile phone. This</strong></del></span> <span
class="inserted"><ins><em>free program there</em></ins></span> would
+ <span class="removed"><del><strong>enable crackers to listen in
on</strong></del></span> <span class="inserted"><ins><em>not
be</em></ins></span> a <span class="removed"><del><strong>child's
speech,</strong></del></span> <span class="inserted"><ins><em>list of who has
installed
it.</p>
</li>
<li id="M201907081">
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many unscrupulous mobile-app developers keep finding
ways</em></ins></span> to <span class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em><a
+ <p>Many unscrupulous mobile-app developers keep finding ways to <a
href="https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
- bypass user's settings</a>, regulations,</em></ins></span> and <span
class="removed"><del><strong>some
- are starting to realize that it is nasty.</p>
+ bypass user's settings</a>, regulations,</em></ins></span> and <span
class="inserted"><ins><em>privacy-enhancing features
+ of the operating system, in order to gather as much private data as
+ they possibly can.</p>
- <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>privacy-enhancing features
- of</em></ins></span> the <span class="removed"><del><strong><a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way</strong></del></span>
<span class="inserted"><ins><em>operating system, in order</em></ins></span> to
<span class="removed"><del><strong>“serve” users
better</a>—never mind
- whether</strong></del></span> <span class="inserted"><ins><em>gather as
much private data as</em></ins></span>
- they <span class="removed"><del><strong>want that.
This</strong></del></span> <span class="inserted"><ins><em>possibly
can.</p>
-
- <p>Thus, we can't trust rules against spying. What we can
trust</em></ins></span> is <span class="removed"><del><strong>a typical example
of
- the attitude of</strong></del></span>
- <span class="inserted"><ins><em>having control over</em></ins></span> the
<span class="removed"><del><strong>proprietary</strong></del></span> software
<span class="removed"><del><strong>industry towards
- those they have subjugated.</p>
-
- <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>we run.</p></em></ins></span>
+ <p>Thus, we can't trust rules against spying. What we can trust is
+ having control over the software we run.</p>
</li>
- <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other</strong></del></span>
- <span class="inserted"><ins><em><li id="M201907080">
+ <li id="M201907080">
<!--#set var="DATE" value='<small
class="date-tag">2019-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many Android</em></ins></span> apps <span
class="inserted"><ins><em>can track
- users' movements even when</em></ins></span> the user <span
class="removed"><del><strong>has
- installed.</strong></del></span> <span
class="inserted"><ins><em>says</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ <p>Many Android apps can track
+ users' movements</em></ins></span> even <span
class="removed"><del><strong>speak
+ into</strong></del></span> <span
class="inserted"><ins><em>when</em></ins></span> the <span
class="removed"><del><strong>toys themselves.</p></strong></del></span>
<span class="inserted"><ins><em>user says <a
+
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
not to allow them access to locations</a>.</p>
- <p>This involves an apparently unintentional
weakness</em></ins></span> in <span class="removed"><del><strong>a way that at
least is visible and
- optional</a>. Not as bad as what the others
do.</p></strong></del></span> <span class="inserted"><ins><em>Android,
+ <p>This involves an apparently unintentional weakness in Android,
exploited intentionally by malicious apps.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>FTC says most mobile
apps for children don't respect privacy:</strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>A computerized vibrator</strong></del></span>
<span class="inserted"><ins><em><li id="M201905300">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The Femm “fertility” app is secretly
a</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
+ <p>The Femm “fertility” app is secretly
a</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
- <p>It snoops on users, too, as you must expect from nonfree
- programs.</p></em></ins></span>
+ <p>It snoops</em></ins></span> on <span
class="removed"><del><strong>its users through the</strong></del></span> <span
class="inserted"><ins><em>users, too, as you must expect from nonfree
+ programs.</p>
</li>
- <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905060">
+ <li id="M201905060">
<!--#set var="DATE" value='<small
class="date-tag">2019-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement to run a proprietary phone app</a> to be allowed into
- the event.</p>
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a</em></ins></span> proprietary <span
class="removed"><del><strong>control app</a>.</p>
+
+ <p>The app was reporting</strong></del></span> <span
class="inserted"><ins><em>phone app</a> to be allowed
into</em></ins></span>
+ the <span class="removed"><del><strong>temperature</strong></del></span>
<span class="inserted"><ins><em>event.</p>
- <p>This app is a spyware that can</em></ins></span> snoop on <span
class="inserted"><ins><em>a lot of
- sensitive data, including user's location and contact list, and has <a
+ <p>This app is a spyware that can snoop on a lot</em></ins></span> of
+ <span class="inserted"><ins><em>sensitive data, including user's location
and contact list, and has <a
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>user</a>. This</strong></del></span> <span
class="inserted"><ins><em>phone.</p>
+ near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>vibrator minute</strong></del></span> <span
class="inserted"><ins><em>phone.</p>
</li>
<li id="M201904131">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Data collected by menstrual and pregnancy monitoring
apps</em></ins></span> is <span class="removed"><del><strong>in
addition</strong></del></span> <span class="inserted"><ins><em>often <a
+ <p>Data collected</em></ins></span> by
+ <span class="removed"><del><strong>minute (thus, indirectly,
whether</strong></del></span> <span class="inserted"><ins><em>menstrual and
pregnancy monitoring apps is often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available</em></ins></span> to
- <span class="removed"><del><strong>the snooping done by the phone
company,</strong></del></span> <span
class="inserted"><ins><em>employers</em></ins></span> and <span
class="removed"><del><strong>perhaps by</strong></del></span> <span
class="inserted"><ins><em>insurance companies</a>. Even
though</em></ins></span> the <span class="removed"><del><strong>OS in the
- phone.</p>
-
- <p>Don't</strong></del></span>
- <span class="inserted"><ins><em>data is “anonymized and
aggregated,” it can easily</em></ins></span> be <span
class="removed"><del><strong>distracted by</strong></del></span>
- <span class="inserted"><ins><em>traced back to</em></ins></span> the <span
class="removed"><del><strong>question of whether</strong></del></span> <span
class="inserted"><ins><em>woman who uses</em></ins></span> the <span
class="removed"><del><strong>app developers get
- users</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+ available to employers and insurance companies</a>. Even though the
+ data is “anonymized and aggregated,”</em></ins></span> it
<span class="removed"><del><strong>was surrounded by a person's
+ body), as well as</strong></del></span> <span
class="inserted"><ins><em>can easily be
+ traced back to</em></ins></span> the <span
class="removed"><del><strong>vibration frequency.</p>
+
+ <p>Note</strong></del></span> <span class="inserted"><ins><em>woman
who uses</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response: a labeling
+ standard with which manufacturers would</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+
+ <p>This has harmful implications for women's rights to equal
employment
+ and freedom to</em></ins></span> make <span
class="removed"><del><strong>statements about</strong></del></span> their <span
class="removed"><del><strong>products, rather than free software which users
could have
+ checked and changed.</p>
- <p>This has harmful implications for women's
rights</em></ins></span> to <span class="removed"><del><strong>say “I
agree”. That</strong></del></span> <span class="inserted"><ins><em>equal
employment
- and freedom to make their own pregnancy choices. Don't use
+ <p>The company</strong></del></span> <span
class="inserted"><ins><em>own pregnancy choices. Don't use
these apps, even if someone offers you a reward to do so. A
- free-software app that does more or less the same thing without
- spying on you</em></ins></span> is <span class="removed"><del><strong>no
excuse</strong></del></span> <span class="inserted"><ins><em>available from
<a
- href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
+ free-software app</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em>does more or less</em></ins></span> the <span
class="removed"><del><strong>vibrator</strong></del></span> <span
class="inserted"><ins><em>same thing without
+ spying on you is available from</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://search.f-droid.org/?q=menstr">F-Droid</a>,
and <a
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f">
a new one is being developed</a>.</p>
</li>
@@ -1869,30 +1934,33 @@
<li id="M201904130">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google tracks the movements of Android phones and iPhones
+ <p>Google tracks the movements</em></ins></span> of <span
class="removed"><del><strong>personal information about how
+ people used it</a>.</p>
+
+ <p>The company's statement that it was
anonymizing</strong></del></span> <span class="inserted"><ins><em>Android
phones and iPhones
running Google apps, and sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves the data</em></ins></span> for <span
class="removed"><del><strong>malware.</p></strong></del></span> <span
class="inserted"><ins><em>years</a>.</p>
+ saves</em></ins></span> the data <span
class="removed"><del><strong>may</strong></del></span> <span
class="inserted"><ins><em>for years</a>.</p>
- <p>Nonfree software in the phone has to be responsible for sending
- the location data to Google.</p></em></ins></span>
+ <p>Nonfree software in the phone has to</em></ins></span> be
+ <span class="removed"><del><strong>true, but it doesn't really matter.
If it had sold</strong></del></span> <span
class="inserted"><ins><em>responsible for sending</em></ins></span>
+ the <span class="inserted"><ins><em>location</em></ins></span> data to
<span class="inserted"><ins><em>Google.</p>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201903251">
+ <li id="M201903251">
<!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many Android phones come with a huge number of</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user</strong></del></span>
- <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access to sensitive data without
- users' knowledge</a>. These hidden apps may either call home with
- the</em></ins></span> data, <span class="removed"><del><strong>including
geolocation, for use by companies.</a></p>
-
- <p>The FTC criticized this app because</strong></del></span> <span
class="inserted"><ins><em>or pass</em></ins></span> it <span
class="removed"><del><strong>asked</strong></del></span> <span
class="inserted"><ins><em>on to user-installed apps that have access to
- the network but no direct access to the data. This results in massive
- surveillance on which</em></ins></span> the user <span
class="inserted"><ins><em>has absolutely no control.</p>
+ <p>Many Android phones come with</em></ins></span> a <span
class="inserted"><ins><em>huge number of <a
+
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that have access to sensitive</em></ins></span>
data <span class="removed"><del><strong>broker,</strong></del></span> <span
class="inserted"><ins><em>without
+ users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
+ the <span class="removed"><del><strong>data broker
would</strong></del></span> <span class="inserted"><ins><em>data, or pass it on
to user-installed apps that</em></ins></span> have <span
class="removed"><del><strong>been able</strong></del></span> <span
class="inserted"><ins><em>access</em></ins></span> to <span
class="removed"><del><strong>figure out
+ who</strong></del></span>
+ the <span class="removed"><del><strong>user was.</p>
+
+ <p>Following this lawsuit,
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
<span class="inserted"><ins><em>network but no direct access
to</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>data. This results in massive
+ surveillance on which the user</em></ins></span> has <span
class="removed"><del><strong>been ordered</strong></del></span> <span
class="inserted"><ins><em>absolutely no control.</p>
</li>
<li id="M201903201">
@@ -1900,29 +1968,33 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A study of 24 “health” apps found that 19 of them
<a
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data</em></ins></span> to
- <span class="removed"><del><strong>approve sending</strong></del></span>
<span class="inserted"><ins><em>third parties</a>, which can use it
+ send sensitive personal data</em></ins></span> to <span
class="removed"><del><strong>pay a total</strong></del></span> <span
class="inserted"><ins><em>third parties</a>, which can use it
for invasive advertising or discriminating against people in poor
medical condition.</p>
<p>Whenever user “consent” is sought, it is buried in
- lengthy terms of service that are difficult to understand. In any case,
- “consent” is not sufficient to legitimize snooping.</p>
+ lengthy terms</em></ins></span> of <span
class="removed"><del><strong>C$4m</a></strong></del></span> <span
class="inserted"><ins><em>service that are difficult</em></ins></span> to <span
class="removed"><del><strong>its customers.</p></strong></del></span>
<span class="inserted"><ins><em>understand. In any case,
+ “consent” is not sufficient to legitimize
snooping.</p></em></ins></span>
</li>
- <li id="M201902230">
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902230">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Facebook offered a convenient proprietary
- library for building mobile apps, which also <a
- href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent</em></ins></span> personal data to <span
class="inserted"><ins><em>Facebook</a>. Lots of companies built apps that
- way and released them, apparently not realizing that all</em></ins></span>
the <span class="removed"><del><strong>app developer but
did</strong></del></span> <span class="inserted"><ins><em>personal
- data they collected would go to Facebook as well.</p>
-
- <p>It shows that no one can trust a nonfree
program,</em></ins></span> not
- <span class="removed"><del><strong>ask about sending
it</strong></del></span> <span class="inserted"><ins><em>even the
- developers of other nonfree programs.</p>
+ library for building mobile apps, which also</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data</em></ins></span> to <span
class="removed"><del><strong>the
+ manufacturer</a>. Guess what?
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots of companies built apps
that</em></ins></span>
+ way <span class="removed"><del><strong>to access</strong></del></span>
<span class="inserted"><ins><em>and released them, apparently not realizing
that all</em></ins></span> the <span
class="removed"><del><strong>data</a></strong></del></span> <span
class="inserted"><ins><em>personal
+ data they</em></ins></span> collected <span
class="removed"><del><strong>by</strong></del></span> <span
class="inserted"><ins><em>would go to Facebook as well.</p>
+
+ <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>manufacturer's
snooping.</p>
+
+ <p>That</strong></del></span>
+ <span class="inserted"><ins><em>developers of other nonfree
programs.</p>
</li>
<li id="M201902140">
@@ -1931,18 +2003,20 @@
<p>The AppCensus database gives information on <a
href="https://www.appcensus.mobi"> how Android apps use and
misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
+ 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em><a
href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to other <span
class="removed"><del><strong>companies.</strong></del></span> <span
class="inserted"><ins><em>companies, and <a
+ Advertising ID</a> to other companies,</em></ins></span> and <span
class="inserted"><ins><em><a
href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link this ID to hardware identifiers</a>,
- so that users cannot escape tracking by resetting it.</p>
+ 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>FBI could listen</strong></del></span> <span
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span
class="removed"><del><strong>these conversations
+ was unacceptable</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
+ so that users cannot escape tracking</em></ins></span> by <span
class="removed"><del><strong>itself.</p></li>
+
+ <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>resetting it.</p>
<p>Collecting hardware identifiers is in apparent violation of
Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry to take action.</em></ins></span> This
<span class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>proves
- that</em></ins></span> the
- <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>policies of a development platform are ineffective at
+ and, once informed, was in no hurry to take action. This proves
+ that the policies of a development platform are ineffective at
preventing nonfree software developers from including malware in
their programs.</p>
</li>
@@ -1950,195 +2024,211 @@
<li id="M201902060">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many nonfree apps have a surveillance feature for <a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ <p>Many nonfree apps have a surveillance feature
for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
recording all the users' actions</a> in interacting with the
app.</p>
</li>
<li id="M201902041.1">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Twenty nine “beauty camera” apps that used to
- be on Google Play had one or more malicious functionalities, such as <a
+ <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span>
+ <span class="inserted"><ins><em>be</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>Google Play had one or more malicious
functionalities, such as <a
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
- stealing users' photos</a> instead</em></ins></span> of <span
class="inserted"><ins><em>“beautifying” them,
- pushing unwanted and often malicious ads on users, and redirecting
- them to phishing sites that stole their credentials.
Furthermore,</em></ins></span>
- the <span class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution”</strong></del></span> <span
class="inserted"><ins><em>user interface of most of them was
designed</em></ins></span> to <span class="removed"><del><strong>surveillance:
why</strong></del></span> <span class="inserted"><ins><em>make uninstallation
+ stealing users' photos</a> instead of “beautifying” them,
+ pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>often malicious ads on users, and redirecting
+ them to phishing sites that stole their credentials. Furthermore,
+ the user interface of most of them was designed to make uninstallation
difficult.</p>
- <p>Users</em></ins></span> should <span class="inserted"><ins><em>of
course uninstall these dangerous apps if they
+ <p>Users should of course uninstall these dangerous apps if they
haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>flashlight
- app send any information to anyone? A free software flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>potential risk because
+ general. <em>All</em> nonfree apps carry a potential risk
because
there is no easy way of knowing what they really
do.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware</strong></del></span>
+
+<!-- #SpywareOnSmartWatches</strong></del></span>
<span class="inserted"><ins><em><li id="M201902010">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>An investigation of the 150 most popular
- gratis VPN apps</em></ins></span> in <span
class="removed"><del><strong>Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
-
- <li>
- <p>A remote-control sex toy was</strong></del></span> <span
class="inserted"><ins><em>Google Play</em></ins></span> found <span
class="inserted"><ins><em>that <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>An investigation of the 150 most
popular
+ gratis VPN apps in Google Play found that <a
href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail</em></ins></span> to <span
class="removed"><del><strong>make</strong></del></span> <span
class="inserted"><ins><em>protect their users' privacy</a> due to DNS
leaks. In
+ 25% fail</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>protect their
users' privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
source code—often used for invasive advertising—that could
- potentially also be used to spy on users. Other technical flaws were
+ potentially also be used to spy</em></ins></span> on <span
class="inserted"><ins><em>users. Other technical flaws were
found as well.</p>
- <p>Moreover, a previous investigation had found
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of
- the <span class="removed"><del><strong>conversation between two
users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy
policies</a>.</p>
-
- <p><small>(It is unfortunate that these articles talk about
“free
- apps.” These apps are gratis, but they are <em>not</em>
<a
- href="/philosophy/free-sw.html">free
software</a>.)</small></p></em></ins></span>
- </li>
+ <p>Moreover, a previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
+ the</em></ins></span> top <span class="removed"><del><strong>under each
subsection -->
- <span class="removed"><del><strong><li></strong></del></span>
+<div class="big-section">
+ <h3 id="SpywareOnSmartWatches">Spyware on “Smart”
Watches</h3>
+ <span class="anchor-reference-id">
+ (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span>
+</div>
+<div style="clear: left;"></div>
- <span class="inserted"><ins><em><li id="M201901050">
- <!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla and i-Que transmit</strong></del></span> <span
class="inserted"><ins><em>Weather Channel app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations</em></ins></span> to <span
class="removed"><del><strong>Nuance Communications</a>,
- a speech recognition</strong></del></span> <span
class="inserted"><ins><em>the company's server</a>. The</em></ins></span>
company <span class="removed"><del><strong>based in</strong></del></span> <span
class="inserted"><ins><em>is
- being sued, demanding that it notify</em></ins></span> the <span
class="removed"><del><strong>U.S.</p>
+<ul>
+ <li>
+ <p>An LG “smart” watch</strong></del></span> <span
class="inserted"><ins><em>10 gratis VPN apps have lousy privacy
policies</a>.</p>
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</strong></del></span> <span
class="inserted"><ins><em>users of what it will do
- with</em></ins></span> the <span
class="removed"><del><strong>toys</strong></del></span> <span
class="inserted"><ins><em>data.</p>
+ <p><small>(It</em></ins></span> is <span
class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>unfortunate that these articles talk about “free
+ apps.” These apps are gratis, but they are
<em>not</em></em></ins></span> <a <span
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+ to report its location</strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.)</small></p>
+ </li>
- <p>We think that lawsuit is about a side issue. What the company
does</em></ins></span>
- with <span class="inserted"><ins><em>the data is</em></ins></span> a <span
class="removed"><del><strong>mobile phone. This would
- enable crackers</strong></del></span> <span
class="inserted"><ins><em>secondary issue. The principal wrong here is that
+ <li id="M201901050">
+ <!--#set var="DATE" value='<small
class="date-tag">2019-01</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The Weather Channel app <a
+
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ stored users' locations</em></ins></span> to <span
class="removed"><del><strong>someone else</strong></del></span> <span
class="inserted"><ins><em>the company's server</a>. The company is
+ being sued, demanding that it notify the users of what it will do
+ with the data.</p>
+
+ <p>We think that lawsuit is about a side issue. What the company does
+ with the data is a secondary issue. The principal wrong here is that
the company gets that data at all.</p>
<p><a
href="https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather and WeatherBug, are
- tracking people's locations.</p>
+ Other weather apps</a>, including Accuweather</em></ins></span> and
<span class="removed"><del><strong>to transmit
+ conversations too</a>.</p></strong></del></span> <span
class="inserted"><ins><em>WeatherBug, are
+ tracking people's locations.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li>
+ <p>A very cheap “smart watch” comes with
an</strong></del></span>
- <li id="M201812290">
+ <span class="inserted"><ins><em><li id="M201812290">
<!--#set var="DATE" value='<small
class="date-tag">2018-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Around 40% of gratis Android apps <a
-
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on the user's actions</em></ins></span> to <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
+ <p>Around 40% of gratis</em></ins></span> Android <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions</em></ins></span> to <span
class="removed"><del><strong>an unidentified site</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
<p>Often they send the machine's “advertising ID,” so
that
Facebook can correlate the data it obtains from the same machine via
various apps. Some of them send Facebook detailed information about
- the user's activities</em></ins></span> in <span
class="removed"><del><strong>on a child's speech, and even speak
- into</strong></del></span> the <span class="removed"><del><strong>toys
themselves.</p></strong></del></span> <span
class="inserted"><ins><em>app; others only say that the user is
- using that app, but that alone is often quite informative.</p>
+ the user's activities</em></ins></span> in <span
class="removed"><del><strong>China</a>.</p>
+ <p>The article says this</strong></del></span> <span
class="inserted"><ins><em>the app; others only say that the
user</em></ins></span> is <span class="removed"><del><strong>a back
door,</strong></del></span>
+ <span class="inserted"><ins><em>using that app,</em></ins></span> but that
<span class="removed"><del><strong>could be</strong></del></span> <span
class="inserted"><ins><em>alone is often quite informative.</p>
- <p>This spying occurs regardless of whether the user has a Facebook
- account.</p></em></ins></span>
+ <p>This spying occurs regardless of whether the user
has</em></ins></span> a
+ <span class="removed"><del><strong>misunderstanding.
However,</strong></del></span> <span class="inserted"><ins><em>Facebook
+ account.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A computerized vibrator</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201810244">
+ <li id="M201810244">
<!--#set var="DATE" value='<small
class="date-tag">2018-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
track the phones of users that have deleted them</a>.</p>
</li>
<li id="M201808030">
<!--#set var="DATE" value='<small
class="date-tag">2018-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some Google apps</em></ins></span> on <span
class="removed"><del><strong>its</strong></del></span> <span
class="inserted"><ins><em>Android <a
+ <p>Some Google apps on Android <a
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the user's location even when</em></ins></span> users <span
class="removed"><del><strong>through</strong></del></span> <span
class="inserted"><ins><em>disable “location
+ record the user's location even when users disable “location
tracking”</a>.</p>
- <p>There are other ways to turn off</em></ins></span> the <span
class="removed"><del><strong>proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>other kinds of location
+ <p>There are other ways to turn off the other kinds of location
tracking, but most users will be tricked by the misleading
control.</p>
</li>
<li id="M201806110">
<!--#set var="DATE" value='<small
class="date-tag">2018-06</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p>The <span class="inserted"><ins><em>Spanish football
streaming</em></ins></span> app <span class="removed"><del><strong>was
reporting</strong></del></span> <span class="inserted"><ins><em><a
-
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
- the <span class="removed"><del><strong>temperature
of</strong></del></span> <span class="inserted"><ins><em>user's movements and
listens through</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The Spanish football streaming app <a
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements and listens through the
microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
- <p>We expect</em></ins></span> it <span
class="removed"><del><strong>was surrounded by</strong></del></span> <span
class="inserted"><ins><em>implements DRM, too—that there is no way to
save</em></ins></span>
- a <span class="removed"><del><strong>person's
- body), as well as</strong></del></span> <span
class="inserted"><ins><em>recording. But we can't be sure
from</em></ins></span> the <span class="removed"><del><strong>vibration
frequency.</p>
-
- <p>Note</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+ <p>We expect</em></ins></span> it <span
class="inserted"><ins><em>implements DRM, too—that
there</em></ins></span> is <span class="removed"><del><strong>certainly
surveillance, at
+ least.</p></strong></del></span> <span
class="inserted"><ins><em>no way to save
+ a recording. But we can't be sure from the article.</p>
<p>If you learn to care much less about sports, you will benefit in
- many ways. This is one more.</p>
+ many ways. This is one more.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+<!-- #SpywareAtLowLevel</strong></del></span>
- <li id="M201804160">
+ <span class="inserted"><ins><em><li id="M201804160">
<!--#set var="DATE" value='<small
class="date-tag">2018-04</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>More than <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>More than <a
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response: a labeling
- standard with which manufacturers would make
statements</strong></del></span> <span class="inserted"><ins><em>5,855 Android
apps studied by researchers were found to snoop
- and collect information</em></ins></span> about <span
class="inserted"><ins><em>its users</a>. 40% of the apps were
- found to insecurely snitch on its users. Furthermore, they could
- detect only some methods of snooping, in these proprietary apps whose
+ of the 5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>snoop
+ and collect information about its users</a>. 40% of the apps were
+ found to insecurely snitch</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>its users. Furthermore, they could
+ detect only some methods of snooping,</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p></strong></del></span> <span
class="inserted"><ins><em>these proprietary apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
- <p>This is evidence that proprietary apps generally work
against</em></ins></span>
- their <span class="removed"><del><strong>products, rather
than</strong></del></span> <span class="inserted"><ins><em>users. To protect
their privacy and freedom, Android users
+ <p>This is evidence that proprietary apps generally work against
+ their users. To protect their privacy and freedom, Android users
need to get rid of the proprietary software—both proprietary
- Android by <a href="https://replicant.us">switching to
Replicant</a>,
- and the proprietary apps by getting apps from the</em></ins></span> free
software
- <span class="inserted"><ins><em>only <a
href="https://f-droid.org/">F-Droid store</a> that <a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
- the user if an app contains anti-features</a>.</p>
+ Android by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,</em></ins></span>
+ and <span class="removed"><del><strong>spyware via BIOS</a> on
Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>the proprietary
apps by getting apps from the free software
+ only <a href="https://f-droid.org/">F-Droid
store</a></em></ins></span> that <span class="inserted"><ins><em><a
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
+ the <span class="removed"><del><strong>specific sabotage method Lenovo
used did</strong></del></span> <span class="inserted"><ins><em>user if an app
contains anti-features</a>.</p>
</li>
<li id="M201804020">
<!--#set var="DATE" value='<small
class="date-tag">2018-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Grindr collects information about <a
-
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"></em></ins></span>
- which users <span class="removed"><del><strong>could</strong></del></span>
<span class="inserted"><ins><em>are HIV-positive, then provides the information
to
+
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+ which users are HIV-positive, then provides the information to
companies</a>.</p>
- <p>Grindr should not</em></ins></span> have
- <span class="removed"><del><strong>checked</strong></del></span> <span
class="inserted"><ins><em>so much information about its users.
+ <p>Grindr should</em></ins></span> not <span
class="removed"><del><strong>affect
+GNU/Linux; also, a “clean” Windows install
is</strong></del></span> <span class="inserted"><ins><em>have so much
information about its users.
It could be designed so that users communicate such info to each
- other but not to the server's database.</p>
+ other but</em></ins></span> not <span class="removed"><del><strong>really
+clean since</strong></del></span> <span class="inserted"><ins><em>to the
server's database.</p>
</li>
<li id="M201803050">
<!--#set var="DATE" value='<small
class="date-tag">2018-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The moviepass app</em></ins></span> and <span
class="removed"><del><strong>changed.</p></strong></del></span> <span
class="inserted"><ins><em>dis-service
- spy on users even more than users expected. It <a
-
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ <p>The moviepass app and dis-service
+ spy on users even more than users expected. It</em></ins></span> <a
<span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
where they travel before and after going to a movie</a>.</p>
<p>Don't be tracked—pay cash!</p>
@@ -2147,7 +2237,11 @@
<li id="M201711240">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tracking software in popular Android apps
+ <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork</strong></del></span> <span
class="inserted"><ins><em>popular Android apps
is pervasive and sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow a user's movements around a physical store by noticing WiFi
@@ -2156,43 +2250,60 @@
<li id="M201708270">
<!--#set var="DATE" value='<small
class="date-tag">2017-08</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p>The <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>Sarahah app <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
- book to developer's server.</p>
+ book</em></ins></span> to <span class="removed"><del><strong>place new
items on top under each subsection</strong></del></span> <span
class="inserted"><ins><em>developer's server.</p>
- <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em>this article misuses</em></ins></span> the <span
class="removed"><del><strong>vibrator</strong></del></span> <span
class="inserted"><ins><em>words
+ <p><small>(Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
referring to zero price.)</small></p>
</li>
<li id="M201707270">
<!--#set var="DATE" value='<small
class="date-tag">2017-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued</strong></del></span>
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows</strong></del></span>
+ <span class="inserted"><ins><em><p>20 dishonest Android apps
recorded</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically,</strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
calls and sent them and text messages and emails to
snoopers</a>.</p>
- <p>Google did not intend to make these apps spy; on the contrary, it
- worked in various ways to prevent that, and deleted these apps after
- discovering what they did. So we cannot blame Google
specifically</em></ins></span>
- for <span class="removed"><del><strong>collecting</strong></del></span>
<span class="inserted"><ins><em>the snooping of these apps.</p>
+ <p>Google did not intend to make these apps spy; on the
contrary,</em></ins></span> it <span class="removed"><del><strong>can
collect</strong></del></span>
+ <span class="inserted"><ins><em>worked in various ways to prevent that,
and deleted these apps after
+ discovering what they did. So we cannot blame Google specifically
+ for</em></ins></span> the <span
class="removed"><del><strong>emails</strong></del></span> <span
class="inserted"><ins><em>snooping</em></ins></span> of <span
class="removed"><del><strong>members</strong></del></span> <span
class="inserted"><ins><em>these apps.</p>
<p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares in the responsibility for the injustice of their being
+ therefore shares in the responsibility for the injustice</em></ins></span>
of <span class="removed"><del><strong>Parliament
+ this way, because</strong></del></span> <span
class="inserted"><ins><em>their being
nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
<p>Could Google have done a better job of preventing apps from
cheating? There is no systematic way for Google, or Android users,
- to inspect executable proprietary apps to see what they do.</p>
+ to inspect executable proprietary apps to see what</em></ins></span> they
<span class="removed"><del><strong>pass it through
Microsoft.</p></li>
+
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>do.</p>
<p>Google could demand the source code for these apps, and study
- the source code somehow to determine whether they mistreat users in
- various ways. If it did a good job of this, it could more or less
+ the source code somehow to determine whether they mistreat
users</em></ins></span> in <span class="removed"><del><strong>Cisco TNP IP
phones:</strong></del></span>
+ <span class="inserted"><ins><em>various ways. If it did a good job of
this, it could more or less
prevent such snooping, except when the app developers are clever
enough to outsmart the checking.</p>
@@ -2204,85 +2315,119 @@
<li id="M201705230">
<!--#set var="DATE" value='<small
class="date-tag">2017-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apps for BART <a
-
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
snoop on users</a>.</p>
<p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
- <p>With proprietary apps, one can only hope that they
don't.</p>
+ <p>With proprietary apps, one can only hope that they
don't.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
- <li id="M201705040">
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705040">
<!--#set var="DATE" value='<small
class="date-tag">2017-05</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>A study found 234 Android apps that track users by <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
+ to ultrasound from beacons placed</em></ins></span> in <span
class="removed"><del><strong>Skype:</strong></del></span> <span
class="inserted"><ins><em>stores or played by TV
programs</a>.</p>
</li>
<li id="M201704260">
<!--#set var="DATE" value='<small
class="date-tag">2017-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Faceapp appears to do</em></ins></span> lots of <span
class="removed"><del><strong>personal information about</strong></del></span>
<span class="inserted"><ins><em>surveillance, judging by <a
-
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"></em></ins></span>
- how
- <span class="removed"><del><strong>people used
it</a>.</p></strong></del></span> <span
class="inserted"><ins><em>much access it demands to personal data in the
device</a>.</p>
+ <p>Faceapp appears to do lots of surveillance, judging
by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands to personal data in the
device</a>.</p>
</li>
<li id="M201704190">
<!--#set var="DATE" value='<small
class="date-tag">2017-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Users are suing Bose for <a
-
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing a spyware app for its headphones</a>. Specifically,
+ <p>Users are suing Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing a spyware app</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>its headphones</a>. Specifically,
the app would record the names of the audio files users listen to
- along with the headphone's unique serial
number.</p></em></ins></span>
+ along with the headphone's unique serial number.</p>
- <p>The <span class="removed"><del><strong>company's
statement</strong></del></span> <span class="inserted"><ins><em>suit
accuses</em></ins></span> that <span
class="removed"><del><strong>it</strong></del></span> <span
class="inserted"><ins><em>this</em></ins></span> was <span
class="removed"><del><strong>anonymizing</strong></del></span> <span
class="inserted"><ins><em>done without</em></ins></span> the <span
class="removed"><del><strong>data may be
- true, but it doesn't really matter.</strong></del></span> <span
class="inserted"><ins><em>users' consent.</em></ins></span>
- If <span class="inserted"><ins><em>the fine print of the app said that
users gave consent for this,
- would that make</em></ins></span> it <span
class="removed"><del><strong>had sold</strong></del></span> <span
class="inserted"><ins><em>acceptable? No way! It should be flat out <a
- href="/philosophy/surveillance-vs-democracy.html"> illegal to
design</em></ins></span>
- the <span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>app</em></ins></span> to <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>snoop at all</a>.</p>
+ <p>The suit accuses that this was done without the users' consent.
+ If the fine print of the app said that users gave consent for this,
+ would that make it acceptable? No way! It should be flat out <a
+ href="/philosophy/surveillance-vs-democracy.html"> illegal to design
+ the app to snoop at all</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
- <li id="M201704074">
+<!-- #SpywareOnTheRoad</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704074">
<!--#set var="DATE" value='<small
class="date-tag">2017-04</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Pairs of Android apps can collude
- to transmit users' personal</em></ins></span> data <span
class="removed"><del><strong>broker,</strong></del></span> <span
class="inserted"><ins><em>to servers. <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>Pairs of Android apps can
collude</em></ins></span>
+ to <span class="removed"><del><strong>place new items on top under each
subsection</strong></del></span> <span class="inserted"><ins><em>transmit
users' personal data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found tens of thousands of pairs that collude</a>.</p>
</li>
<li id="M201703300">
<!--#set var="DATE" value='<small
class="date-tag">2017-03</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Verizon <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+
+<span class="removed"><del><strong><div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware</strong></del></span>
+ <span class="inserted"><ins><em><p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
pre-install
- on some of its phones. The app will give Verizon the same information
- about the users' searches that Google normally gets when they use
- its search engine.</p>
+ announced an opt-in proprietary search app that it will</a>
pre-install</em></ins></span>
+ on <span class="inserted"><ins><em>some of its phones.</em></ins></span>
The <span class="removed"><del><strong>Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
- <p>Currently, the app is <a
-
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>Every “home security” camera,
if</strong></del></span> <span class="inserted"><ins><em>app will give Verizon
the same information
+ about the users' searches that Google normally gets when they
use</em></ins></span>
+ its <span class="removed"><del><strong>manufacturer can communicate with
it,</strong></del></span> <span class="inserted"><ins><em>search
engine.</p>
+
+ <p>Currently, the app</em></ins></span> is <span
class="removed"><del><strong>a surveillance device.</strong></del></span> <a
+<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+ Canary camera</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
being pre-installed on only one phone</a>, and the user must
- explicitly opt-in before</em></ins></span> the <span
class="inserted"><ins><em>app takes effect. However, the app
- remains spyware—an “optional” piece of spyware is
- still spyware.</p>
+ explicitly opt-in before the app takes effect. However, the app
+ remains spyware—an “optional” piece of
spyware</em></ins></span> is <span class="removed"><del><strong>an
example</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>still spyware.</p>
</li>
<li id="M201701210">
<!--#set var="DATE" value='<small
class="date-tag">2017-01</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>The Meitu photo-editing app <a
+ --><!--#echo encoding="none" var="DATE" --></em></ins></span>
+ <p>The <span class="removed"><del><strong>article describes
wrongdoing by</strong></del></span> <span class="inserted"><ins><em>Meitu
photo-editing app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user</em></ins></span> data <span class="removed"><del><strong>broker
would have been able</strong></del></span> to <span
class="removed"><del><strong>figure out
- who</strong></del></span> <span class="inserted"><ins><em>a Chinese
company</a>.</p>
+ user data to a Chinese company</a>.</p>
</li>
<li id="M201611280">
@@ -2290,11 +2435,9 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after</em></ins></span> the <span
class="removed"><del><strong>user was.</p>
-
- <p>Following this lawsuit,</strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
+ movements before and after</em></ins></span> the <span
class="removed"><del><strong>manufacturer, based on</strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
- <p>This example illustrates how “getting the user's
+ <p>This example illustrates how “getting</em></ins></span> the
<span class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>user's
consent” for surveillance is inadequate as a protection against
massive surveillance.</p>
</li>
@@ -2302,58 +2445,79 @@
<li id="M201611160">
<!--#set var="DATE" value='<small
class="date-tag">2016-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated</em></ins></span> the <span
class="removed"><del><strong>company has been ordered</strong></del></span>
<span class="inserted"><ins><em>privacy and security of
+ <p>A <a
+
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a></em></ins></span> that <span
class="inserted"><ins><em>investigated</em></ins></span> the <span
class="removed"><del><strong>device is tethered</strong></del></span> <span
class="inserted"><ins><em>privacy and security of
283 Android VPN apps concluded that “in spite of the promises
for privacy, security, and anonymity given by the majority of VPN
- apps—millions of users may be unawarely subject</em></ins></span> to
<span class="removed"><del><strong>pay</strong></del></span> <span
class="inserted"><ins><em>poor security
+ apps—millions of users may be unawarely subject</em></ins></span> to
<span class="inserted"><ins><em>poor security
guarantees and abusive practices inflicted by VPN apps.”</p>
- <p>Following is</em></ins></span> a <span
class="removed"><del><strong>total</strong></del></span> <span
class="inserted"><ins><em>non-exhaustive list, taken from the research
paper,</em></ins></span>
- of <span class="removed"><del><strong>C$4m</a></strong></del></span>
<span class="inserted"><ins><em>some proprietary VPN apps that track users and
infringe their
+ <p>Following is</em></ins></span> a <span
class="removed"><del><strong>server.</p>
+ <p><a href="/proprietary/proprietary-tethers.html">More
about</strong></del></span> <span class="inserted"><ins><em>non-exhaustive
list, taken from the research paper,
+ of some</em></ins></span> proprietary <span
class="removed"><del><strong>tethering</a>.</p>
+ <p>But</strong></del></span> <span class="inserted"><ins><em>VPN
apps that track users and infringe their
privacy:</p>
<dl class="compact">
<dt>SurfEasy</dt>
<dd>Includes tracking libraries such as NativeX and Appflood,
- meant</em></ins></span> to <span class="removed"><del><strong>its
customers.</p></strong></del></span> <span
class="inserted"><ins><em>track users and show them targeted ads.</dd>
+ meant to track users and show them targeted ads.</dd>
<dt>sFly Network Booster</dt>
<dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning it has full access to users'
+ permissions upon installation, meaning</em></ins></span> it <span
class="inserted"><ins><em>has full access to users'
text messages.</dd>
<dt>DroidVPN and TigerVPN</dt>
<dd>Requests the <code>READ_LOGS</code> permission to
read logs
- for other apps and also core system logs. TigerVPN developers have
+ for other apps and</em></ins></span> also <span
class="removed"><del><strong>demonstrates that</strong></del></span> <span
class="inserted"><ins><em>core system logs. TigerVPN developers have
confirmed this.</dd>
<dt>HideMyAss</dt>
<dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
- may turn them over to the UK government if requested.</dd>
+ may turn them over to</em></ins></span> the <span
class="removed"><del><strong>device gives</strong></del></span> <span
class="inserted"><ins><em>UK government if requested.</dd>
<dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages returned to the
- users. The stated purpose of the JS injection is to display ads. Uses
+ <dd>Injects JavaScript code into</em></ins></span> the <span
class="removed"><del><strong>company
+ surveillance capability.</p>
+ </li>
+
+ <li>
+ <p>The Nest Cam “smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span> <span
class="inserted"><ins><em>HTML pages returned to</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
+ <p>A “smart” device means</strong></del></span>
+ <span class="inserted"><ins><em>users. The stated purpose
of</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>JS injection</em></ins></span> is <span
class="removed"><del><strong>using it</strong></del></span> to <span
class="removed"><del><strong>outsmart
+ you.</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul>
+ <li><p>E-books can contain</strong></del></span> <span
class="inserted"><ins><em>display ads. Uses
roughly five tracking libraries. Also, it redirects the user's
traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses roughly
- five tracking libraries. Developers of this app have confirmed that
+ <dd>Injects</em></ins></span> JavaScript <span
class="removed"><del><strong>code,</strong></del></span> <span
class="inserted"><ins><em>code into HTML pages,</em></ins></span> and <span
class="removed"><del><strong><a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes</strong></del></span>
<span class="inserted"><ins><em>also uses roughly
+ five tracking libraries. Developers of</em></ins></span> this <span
class="removed"><del><strong>code snoops on
readers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>app have confirmed that
the non-premium version of the app does JavaScript injection for
tracking the user and displaying ads.</dd>
</dl></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
<span class="inserted"><ins><em><li id="M201609210">
<!--#set var="DATE" value='<small
class="date-tag">2016-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Google's new voice messaging app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ <p>Google's new voice messaging app <a
+
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
all conversations</a>.</p>
</li>
@@ -2363,68 +2527,69 @@
<p>Facebook's new Magic Photo app <a
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections for known faces</a>,
- and suggests you circulate the picture you take
according</em></ins></span> to <span class="inserted"><ins><em>who is
- in</em></ins></span> the
- <span class="removed"><del><strong>manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way</strong></del></span> <span
class="inserted"><ins><em>frame.</p>
-
- <p>This spyware feature seems</em></ins></span> to <span
class="inserted"><ins><em>require online</em></ins></span> access <span
class="inserted"><ins><em>to some
- known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>data</a>
- collected by the manufacturer's snooping.</p>
-
- <p>That</strong></del></span> <span
class="inserted"><ins><em>pictures are likely to be
- sent across</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>wire to Facebook's servers</em></ins></span> and
<span class="inserted"><ins><em>face-recognition
+ and suggests you circulate the picture you take according to who
is</em></ins></span>
+ in <span class="removed"><del><strong>many e-readers—not
only</strong></del></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even</strong></del></span> <span
class="inserted"><ins><em>frame.</p>
+
+ <p>This spyware feature seems to require online access to some
+ known-faces database,</em></ins></span> which <span
class="removed"><del><strong>page</strong></del></span> <span
class="inserted"><ins><em>means the pictures are likely to be
+ sent across the wire to Facebook's servers and face-recognition
algorithms.</p>
<p>If so, none of Facebook users' pictures are private anymore,
- even if</em></ins></span> the <span class="removed"><del><strong>FBI could
listen</strong></del></span> <span class="inserted"><ins><em>user didn't
“upload” them</em></ins></span> to <span
class="removed"><del><strong>these conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>the service.</p>
+ even if</em></ins></span> the user <span
class="removed"><del><strong>reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>didn't “upload” them to the
service.</p></em></ins></span>
</li>
- <li id="M201605310">
+ <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,”</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201605310">
<!--#set var="DATE" value='<small
class="date-tag">2016-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Facebook's app listens all the time,</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <p>Facebook's app listens all</em></ins></span> the <span
class="removed"><del><strong>e-reader used
+ by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>time,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html">to
- snoop on what people are listening</em></ins></span> to <span
class="inserted"><ins><em>or watching</a>. In addition,
- it may be analyzing people's conversations to serve them with targeted
- advertisements.</p>
+ snoop on what people are listening</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
+ needed</strong></del></span> <span class="inserted"><ins><em>or
watching</a>. In addition,
+ it may be analyzing people's conversations</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
</li>
+</ul>
- <li id="M201604250">
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul>
+<li><p>Computerized cars</strong></del></span> <span
class="inserted"><ins><em>serve them</em></ins></span> with <span
class="removed"><del><strong>nonfree software are
+ <a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>targeted
+ advertisements.</p></em></ins></span>
+ </li>
+
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
+ effectively
+ anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201604250">
<!--#set var="DATE" value='<small
class="date-tag">2016-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A pregnancy test controller application not only can <a
-
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"></em></ins></span>
- spy on <span class="removed"><del><strong>children</strong></del></span>
<span class="inserted"><ins><em>many sorts of data in the
phone,</em></ins></span> and <span
class="removed"><del><strong>adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>in server accounts,
- it can alter them too</a>.</p></em></ins></span>
+ <p>A pregnancy test controller application not only
can</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ spy on many sorts of data in the phone,</em></ins></span> and <span
class="removed"><del><strong>make changes</strong></del></span> in <span
class="inserted"><ins><em>server accounts,
+ it can alter them too</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareOnSmartWatches</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201601130">
+ <li id="M201601130">
<!--#set var="DATE" value='<small
class="date-tag">2016-01</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make sure to place new
items</strong></del></span>
- <span class="inserted"><ins><em><p>Apps that include <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Apps that include <a
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users post
on</em></ins></span> various
+ <span class="removed"><del><strong>settings</a>.</p>
-<div class="big-section">
- <h3 id="SpywareOnSmartWatches">Spyware</strong></del></span> <span
class="inserted"><ins><em>what radio and TV programs
- are playing nearby</a>. Also</em></ins></span> on <span
class="removed"><del><strong>“Smart” Watches</h3>
- <span class="anchor-reference-id">
- (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li>
- <p>An LG “smart” watch is designed</strong></del></span>
<span class="inserted"><ins><em>what users post on various sites
+ <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>sites
such as Facebook, Google+ and Twitter.</p>
</li>
@@ -2432,46 +2597,51 @@
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>“Cryptic communication,”
- unrelated to the app's functionality, was</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></strong></del></span>
- <span
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis Android apps</a>.</p>
+ unrelated</em></ins></span> to <span class="removed"><del><strong>do
because</strong></del></span> the <span class="removed"><del><strong>system has
no authentication when
+ accessed through</strong></del></span> <span
class="inserted"><ins><em>app's functionality, was <a
+
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in</em></ins></span> the <span class="removed"><del><strong>modem.
However, even if it asked</strong></del></span> <span
class="inserted"><ins><em>500 most popular gratis Android
apps</a>.</p>
<p>The article should not have described these apps as
- “free”—they are not free software. The clear
way</em></ins></span>
- to <span class="removed"><del><strong>report its
location</strong></del></span> <span class="inserted"><ins><em>say “zero
price” is “gratis.”</p>
+ “free”—they are not free software. The clear way
+ to say “zero price” is “gratis.”</p>
- <p>The article takes for granted that the usual analytics tools are
- legitimate, but is that valid? Software developers have no
right</em></ins></span> to <span class="removed"><del><strong>someone
else</strong></del></span>
- <span class="inserted"><ins><em>analyze what users are doing or how.
“Analytics” tools
+ <p>The article takes</em></ins></span> for
+ <span class="removed"><del><strong>authentication, you couldn't be
confident</strong></del></span> <span
class="inserted"><ins><em>granted</em></ins></span> that <span
class="removed"><del><strong>Nissan has no
+ access. The software in</strong></del></span> the <span
class="removed"><del><strong>car</strong></del></span> <span
class="inserted"><ins><em>usual analytics tools are
+ legitimate, but</em></ins></span> is
+ <span class="removed"><del><strong>proprietary,</strong></del></span>
<span class="inserted"><ins><em>that valid? Software developers have no right to
+ analyze what users are doing or how. “Analytics” tools
that snoop are just as wrong as any other snooping.</p>
</li>
<li id="M201510300">
<!--#set var="DATE" value='<small
class="date-tag">2015-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>More than 73%</em></ins></span> and <span
class="inserted"><ins><em>47% of mobile applications, for Android and iOS
- respectively <a href="https://techscience.org/a/2015103001/">hand
over
- personal, behavioral and location information</a> of their
users</em></ins></span> to <span class="removed"><del><strong>transmit
- conversations too</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>third parties.</p></em></ins></span>
+ <p>More than 73% and 47% of mobile applications, for Android and iOS
+ respectively</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ means</strong></del></span> <span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">hand
over
+ personal, behavioral and location information</a> of their users to
+ third parties.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A very cheap “smart watch” comes with an Android
app</strong></del></span>
- <span class="inserted"><ins><em><li id="M201508210">
+ <li id="M201508210">
<!--#set var="DATE" value='<small
class="date-tag">2015-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Like most “music screaming” disservices, Spotify is
- based on proprietary malware (DRM and snooping). In August 2015
it</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some are
starting
- to realize</em></ins></span> that <span
class="removed"><del><strong>connects</strong></del></span> <span
class="inserted"><ins><em>it is nasty.</p>
+ based on proprietary malware (DRM and snooping). In August
2015</em></ins></span> it <span class="removed"><del><strong>demands blind
faith from its users</a>.</p>
- <p>This article shows the <a
+ <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased snooping</a>, and some are
starting</em></ins></span>
+ to <span class="inserted"><ins><em>realize that it is nasty.</p>
+
+ <p>This article shows</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way</em></ins></span> to
<span class="removed"><del><strong>an unidentified site</strong></del></span>
<span class="inserted"><ins><em>“serve”
+ twisted ways that they present snooping as a way to “serve”
users better</a>—never mind whether they want that. This is a
- typical example of the attitude of the proprietary software industry
+ typical example of</em></ins></span> the <span
class="removed"><del><strong>cell phone
+ modem enables</strong></del></span> <span
class="inserted"><ins><em>attitude of</em></ins></span> the <span
class="removed"><del><strong>phone company to track</strong></del></span> <span
class="inserted"><ins><em>proprietary software industry
towards those they have subjugated.</p>
<p>Out, out, damned Spotify!</p>
@@ -2482,59 +2652,39 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf">
- A study</em></ins></span> in <span
class="removed"><del><strong>China</a>.</p></strong></del></span>
<span class="inserted"><ins><em>2015</a> found that 90% of the top-ranked
gratis proprietary
- Android apps contained recognizable tracking libraries. For the paid
- proprietary apps, it was only 60%.</p></em></ins></span>
+ A study in 2015</a> found that 90% of</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>top-ranked gratis proprietary
+ Android apps contained recognizable tracking libraries.
For</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>paid
+ proprietary apps,</em></ins></span> it <span class="inserted"><ins><em>was
only 60%.</p>
- <p>The article <span class="removed"><del><strong>says this is a
back door,</strong></del></span> <span class="inserted"><ins><em>confusingly
describes gratis apps as
- “free”,</em></ins></span> but <span
class="inserted"><ins><em>most of them are not in fact <a
+ <p>The article confusingly describes gratis apps as
+ “free”, but most of them are not in fact <a
href="/philosophy/free-sw.html">free software</a>. It also uses
the
- ugly word “monetize”. A good replacement for</em></ins></span>
that <span class="removed"><del><strong>could be a
- misunderstanding. However, it</strong></del></span> <span
class="inserted"><ins><em>word</em></ins></span>
- is <span class="removed"><del><strong>certainly surveillance, at
- least.</p></strong></del></span> <span
class="inserted"><ins><em>“exploit”; nearly always that will fit
perfectly.</p></em></ins></span>
+ ugly word “monetize”. A good replacement for that
word</em></ins></span>
+ is <span class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>“exploit”; nearly always that will fit
perfectly.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareAtLowLevel</strong></del></span>
- <span class="inserted"><ins><em><li id="M201505060">
+ <li id="M201505060">
<!--#set var="DATE" value='<small
class="date-tag">2015-05</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>Gratis Android apps (but not <a
- href="/philosophy/free-sw.html">free software</a>)
connect</em></ins></span> to <span class="removed"><del><strong>place new items
on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
-
-<ul>
-<li><p></strong></del></span> <span
class="inserted"><ins><em>100</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</em></ins></span>
- and <span class="removed"><del><strong>spyware via
BIOS</a></strong></del></span> <span
class="inserted"><ins><em>advertising</a> URLs,</em></ins></span> on
<span class="removed"><del><strong>Windows installs.
-Note that</strong></del></span> the <span
class="removed"><del><strong>specific sabotage method
Lenovo</strong></del></span> <span class="inserted"><ins><em>average.</p>
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Gratis Android apps (but not <a
+ href="/philosophy/free-sw.html">free software</a>)
connect</em></ins></span> to <span class="removed"><del><strong>physically
remove</strong></del></span> <span class="inserted"><ins><em>100 <a
+
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
+ and advertising</a> URLs, on</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>average.</p></em></ins></span>
</li>
- <li id="M201504060">
+ <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201504060">
<!--#set var="DATE" value='<small
class="date-tag">2015-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Widely</em></ins></span> used <span
class="removed"><del><strong>did not affect
-GNU/Linux; also, a “clean” Windows install</strong></del></span>
<span class="inserted"><ins><em><a
-
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This</em></ins></span>
is <span class="removed"><del><strong>not really
-clean since</strong></del></span> <span class="inserted"><ins><em>in addition
to
- the snooping done by the phone company, and perhaps by the OS in
- the phone.</p>
+ <p>Widely used</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on the user</a>. This</em></ins></span>
is <span class="removed"><del><strong>made available</strong></del></span>
<span class="inserted"><ins><em>in addition</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance
companies,</strong></del></span>
+ <span class="inserted"><ins><em>the snooping done by the phone
company,</em></ins></span> and
+ <span class="removed"><del><strong>others.</p>
+
+ <p>The case of toll-collection systems,
mentioned</strong></del></span> <span class="inserted"><ins><em>perhaps by the
OS</em></ins></span> in
+ <span class="inserted"><ins><em>the phone.</p>
<p>Don't be distracted by the question of whether the app developers
get users to say “I agree”. That is no excuse for
@@ -2545,22 +2695,18 @@
<!--#set var="DATE" value='<small
class="date-tag">2014-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many proprietary apps for mobile devices
- report which other apps the user has installed.</em></ins></span> <a
<span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span>
- <span
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this</em></ins></span> in <span class="removed"><del><strong>its
own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork</strong></del></span> <span class="inserted"><ins><em>a
way that at least is visible and optional</a>. Not
+ report which other apps the user has installed. <a
+ href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing</em></ins></span> this <span
class="removed"><del><strong>article,</strong></del></span> <span
class="inserted"><ins><em>in a way that at least is visible and
optional</a>. Not
as bad as what the others do.</p>
</li>
<li id="M201401150.1">
<!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>The Simeji keyboard is a
smartphone version of Baidu's <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The Simeji keyboard</em></ins></span> is <span
class="removed"><del><strong>not
+ really</strong></del></span> a <span
class="removed"><del><strong>matter</strong></del></span> <span
class="inserted"><ins><em>smartphone version</em></ins></span> of <span
class="removed"><del><strong>proprietary surveillance. These systems are an
+ intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>Baidu's <a
href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
title="Input Method Editor">IME</abbr></a>.</p>
</li>
@@ -2568,24 +2714,12 @@
<li id="M201312270">
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The nonfree Snapchat app's principal purpose is</em></ins></span>
to <span class="removed"><del><strong>place new items</strong></del></span>
<span class="inserted"><ins><em>restrict the
- use of data</em></ins></span> on <span class="removed"><del><strong>top
under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>the user's
computer, but it does surveillance too:</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically,</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"></em></ins></span>
- it <span class="removed"><del><strong>can collect</strong></del></span>
<span class="inserted"><ins><em>tries to get</em></ins></span> the <span
class="removed"><del><strong>emails of members</strong></del></span> <span
class="inserted"><ins><em>user's list</em></ins></span> of <span
class="removed"><del><strong>Parliament</strong></del></span> <span
class="inserted"><ins><em>other people's phone
+ <p>The nonfree Snapchat app's principal purpose is to restrict the
+ use</em></ins></span> of <span class="removed"><del><strong>privacy, and
should be replaced with anonymous
+ payment systems,</strong></del></span> <span
class="inserted"><ins><em>data on the user's computer,</em></ins></span> but
<span class="inserted"><ins><em>it does surveillance too: <a
+
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries to get</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware.
The</strong></del></span> <span class="inserted"><ins><em>user's list
of</em></ins></span> other
+ <span class="removed"><del><strong>cases mentioned are
done</strong></del></span> <span class="inserted"><ins><em>people's phone
numbers</a>.</p>
</li>
@@ -2594,14 +2728,19 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Brightest Flashlight app <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies</a>.</p>
+ sends user data, including geolocation, for use</em></ins></span> by <span
class="removed"><del><strong>proprietary malware in the
car.</p></li>
- <p>The FTC criticized</em></ins></span> this <span
class="removed"><del><strong>way,</strong></del></span> <span
class="inserted"><ins><em>app</em></ins></span> because <span
class="removed"><del><strong>they pass</strong></del></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>companies</a>.</p>
- <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>asked the user to
- approve sending personal data to the app developer but did not ask
- about sending it to other companies. This shows the weakness of
- the reject-it-if-you-dislike-snooping “solution” to
+ <p>The FTC criticized this app because it asked</em></ins></span>
the <span class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> to <span
class="removed"><del><strong>extract</strong></del></span>
+ <span class="inserted"><ins><em>approve sending personal</em></ins></span>
data <span class="removed"><del><strong>remotely and
+ determine</strong></del></span> <span
class="inserted"><ins><em>to</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>). The company says it doesn't
+ store this information,</strong></del></span> <span
class="inserted"><ins><em>app developer</em></ins></span> but <span
class="removed"><del><strong>if the state orders</strong></del></span> <span
class="inserted"><ins><em>did not ask
+ about sending</em></ins></span> it to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>other companies. This shows</em></ins></span> the
<span class="removed"><del><strong>data
+ and hand it over,</strong></del></span> <span
class="inserted"><ins><em>weakness of</em></ins></span>
+ the <span class="removed"><del><strong>state can store
it.</p></strong></del></span> <span
class="inserted"><ins><em>reject-it-if-you-dislike-snooping
“solution” to
surveillance: why should a flashlight app send any information to
anyone? A free software flashlight app would not.</p>
</li>
@@ -2609,184 +2748,115 @@
<li id="M201212100">
<!--#set var="DATE" value='<small
class="date-tag">2012-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>FTC says most mobile apps for children don't respect
privacy:</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+ <p>FTC says most mobile apps for children don't respect privacy:
<a
+
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
</li>
</ul>
-<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInSkype">Skype</h4></em></ins></span>
+<span class="removed"><del><strong><!-- #SpywareAtHome</strong></del></span>
+
+
+<span class="inserted"><ins><em><div class="big-subsection">
+ <h4 id="SpywareInSkype">Skype</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Spyware in Skype:</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201908151">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Skype refuses to say whether it can <a
-
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
- on calls</a>.</p>
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>Skype refuses</em></ins></span>
to <span class="removed"><del><strong>place new items</strong></del></span>
<span class="inserted"><ins><em>say whether it can <a
+
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop</em></ins></span>
+ on <span class="removed"><del><strong>top under each
subsection</strong></del></span> <span
class="inserted"><ins><em>calls</a>.</p>
<p>That almost certainly means it can do so.</p>
</li>
<li id="M201307110">
<!--#set var="DATE" value='<small
class="date-tag">2013-07</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Skype contains</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.</em></ins></span>
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+ <span class="inserted"><ins><em><p>Skype contains <a
+
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
Microsoft changed Skype <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
specifically for spying</a>.</p>
</li>
-</ul>
-
-
-
-<span class="removed"><del><strong><!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div></strong></del></span>
+</ul></em></ins></span>
-<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInCameras">Spyware
in Cameras</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInGames">Games</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInCameras">#SpywareInCameras</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInGames">#SpywareInGames</a>)</span></em></ins></span>
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareAtHome">Spyware at
Home</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInGames">Games</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtHome">#SpywareAtHome</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInGames">#SpywareInGames</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear: left;"></div>
-<span class="removed"><del><strong><ul>
- <li>
- <p>Every “home security” camera, if its manufacturer can
communicate with it,</strong></del></span>
+<ul>
+ <li><p>Lots</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M202010221">
<!--#set var="DATE" value='<small
class="date-tag">2020-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft</em></ins></span> is <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>imposing its</em></ins></span>
- surveillance <span
class="removed"><del><strong>device.</strong></del></span> <span
class="inserted"><ins><em>on the game of Minecraft by</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera is</strong></del></span>
+ <p>Microsoft is imposing its
+ surveillance on the game</em></ins></span> of <span
class="removed"><del><strong>“smart” products are
+ designed</strong></del></span> <span
class="inserted"><ins><em>Minecraft by</em></ins></span> <a <span
class="removed"><del><strong>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
+ listen</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring
- every player to open</em></ins></span> an <span
class="removed"><del><strong>example</a>.</p>
- <p>The article describes wrongdoing by the manufacturer,
based</strong></del></span> <span
class="inserted"><ins><em>account</em></ins></span> on <span
class="inserted"><ins><em>Microsoft's network</a>. Microsoft
- has bought</em></ins></span> the <span class="removed"><del><strong>fact
- that the device is tethered</strong></del></span> <span
class="inserted"><ins><em>game and will merge all accounts into its network,
- which will give them access</em></ins></span> to <span
class="removed"><del><strong>a server.</p>
- <p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But it also demonstrates</strong></del></span> <span
class="inserted"><ins><em>people's data.</p>
+ every player</em></ins></span> to <span
class="removed"><del><strong>everyone in</strong></del></span> <span
class="inserted"><ins><em>open an account on Microsoft's network</a>.
Microsoft
+ has bought</em></ins></span> the <span
class="removed"><del><strong>house,</strong></del></span> <span
class="inserted"><ins><em>game and will merge</em></ins></span> all <span
class="inserted"><ins><em>accounts into its network,
+ which will give them access to people's data.</p>
<p>Minecraft players <a
href="https://directory.fsf.org/wiki/Minetest">can play
Minetest</a>
- instead. The essential advantage of Minetest is</em></ins></span> that
<span class="removed"><del><strong>the device gives the company
- surveillance capability.</p>
- </li>
+ instead. The essential advantage of Minetest is that it is free
+ software, meaning it respects</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
- <li>
- <p>The Nest Cam “smart” camera</strong></del></span>
<span class="inserted"><ins><em>it</em></ins></span> is <span
class="removed"><del><strong><a
- href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when the “owner”
switches</strong></del></span> <span class="inserted"><ins><em>free
- software, meaning</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>respects</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using</strong></del></span> <span
class="inserted"><ins><em>user's computer freedom. As a bonus,</em></ins></span>
- it <span class="removed"><del><strong>to outsmart
- you.</p></strong></del></span> <span
class="inserted"><ins><em>offers more options.</p></em></ins></span>
+ <p>Today's technological practice does not include any
way</strong></del></span> <span class="inserted"><ins><em>user's computer
freedom. As a bonus,
+ it offers more options.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-<ul>
- <li><p>E-books can contain JavaScript code,</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201908210">
+ <li id="M201908210">
<!--#set var="DATE" value='<small
class="date-tag">2019-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Microsoft recorded users of Xboxes</em></ins></span> and <span
class="inserted"><ins><em>had</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
+ <p>Microsoft recorded users</em></ins></span> of
+ <span class="removed"><del><strong>making</strong></del></span> <span
class="inserted"><ins><em>Xboxes and had <a
+
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
human workers listen to the recordings</a>.</p>
<p>Morally, we see no difference between having human workers listen
and
- having speech-recognition systems listen. Both intrude</em></ins></span>
on <span
class="removed"><del><strong>readers</a>.</p></strong></del></span>
<span class="inserted"><ins><em>privacy.</p></em></ins></span>
+ having speech-recognition systems listen. Both intrude on
privacy.</p>
</li>
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201806240">
+ <li id="M201806240">
<!--#set var="DATE" value='<small
class="date-tag">2018-06</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Red Shell is a spyware that
- is found</em></ins></span> in many <span
class="removed"><del><strong>e-readers—not only the
- Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page the user reads at what
time</a>.</p>
- </li>
-
- <li><p>Adobe made “Digital Editions,” the e-reader
used
- by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>proprietary games. It</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of</strong></del></span>
- <span
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks</em></ins></span> data <span class="inserted"><ins><em>on users'
computers and sends it</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
- needed to check DRM!</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
-
-<ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
- snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>third parties</a>.</p></em></ins></span>
+ <p>Red Shell is</em></ins></span> a <span
class="removed"><del><strong>device</strong></del></span> <span
class="inserted"><ins><em>spyware</em></ins></span> that <span
class="removed"><del><strong>can obey your voice commands without
+ potentially spying</strong></del></span>
+ <span class="inserted"><ins><em>is found in many proprietary games. It
<a
+
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
+ tracks data</em></ins></span> on <span class="removed"><del><strong>you.
Even if</strong></del></span> <span class="inserted"><ins><em>users' computers
and sends</em></ins></span> it <span class="inserted"><ins><em>to third
parties</a>.</p>
</li>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>id="M201804144">
+ <li id="M201804144">
<!--#set var="DATE" value='<small
class="date-tag">2018-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>ArenaNet surreptitiously installed</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
- effectively
- anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in various
- settings</a>.</p>
-
- <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>spyware
- program along with an update</em></ins></span> to <span
class="removed"><del><strong>do because</strong></del></span> the <span
class="removed"><del><strong>system has no authentication when
- accessed through the modem. However, even if it asked for
- authentication, you couldn't be confident that Nissan has no
- access.</strong></del></span> <span class="inserted"><ins><em>massive
- multiplayer game Guild Wars 2.</em></ins></span> The <span
class="removed"><del><strong>software in the car is
- proprietary,</strong></del></span> <span class="inserted"><ins><em>spyware
allowed ArenaNet</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from its users</a>.</p>
-
- <p>Even if no one connects</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"></em></ins></span>
- to <span class="removed"><del><strong>the car remotely, the cell phone
- modem enables the phone company to track the car's
movements</strong></del></span> <span class="inserted"><ins><em>snoop
on</em></ins></span> all
- <span class="removed"><del><strong>the time; it is possible to physically
remove the cell phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>open processes running on its user's
computer</a>.</p></em></ins></span>
+ <p>ArenaNet surreptitiously installed a spyware
+ program along with an update to the massive
+ multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
+
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
+ to snoop on all open processes running on its user's
computer</a>.</p>
</li>
- <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201711070">
+ <li id="M201711070">
<!--#set var="DATE" value='<small
class="date-tag">2017-11</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The driver for a certain gaming keyboard</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records</strong></del></span>
- <span
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends</em></ins></span>
- information <span class="removed"><del><strong>about drivers'
movements</a>,
- which is made available</strong></del></span> to <span
class="removed"><del><strong>car manufacturers, insurance
companies,</strong></del></span> <span
class="inserted"><ins><em>China</a>.</p>
+ <p>The driver for a certain gaming keyboard <a
+
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
+ information to China</a>.</p>
</li>
<li id="M201512290">
@@ -2794,58 +2864,48 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Many <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users</em></ins></span> and
- <span class="removed"><del><strong>others.</p>
-
- <p>The case of toll-collection systems, mentioned in this
article,</strong></del></span> <span class="inserted"><ins><em>report to the
+ video game consoles snoop on their users and report to the
internet</a>—even what their users weigh.</p>
- <p>A game console</em></ins></span> is <span
class="removed"><del><strong>not
- really</strong></del></span> a <span class="removed"><del><strong>matter
of proprietary surveillance. These systems are an
- intolerable invasion of privacy,</strong></del></span> <span
class="inserted"><ins><em>computer,</em></ins></span> and <span
class="removed"><del><strong>should be replaced</strong></del></span> <span
class="inserted"><ins><em>you can't trust a computer</em></ins></span> with
<span class="removed"><del><strong>anonymous
- payment systems, but the invasion isn't done by malware. The other
- cases mentioned are done by proprietary malware in the
car.</p></li>
-
- <li><p>Tesla cars allow the company to
extract</strong></del></span>
- <span class="inserted"><ins><em>a nonfree operating system.</p>
+ <p>A game console</em></ins></span> is <span
class="removed"><del><strong>air-gapped, it could be
+ saving up records about</strong></del></span> <span
class="inserted"><ins><em>a computer, and</em></ins></span> you <span
class="removed"><del><strong>for later
examination.</p></strong></del></span> <span
class="inserted"><ins><em>can't trust a computer with
+ a nonfree operating system.</p></em></ins></span>
</li>
- <li id="M201509160">
+ <span class="removed"><del><strong><li><p>Nest thermometers
+ send</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201509160">
<!--#set var="DATE" value='<small
class="date-tag">2015-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Modern gratis game cr…apps <a
-
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of</em></ins></span> data <span
class="removed"><del><strong>remotely</strong></del></span> <span
class="inserted"><ins><em>about their users</em></ins></span> and
- <span class="removed"><del><strong>determine the car's location at any
time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>their users'
- friends</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
- store this information, but if the state orders</strong></del></span>
<span class="inserted"><ins><em>associates</a>.</p>
+ <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range</em></ins></span> of data about <span
class="inserted"><ins><em>their users and their users'
+ friends and associates</a>.</p>
- <p>Even nastier, they do</em></ins></span> it <span
class="removed"><del><strong>to get</strong></del></span> <span
class="inserted"><ins><em>through ad networks that merge</em></ins></span> the
data
- <span class="inserted"><ins><em>collected by various
cr…apps</em></ins></span> and <span class="removed"><del><strong>hand it
over,</strong></del></span> <span class="inserted"><ins><em>sites made by
different
+ <p>Even nastier, they do it through ad networks that
merge</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p></strong></del></span>
<span class="inserted"><ins><em>data
+ collected by various cr…apps and sites made by different
companies.</p>
<p>They use this data to manipulate people to buy things, and hunt
for
“whales” who can be led to spend a lot of money. They also
- use a back door to manipulate</em></ins></span> the <span
class="removed"><del><strong>state</strong></del></span> <span
class="inserted"><ins><em>game play for specific players.</p>
+ use a back door to manipulate the game play for specific players.</p>
- <p>While the article describes gratis games, games that cost
money</em></ins></span>
- can <span class="removed"><del><strong>store
it.</p></strong></del></span> <span class="inserted"><ins><em>use the
same tactics.</p></em></ins></span>
+ <p>While the article describes gratis games, games that cost money
+ can use the same tactics.</p></em></ins></span>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareAtHome</strong></del></span>
+ <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span>
<span class="inserted"><ins><em><li id="M201401280">
<!--#set var="DATE" value='<small
class="date-tag">2014-01</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
- <span class="inserted"><ins><em><p>Angry Birds <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Angry Birds <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
spies for companies, and the NSA takes advantage</em></ins></span>
- to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>spy through it
too</a>. Here's information</em></ins></span> on <span
class="removed"><del><strong>top under each subsection</strong></del></span>
<span class="inserted"><ins><em><a
+ to spy <span class="inserted"><ins><em>through it too</a>. Here's
information</em></ins></span> on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em><a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
@@ -2856,64 +2916,46 @@
<li id="M200510200">
<!--#set var="DATE" value='<small
class="date-tag">2005-10</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
- <span class="inserted"><ins><em><p>Blizzard Warden is a hidden
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Blizzard Warden is a hidden
“cheating-prevention” program that <a
href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
spies on every process running on a gamer's computer and sniffs a
good deal of personal data</a>, including lots of activities which
have nothing to do with cheating.</p>
</li>
-</ul></em></ins></span>
+</ul>
<div class="big-section">
- <h3 <span class="removed"><del><strong>id="SpywareAtHome">Spyware at
Home</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInEquipment">Spyware in Connected
Equipment</h3></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtHome">#SpywareAtHome</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
+ <h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
</div>
<div style="clear: left;"></div>
-<span class="removed"><del><strong><ul>
- <li><p>Lots of “smart” products are
- designed</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M202101050">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Most Internet connected devices in Mozilla's</em></ins></span>
<a <span
class="removed"><del><strong>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen</strong></del></span>
- <span
class="inserted"><ins><em>href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
+ <p>Most Internet connected devices in Mozilla's <a
+
href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
Not Included”</a> list <a
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
- designed</em></ins></span> to <span class="removed"><del><strong>everyone
in the house, all the time</a>.</p>
-
- <p>Today's technological practice does not include any way of
- making a device that can obey your voice commands without
- potentially spying</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>you. Even</strong></del></span> <span
class="inserted"><ins><em>users</a> even</em></ins></span> if <span
class="removed"><del><strong>it is air-gapped, it could be
- saving up records about you for later examination.</p>
- </li>
-
- <li><p>Nest thermometers
- send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot</strong></del></span> <span class="inserted"><ins><em>they meet
+ designed to snoop on users</a> even if they meet
Mozilla's “Minimum Security Standards.” Insecure
- design</em></ins></span> of <span class="removed"><del><strong>data
about</strong></del></span> the <span
class="removed"><del><strong>user</a>.</p></strong></del></span>
<span class="inserted"><ins><em>program running on some of these devices <a
+ design of the program running on some of these devices <a
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes
the user susceptible to be snooped and exploited by crackers as
- well</a>.</p></em></ins></span>
+ well</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201708280">
+ <li id="M201708280">
<!--#set var="DATE" value='<small
class="date-tag">2017-08</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The bad security in many Internet of Stings devices allows <a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
- to <span class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>the people that use them</a>.</p>
+
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on the people that use them</a>.</p>
<p>Don't be a sucker—reject all the stings.</p>
@@ -3091,20 +3133,20 @@
snooping all the time</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
snoops on what programs people watch, and even what they wanted to
- record</a>.</p></em></ins></span>
+ record</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>The</strong></del></span>
- <span class="inserted"><ins><em><li id="M201504300">
+ <li id="M201504300">
<!--#set var="DATE" value='<small
class="date-tag">2015-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio <a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
used a firmware “upgrade” to make its TVs snoop on what
- users watch</a>. The TVs did not do that when first sold.</p>
+ users watch</a>. The TVs did not do that when first
sold.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>The</strong></del></span>
- <li id="M201502090">
+ <span class="inserted"><ins><em><li id="M201502090">
<!--#set var="DATE" value='<small
class="date-tag">2015-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The</em></ins></span> Samsung “Smart” TV <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits</strong></del></span>
@@ -3759,8 +3801,8 @@
phones. <em>All</em> such data collection should be
forbidden.</p>
<p>But if you really want to be safe, we must make sure the car's
- hardware cannot collect any of that data, or that the software
- is free so we know it won't collect any of</em></ins></span> that <span
class="inserted"><ins><em>data.</p>
+ hardware cannot collect any of</em></ins></span> that <span
class="inserted"><ins><em>data, or that the software
+ is free so we know it won't collect any of that data.</p>
</li>
<li id="M201711230">
@@ -3841,8 +3883,8 @@
<ul class="blurbs">
<li id="M202008182">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
- <span class="inserted"><ins><em><p>Oculus headsets <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Oculus headsets <a
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
users to identify themselves to Facebook</a>. This will give Facebook
free rein to pervasively snoop on Oculus users.</p>
@@ -3850,8 +3892,8 @@
<li id="M201612230">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>VR equipment, measuring every slight motion,
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+ <span class="inserted"><ins><em><p>VR equipment, measuring every
slight motion,
creates the potential for the most intimate
surveillance ever. All it takes to make this potential real <a
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
@@ -4469,7 +4511,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/10/08 19:34:57 $
+$Date: 2021/10/12 08:33:44 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.404
retrieving revision 1.405
diff -u -b -r1.404 -r1.405
--- po/proprietary-surveillance.de.po 8 Oct 2021 19:34:57 -0000 1.404
+++ po/proprietary-surveillance.de.po 12 Oct 2021 08:33:45 -0000 1.405
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-10-08 19:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -1224,6 +1224,24 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-"
"health-apps-harvest-user-data-global-study-shows\">Almost all proprietary "
"health apps harvest users' data</a>, including sensitive health information, "
Index: po/proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.223
retrieving revision 1.224
diff -u -b -r1.223 -r1.224
--- po/proprietary-surveillance.es.po 9 Oct 2021 10:02:21 -0000 1.223
+++ po/proprietary-surveillance.es.po 12 Oct 2021 08:33:46 -0000 1.224
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-10-08 19:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
"PO-Revision-Date: 2021-10-09 11:37+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-10-12 08:26+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -891,6 +892,24 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-"
"health-apps-harvest-user-data-global-study-shows\">Almost all proprietary "
"health apps harvest users' data</a>, including sensitive health information, "
Index: po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.657
retrieving revision 1.658
diff -u -b -r1.657 -r1.658
--- po/proprietary-surveillance.fr.po 8 Oct 2021 19:48:15 -0000 1.657
+++ po/proprietary-surveillance.fr.po 12 Oct 2021 08:33:46 -0000 1.658
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-10-08 19:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
"PO-Revision-Date: 2021-10-08 21:47+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-10-12 08:26+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -886,6 +887,24 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-"
"health-apps-harvest-user-data-global-study-shows\">Almost all proprietary "
"health apps harvest users' data</a>, including sensitive health information, "
Index: po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.276
retrieving revision 1.277
diff -u -b -r1.276 -r1.277
--- po/proprietary-surveillance.it-diff.html 8 Oct 2021 19:34:57 -0000
1.276
+++ po/proprietary-surveillance.it-diff.html 12 Oct 2021 08:33:46 -0000
1.277
@@ -648,165 +648,190 @@
</div>
<ul class="blurbs">
- <li id="M202106170">
+ <li id="M202106250">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/">El
+ Salvador Dictatorship's Chivo wallet is spyware</a>, it's
a</em></ins></span>
+ proprietary <span class="removed"><del><strong>Android apps contained
recognizable tracking libraries. For</strong></del></span> <span
class="inserted"><ins><em>program that breaks users' freedom and spies on
people;
+ demands personal data such as</em></ins></span> the <span
class="removed"><del><strong>paid proprietary apps,</strong></del></span> <span
class="inserted"><ins><em>national ID number and does face
+ recognition, and</em></ins></span> it <span
class="removed"><del><strong>was only 60%.</p>
+
+ <p>The article confusingly describes gratis apps</strong></del></span>
as <span class="removed"><del><strong>“free”,
+ but most of them are not in fact
+ <a href="/philosophy/free-sw.html">free
software</a>.</strong></del></span> <span class="inserted"><ins><em>bad
security for its data.</em></ins></span> It also <span
class="removed"><del><strong>uses the ugly word “monetize”. A good
replacement</strong></del></span> <span
class="inserted"><ins><em>asks</em></ins></span> for <span
class="removed"><del><strong>that word is “exploit”; nearly always
that will fit
+ perfectly.</p>
+</li>
+
+<li>
+ <p>Apps</strong></del></span>
+ <span class="inserted"><ins><em>almost every malware permission in
people's smart phones.</p>
+
+ <p>The article criticizes it</em></ins></span> for <span
class="removed"><del><strong>BART</strong></del></span> <span
class="inserted"><ins><em>faults in “data
+ protection”, though</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With proprietary apps, one can only hope that they
don't.</p></strong></del></span> <span
class="inserted"><ins><em>href="">“data protection”
+ is the wrong approach to privacy
anyway</a>.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
+ <p>A study found 234 Android</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202106170">
<!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-health-apps-harvest-user-data-global-study-shows">Almost
- all</em></ins></span> proprietary <span
class="removed"><del><strong>Android</strong></del></span> <span
class="inserted"><ins><em>health</em></ins></span> apps <span
class="removed"><del><strong>contained recognizable</strong></del></span> <span
class="inserted"><ins><em>harvest users' data</a>, including
- sensitive health information,</em></ins></span> tracking <span
class="removed"><del><strong>libraries. For
- the paid proprietary apps, it was only 60%.</p></strong></del></span>
<span class="inserted"><ins><em>identifiers, and cookies to
- track user activities. Some of these applications are tracking users
- across different platforms.</p>
+ all proprietary health</em></ins></span> apps <span
class="removed"><del><strong>that</strong></del></span> <span
class="inserted"><ins><em>harvest users' data</a>, including
+ sensitive health information, tracking identifiers, and cookies
to</em></ins></span>
+ track <span class="inserted"><ins><em>user activities. Some of these
applications are tracking</em></ins></span> users <span
class="removed"><del><strong>by
+ <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed in stores or played by TV
programs</a>.
+ </p></strong></del></span>
+ <span class="inserted"><ins><em>across different
platforms.</p></em></ins></span>
</li>
- <li id="M202102200">
+<span class="removed"><del><strong><li>
+ <p>Pairs</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202102200">
<!--#set var="DATE" value='<small
class="date-tag">2021-02</small>'
- --><!--#echo encoding="none" var="DATE" --></em></ins></span>
- <p>The <span class="removed"><del><strong>article confusingly
describes gratis apps</strong></del></span> <span
class="inserted"><ins><em>proprietary program Clubhouse
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The proprietary program Clubhouse
is malware and a privacy disaster. Clubhouse <a
href="https://www.theguardian.com/commentisfree/2021/feb/20/why-hot-new-social-app-clubhouse-spells-nothing-but-trouble">collects
- people's personal data such</em></ins></span> as <span
class="removed"><del><strong>“free”,
- but most</strong></del></span> <span
class="inserted"><ins><em>recordings</em></ins></span> of <span
class="removed"><del><strong>them are</strong></del></span> <span
class="inserted"><ins><em>people's
- conversations</a>, and, as a secondary problem,
does</em></ins></span> not <span class="inserted"><ins><em>encrypt them,
+ people's personal data such as recordings</em></ins></span> of <span
class="removed"><del><strong>Android apps can collude</strong></del></span>
<span class="inserted"><ins><em>people's
+ conversations</a>, and, as a secondary problem, does not encrypt
them,
which shows a bad security part of the issue.</p>
- <p>A user's unique Clubhouse ID number and chatroom ID are
transmitted</em></ins></span>
- in <span class="removed"><del><strong>fact
- <a href="/philosophy/free-sw.html">free software</a>.
- It also uses</strong></del></span> <span
class="inserted"><ins><em>plaintext, and Agora (the company
behind</em></ins></span> the <span class="removed"><del><strong>ugly word
“monetize”. A</strong></del></span> <span
class="inserted"><ins><em>app) would likely
- have access to users' raw audio, potentially providing access to
+ <p>A user's unique Clubhouse ID number and chatroom ID are
transmitted
+ in plaintext, and Agora (the company behind the app) would likely
+ have access</em></ins></span> to <span
class="removed"><del><strong>transmit</strong></del></span> users' <span
class="inserted"><ins><em>raw audio, potentially providing access to
the Chinese government.</p>
- <p>Even with</em></ins></span> good <span
class="removed"><del><strong>replacement
- for that word</strong></del></span> <span class="inserted"><ins><em>security
of data transmission, collecting personal
- data of people</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always that will fit
- perfectly.</p></strong></del></span> <span
class="inserted"><ins><em>wrong and a violation of people's privacy
rights.</p></em></ins></span>
+ <p>Even with good security of data transmission,
collecting</em></ins></span> personal
+ data <span class="removed"><del><strong>to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens</strong></del></span> of <span
class="removed"><del><strong>thousands</strong></del></span> <span
class="inserted"><ins><em>people is wrong and a violation</em></ins></span> of
<span class="removed"><del><strong>pairs that
collude</a>.</p></strong></del></span> <span
class="inserted"><ins><em>people's privacy rights.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
- <p>Apps for BART</strong></del></span>
+<p>Google Play intentionally sends app developers <a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+the personal details</strong></del></span>
<span class="inserted"><ins><em><li id="M202101080">
<!--#set var="DATE" value='<small
class="date-tag">2021-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>As of 2021, WhatsApp (one of Facebook's subsidiaries)
is</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/">forcing
- its users to hand over sensitive personal data</a> to its parent
+ <p>As</em></ins></span> of <span class="removed"><del><strong>users
that install the app</a>.</p>
+
+<p>Merely asking the “consent”</strong></del></span> <span
class="inserted"><ins><em>2021, WhatsApp (one</em></ins></span> of <span
class="inserted"><ins><em>Facebook's subsidiaries) is <a
+
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/">forcing
+ its</em></ins></span> users <span class="inserted"><ins><em>to hand over
sensitive personal data</a> to its parent
company. This increases Facebook's power over users, and further
jeopardizes people's privacy and security.</p>
<p>Instead of WhatsApp you can use <a
- href="https://directory.fsf.org/wiki/Jami">GNU Jami</a>, which
is</em></ins></span>
- free software <span
class="removed"><del><strong>apps,</strong></del></span> <span
class="inserted"><ins><em>and will not collect your data.</p>
+ href="https://directory.fsf.org/wiki/Jami">GNU Jami</a>,
which</em></ins></span> is
+ <span class="inserted"><ins><em>free software and will</em></ins></span>
not <span class="removed"><del><strong>enough
+to legitimize actions</strong></del></span> <span
class="inserted"><ins><em>collect your data.</p>
</li>
<li id="M202006260">
<!--#set var="DATE" value='<small
class="date-tag">2020-06</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Most apps are malware, but
- Trump's campaign app, like Modi's campaign app, is <a
+ Trump's campaign app,</em></ins></span> like <span
class="removed"><del><strong>this. At this point, most</strong></del></span>
<span class="inserted"><ins><em>Modi's campaign app, is <a
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/">
- especially nasty malware, helping companies snoop on</em></ins></span>
users <span class="removed"><del><strong>could <em>make
sure</em></strong></del></span> <span class="inserted"><ins><em>as well
- as snooping on them itself</a>.</p>
-
- <p>The article says</em></ins></span> that <span
class="removed"><del><strong>they don't snoop.</p>
- <p>With proprietary apps, one can only hope</strong></del></span>
<span class="inserted"><ins><em>Biden's app has a less manipulative overall
- approach, but</em></ins></span> that <span
class="removed"><del><strong>they don't.</p></strong></del></span> <span
class="inserted"><ins><em>does not tell us whether it has functionalities we
- consider malicious, such as sending data the user has not explicitly
- asked to send.</p></em></ins></span>
+ especially nasty malware, helping companies snoop on</em></ins></span>
users <span class="removed"><del><strong>have
+stopped reading the “Terms and Conditions” that spell out
+what they are “consenting” to. Google should clearly
+and honestly identify the information it collects</strong></del></span> <span
class="inserted"><ins><em>as well
+ as snooping</em></ins></span> on <span class="removed"><del><strong>users,
instead
+of hiding</strong></del></span> <span class="inserted"><ins><em>them
itself</a>.</p>
+
+ <p>The article says that Biden's app has a less manipulative overall
+ approach, but that does not tell us whether</em></ins></span> it <span
class="removed"><del><strong>in an obscurely worded EULA.</p>
+
+<p>However, to truly protect people's privacy,</strong></del></span>
<span class="inserted"><ins><em>has functionalities</em></ins></span> we <span
class="removed"><del><strong>must prevent Google</strong></del></span>
+ <span class="inserted"><ins><em>consider malicious, such as sending data
the user has not explicitly
+ asked to send.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>A study found 234 Android apps that track
users</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201809121">
+ <li id="M201809121">
<!--#set var="DATE" value='<small
class="date-tag">2018-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Tiny Lab Productions, along with online ad businesses
run</em></ins></span>
- by <span class="inserted"><ins><em>Google, Twitter and three other
companies are facing a lawsuit</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or
played</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html">for
- violating people's privacy</em></ins></span> by <span
class="removed"><del><strong>TV programs</a>.
- </p>
-
-</li>
-
-<li>
- <p>Pairs of Android apps can collude to transmit users'
personal</strong></del></span> <span class="inserted"><ins><em>collecting their
data from mobile games
- and handing over these</em></ins></span> data to <span
class="removed"><del><strong>servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands</strong></del></span> <span
class="inserted"><ins><em>other companies/advertisers</a>.</p>
+ <p>Tiny Lab Productions, along with online ad businesses run
+ by Google, Twitter</em></ins></span> and <span
class="inserted"><ins><em>three</em></ins></span> other companies <span
class="inserted"><ins><em>are facing a lawsuit <a
+
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html">for
+ violating people's privacy by collecting their data</em></ins></span> from
<span class="removed"><del><strong>getting this personal information in the
first
+place!</p></strong></del></span> <span class="inserted"><ins><em>mobile
games
+ and handing over these data to other
companies/advertisers</a>.</p></em></ins></span>
</li>
- <li id="M201601110">
+ <span class="removed"><del><strong><li>
+ <p>Google Play (a component</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201601110">
<!--#set var="DATE" value='<small
class="date-tag">2016-01</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>pairs that
collude</a>.</p></strong></del></span> <span
class="inserted"><ins><em>monitoring
- people through “their” phones is <a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software to make sure they can't “fool”
- the monitoring</a>.</p></em></ins></span>
- </li>
+ <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>Android)</strong></del></span> <span
class="inserted"><ins><em>monitoring
+ people through “their” phones is</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary software to make sure they can't
“fool”</em></ins></span>
+ the <span class="removed"><del><strong>users' movements without their
permission</a>.</p>
-<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends app developers</strong></del></span>
+ <p>Even if you disable Google Maps</strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201510050">
+ <li id="M201510050">
<!--#set var="DATE" value='<small
class="date-tag">2015-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>According to Edward Snowden,</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233">agencies
can take over
+ <p>According to Edward Snowden, <a
+ href="http://www.bbc.com/news/uk-34444233">agencies can take over
smartphones</a> by sending hidden text messages which enable
- them to turn</em></ins></span> the <span
class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>phones on and
off, listen to</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
-
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>microphone,
- retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>GPS, take
photographs, read
+ them to turn the phones on</em></ins></span> and <span
class="removed"><del><strong>location tracking, you must
+ disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>off, listen</em></ins></span> to <span
class="removed"><del><strong>completely stop</strong></del></span> the <span
class="removed"><del><strong>tracking.</strong></del></span> <span
class="inserted"><ins><em>microphone,
+ retrieve geo-location data from the GPS, take photographs, read
text messages, read call, location and web browsing history, and
- read the contact list. This malware</em></ins></span> is <span
class="removed"><del><strong>not enough</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this.
At</strong></del></span> <span class="inserted"><ins><em>disguise itself
- from investigation.</p>
+ read the contact list.</em></ins></span> This <span
class="inserted"><ins><em>malware</em></ins></span> is
+ <span class="removed"><del><strong>yet another example of nonfree software
pretending</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to <span
class="removed"><del><strong>obey the user,
+ when it's actually doing something else. Such a thing would be almost
+ unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>disguise itself
+ from investigation.</p></em></ins></span>
</li>
- <li id="M201311120">
+ <span class="removed"><del><strong><li><p>More than 73%
of</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201311120">
<!--#set var="DATE" value='<small
class="date-tag">2013-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones,
Android, and BlackBerry</a>. While there is not much
- detail here, it seems that</em></ins></span> this <span
class="removed"><del><strong>point, most users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>does not
operate via</em></ins></span>
- the <span class="removed"><del><strong>“Terms and
Conditions”</strong></del></span> <span
class="inserted"><ins><em>universal back door</em></ins></span> that <span
class="removed"><del><strong>spell out
-what they</strong></del></span> <span class="inserted"><ins><em>we know nearly
all portable
- phones have. It may involve exploiting various bugs.
There</em></ins></span> are <span
class="removed"><del><strong>“consenting” to. Google should clearly
-and honestly identify the information it collects on users,
instead</strong></del></span> <span class="inserted"><ins><em><a
-
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots</em></ins></span> of <span class="removed"><del><strong>hiding it in
an obscurely worded EULA.</p>
-
-<p>However, to truly protect people's privacy, we must prevent Google
-and other companies from getting this personal
information</strong></del></span> <span
class="inserted"><ins><em>bugs</em></ins></span> in the <span
class="removed"><del><strong>first
-place!</p></strong></del></span> <span class="inserted"><ins><em>phones'
radio software</a>.</p></em></ins></span>
+ detail here, it seems that this does not operate via</em></ins></span>
+ the <span class="removed"><del><strong>most popular Android
apps</strong></del></span> <span class="inserted"><ins><em>universal back door
that we know nearly all portable
+ phones have. It may involve exploiting various bugs. There
are</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral and location information</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ lots</em></ins></span> of <span class="inserted"><ins><em>bugs in the
phones' radio software</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Google Play (a component of Android)</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201307000">
+ <li id="M201307000">
<!--#set var="DATE" value='<small
class="date-tag">2013-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Portable phones with GPS</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send</em></ins></span> their <span
class="removed"><del><strong>permission</a>.</p>
-
- <p>Even if you disable Google Maps and</strong></del></span> <span
class="inserted"><ins><em>GPS</em></ins></span> location <span
class="removed"><del><strong>tracking, you must
- disable Google Play itself to completely</strong></del></span> <span
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span>
stop
- <span class="inserted"><ins><em>them</a>. (The US says it will
eventually require all new portable phones
- to have GPS.)</p>
+ <p>Portable phones with GPS <a
+
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+ will send</em></ins></span> their <span class="inserted"><ins><em>GPS
location on remote command, and</em></ins></span> users <span
class="removed"><del><strong>with third
parties.</p></strong></del></span> <span class="inserted"><ins><em>cannot
stop
+ them</a>. (The US says it will eventually require all new portable
phones
+ to have GPS.)</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -820,39 +845,31 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple
- is moving its Chinese customers' iCloud data to a datacenter controlled
- by</em></ins></span> the <span class="removed"><del><strong>tracking.
This</strong></del></span> <span class="inserted"><ins><em>Chinese
government</a>. Apple</em></ins></span> is
- <span class="removed"><del><strong>yet another example of nonfree software
pretending</strong></del></span> <span class="inserted"><ins><em>already
storing the encryption
+ is moving its Chinese customers' iCloud data</em></ins></span> to <span
class="inserted"><ins><em>a datacenter controlled
+ by</em></ins></span> the <span class="removed"><del><strong>app's
functionality,
+ was</strong></del></span> <span class="inserted"><ins><em>Chinese
government</a>. Apple is already storing the encryption
keys on these servers, obeying Chinese authority, making all Chinese
- user data available</em></ins></span> to <span
class="removed"><del><strong>obey</strong></del></span> the <span
class="removed"><del><strong>user,
- when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>government.</p></em></ins></span>
+ user data available to the government.</p>
</li>
- <span class="removed"><del><strong><li><p>More than 73% of the
most popular Android apps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M202009183">
+ <li id="M202009183">
<!--#set var="DATE" value='<small
class="date-tag">2020-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Facebook</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral and location information</a> of their</strong></del></span>
+ <p>Facebook</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops
- on Instagram</a></em></ins></span> users <span
class="removed"><del><strong>with third
parties.</p></strong></del></span> <span class="inserted"><ins><em>by
surreptitously turning on the device's
- camera.</p></em></ins></span>
- </li>
+ on Instagram</a> users by surreptitously turning
on</em></ins></span> the <span class="removed"><del><strong>500 most popular
gratis Android apps</a>.</p>
- <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated to</strong></del></span>
+ <p>The article should</strong></del></span> <span
class="inserted"><ins><em>device's
+ camera.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M202004200">
+ <li id="M202004200">
<!--#set var="DATE" value='<small
class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Apple whistleblower Thomas Le Bonniec reports that Apple
- made a practice of surreptitiously activating</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
- was</strong></del></span> <span class="inserted"><ins><em>Siri software
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis Android apps</a>.</p>
-
- <p>The article should</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf">
+ made a practice of surreptitiously activating the Siri software to <a
+
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf">
record users' conversations when they had</em></ins></span> not <span
class="removed"><del><strong>have described</strong></del></span> <span
class="inserted"><ins><em>activated Siri</a>.
This was not just occasional, it was systematic practice.</p>
@@ -1807,36 +1824,27 @@
<p>The company's statement that it was
anonymizing</strong></del></span> <span class="inserted"><ins><em>Android
phones and iPhones
running Google apps, and sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves</em></ins></span> the data <span class="removed"><del><strong>may be
- true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>for years</a>.</p>
-
- <p>Nonfree software in</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>phone has</em></ins></span> to <span
class="removed"><del><strong>a
- data broker,</strong></del></span> <span class="inserted"><ins><em>be
responsible for sending</em></ins></span>
- the <span class="inserted"><ins><em>location</em></ins></span> data <span
class="removed"><del><strong>broker would have been able to figure out
- who the user was.</p>
+ saves</em></ins></span> the data <span
class="removed"><del><strong>may</strong></del></span> <span
class="inserted"><ins><em>for years</a>.</p>
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of
C$4m</a></strong></del></span> to <span class="removed"><del><strong>its
customers.</p></strong></del></span> <span
class="inserted"><ins><em>Google.</p></em></ins></span>
+ <p>Nonfree software in the phone has to</em></ins></span> be
+ <span class="removed"><del><strong>true, but it doesn't really matter.
If it had sold</strong></del></span> <span
class="inserted"><ins><em>responsible for sending</em></ins></span>
+ the <span class="inserted"><ins><em>location</em></ins></span> data to
<span class="inserted"><ins><em>Google.</p>
</li>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201903251">
+ <li id="M201903251">
<!--#set var="DATE" value='<small
class="date-tag">2019-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Many Android phones come</em></ins></span> with <span
class="removed"><del><strong>microphones</strong></del></span> <span
class="inserted"><ins><em>a huge number of</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have access</em></ins></span> to <span
class="inserted"><ins><em>sensitive data without
+ <p>Many Android phones come with</em></ins></span> a <span
class="inserted"><ins><em>huge number of <a
+
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
+ preinstalled nonfree apps that have access to sensitive</em></ins></span>
data <span class="removed"><del><strong>broker,</strong></del></span> <span
class="inserted"><ins><em>without
users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
- the
- <span class="removed"><del><strong>manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way</strong></del></span> <span class="inserted"><ins><em>data, or
pass it on</em></ins></span> to <span class="inserted"><ins><em>user-installed
apps that have</em></ins></span> access <span
class="inserted"><ins><em>to</em></ins></span>
- the <span class="removed"><del><strong>data</a>
- collected by the manufacturer's snooping.</p>
+ the <span class="removed"><del><strong>data broker
would</strong></del></span> <span class="inserted"><ins><em>data, or pass it on
to user-installed apps that</em></ins></span> have <span
class="removed"><del><strong>been able</strong></del></span> <span
class="inserted"><ins><em>access</em></ins></span> to <span
class="removed"><del><strong>figure out
+ who</strong></del></span>
+ the <span class="removed"><del><strong>user was.</p>
- <p>That</strong></del></span> <span
class="inserted"><ins><em>network but no direct access to</em></ins></span> the
<span class="removed"><del><strong>manufacturer and</strong></del></span> <span
class="inserted"><ins><em>data. This results in massive
- surveillance on which</em></ins></span> the <span
class="removed"><del><strong>FBI could listen</strong></del></span> <span
class="inserted"><ins><em>user has absolutely no control.</p>
+ <p>Following this lawsuit,
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
<span class="inserted"><ins><em>network but no direct access
to</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>data. This results in massive
+ surveillance on which the user</em></ins></span> has <span
class="removed"><del><strong>been ordered</strong></del></span> <span
class="inserted"><ins><em>absolutely no control.</p>
</li>
<li id="M201903201">
@@ -1844,88 +1852,95 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A study of 24 “health” apps found that 19 of them
<a
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data</em></ins></span> to <span
class="removed"><del><strong>these conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>third parties</a>, which can use it
+ send sensitive personal data</em></ins></span> to <span
class="removed"><del><strong>pay a total</strong></del></span> <span
class="inserted"><ins><em>third parties</a>, which can use it
for invasive advertising or discriminating against people in poor
medical condition.</p>
<p>Whenever user “consent” is sought, it is buried in
- lengthy terms of service that are difficult to understand. In any case,
- “consent” is not sufficient to legitimize snooping.</p>
+ lengthy terms</em></ins></span> of <span
class="removed"><del><strong>C$4m</a></strong></del></span> <span
class="inserted"><ins><em>service that are difficult</em></ins></span> to <span
class="removed"><del><strong>its customers.</p></strong></del></span>
<span class="inserted"><ins><em>understand. In any case,
+ “consent” is not sufficient to legitimize
snooping.</p></em></ins></span>
</li>
- <li id="M201902230">
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902230">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Facebook offered a convenient proprietary
- library for building mobile apps, which also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ library for building mobile apps, which also</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span>
<span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data</em></ins></span> to <span
class="removed"><del><strong>spy on children</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots of companies built apps that
- way</em></ins></span> and <span
class="removed"><del><strong>adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>released them, apparently not realizing that
all the personal
- data they collected would go to Facebook as well.</p>
-
- <p>It shows that no one can trust a nonfree program, not even the
- developers of other nonfree programs.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
+ sent personal data</em></ins></span> to <span
class="removed"><del><strong>the
+ manufacturer</a>. Guess what?
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots of companies built apps
that</em></ins></span>
+ way <span class="removed"><del><strong>to access</strong></del></span>
<span class="inserted"><ins><em>and released them, apparently not realizing
that all</em></ins></span> the <span
class="removed"><del><strong>data</a></strong></del></span> <span
class="inserted"><ins><em>personal
+ data they</em></ins></span> collected <span
class="removed"><del><strong>by</strong></del></span> <span
class="inserted"><ins><em>would go to Facebook as well.</p>
+ <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>manufacturer's
snooping.</p>
-<!-- #SpywareAtLowLevel</strong></del></span>
+ <p>That</strong></del></span>
+ <span class="inserted"><ins><em>developers of other nonfree
programs.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201902140">
+ <li id="M201902140">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
-<span class="removed"><del><strong><!-- WEBMASTERS: make sure to place new
items</strong></del></span>
- <span class="inserted"><ins><em><p>The AppCensus database gives
information</em></ins></span> on <span class="removed"><del><strong>top under
each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware</strong></del></span> <span
class="inserted"><ins><em><a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>The AppCensus database gives information on <a
href="https://www.appcensus.mobi"> how Android apps use and
misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
+ 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em><a
href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies, and <a
+ Advertising ID</a> to other companies,</em></ins></span> and <span
class="inserted"><ins><em><a
href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link this ID to hardware identifiers</a>,
- so that users cannot escape tracking by resetting it.</p>
+ 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>FBI could listen</strong></del></span> <span
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span
class="removed"><del><strong>these conversations
+ was unacceptable</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
+ so that users cannot escape tracking</em></ins></span> by <span
class="removed"><del><strong>itself.</p></li>
+
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span class="inserted"><ins><em>resetting
it.</p>
<p>Collecting hardware identifiers is in apparent violation of
Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry to take action. This proves
- that the policies of a development platform are
ineffective</em></ins></span> at <span class="removed"><del><strong>Low
Level</h3>
+ and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>spy on children and
adults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>take action. This proves
+ that the policies of a development platform are ineffective at
+ preventing nonfree software developers from including malware in
+ their programs.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+
+<!-- #SpywareAtLowLevel</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902060">
+ <!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
+ <span class="inserted"><ins><em><p>Many nonfree apps have a
surveillance feature for <a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in interacting with the
app.</p>
+ </li>
+
+ <li id="M201902041.1">
+ <!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span>
+ <span class="inserted"><ins><em>be</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
<span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
</div>
<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span>
- <span class="inserted"><ins><em>preventing nonfree software developers
from including malware</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
<ul>
-<li><p></strong></del></span>
- <span class="inserted"><ins><em>their programs.</p>
- </li>
-
- <li id="M201902060">
- <!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Many nonfree apps have a surveillance feature
for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+<li><p></strong></del></span> <span
class="inserted"><ins><em>Google Play had one or more malicious
functionalities, such as</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p>
- </li>
-
- <li id="M201902041.1">
- <!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Twenty nine “beauty camera” apps that used to
- be on Google Play had one or more malicious functionalities, such as <a
-
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
+ <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
stealing users' photos</a> instead of “beautifying” them,
pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a></strong></del></span>
<span class="inserted"><ins><em>often malicious ads</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
Note</strong></del></span> <span class="inserted"><ins><em>users, and
redirecting
@@ -2248,8 +2263,8 @@
anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201705040">
<!--#set var="DATE" value='<small
class="date-tag">2017-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A study found 234 Android apps that track users by <a
-
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ <p>A study found 234 Android apps that track users
by</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
to ultrasound from beacons placed in stores or played by TV
programs</a>.</p>
</li>
@@ -2257,8 +2272,8 @@
<li id="M201704260">
<!--#set var="DATE" value='<small
class="date-tag">2017-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Faceapp appears to do lots of surveillance, judging
by</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ <p>Faceapp appears to do lots of surveillance, judging by <a
+
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
how much</em></ins></span> access <span class="inserted"><ins><em>it
demands to personal data in the device</a>.</p>
</li>
@@ -2485,7 +2500,7 @@
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
twisted ways that they present snooping as</em></ins></span> a <span
class="removed"><del><strong>matter</strong></del></span> <span
class="inserted"><ins><em>way to “serve”
users better</a>—never mind whether they want that. This is a
- typical example of the attitude</em></ins></span> of <span
class="inserted"><ins><em>the</em></ins></span> proprietary <span
class="removed"><del><strong>surveillance. These systems are an
+ typical example</em></ins></span> of <span class="inserted"><ins><em>the
attitude of the</em></ins></span> proprietary <span
class="removed"><del><strong>surveillance. These systems are an
intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>software industry
towards those they have subjugated.</p>
@@ -2959,20 +2974,20 @@
watching</strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
snoops on what programs people watch,</em></ins></span> and <span
class="removed"><del><strong>listening all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>even what they wanted to
- record</a>.</p></em></ins></span>
+ record</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>The</strong></del></span>
- <span class="inserted"><ins><em><li id="M201504300">
+ <li id="M201504300">
<!--#set var="DATE" value='<small
class="date-tag">2015-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio <a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
used a firmware “upgrade” to make its TVs snoop on what
- users watch</a>. The TVs did not do that when first sold.</p>
+ users watch</a>. The TVs did not do that when first
sold.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>The</strong></del></span>
- <li id="M201502090">
+ <span class="inserted"><ins><em><li id="M201502090">
<!--#set var="DATE" value='<small
class="date-tag">2015-02</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The</em></ins></span> Samsung “Smart” TV <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits</strong></del></span>
@@ -3338,17 +3353,17 @@
<p>Data collected by devices such as the Nest thermostat, the Philips
Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
speakers are likewise stored longer than necessary on the servers
- the devices are tethered to. Moreover, they are made
available</em></ins></span> to
- <span class="inserted"><ins><em>Alexa. As a result, Amazon has a very
precise picture of users' life
- at home, not only in</em></ins></span> the
- <span
class="removed"><del><strong>internet</a>—</strong></del></span>
<span class="inserted"><ins><em>present, but in the past (and, who knows,
+ the devices are tethered to. Moreover, they are made available to
+ Alexa. As a result, Amazon has a very precise picture of users' life
+ at home, not only in the present, but in the past (and, who knows,
in the future too?)</p>
</li>
<li id="M201904240">
<!--#set var="DATE" value='<small
class="date-tag">2019-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Some of users' commands to the Alexa service are <a
+ <p>Some of users' commands</em></ins></span> to the
+ <span
class="removed"><del><strong>internet</a>—</strong></del></span>
<span class="inserted"><ins><em>Alexa service are <a
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
recorded for Amazon employees to listen to</a>. The Google and Apple
voice assistants do similar things.</p>
@@ -3480,7 +3495,7 @@
<p>Even nastier, they do it through ad
networks</strong></del></span> <span class="inserted"><ins><em>spoof messages
to and from the watch, possibly endangering the child.</p>
- <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>merge</strong></del></span> <span
class="inserted"><ins><em>this article misuses</em></ins></span> the <span
class="inserted"><ins><em>word “<a
+ <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>merge</strong></del></span> <span
class="inserted"><ins><em>this article misuses the word “<a
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”
to mean “crackers.”)</small></p>
</li>
@@ -3518,7 +3533,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://gizmodo.com/get-ready-for-in-car-ads-1846888390">Ford
- is planning to force ads on drivers in cars</a>, with the ability for
+ is planning to force ads on drivers in cars</a>,
with</em></ins></span> the <span class="inserted"><ins><em>ability for
the owner to pay extra to turn them off. The system probably imposes
surveillance on drivers too.</p>
</li>
@@ -4293,7 +4308,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/10/08 19:34:57 $
+$Date: 2021/10/12 08:33:46 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.416
retrieving revision 1.417
diff -u -b -r1.416 -r1.417
--- po/proprietary-surveillance.it.po 8 Oct 2021 19:34:58 -0000 1.416
+++ po/proprietary-surveillance.it.po 12 Oct 2021 08:33:47 -0000 1.417
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-10-08 19:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -1184,6 +1184,24 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-"
"health-apps-harvest-user-data-global-study-shows\">Almost all proprietary "
"health apps harvest users' data</a>, including sensitive health information, "
Index: po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.294
retrieving revision 1.295
diff -u -b -r1.294 -r1.295
--- po/proprietary-surveillance.ja-diff.html 8 Oct 2021 19:34:58 -0000
1.294
+++ po/proprietary-surveillance.ja-diff.html 12 Oct 2021 08:33:47 -0000
1.295
@@ -608,25 +608,21 @@
<div class="big-subsection">
<span class="inserted"><ins><em><span
id="SpywareAtLowLevel"></span></em></ins></span>
- <h4 <span class="removed"><del><strong>id="SpywareInAndroid">Spyware
in Android</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInBIOS">BIOS</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInAndroid">#SpywareInAndroid</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></em></ins></span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInAndroid">Spyware</strong></del></span>
<span class="inserted"><ins><em>id="SpywareInBIOS">BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>More than 73% of</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201509220">
<!--#set var="DATE" value='<small
class="date-tag">2015-09</small>'
--><!--#echo encoding="none" var="DATE" -->
<p><a
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware and spyware via
- BIOS</a> on Windows installs. Note that</em></ins></span> the <span
class="removed"><del><strong>most popular Android apps</strong></del></span>
<span class="inserted"><ins><em>specific
+ BIOS</a> on Windows installs. Note that the specific
sabotage method Lenovo used did not affect GNU/Linux; also, a
- “clean” Windows install is not really clean
since</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft
puts in its
+ “clean” Windows install is not really clean since <a
+ href="/proprietary/malware-microsoft.html">Microsoft
puts</em></ins></span> in <span
class="removed"><del><strong>Android</h4></strong></del></span> <span
class="inserted"><ins><em>its
own malware</a>.</p>
</li>
</ul>
@@ -634,10 +630,13 @@
<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+ <h3 id="SpywareOnMobiles">Spyware on
Mobiles</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInAndroid">#SpywareInAndroid</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span></em></ins></span>
</div>
-<div style="clear: left;"></div>
+
+<span class="removed"><del><strong><ul>
+ <li><p>More than 73% of</strong></del></span>
+<span class="inserted"><ins><em><div style="clear: left;"></div>
<div class="big-subsection">
<h4 id="SpywareInTelephones">All “Smart” Phones</h4>
@@ -645,6 +644,23 @@
</div>
<ul class="blurbs">
+ <li id="M202106250">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/">El
+ Salvador Dictatorship's Chivo wallet is spyware</a>, it's a
+ proprietary program that breaks users' freedom and spies on people;
+ demands personal data such as</em></ins></span> the <span
class="removed"><del><strong>most popular Android apps</strong></del></span>
<span class="inserted"><ins><em>national ID number and does face
+ recognition, and it as bad security for its data. It also asks for
+ almost every malware permission in people's smart phones.</p>
+
+ <p>The article criticizes it for faults in “data
+ protection”, though</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral</strong></del></span> <span
class="inserted"><ins><em>href="">“data protection”
+ is the wrong approach to privacy anyway</a>.</p>
+ </li>
+
<li id="M202106170">
<!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -1923,7 +1939,9 @@
and, once informed, was in no hurry to take action. This proves
that</em></ins></span> the <span class="removed"><del><strong>invasion
isn't done by malware. The other
cases mentioned</strong></del></span> <span
class="inserted"><ins><em>policies of a development platform</em></ins></span>
are <span class="removed"><del><strong>done by
proprietary</strong></del></span> <span class="inserted"><ins><em>ineffective at
- preventing nonfree software developers from including</em></ins></span>
malware in
+ preventing nonfree software developers from including</em></ins></span>
malware in <span class="removed"><del><strong>the car.</p></li>
+
+ <li><p>Tesla cars allow the</strong></del></span>
<span class="inserted"><ins><em>their programs.</p>
</li>
@@ -1932,19 +1950,15 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
-
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>users' actions</a> in interacting
with</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+ recording all the users' actions</a> in interacting with the
app.</p>
</li>
<li id="M201902041.1">
<!--#set var="DATE" value='<small
class="date-tag">2019-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>extract data
remotely and
- determine the car's location at any time. (See</strong></del></span>
- <span class="inserted"><ins><em>be on Google Play had one or more
malicious functionalities, such as</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>).</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
+ <p>Twenty nine “beauty camera” apps that used to
+ be on Google Play had one or more malicious functionalities, such as <a
+
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/">
stealing users' photos</a> instead of “beautifying” them,
pushing unwanted and often malicious ads on users, and redirecting
them to phishing sites that stole their credentials. Furthermore,
@@ -1983,13 +1997,13 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Weather Channel app <a
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations to the company's
server</a>.</em></ins></span> The company <span
class="removed"><del><strong>says</strong></del></span> <span
class="inserted"><ins><em>is
- being sued, demanding that</em></ins></span> it <span
class="removed"><del><strong>doesn't</strong></del></span> <span
class="inserted"><ins><em>notify the users of what it will do
+ stored users' locations to the company's server</a>. The company is
+ being sued, demanding that it notify the users of what it will do
with the data.</p>
<p>We think that lawsuit is about a side issue. What the company does
with the data is a secondary issue. The principal wrong here is that
- the company gets that data at all.</p>
+ the</em></ins></span> company <span class="inserted"><ins><em>gets that
data at all.</p>
<p><a
href="https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps">
@@ -2002,10 +2016,10 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Around 40% of gratis Android apps <a
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on the user's actions to Facebook</a>.</p>
+ report on the user's actions</em></ins></span> to <span
class="removed"><del><strong>extract</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
<p>Often they send the machine's “advertising ID,” so
that
- Facebook can correlate the data it obtains from the same machine via
+ Facebook can correlate the</em></ins></span> data <span
class="removed"><del><strong>remotely</strong></del></span> <span
class="inserted"><ins><em>it obtains from the same machine via
various apps. Some of them send Facebook detailed information about
the user's activities in the app; others only say that the user is
using that app, but that alone is often quite informative.</p>
@@ -2039,7 +2053,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Spanish football streaming app <a
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
- the user's movements and listens through the
microphone</a>.</p>
+ the user's movements</em></ins></span> and <span
class="inserted"><ins><em>listens through the microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
@@ -2102,7 +2116,7 @@
<p>Tracking software in popular Android apps
is pervasive and sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical</em></ins></span> store <span
class="inserted"><ins><em>by noticing WiFi
+ follow a user's movements around a physical store by noticing WiFi
networks</a>.</p>
</li>
@@ -2114,7 +2128,7 @@
uploads all phone numbers and email addresses</a> in user's address
book to developer's server.</p>
- <p><small>(Note that</em></ins></span> this <span
class="removed"><del><strong>information, but</strong></del></span> <span
class="inserted"><ins><em>article misuses the words
+ <p><small>(Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
referring to zero price.)</small></p>
</li>
@@ -2142,9 +2156,9 @@
to inspect executable proprietary apps to see what they do.</p>
<p>Google could demand the source code for these apps, and study
- the source code somehow to determine whether they mistreat users in
+ the source code somehow to</em></ins></span> determine <span
class="inserted"><ins><em>whether they mistreat users in
various ways. If it did a good job of this, it could more or less
- prevent such snooping, except when the app developers are clever
+ prevent such snooping, except when</em></ins></span> the <span
class="removed"><del><strong>car's location</strong></del></span> <span
class="inserted"><ins><em>app developers are clever
enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
@@ -2195,15 +2209,16 @@
If the fine print of the app said that users gave consent for this,
would that make it acceptable? No way! It should be flat out <a
href="/philosophy/surveillance-vs-democracy.html"> illegal to design
- the app to snoop at all</a>.</p>
+ the app to snoop</em></ins></span> at <span
class="removed"><del><strong>any time. (See</strong></del></span> <span
class="inserted"><ins><em>all</a>.</p>
</li>
<li id="M201704074">
<!--#set var="DATE" value='<small
class="date-tag">2017-04</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Pairs of Android apps can collude
- to transmit users' personal data to servers. <a
-
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
+ to transmit users' personal data to servers.</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found tens of thousands of pairs that collude</a>.</p>
</li>
@@ -2252,7 +2267,7 @@
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated the privacy and security of
283 Android VPN apps concluded that “in spite of the promises
- for privacy, security, and anonymity given by the majority of VPN
+ for privacy, security,</em></ins></span> and <span
class="removed"><del><strong>c.</a>).</strong></del></span> <span
class="inserted"><ins><em>anonymity given by the majority of VPN
apps—millions of users may be unawarely subject to poor security
guarantees and abusive practices inflicted by VPN apps.”</p>
@@ -2277,17 +2292,18 @@
<dt>HideMyAss</dt>
<dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
- may turn them over to the UK government</em></ins></span> if <span
class="inserted"><ins><em>requested.</dd>
+ may turn them over to the UK government if requested.</dd>
<dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into</em></ins></span> the <span
class="removed"><del><strong>state orders</strong></del></span> <span
class="inserted"><ins><em>HTML pages returned to the
- users. The stated purpose of the JS injection is to display ads. Uses
- roughly five tracking libraries. Also,</em></ins></span> it <span
class="inserted"><ins><em>redirects the user's
+ <dd>Injects JavaScript code into the HTML pages returned to the
+ users.</em></ins></span> The <span class="removed"><del><strong>company
says</strong></del></span> <span class="inserted"><ins><em>stated purpose of
the JS injection is to display ads. Uses
+ roughly five tracking libraries. Also,</em></ins></span> it <span
class="removed"><del><strong>doesn't
+ store</strong></del></span> <span class="inserted"><ins><em>redirects
the user's
traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
<dd>Injects JavaScript code into HTML pages, and also uses roughly
- five tracking libraries. Developers of this app have confirmed that
+ five tracking libraries. Developers of</em></ins></span> this <span
class="removed"><del><strong>information, but</strong></del></span> <span
class="inserted"><ins><em>app have confirmed that
the non-premium version of the app does JavaScript injection for
tracking the user and displaying ads.</dd>
</dl>
@@ -2307,7 +2323,7 @@
<p>Facebook's new Magic Photo app <a
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections for known faces</a>,
- and suggests you circulate the picture you take
according</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>who is
+ and suggests you circulate the picture you take according to who is
in the frame.</p>
<p>This spyware feature seems to require online access to some
@@ -2316,16 +2332,16 @@
algorithms.</p>
<p>If so, none of Facebook users' pictures are private anymore,
- even if the user didn't “upload” them to the service.</p>
+ even</em></ins></span> if the <span class="removed"><del><strong>state
orders</strong></del></span> <span class="inserted"><ins><em>user didn't
“upload” them to the service.</p>
</li>
<li id="M201605310">
<!--#set var="DATE" value='<small
class="date-tag">2016-05</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Facebook's app listens all</em></ins></span> the <span
class="inserted"><ins><em>time, <a
+ <p>Facebook's app listens all the time, <a
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html">to
- snoop on what people are listening to or watching</a>. In addition,
- it may be analyzing people's conversations to serve them with targeted
+ snoop on what people are listening to or watching</a>. In
addition,</em></ins></span>
+ it <span class="inserted"><ins><em>may be analyzing people's
conversations</em></ins></span> to <span class="inserted"><ins><em>serve them
with targeted
advertisements.</p>
</li>
@@ -2334,8 +2350,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A pregnancy test controller application not only can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts of</em></ins></span> data <span
class="inserted"><ins><em>in the phone,</em></ins></span> and <span
class="removed"><del><strong>hand</strong></del></span> <span
class="inserted"><ins><em>in server accounts,</em></ins></span>
- it <span class="removed"><del><strong>over,</strong></del></span> <span
class="inserted"><ins><em>can alter them too</a>.</p>
+ spy on many sorts of data in the phone, and in server accounts,
+ it can alter them too</a>.</p>
</li>
<li id="M201601130">
@@ -2352,7 +2368,7 @@
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>“Cryptic communication,”
- unrelated to</em></ins></span> the <span
class="removed"><del><strong>state</strong></del></span> <span
class="inserted"><ins><em>app's functionality, was <a
+ unrelated to the app's functionality, was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
found in the 500 most popular gratis Android apps</a>.</p>
@@ -2428,8 +2444,8 @@
the snooping done by the phone company, and perhaps by the OS in
the phone.</p>
- <p>Don't be distracted by the question of whether the app developers
- get users to say “I agree”. That is no excuse for
+ <p>Don't be distracted by the question of whether the app
developers</em></ins></span>
+ get <span class="inserted"><ins><em>users to say “I agree”.
That is no excuse for
malware.</p>
</li>
@@ -2437,9 +2453,9 @@
<!--#set var="DATE" value='<small
class="date-tag">2014-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Many proprietary apps for mobile devices
- report which other apps the user has installed. <a
+ report which other apps</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>user has installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible and optional</a>. Not
+ is doing this in a way that at least is visible</em></ins></span> and
<span class="removed"><del><strong>hand</strong></del></span> <span
class="inserted"><ins><em>optional</a>. Not
as bad as what the others do.</p>
</li>
@@ -2455,9 +2471,9 @@
<!--#set var="DATE" value='<small
class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>The nonfree Snapchat app's principal purpose is to restrict the
- use of data on the user's computer, but it does surveillance too: <a
+ use of data on the user's computer, but</em></ins></span> it <span
class="removed"><del><strong>over,</strong></del></span> <span
class="inserted"><ins><em>does surveillance too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the user's list of other people's phone
+ it tries to get</em></ins></span> the <span
class="removed"><del><strong>state</strong></del></span> <span
class="inserted"><ins><em>user's list of other people's phone
numbers</a>.</p>
</li>
@@ -2751,7 +2767,7 @@
instead. Unfortunately, this is</em></ins></span> not <span
class="removed"><del><strong>allowed</strong></del></span> <span
class="inserted"><ins><em>always possible. Another option,
if you are technically oriented, is to get your own router (which can
be an old computer running completely free software), and set up a
- firewall</em></ins></span> to <span class="inserted"><ins><em>block
connections to Vizio's servers. Or, as a last resort,
+ firewall to block connections to Vizio's servers. Or, as a last resort,
you can replace your TV with another model.</p>
</li>
@@ -2764,7 +2780,7 @@
<p>We link to the article for the facts it presents. It
is too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix app <a
+ moral weakness of surrendering</em></ins></span> to <span
class="inserted"><ins><em>Netflix. The Netflix app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
@@ -2778,10 +2794,11 @@
cable</a>. Even if the image is coming from the user's own computer,
the TV reports</em></ins></span> what <span class="inserted"><ins><em>it
is. The existence of a way to disable</em></ins></span> the <span
class="removed"><del><strong>user watches — no
exceptions!</p></strong></del></span>
<span class="inserted"><ins><em>surveillance, even if it were not hidden
as it was in these TVs,
- does not legitimize the surveillance.</p>
+ does not legitimize the surveillance.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Vizio</strong></del></span>
- <li id="M201511130">
+ <span class="inserted"><ins><em><li id="M201511130">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Some web and TV advertisements play inaudible
@@ -2790,11 +2807,10 @@
are nearby. Once your Internet devices are paired with
your TV, advertisers can correlate ads with Web activity, and other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
- cross-device tracking</a>.</p></em></ins></span>
+ cross-device tracking</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Vizio</strong></del></span>
- <span class="inserted"><ins><em><li id="M201511060">
+ <li id="M201511060">
<!--#set var="DATE" value='<small
class="date-tag">2015-11</small>'
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio</em></ins></span> goes a step further than other TV
@@ -2965,7 +2981,7 @@
passes by, the user's front door.</p>
<p>The article focuses</em></ins></span> on <span
class="removed"><del><strong>their users and report</strong></del></span> <span
class="inserted"><ins><em>how Ring used to let individual employees look
- at the videos freely. It appears Amazon has tried to prevent that
+ at the videos freely. It appears Amazon has tried</em></ins></span> to
<span class="inserted"><ins><em>prevent that
secondary abuse, but the primary abuse—that Amazon gets the
video—Amazon expects society to surrender to.</p>
</li>
@@ -2975,13 +2991,13 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Nearly all “home security cameras” <a
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy of everything they
+ give</em></ins></span> the
+ <span
class="removed"><del><strong>internet</a>—</strong></del></span>
<span class="inserted"><ins><em>manufacturer an unencrypted copy of everything
they
see</a>. “Home insecurity camera” would be a better
name!</p>
<p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not</em></ins></span> to <span
class="inserted"><ins><em>look at what's in</em></ins></span> the
- <span
class="removed"><del><strong>internet</a>—</strong></del></span>
<span class="inserted"><ins><em>videos. That's not
+ manufacturers promise not to look at what's in the videos. That's not
security for your home. Security means making sure they don't get to
see through your camera.</p>
</li>
@@ -3066,11 +3082,11 @@
<li id="M201702280">
<!--#set var="DATE" value='<small
class="date-tag">2017-02</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>“CloudPets” toys with microphones <a
+ <p>“CloudPets” toys</em></ins></span> with <span
class="inserted"><ins><em>microphones <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
leak childrens' conversations to the manufacturer</a>. Guess what?
<a
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a> collected by the
+ Crackers found</em></ins></span> a <span class="inserted"><ins><em>way to
access the data</a> collected by the
manufacturer's snooping.</p>
<p>That the manufacturer and the FBI could listen to these
@@ -3086,7 +3102,7 @@
company based in the U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys</em></ins></span> with a <span
class="inserted"><ins><em>mobile phone. This would enable
+ can remotely control the toys with a mobile phone. This would enable
crackers to listen in on a child's speech, and even speak into the
toys themselves.</p>
</li>
@@ -3562,8 +3578,8 @@
<ul class="blurbs">
<li id="M202008182">
<!--#set var="DATE" value='<small
class="date-tag">2020-08</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Oculus headsets <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+ <span class="inserted"><ins><em><p>Oculus headsets <a
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require
users to identify themselves to Facebook</a>. This will give Facebook
free rein to pervasively snoop on Oculus users.</p>
@@ -3571,8 +3587,8 @@
<li id="M201612230">
<!--#set var="DATE" value='<small
class="date-tag">2016-12</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
- <span class="inserted"><ins><em><p>VR equipment, measuring every
slight motion,
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>VR equipment, measuring every slight motion,
creates the potential for the most intimate
surveillance ever. All it takes to make this potential real <a
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
@@ -3753,8 +3769,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
- JavaScript on its web site to give other companies personal
data</em></ins></span> on
- <span class="inserted"><ins><em>its customers</a>.</p>
+ JavaScript</em></ins></span> on <span class="inserted"><ins><em>its web
site to give other companies personal data on
+ its customers</a>.</p>
</li>
<li id="M201712300">
@@ -3901,8 +3917,8 @@
<span class="inserted"><ins><em><li id="M201506180">
<!--#set var="DATE" value='<small
class="date-tag">2015-06</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Google Chrome includes a module that <a
+ --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
+ <span class="inserted"><ins><em><p>Google Chrome includes a module
that <a
href="https://www.privateinternetaccess.com/blog/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
activates microphones and transmits audio to its
servers</a>.</p>
</li>
@@ -3918,8 +3934,8 @@
<li id="M200809060">
<!--#set var="DATE" value='<small
class="date-tag">2008-09</small>'
- --><!--#echo encoding="none" var="DATE"</em></ins></span> -->
- <span class="inserted"><ins><em><p>Google Chrome contains a key
logger that <a
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>Google Chrome contains a key logger that <a
href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/">
sends Google every URL typed in</a>, one key at a time.</p>
</li>
@@ -4151,7 +4167,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/10/08 19:34:58 $
+$Date: 2021/10/12 08:33:47 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.397
retrieving revision 1.398
diff -u -b -r1.397 -r1.398
--- po/proprietary-surveillance.ja.po 8 Oct 2021 19:34:58 -0000 1.397
+++ po/proprietary-surveillance.ja.po 12 Oct 2021 08:33:48 -0000 1.398
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-10-08 19:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -902,6 +902,24 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-"
"health-apps-harvest-user-data-global-study-shows\">Almost all proprietary "
"health apps harvest users' data</a>, including sensitive health information, "
Index: po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.336
retrieving revision 1.337
diff -u -b -r1.336 -r1.337
--- po/proprietary-surveillance.pot 8 Oct 2021 19:35:02 -0000 1.336
+++ po/proprietary-surveillance.pot 12 Oct 2021 08:33:48 -0000 1.337
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-10-08 19:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -661,6 +661,24 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
"<a "
+"href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/\">El
"
+"Salvador Dictatorship's Chivo wallet is spyware</a>, it's a proprietary "
+"program that breaks users' freedom and spies on people; demands personal "
+"data such as the national ID number and does face recognition, and it as bad "
+"security for its data. It also asks for almost every malware permission in "
+"people's smart phones."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"<a "
"href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-health-apps-harvest-user-data-global-study-shows\">Almost
"
"all proprietary health apps harvest users' data</a>, including sensitive "
"health information, tracking identifiers, and cookies to track user "
Index: po/proprietary-surveillance.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pt-br.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- po/proprietary-surveillance.pt-br.po 8 Oct 2021 19:35:02 -0000
1.7
+++ po/proprietary-surveillance.pt-br.po 12 Oct 2021 08:33:48 -0000
1.8
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2021-10-08 19:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
"PO-Revision-Date: 2021-06-26 09:40-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -881,6 +881,24 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-"
"health-apps-harvest-user-data-global-study-shows\">Almost all proprietary "
"health apps harvest users' data</a>, including sensitive health information, "
Index: po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.734
retrieving revision 1.735
diff -u -b -r1.734 -r1.735
--- po/proprietary-surveillance.ru.po 10 Oct 2021 06:31:57 -0000 1.734
+++ po/proprietary-surveillance.ru.po 12 Oct 2021 08:33:48 -0000 1.735
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-10-08 19:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-10-12 08:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -878,6 +879,24 @@
#. type: Content of: <div><div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><p>
+msgid ""
"<a href=\"https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-"
"health-apps-harvest-user-data-global-study-shows\">Almost all proprietary "
"health apps harvest users' data</a>, including sensitive health information, "
Index: po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.299
retrieving revision 1.300
diff -u -b -r1.299 -r1.300
--- po/proprietary.de-diff.html 12 Oct 2021 07:33:26 -0000 1.299
+++ po/proprietary.de-diff.html 12 Oct 2021 08:33:48 -0000 1.300
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -58,17 +58,17 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+#TOC a:hover { text-decoration: underline; }
+-->
</style>
<style type="text/css" media="print,screen">
.reduced-width { width: 55em; }
@@ -137,19 +137,19 @@
</tr>
<tr>
<td>
- <ul class="columns"></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
- <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
- <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
+ <ul class="columns">
+ <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
@@ -200,10 +200,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -238,6 +238,22 @@
that can communicate with the company that made it.</p>
</li>
+ <li id="M202106250">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/">El
+ Salvador Dictatorship's Chivo wallet is spyware</a>, it's a
+ proprietary program that breaks users' freedom and spies on people;
+ demands personal data such as the national ID number and does face
+ recognition, and it as bad security for its data. It also asks for
+ almost every malware permission in people's smart phones.</p>
+
+ <p>The article criticizes it for faults in “data
+ protection”, though <a href="">“data protection”
+ is the wrong approach to privacy anyway</a>.</p>
+ </li>
+
<li id="M202109210">
<!--#set var="DATE" value='<small
class="date-tag">2021-09</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -271,14 +287,6 @@
affected by a security vulnerability that could give attackers access
to live feeds</a>.</p>
</li>
-
- <li id="M202108240">
- <!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Recent Samsung TVs have a back door with which Samsung can <a
-
href="https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide">
- brick them remotely</a>.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -342,7 +350,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/10/12 07:33:26 $
+$Date: 2021/10/12 08:33:48 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.316
retrieving revision 1.317
diff -u -b -r1.316 -r1.317
--- po/proprietary.de.po 12 Oct 2021 07:33:26 -0000 1.316
+++ po/proprietary.de.po 12 Oct 2021 08:33:48 -0000 1.317
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -495,6 +495,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
@@ -523,13 +541,6 @@
"attackers access to live feeds</a>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
-"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
-"brick them remotely</a>."
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.522
retrieving revision 1.523
diff -u -b -r1.522 -r1.523
--- po/proprietary.es.po 12 Oct 2021 07:33:26 -0000 1.522
+++ po/proprietary.es.po 12 Oct 2021 08:33:48 -0000 1.523
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -357,6 +357,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
@@ -400,16 +418,6 @@
"iot-bug-video-feeds/\">están afectados por una vulnerabilidad que puede "
"permitir a posibles atacantes acceder a los registros en vivo</a>."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
-"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
-"brick them remotely</a>."
-msgstr ""
-"Los últimos televisores de Samsung tienen una puerta trasera que permite a "
-"Samsung <a href=\"https://www.pcmag.com/news/samsung-can-remotely-disable-"
-"any-of-its-tvs-worldwide\">inutilizarlos de forma remota</a>."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Ver más…</a>"
@@ -490,6 +498,15 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "Recent Samsung TVs have a back door with which Samsung can <a href="
+#~ "\"https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-"
+#~ "worldwide\"> brick them remotely</a>."
+#~ msgstr ""
+#~ "Los últimos televisores de Samsung tienen una puerta trasera que permite "
+#~ "a Samsung <a href=\"https://www.pcmag.com/news/samsung-can-remotely-"
+#~ "disable-any-of-its-tvs-worldwide\">inutilizarlos de forma remota</a>."
+
+#~ msgid ""
#~ "The Russian communications watchdog <a href=\"https://www.reuters.com/"
#~ "legal/litigation/russian-watchdog-tells-google-apple-remove-navalny-app-"
#~ "report-2021-08-20/\"> tells Google and Apple to remove Navalny's app</a> "
Index: po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.540
retrieving revision 1.541
diff -u -b -r1.540 -r1.541
--- po/proprietary.fr.po 12 Oct 2021 08:10:19 -0000 1.540
+++ po/proprietary.fr.po 12 Oct 2021 08:33:49 -0000 1.541
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
"PO-Revision-Date: 2021-10-12 10:09+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-10-12 08:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -361,6 +362,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
@@ -406,16 +425,6 @@
"feeds/\">faille de sécurité qui permettrait à des attaquant d'espionner le
"
"flux vidéo</a>."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
-"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
-"brick them remotely</a>."
-msgstr ""
-"Les téléviseurs récents de Samsung ont une porte dérobée qui permet au "
-"fabricant de <a href=\"https://www.pcmag.com/news/samsung-can-remotely-"
-"disable-any-of-its-tvs-worldwide\">les flinguer à distance</a>."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Voir plus…</a>"
@@ -490,6 +499,15 @@
msgstr "Dernière mise à jour :"
#~ msgid ""
+#~ "Recent Samsung TVs have a back door with which Samsung can <a href="
+#~ "\"https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-"
+#~ "worldwide\"> brick them remotely</a>."
+#~ msgstr ""
+#~ "Les téléviseurs récents de Samsung ont une porte dérobée qui permet
au "
+#~ "fabricant de <a href=\"https://www.pcmag.com/news/samsung-can-remotely-"
+#~ "disable-any-of-its-tvs-worldwide\">les flinguer à distance</a>."
+
+#~ msgid ""
#~ "The Russian communications watchdog <a href=\"https://www.reuters.com/"
#~ "legal/litigation/russian-watchdog-tells-google-apple-remove-navalny-app-"
#~ "report-2021-08-20/\"> tells Google and Apple to remove Navalny's app</a> "
Index: po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.309
retrieving revision 1.310
diff -u -b -r1.309 -r1.310
--- po/proprietary.it-diff.html 12 Oct 2021 07:33:26 -0000 1.309
+++ po/proprietary.it-diff.html 12 Oct 2021 08:33:49 -0000 1.310
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -58,17 +58,17 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+#TOC a:hover { text-decoration: underline; }
+-->
</style>
<style type="text/css" media="print,screen">
.reduced-width { width: 55em; }
@@ -137,19 +137,19 @@
</tr>
<tr>
<td>
- <ul class="columns"></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
- <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
- <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
+ <ul class="columns">
+ <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
@@ -237,6 +237,22 @@
that can communicate with the company that made it.</p>
</li>
+ <li id="M202106250">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/">El
+ Salvador Dictatorship's Chivo wallet is spyware</a>, it's a
+ proprietary program that breaks users' freedom and spies on people;
+ demands personal data such as the national ID number and does face
+ recognition, and it as bad security for its data. It also asks for
+ almost every malware permission in people's smart phones.</p>
+
+ <p>The article criticizes it for faults in “data
+ protection”, though <a href="">“data protection”
+ is the wrong approach to privacy anyway</a>.</p>
+ </li>
+
<li id="M202109210">
<!--#set var="DATE" value='<small
class="date-tag">2021-09</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -270,14 +286,6 @@
affected by a security vulnerability that could give attackers access
to live feeds</a>.</p>
</li>
-
- <li id="M202108240">
- <!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Recent Samsung TVs have a back door with which Samsung can <a
-
href="https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide">
- brick them remotely</a>.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -341,7 +349,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/10/12 07:33:26 $
+$Date: 2021/10/12 08:33:49 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.325
retrieving revision 1.326
diff -u -b -r1.325 -r1.326
--- po/proprietary.it.po 12 Oct 2021 07:33:26 -0000 1.325
+++ po/proprietary.it.po 12 Oct 2021 08:33:49 -0000 1.326
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -500,6 +500,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
@@ -528,13 +546,6 @@
"attackers access to live feeds</a>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
-"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
-"brick them remotely</a>."
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.314
retrieving revision 1.315
diff -u -b -r1.314 -r1.315
--- po/proprietary.ja-diff.html 12 Oct 2021 07:33:26 -0000 1.314
+++ po/proprietary.ja-diff.html 12 Oct 2021 08:33:52 -0000 1.315
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -63,8 +63,8 @@
color: #004caa;
text-decoration: none;
}
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none; }
-#TOC a:hover { text-decoration: underline;</em></ins></span> }
+#TOC a { text-decoration: none; }
+#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -129,7 +129,8 @@
<li><a href="/proprietary/malware-mobiles.html">Malware in
mobile devices</a></li>
<li><a href="/proprietary/malware-kindle-swindle.html">Malware
in</strong></del></span> <span class="inserted"><ins><em>make other changes,
subscribe to</em></ins></span> the <span class="removed"><del><strong>Amazon
- Swindle</a></li></strong></del></span> <span
class="inserted"><ins><em><a
+ Swindle</a></li>
+ <li><a href="/proprietary/malware-games.html">Malware in
games</a></li></strong></del></span> <span
class="inserted"><ins><em><a
href="https://lists.gnu.org/mailman/listinfo/www-malware-commits">mailing
list
<www-malware-commits@gnu.org></a>.</p>
@@ -141,8 +142,7 @@
<tr>
<td>
<ul class="columns"></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li>
- <li><a href="/proprietary/malware-appliances.html">Malware in
appliances</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li>
</ul>
</div>
@@ -176,11 +176,11 @@
<li><a
href="/proprietary/malware-cars.html">Cars</a></li>
<li><a
href="/proprietary/malware-games.html">Games</a></li>
<li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
- <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
+ <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a
href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
- <ul>
- <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <ul></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li>
<li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
<li><a
href="/proprietary/malware-apple.html">Apple</a></li>
<li><a
href="/proprietary/malware-google.html">Google</a></li>
@@ -205,10 +205,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -242,6 +242,22 @@
that can communicate with the company that made it.</p>
</li>
+ <li id="M202106250">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/">El
+ Salvador Dictatorship's Chivo wallet is spyware</a>, it's a
+ proprietary program that breaks users' freedom and spies on people;
+ demands personal data such as the national ID number and does face
+ recognition, and it as bad security for its data. It also asks for
+ almost every malware permission in people's smart phones.</p>
+
+ <p>The article criticizes it for faults in “data
+ protection”, though <a href="">“data protection”
+ is the wrong approach to privacy anyway</a>.</p>
+ </li>
+
<li id="M202109210">
<!--#set var="DATE" value='<small
class="date-tag">2021-09</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -275,14 +291,6 @@
affected by a security vulnerability that could give attackers access
to live feeds</a>.</p>
</li>
-
- <li id="M202108240">
- <!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Recent Samsung TVs have a back door with which Samsung can <a
-
href="https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide">
- brick them remotely</a>.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -346,7 +354,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/10/12 07:33:26 $
+$Date: 2021/10/12 08:33:52 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.308
retrieving revision 1.309
diff -u -b -r1.308 -r1.309
--- po/proprietary.ja.po 12 Oct 2021 07:33:26 -0000 1.308
+++ po/proprietary.ja.po 12 Oct 2021 08:33:52 -0000 1.309
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -358,6 +358,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
@@ -386,13 +404,6 @@
"attackers access to live feeds</a>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
-"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
-"brick them remotely</a>."
-msgstr ""
-
#. type: Content of: <div><p>
#, fuzzy
#| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
Index: po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.310
retrieving revision 1.311
diff -u -b -r1.310 -r1.311
--- po/proprietary.nl-diff.html 12 Oct 2021 07:33:26 -0000 1.310
+++ po/proprietary.nl-diff.html 12 Oct 2021 08:33:52 -0000 1.311
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -58,17 +58,17 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+#TOC a:hover { text-decoration: underline; }
+-->
</style>
<style type="text/css" media="print,screen">
.reduced-width { width: 55em; }
@@ -137,20 +137,20 @@
</tr>
<tr>
<td>
- <ul class="columns"></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-phones.html">Malware
in phones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
- <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
- <li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
+ <ul class="columns">
+ <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-phones.html">Malware
in phones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
@@ -237,6 +237,22 @@
that can communicate with the company that made it.</p>
</li>
+ <li id="M202106250">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/">El
+ Salvador Dictatorship's Chivo wallet is spyware</a>, it's a
+ proprietary program that breaks users' freedom and spies on people;
+ demands personal data such as the national ID number and does face
+ recognition, and it as bad security for its data. It also asks for
+ almost every malware permission in people's smart phones.</p>
+
+ <p>The article criticizes it for faults in “data
+ protection”, though <a href="">“data protection”
+ is the wrong approach to privacy anyway</a>.</p>
+ </li>
+
<li id="M202109210">
<!--#set var="DATE" value='<small
class="date-tag">2021-09</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -270,14 +286,6 @@
affected by a security vulnerability that could give attackers access
to live feeds</a>.</p>
</li>
-
- <li id="M202108240">
- <!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Recent Samsung TVs have a back door with which Samsung can <a
-
href="https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide">
- brick them remotely</a>.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -341,7 +349,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/10/12 07:33:26 $
+$Date: 2021/10/12 08:33:52 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.299
retrieving revision 1.300
diff -u -b -r1.299 -r1.300
--- po/proprietary.nl.po 12 Oct 2021 07:33:26 -0000 1.299
+++ po/proprietary.nl.po 12 Oct 2021 08:33:52 -0000 1.300
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -403,6 +403,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
@@ -431,13 +449,6 @@
"attackers access to live feeds</a>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
-"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
-"brick them remotely</a>."
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Mobiles</a>-]
# | {+href=\"/proprietary/all.html\">More items…</a>+}
Index: po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.326
retrieving revision 1.327
diff -u -b -r1.326 -r1.327
--- po/proprietary.pl-diff.html 12 Oct 2021 07:33:26 -0000 1.326
+++ po/proprietary.pl-diff.html 12 Oct 2021 08:33:53 -0000 1.327
@@ -28,10 +28,10 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -56,14 +56,14 @@
#TOC ul { padding-top: .5em; margin: 0; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none; }
#TOC a:hover { text-decoration: underline;</em></ins></span> }
-->
</style>
@@ -166,18 +166,18 @@
<td></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li>
- <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
- <li><a
href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-in-online-conferencing.html">Conferencing</a></li>
</ul>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li>
+ <ul>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
<li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
@@ -199,10 +199,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -236,6 +236,22 @@
that can communicate with the company that made it.</p>
</li>
+ <li id="M202106250">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/">El
+ Salvador Dictatorship's Chivo wallet is spyware</a>, it's a
+ proprietary program that breaks users' freedom and spies on people;
+ demands personal data such as the national ID number and does face
+ recognition, and it as bad security for its data. It also asks for
+ almost every malware permission in people's smart phones.</p>
+
+ <p>The article criticizes it for faults in “data
+ protection”, though <a href="">“data protection”
+ is the wrong approach to privacy anyway</a>.</p>
+ </li>
+
<li id="M202109210">
<!--#set var="DATE" value='<small
class="date-tag">2021-09</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -269,14 +285,6 @@
affected by a security vulnerability that could give attackers access
to live feeds</a>.</p>
</li>
-
- <li id="M202108240">
- <!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Recent Samsung TVs have a back door with which Samsung can <a
-
href="https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide">
- brick them remotely</a>.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -340,7 +348,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/10/12 07:33:26 $
+$Date: 2021/10/12 08:33:53 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.291
retrieving revision 1.292
diff -u -b -r1.291 -r1.292
--- po/proprietary.pl.po 12 Oct 2021 07:33:26 -0000 1.291
+++ po/proprietary.pl.po 12 Oct 2021 08:33:53 -0000 1.292
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -584,6 +584,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
@@ -612,13 +630,6 @@
"attackers access to live feeds</a>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
-"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
-"brick them remotely</a>."
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/philosophy/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.288
retrieving revision 1.289
diff -u -b -r1.288 -r1.289
--- po/proprietary.pot 12 Oct 2021 07:33:26 -0000 1.288
+++ po/proprietary.pot 12 Oct 2021 08:33:53 -0000 1.289
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -295,6 +295,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a "
+"href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/\">El
"
+"Salvador Dictatorship's Chivo wallet is spyware</a>, it's a proprietary "
+"program that breaks users' freedom and spies on people; demands personal "
+"data such as the national ID number and does face recognition, and it as bad "
+"security for its data. It also asks for almost every malware permission in "
+"people's smart phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a "
"href=\"https://www.techrepublic.com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/\">
"
"added a surveillance API (idle detection API)</a> which lets websites ask "
@@ -325,13 +343,6 @@
"feeds</a>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a "
-"href=\"https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\">
"
-"brick them remotely</a>."
-msgstr ""
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr ""
Index: po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.456
retrieving revision 1.457
diff -u -b -r1.456 -r1.457
--- po/proprietary.pt-br.po 12 Oct 2021 07:33:26 -0000 1.456
+++ po/proprietary.pt-br.po 12 Oct 2021 08:33:54 -0000 1.457
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
"PO-Revision-Date: 2021-06-13 12:11-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -351,6 +351,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
@@ -379,16 +397,6 @@
"attackers access to live feeds</a>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
-"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
-"brick them remotely</a>."
-msgstr ""
-"As TVs Samsung recentes têm um <em>backdoor</em> com a qual a Samsung pode "
-"<a href=\"https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-"
-"tvs-worldwide\"> inutilizá-las remotamente </a>"
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Mais itensâ¦</a>"
@@ -464,6 +472,15 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "Recent Samsung TVs have a back door with which Samsung can <a href="
+#~ "\"https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-"
+#~ "worldwide\"> brick them remotely</a>."
+#~ msgstr ""
+#~ "As TVs Samsung recentes têm um <em>backdoor</em> com a qual a Samsung "
+#~ "pode <a href=\"https://www.pcmag.com/news/samsung-can-remotely-disable-"
+#~ "any-of-its-tvs-worldwide\"> inutilizá-las remotamente </a>"
+
+#~ msgid ""
#~ "The Russian communications watchdog <a href=\"https://www.reuters.com/"
#~ "legal/litigation/russian-watchdog-tells-google-apple-remove-navalny-app-"
#~ "report-2021-08-20/\"> tells Google and Apple to remove Navalny's app</a> "
Index: po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.557
retrieving revision 1.558
diff -u -b -r1.557 -r1.558
--- po/proprietary.ru.po 12 Oct 2021 08:04:10 -0000 1.557
+++ po/proprietary.ru.po 12 Oct 2021 08:33:55 -0000 1.558
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2021-10-12 08:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -363,6 +364,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
@@ -406,16 +425,6 @@
"kalay-iot-bug-video-feeds/\">подвеÑÐ¶ÐµÐ½Ñ ÑÑзвимоÑÑи,
коÑоÑÐ°Ñ Ð¼Ð¾Ð³Ð»Ð° Ð±Ñ "
"позволиÑÑ Ð·Ð»Ð¾ÑмÑÑленникам полÑÑиÑÑ
доÑÑÑп к видеопоÑокÑ</a>."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
-"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
-"brick them remotely</a>."
-msgstr ""
-"РновÑÑ
ÑелевизоÑаÑ
Samsung еÑÑÑ ÑеÑнÑй Ñ
од,
по коÑоÑÐ¾Ð¼Ñ Samsung <a href="
-"\"https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-"
-"worldwide\"> Ð¼Ð¾Ð¶ÐµÑ Ð¸Ñ
вÑводиÑÑ Ð¸Ð· ÑÑÑÐ¾Ñ Ð¿Ð¾
ÑеÑи</a>."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Ðалее...</a>"
@@ -493,6 +502,15 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Recent Samsung TVs have a back door with which Samsung can <a href="
+#~ "\"https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-"
+#~ "worldwide\"> brick them remotely</a>."
+#~ msgstr ""
+#~ "РновÑÑ
ÑелевизоÑаÑ
Samsung еÑÑÑ ÑеÑнÑй Ñ
од,
по коÑоÑÐ¾Ð¼Ñ Samsung <a href="
+#~ "\"https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-"
+#~ "worldwide\"> Ð¼Ð¾Ð¶ÐµÑ Ð¸Ñ
вÑводиÑÑ Ð¸Ð· ÑÑÑÐ¾Ñ Ð¿Ð¾
ÑеÑи</a>."
+
+#~ msgid ""
#~ "The Russian communications watchdog <a href=\"https://www.reuters.com/"
#~ "legal/litigation/russian-watchdog-tells-google-apple-remove-navalny-app-"
#~ "report-2021-08-20/\"> tells Google and Apple to remove Navalny's app</a> "
Index: po/proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.204
retrieving revision 1.205
diff -u -b -r1.204 -r1.205
--- po/proprietary.tr.po 12 Oct 2021 07:33:26 -0000 1.204
+++ po/proprietary.tr.po 12 Oct 2021 08:33:55 -0000 1.205
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
"PO-Revision-Date: 2021-09-22 20:31+0200\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -352,6 +352,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
@@ -390,16 +408,6 @@
"bug-video-feeds/\">saldırganların canlı yayına eriÅmesini saÄlayan bir "
"güvenlik açıÄına sahip</a>."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
-"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
-"brick them remotely</a>."
-msgstr ""
-"Yeni Samsung TV'leri Samsung'un <a href=\"https://www.pcmag.com/news/samsung-"
-"can-remotely-disable-any-of-its-tvs-worldwide\">uzaktan onları "
-"durdurabileceÄi</a> bir arka kapısı var."
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">Daha fazlası…</a>"
@@ -481,6 +489,15 @@
msgstr "Son Güncelleme:"
#~ msgid ""
+#~ "Recent Samsung TVs have a back door with which Samsung can <a href="
+#~ "\"https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-"
+#~ "worldwide\"> brick them remotely</a>."
+#~ msgstr ""
+#~ "Yeni Samsung TV'leri Samsung'un <a href=\"https://www.pcmag.com/news/"
+#~ "samsung-can-remotely-disable-any-of-its-tvs-worldwide\">uzaktan onları "
+#~ "durdurabileceÄi</a> bir arka kapısı var."
+
+#~ msgid ""
#~ "The Russian communications watchdog <a href=\"https://www.reuters.com/"
#~ "legal/litigation/russian-watchdog-tells-google-apple-remove-navalny-app-"
#~ "report-2021-08-20/\"> tells Google and Apple to remove Navalny's app</a> "
Index: po/proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.258
retrieving revision 1.259
diff -u -b -r1.258 -r1.259
--- po/proprietary.zh-cn.po 12 Oct 2021 07:33:26 -0000 1.258
+++ po/proprietary.zh-cn.po 12 Oct 2021 08:33:55 -0000 1.259
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
"PO-Revision-Date: 2021-10-11 16:14+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -331,6 +331,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
@@ -371,15 +389,6 @@
"\"https://www.wired.com/story/kalay-iot-bug-video-feeds/\">ä¸ä¸ªå®å
¨æ¼æ´è¢«æ»å»"
"è
å©ç¨æ¥è®¿é®ç°åºè§é¢</a>ã"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
-"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
-"brick them remotely</a>."
-msgstr ""
-"ææ°çä¸æçµè§æ个åé¨ï¼ä¸æå¯ä»¥ç¨å® <a
href=\"https://www.pcmag.com/news/"
-"samsung-can-remotely-disable-any-of-its-tvs-worldwide\">è¿ç¨ä½¿çµè§åç
</a>ã"
-
#. type: Content of: <div><p>
msgid "<a href=\"/proprietary/all.html\">More items…</a>"
msgstr "<a href=\"/proprietary/all.html\">æ´å¤å
容…</a>"
@@ -455,6 +464,15 @@
msgstr "æåæ´æ°ï¼"
#~ msgid ""
+#~ "Recent Samsung TVs have a back door with which Samsung can <a href="
+#~ "\"https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-"
+#~ "worldwide\"> brick them remotely</a>."
+#~ msgstr ""
+#~ "ææ°çä¸æçµè§æ个åé¨ï¼ä¸æå¯ä»¥ç¨å® <a
href=\"https://www.pcmag.com/news/"
+#~
"samsung-can-remotely-disable-any-of-its-tvs-worldwide\">è¿ç¨ä½¿çµè§åç
</"
+#~ "a>ã"
+
+#~ msgid ""
#~ "The Russian communications watchdog <a href=\"https://www.reuters.com/"
#~ "legal/litigation/russian-watchdog-tells-google-apple-remove-navalny-app-"
#~ "report-2021-08-20/\"> tells Google and Apple to remove Navalny's app</a> "
Index: po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.289
retrieving revision 1.290
diff -u -b -r1.289 -r1.290
--- po/proprietary.zh-tw-diff.html 12 Oct 2021 07:33:26 -0000 1.289
+++ po/proprietary.zh-tw-diff.html 12 Oct 2021 08:33:55 -0000 1.290
@@ -29,9 +29,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+#about-section { font-size: 1.1em; font-style: italic; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%; width: max-content;
overflow: auto;
border: .2em solid #e0dfda;
@@ -58,17 +58,17 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+#TOC a:hover { text-decoration: underline; }
+-->
</style>
<style type="text/css" media="print,screen">
.reduced-width { width: 55em; }
@@ -137,19 +137,19 @@
</tr>
<tr>
<td>
- <ul class="columns"></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
- <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
- <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
+ <ul class="columns">
+ <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
@@ -200,10 +200,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -238,6 +238,22 @@
that can communicate with the company that made it.</p>
</li>
+ <li id="M202106250">
+ <!--#set var="DATE" value='<small
class="date-tag">2021-06</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p><a
+
href="https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/">El
+ Salvador Dictatorship's Chivo wallet is spyware</a>, it's a
+ proprietary program that breaks users' freedom and spies on people;
+ demands personal data such as the national ID number and does face
+ recognition, and it as bad security for its data. It also asks for
+ almost every malware permission in people's smart phones.</p>
+
+ <p>The article criticizes it for faults in “data
+ protection”, though <a href="">“data protection”
+ is the wrong approach to privacy anyway</a>.</p>
+ </li>
+
<li id="M202109210">
<!--#set var="DATE" value='<small
class="date-tag">2021-09</small>'
--><!--#echo encoding="none" var="DATE" -->
@@ -271,14 +287,6 @@
affected by a security vulnerability that could give attackers access
to live feeds</a>.</p>
</li>
-
- <li id="M202108240">
- <!--#set var="DATE" value='<small
class="date-tag">2021-08</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>Recent Samsung TVs have a back door with which Samsung can <a
-
href="https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide">
- brick them remotely</a>.</p>
- </li>
</ul>
<p class="button right-align">
<a href="/proprietary/all.html">More items…</a></p>
@@ -342,7 +350,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/10/12 07:33:26 $
+$Date: 2021/10/12 08:33:55 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.278
retrieving revision 1.279
diff -u -b -r1.278 -r1.279
--- po/proprietary.zh-tw.po 12 Oct 2021 07:33:26 -0000 1.278
+++ po/proprietary.zh-tw.po 12 Oct 2021 08:33:56 -0000 1.279
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2021-10-12 07:26+0000\n"
+"POT-Creation-Date: 2021-10-12 08:26+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -473,6 +473,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
@@ -501,13 +519,6 @@
"attackers access to live feeds</a>."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Recent Samsung TVs have a back door with which Samsung can <a href=\"https://"
-"www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide\"> "
-"brick them remotely</a>."
-msgstr ""
-
#. type: Content of: <div><p>
# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
# | devices</a>-] {+href=\"/proprietary/all.html\">More items…</a>+}
Index: po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.426
retrieving revision 1.427
diff -u -b -r1.426 -r1.427
--- po/pt-br.po 12 Oct 2021 07:33:26 -0000 1.426
+++ po/pt-br.po 12 Oct 2021 08:33:56 -0000 1.427
@@ -523,6 +523,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
Index: po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.717
retrieving revision 1.718
diff -u -b -r1.717 -r1.718
--- po/ru.po 12 Oct 2021 07:50:10 -0000 1.717
+++ po/ru.po 12 Oct 2021 08:33:56 -0000 1.718
@@ -515,12 +515,12 @@
"does not like</a>. In phones sold in Europe, Xiaomi leaves this deactivated "
"by default, but has a back door to activate the censorship."
msgstr ""
-"РнекоÑоÑÑÑ
ÑелеÑÐ¾Ð½Ñ Xiaomi <a
href=\"https://www.theguardian.com/world/2021/sep/22/"
-"lithuania-tells-citizens-to-throw-out-chinese-phones-over-censorship-concerns"
-"\">еÑÑÑ Ð²ÑедоноÑÐ½Ð°Ñ ÑÑнкÑÐ¸Ñ Ð·Ð°Ð¿Ð¸ÐºÐ¸Ð²Ð°Ð½Ð¸Ñ
ÑÑаз, вÑÑажаÑÑиÑ
полиÑиÑеÑкие "
-"взглÑдÑ, коÑоÑÑе не по нÑÐ°Ð²Ñ ÐиÑаÑ</a>. Ð
ÑелеÑонаÑ
, пÑодаваемÑÑ
в ÐвÑопе, "
-"Xiaomi оÑÑавлÑÐµÑ ÑÑо изнаÑалÑно вÑклÑÑеннÑм,
но Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ð¸ еÑÑÑ ÑеÑнÑй Ñ
од, "
-"ÑÑÐ¾Ð±Ñ Ð²ÐºÐ»ÑÑиÑÑ ÑензÑÑÑ."
+"РнекоÑоÑÑÑ
ÑелеÑÐ¾Ð½Ñ Xiaomi <a
href=\"https://www.theguardian.com/world/2021/"
+"sep/22/lithuania-tells-citizens-to-throw-out-chinese-phones-over-censorship-"
+"concerns\">еÑÑÑ Ð²ÑедоноÑÐ½Ð°Ñ ÑÑнкÑиÑ
Ð·Ð°Ð¿Ð¸ÐºÐ¸Ð²Ð°Ð½Ð¸Ñ ÑÑаз, вÑÑажаÑÑиÑ
"
+"полиÑиÑеÑкие взглÑдÑ, коÑоÑÑе не по нÑавÑ
ÐиÑаÑ</a>. Ð ÑелеÑонаÑ
, "
+"пÑодаваемÑÑ
в ÐвÑопе, Xiaomi оÑÑавлÑÐµÑ ÑÑо
изнаÑалÑно вÑклÑÑеннÑм, но Ñ "
+"компании еÑÑÑ ÑеÑнÑй Ñ
од, ÑÑÐ¾Ð±Ñ Ð²ÐºÐ»ÑÑиÑÑ
ÑензÑÑÑ."
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -532,6 +532,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
Index: po/tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.222
retrieving revision 1.223
diff -u -b -r1.222 -r1.223
--- po/tr.po 12 Oct 2021 07:33:26 -0000 1.222
+++ po/tr.po 12 Oct 2021 08:33:56 -0000 1.223
@@ -429,6 +429,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
Index: po/zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.224
retrieving revision 1.225
diff -u -b -r1.224 -r1.225
--- po/zh-cn.po 12 Oct 2021 07:33:27 -0000 1.224
+++ po/zh-cn.po 12 Oct 2021 08:33:56 -0000 1.225
@@ -429,6 +429,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
Index: po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.342
retrieving revision 1.343
diff -u -b -r1.342 -r1.343
--- po/zh-tw.po 12 Oct 2021 07:33:27 -0000 1.342
+++ po/zh-tw.po 12 Oct 2021 08:33:56 -0000 1.343
@@ -454,6 +454,24 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"<a href=\"https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-"
+"riesgo-datos-personales-de-usuarios/852310/2021/\">El Salvador "
+"Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that "
+"breaks users' freedom and spies on people; demands personal data such as the "
+"national ID number and does face recognition, and it as bad security for its "
+"data. It also asks for almost every malware permission in people's smart "
+"phones."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The article criticizes it for faults in “data protection”, "
+"though <a href=\"\">“data protection” is the wrong approach to "
+"privacy anyway</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google's proprietary Chrome web browser <a href=\"https://www.techrepublic."
"com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"
"\"> added a surveillance API (idle detection API)</a> which lets websites "
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary proprietary-back-doors.fr.html ...,
GNUN <=