www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-google.pt-br.html propr...


From: GNUN
Subject: www/proprietary malware-google.pt-br.html propr...
Date: Tue, 7 Dec 2021 14:30:34 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/12/07 14:30:34

Modified files:
        proprietary    : malware-google.pt-br.html 
                         proprietary-surveillance.pt-br.html 
Added files:
        proprietary/po : malware-google.pt-br-diff.html 
                         proprietary-surveillance.pt-br-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.pt-br.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.pt-br.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pt-br-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pt-br-diff.html?cvsroot=www&rev=1.1

Patches:
Index: malware-google.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.pt-br.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- malware-google.pt-br.html   6 Sep 2021 01:03:48 -0000       1.7
+++ malware-google.pt-br.html   7 Dec 2021 19:30:30 -0000       1.8
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-google.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-google.pt-br.po">
+ https://www.gnu.org/proprietary/po/malware-google.pt-br.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-google.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-google.pt-br-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2021-10-08" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-google.en.html" -->
 
 <!--#include virtual="/server/header.pt-br.html" -->
 <!-- Parent-Version: 1.96 -->
@@ -34,6 +39,7 @@
 </div>
 
 <!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/outdated.pt-br.html" -->
 <!--#include virtual="/server/top-addendum.pt-br.html" -->
 <div style="clear: both"></div>
 <div id="last-div" class="reduced-width">
@@ -961,7 +967,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2021/09/06 01:03:48 $
+$Date: 2021/12/07 19:30:30 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-surveillance.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.pt-br.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary-surveillance.pt-br.html 25 Jul 2021 14:31:53 -0000      1.3
+++ proprietary-surveillance.pt-br.html 7 Dec 2021 19:30:30 -0000       1.4
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-surveillance.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-surveillance.pt-br.po">
+ https://www.gnu.org/proprietary/po/proprietary-surveillance.pt-br.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/proprietary/proprietary-surveillance.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-surveillance.pt-br-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2021-10-08" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-surveillance.en.html" -->
 
 <!--#include virtual="/server/header.pt-br.html" -->
 <!-- Parent-Version: 1.96 -->
@@ -52,6 +57,7 @@
 </div>
 
 <!--GNUN: OUT-OF-DATE NOTICE-->
+<!--#include virtual="/server/outdated.pt-br.html" -->
 <!--#include virtual="/server/top-addendum.pt-br.html" -->
 <div style="clear: both"></div>
 <div id="last-div" class="reduced-width">
@@ -4285,7 +4291,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização:
 
-$Date: 2021/07/25 14:31:53 $
+$Date: 2021/12/07 19:30:30 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-google.pt-br-diff.html
===================================================================
RCS file: po/malware-google.pt-br-diff.html
diff -N po/malware-google.pt-br-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/malware-google.pt-br-diff.html   7 Dec 2021 19:30:32 -0000       1.1
@@ -0,0 +1,811 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/malware-google.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.96 --&gt;
+&lt;!--#set var="DISABLE_TOP_ADDENDUM" value="yes" --&gt;
+&lt;!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit &lt;ul class="blurbs"&gt;!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+--&gt;
+&lt;title&gt;Google's Software Is Malware
+- GNU Project - Free Software Foundation&lt;/title&gt;
+&lt;link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" /&gt;
+ &lt;!--#include virtual="/proprietary/po/malware-google.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;div class="nav"&gt;
+&lt;a id="side-menu-button" class="switch" href="#navlinks"&gt;
+ &lt;img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" /&gt;
+&lt;/a&gt;
+
+&lt;p class="breadcrumb"&gt;
+ &lt;a href="/"&gt;&lt;img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /&gt;&lt;/a&gt;&nbsp;/
+ &lt;a href="/proprietary/proprietary.html"&gt;Malware&lt;/a&gt;&nbsp;/
+ By company&nbsp;/
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;!--GNUN: OUT-OF-DATE NOTICE--&gt;
+&lt;!--#include virtual="/server/top-addendum.html" --&gt;
+&lt;div style="clear: both"&gt;&lt;/div&gt;
+&lt;div id="last-div" class="reduced-width"&gt;
+&lt;h2&gt;Google's Software is Malware&lt;/h2&gt;
+
+&lt;div class="infobox"&gt;
+&lt;hr class="full-width" /&gt;
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;that is the
+basic injustice&lt;/a&gt;. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.&lt;/p&gt;
+
+&lt;p&gt;This typically takes the form of malicious functionalities.&lt;/p&gt;
+&lt;hr class="full-width" /&gt;
+&lt;/div&gt;
+
+&lt;div class="article"&gt;
+&lt;div class="important"&gt;
+&lt;p&gt;If you know of an example that ought to be in this page but isn't
+here, please write
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;div id="TOC" class="toc-inline"&gt;
+&lt;h3&gt;Types of Google malware&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
+&lt;!--&lt;li&gt;&lt;a 
href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt;--&gt;
+  &lt;li&gt;&lt;a href="#drm"&gt;DRM&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+&lt;!--&lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&lt;/li&gt;--&gt;
+  &lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+
+&lt;h3 id="back-doors"&gt;Back Doors&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202004130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The &lt;a 
href="https://www.google.com/mobile/android/market-tos.html"&gt;
+    Google Play Terms of Service&lt;/a&gt; insist that the user of Android 
accept
+    the presence of universal back doors in apps released by Google.&lt;/p&gt;
+
+    &lt;p&gt;This does not tell us whether any of Google's apps currently
+    contains a universal back door, but that is a secondary question.
+    In moral terms, demanding that people accept in advance certain bad
+    treatment is equivalent to actually doing it.  Whatever condemnation
+    the latter deserves, the former deserves the same.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201908220"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;ChromeBooks are programmed for obsolescence:
+    ChromeOS has a universal back door that is used for updates and &lt;a
+    
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/"&gt;
+    ceases to operate at a predefined date&lt;/a&gt;. From then on, there
+    appears to be no support whatsoever for the computer.&lt;/p&gt;
+
+    &lt;p&gt;In other words, when you stop getting screwed by the back door,
+    you start getting screwed by the obsolescence.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201809140"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Android has a &lt;a
+    
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change"&gt;
+    back door for remotely changing &ldquo;user&rdquo; 
settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article suggests it might be a universal back door, but this
+    isn't clear.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201202280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;ChromeOS has a universal back
+    door. At least, Google says it does&mdash;in &lt;a
+    href="https://www.google.com/intl/en/chromebook/termsofservice.html"&gt;
+    section 4 of the EULA&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201103070"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2011-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;In Android, &lt;a
+    
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"&gt;
+    Google has a back door to remotely delete apps&lt;/a&gt;. (It was in a
+    program called GTalkService, which seems since then to have been
+    merged into Google Play.)&lt;/p&gt;
+
+    &lt;p&gt;Google can also &lt;a
+    
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
+    forcibly and remotely install apps&lt;/a&gt; through GTalkService.  This is
+    not equivalent to a universal back door, but permits various dirty
+    tricks.&lt;/p&gt;
+
+    &lt;p&gt;Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has 
not been
+    malicious so far, the point is that nobody should have such power,
+    which could also be used maliciously.  You might well decide to
+    let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs 
that
+    it considers malicious.  But there is no excuse for allowing it to
+    &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to 
decide
+    who (if anyone) to trust in this way.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="censorship"&gt;Censorship&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201703160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google &lt;a
+    
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts"&gt;
+    offers censorship software&lt;/a&gt;, ostensibly for parents to put into
+    their children's computers.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201701180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;On Windows and MacOS, Chrome &lt;a
+    
href="https://sites.google.com/a/chromium.org/dev/developers/extensions-deployment-faq"&gt;
+    disables extensions&lt;/a&gt; that are not hosted in the Chrome Web
+    Store.&lt;/p&gt;
+
+    &lt;p&gt;For example, an extension was &lt;a
+    
href="https://web.archive.org/web/20170120094917/https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/"&gt;
+    banned from the Chrome Web Store, and permanently disabled&lt;/a&gt; on
+    more than 40,000 computers.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201602030"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones"&gt;
+    Google censored installation of Samsung's ad-blocker&lt;/a&gt; on Android
+    phones, saying that blocking ads is &ldquo;interference&rdquo; with
+    the sites that advertise (and surveil users through ads).&lt;/p&gt;
+
+    &lt;p&gt;The ad-blocker is proprietary software, just like the program
+    (Google Play) that Google used to deny access to install it. Using
+    a nonfree program gives the owner power over you, and Google has
+    exercised that power.&lt;/p&gt;
+
+    &lt;p&gt;Google's censorship, unlike that of Apple, is not total: Android
+    allows users to install apps in other ways. You can install free
+    programs from f-droid.org.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="drm"&gt;DRM&lt;/h3&gt;
+
+&lt;p&gt;Digital restrictions management, or &ldquo;DRM,&rdquo; refers to
+functionalities designed to restrict what users can do with the data
+in their computers.&lt;/p&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201705150"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google now allows Android
+    apps to detect whether a device has been rooted, &lt;a
+    
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/"&gt;and
+    refuse to install if so&lt;/a&gt;. The Netflix app uses this ability to
+    enforce DRM by refusing to install on rooted Android devices.&lt;/p&gt;
+
+    &lt;p&gt;Update: Google &lt;i&gt;intentionally&lt;/i&gt; changed Android 
so that apps &lt;a
+    
href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/"&gt;can
+    detect rooted devices and refuse to run on them&lt;/a&gt;. The Netflix app
+    is proprietary malware, and one shouldn't use it. However, that does
+    not make what Google has done any less wrong.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201701300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Chrome &lt;a
+    
href="http://boingboing.net/2017/01/30/google-quietly-makes-optiona.html"&gt;implements
+    DRM&lt;/a&gt;. So does Chromium, through nonfree software that is 
effectively
+    part of it.&lt;/p&gt;
+
+    &lt;p&gt;&lt;a
+    
href="https://bugs.chromium.org/p/chromium/issues/detail_ezt?id=686430"&gt;More
+    information&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201102250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2011-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Android &lt;a
+    
href="https://developer.android.com/reference/android/drm/package-summary.html"&gt;
+    contains facilities specifically to support DRM&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="insecurity"&gt;Insecurity&lt;/h3&gt;
+
+&lt;p&gt;These bugs are/were not intentional, so unlike the rest of the file
+  they do not count as malware. We mention them to refute the
+  supposition that prestigious proprietary software doesn't have grave
+  bugs.&lt;/p&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202107180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones"&gt;
+    The pegasus spyware used vulnerabilities on proprietary smartphone
+    operating systems&lt;/a&gt; to impose surveillance on people. It can record
+    people's calls, copy their messages, and secretly film them, using a
+    security vulnerability. There's also &lt;a
+    
href="https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf"&gt;
+       a technical analysis of this spyware&lt;/a&gt; available in PDF 
format.&lt;/p&gt;
+
+    &lt;p&gt;A free operating system would've let people to fix the bugs for
+    themselves but now infected people will be compelled to wait for 
corporations to
+    fix the problems.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;Please note that the article
+    wrongly refers to crackers as &ldquo;&lt;a
+    
href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;.&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202008110"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;TikTok &lt;a
+    
href="https://boingboing.net/2020/08/11/tiktok-exploited-android-secur.html"&gt;
+    exploited an Android vulnerability&lt;/a&gt; to obtain user MAC
+    addresses.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201907080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many Android apps can track
+    users' movements even when the user says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
+    exploited intentionally by malicious apps.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201311120"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
+    The NSA can tap data in smart phones, including iPhones,
+    Android, and BlackBerry&lt;/a&gt;.  While there is not much
+    detail here, it seems that this does not operate via
+    the universal back door that we know nearly all portable
+    phones have. It may involve exploiting various bugs.  There are &lt;a
+    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+    lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="interference"&gt;Interference&lt;/h3&gt;
+
+&lt;p&gt;This section gives examples of Google software harassing or annoying
+the user, or causing trouble for the user.  These actions are like
+sabotage but the word &ldquo;sabotage&rdquo; is too strong for them.&lt;/p&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202106190"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/"&gt;Google
+    automatically installed an app on many proprietary Android 
phones&lt;/a&gt;. The app
+    might or might not do malicious things but the power Google has over 
proprietary
+    Android phones is dangerous.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201901230"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google is modifying Chromium so that &lt;a
+    
href="https://tech.slashdot.org/story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-will-break-content-blocking-extensions-including-various-ad-blockers"&gt;
+    extensions won't be able to alter or block whatever the page
+    contains&lt;/a&gt;. Users could conceivably reverse the change in a fork
+    of Chromium, but surely Chrome (nonfree) will have the same change,
+    and users can't fix it there.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="sabotage"&gt;Sabotage&lt;/h3&gt;
+
+&lt;p&gt;The wrongs in this section are not precisely malware, since they do
+not involve making the program that runs in a way that hurts the user.
+But they are a lot like malware, since they are technical Google
+actions that harm the users of specific Google software.&lt;/p&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202011060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A new app published by Google &lt;a
+    
href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/"&gt;lets
+    banks and creditors deactivate people's Android devices&lt;/a&gt; if they
+    fail to make payments. If someone's device gets deactivated, it will
+    be limited to basic functionality, such as emergency calling and
+    access to settings.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201604050"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Revolv is a device that managed &ldquo;smart home&rdquo;
+    operations: switching lights, operate motion sensors, regulating
+    temperature, etc.  Its proprietary software depends on a remote server
+    to do these tasks.  On May 15th, 2016, Google/Alphabet &lt;a
+    
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be"&gt;intentionally
+    broke it by shutting down the server&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;If it were free software, users would have the ability to make it
+    work again, differently, and then have a freedom-respecting home
+    instead of a &ldquo;smart&rdquo; home. Don't let proprietary software
+    control your devices and turn them into $300 out-of-warranty
+    bricks. Insist on self-contained computers that run free 
software!&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511244"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google has long had &lt;a
+    
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted"&gt;a
+    back door to remotely unlock an Android device&lt;/a&gt;, unless its disk
+    is encrypted (possible since Android 5.0 Lollipop, but still not
+    quite the default).&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="surveillance"&gt;Surveillance&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li <span class="inserted"><ins><em>id="M202109210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google's proprietary Chrome web browser &lt;a
+    
href="https://www.techrepublic.com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"&gt;
+    added a surveillance API (idle detection API)&lt;/a&gt; which lets
+    websites ask Chrome to report when a user with a web page open is
+    idle.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li</em></ins></span> id="M202102160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google &lt;a
+    
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16"&gt;handed
+    over personal data of Indian protesters and activists to Indian
+    police&lt;/a&gt; which led to their arrest. The cops requested the IP
+    address and the location where a document was created and with that
+    information, they identified protesters and activists.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202008030"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google Nest &lt;a
+    
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
+    is taking over ADT&lt;/a&gt;. Google sent out a software
+    update to its speaker devices using their back door &lt;a
+    href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt; that
+    listens for things like smoke alarms&lt;/a&gt; and then notifies your phone
+    that an alarm is happening. This means the devices now listen for more
+    than just their wake words. Google says the software update was sent
+    out prematurely and on accident and Google was planning on disclosing
+    this new feature and offering it to customers who pay for it.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202004301"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Proprietary programs Google Meet, Microsoft Teams, and WebEx &lt;a
+    
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/"&gt;are
+    collecting user's personal and identifiable data&lt;/a&gt; including how 
long
+    a call lasts, who's participating in the call, and the IP addresses
+    of everyone taking part. From experience, this can even harm users
+    physically if those companies hand over data to governments.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202004131"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google, Apple, and Microsoft (and probably some other companies)
+    &lt;a 
href="https://www.lifewire.com/wifi-positioning-system-1683343"&gt;are
+    collecting people's access points and GPS coordinates (which can
+    identify people's precise location) even if their GPS is turned
+    off&lt;/a&gt;, without the person's consent, using proprietary software
+    implemented in person's smartphone. Though merely asking for permission
+    would not necessarily legitimize this.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201907210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
+    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
+    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
+    subcontractors discloses a thousand confidential voice recordings,
+    users were easily identified from these recordings.&lt;/p&gt;
+
+    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is no
+    way to see or control what it records or sends.&lt;/p&gt;
+
+    &lt;p&gt;Rather than trying to better control the use of recordings, Google
+    should not record or listen to the person's voice.  It should only
+    get commands that the user wants to send to some Google service.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201906220"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google Chrome is an &lt;a
+    
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/"&gt;
+    instrument of surveillance&lt;/a&gt;. It lets thousands of trackers invade
+    users' computers and report the sites they visit to advertising and
+    data companies, first of all to Google. Moreover, if users have a
+    Gmail account, Chrome automatically logs them in to the browser for
+    more convenient profiling. On Android, Chrome also reports their
+    location to Google.&lt;/p&gt;
+
+    &lt;p&gt;The best way to escape surveillance is to switch to &lt;a
+    href="/software/icecat/"&gt;IceCat&lt;/a&gt;, a modified version of Firefox
+    with several changes to protect users' privacy.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201904130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google tracks the movements of Android phones and iPhones
+    running Google apps, and sometimes &lt;a
+    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves the data for years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
+    the location data to Google.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902040"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google invites people to &lt;a
+    
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss"&gt;
+    let Google monitor their phone use, and all internet use in their
+    homes, for an extravagant payment of $20&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This is not a malicious functionality of a program with some other
+    purpose; this is the software's sole purpose, and Google says so. But
+    Google says it in a way that encourages most people to ignore the
+    details. That, we believe, makes it fitting to list here.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201811230"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;An Android phone was observed to track location even while
+    in airplane mode. It didn't send the location data while in
+    airplane mode.  Instead, &lt;a
+    
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
+    it saved up the data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201809121"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Tiny Lab Productions, along with online ad businesses run
+    by Google, Twitter and three other companies are facing a lawsuit &lt;a
+    
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html"&gt;for
+    violating people's privacy by collecting their data from mobile games
+    and handing over these data to other 
companies/advertisers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201808131"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theverge.com/2018/8/13/17684660/google-turn-off-location-history-data"&gt;Google
+    will track people even if people turn off location history&lt;/a&gt;, using
+    Google Maps, weather updates, and browser searches. Google basically
+    uses any app activity to track people.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201808130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Since the beginning of 2017, &lt;a
+    
href="https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/"&gt;Android
+    phones have been collecting the addresses of nearby cellular
+    towers&lt;/a&gt;, even when location services are disabled, and sending
+    that data back to Google.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201808030"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some Google apps on Android &lt;a
+    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record the user's location even when users disable &ldquo;location
+    tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;There are other ways to turn off the other kinds of location
+    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Android tracks location for Google &lt;a
+    
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+    even when &ldquo;location services&rdquo; are turned off, even when
+    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201704131"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Low-priced Chromebooks for schools are &lt;a
+    href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
+    collecting far more data on students than is necessary, and store
+    it indefinitely&lt;/a&gt;. Parents and students complain about the lack
+    of transparency on the part of both the educational services and the
+    schools, the difficulty of opting out of these services, and the lack
+    of proper privacy policies, among other things.&lt;/p&gt;
+
+    &lt;p&gt;But complaining is not sufficient. Parents, students and teachers
+    should realize that the software Google uses to spy on students is
+    nonfree, so they can't verify what it really does. The only remedy is
+    to persuade school officials to &lt;a 
href="/education/edu-schools.html"&gt;
+    exclusively use free software&lt;/a&gt; for both education and school
+    administration. If the school is run locally, parents and teachers
+    can mandate their representatives at the School Board to refuse the
+    budget unless the school initiates a switch to free software. If
+    education is run nation-wide, they need to persuade legislators
+    (e.g., through free software organizations, political parties,
+    etc.) to migrate the public schools to free software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201609210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google's new voice messaging app &lt;a
+    
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+    all conversations&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201609140"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google Play (a component of Android) &lt;a
+    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself to completely stop the tracking.  This is
+    yet another example of nonfree software pretending to obey the user,
+    when it's actually doing something else.  Such a thing would be almost
+    unthinkable with free software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201507280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google Chrome makes it easy for an extension to do &lt;a
+    
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
+    snooping on the user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201506180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google Chrome includes a module that &lt;a
+    
href="https://www.privateinternetaccess.com/blog/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
+    activates microphones and transmits audio to its 
servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201407170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
+    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
+    data about the user&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201308040"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google Chrome &lt;a
+    href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"&gt;
+    spies on browser history, affiliations&lt;/a&gt;, and other installed
+    software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201308010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall Street
+    Journal (in an article blocked from us by a paywall) reports that &lt;a
+    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+    the FBI can remotely activate the GPS and microphone in Android phones
+    and laptops&lt;/a&gt; (presumably Windows laptops).  Here is &lt;a
+    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201307280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Spyware is present in some Android devices when they are
+    sold.  Some Motorola phones, made when this company was owned
+    by Google, use a modified version of Android that &lt;a
+    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    sends personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201307250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A Motorola phone &lt;a
+    
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201302150"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google Play intentionally sends app developers &lt;a
+    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
+    legitimize actions like this.  At this point, most users have stopped
+    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
+    they are &ldquo;consenting&rdquo; to.  Google should clearly and
+    honestly identify the information it collects on users, instead of
+    hiding it in an obscurely worded EULA.&lt;/p&gt;
+
+    &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
+    and other companies from getting this personal information in the
+    first place!&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201208210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many web sites report all their visitors
+    to Google by using the Google Analytics service, which &lt;a
+    
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
+    tells Google the IP address and the page that was 
visited&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M200809060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2008-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google Chrome contains a key logger that &lt;a
+    
href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
+    sends Google every URL typed in&lt;/a&gt;, one key at a time.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="tyrants"&gt;Tyrants&lt;/h3&gt;
+
+&lt;p&gt;Tyrants are systems that reject any operating system not 
+&ldquo;authorized&rdquo; by the manufacturer.&lt;/p&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201304080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Motorola, then owned by Google, made &lt;a
+    
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html"&gt;
+    Android phones that are tyrants&lt;/a&gt; (though someone found a way to
+    crack the restriction).&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+
+&lt;/div&gt;
+&lt;!--#include virtual="/proprietary/proprietary-menu.html" --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer" role="contentinfo"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:gnu@gnu.org"&gt;&lt;gnu@gnu.org&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:web-translators@gnu.org"&gt;
+        &lt;web-translators@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and contributing translations 
of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and contributing translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2017-2021 Free Software Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative
+Commons Attribution 4.0 International License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2021/12/07 19:30:32 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;&lt;!-- for class="inner", starts in the banner include --&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: po/proprietary-surveillance.pt-br-diff.html
===================================================================
RCS file: po/proprietary-surveillance.pt-br-diff.html
diff -N po/proprietary-surveillance.pt-br-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ po/proprietary-surveillance.pt-br-diff.html 7 Dec 2021 19:30:34 -0000       
1.1
@@ -0,0 +1,3584 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/proprietary-surveillance.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.96 --&gt;
+&lt;!--#set var="DISABLE_TOP_ADDENDUM" value="yes" --&gt;
+&lt;!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+                  Please do not edit &lt;ul class="blurbs"&gt;!
+    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
+           See explanations in /proprietary/workshop/README.md.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+--&gt;
+&lt;title&gt;Proprietary Surveillance - GNU Project - Free Software 
Foundation&lt;/title&gt;
+&lt;link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" /&gt;
+&lt;style type="text/css" media="screen,print"&gt;&lt;!--
+.pict {
+    width: 18em;
+    margin: 2em auto;
+}
+.pict p {
+    font-size: .9em;
+}
+@media (min-width: 46em) {
+    .pict {
+        width: 18em;
+        float: right;
+        margin: .3em 0 1em 2em;
+    }
+}
+--&gt;&lt;/style&gt;
+&lt;!-- GNUN: localize URL /graphics/dog.small.jpg --&gt;
+&lt;!--#include virtual="/proprietary/po/proprietary-surveillance.translist" 
--&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;div class="nav"&gt;
+&lt;a id="side-menu-button" class="switch" href="#navlinks"&gt;
+ &lt;img id="side-menu-icon" height="32"
+      src="/graphics/icons/side-menu.png"
+      title="Section contents"
+      alt="&nbsp;[Section contents]&nbsp;" /&gt;
+&lt;/a&gt;
+
+&lt;p class="breadcrumb"&gt;
+ &lt;a href="/"&gt;&lt;img src="/graphics/icons/home.png" height="24"
+    alt="GNU Home" title="GNU Home" /&gt;&lt;/a&gt;&nbsp;/
+ &lt;a href="/proprietary/proprietary.html"&gt;Malware&lt;/a&gt;&nbsp;/
+ By type&nbsp;/
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;!--GNUN: OUT-OF-DATE NOTICE--&gt;
+&lt;!--#include virtual="/server/top-addendum.html" --&gt;
+&lt;div style="clear: both"&gt;&lt;/div&gt;
+&lt;div id="last-div" class="reduced-width"&gt;
+&lt;h2&gt;Proprietary Surveillance&lt;/h2&gt;
+
+&lt;div class="infobox"&gt;
+&lt;hr class="full-width" /&gt;
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;that is the
+basic injustice&lt;/a&gt;. The developers and manufacturers often exercise
+that power to the detriment of the users they ought to serve.&lt;/p&gt;
+
+&lt;p&gt;This typically takes the form of malicious functionalities.&lt;/p&gt;
+&lt;hr class="full-width" /&gt;
+&lt;/div&gt;
+
+&lt;div id="surveillance" class="pict"&gt;
+&lt;a href="/graphics/dog.html"&gt;
+&lt;img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the 
three ads that popped up on his computer screen..." /&gt;&lt;/a&gt;
+&lt;p&gt;&ldquo;How did they find out I'm a dog?&rdquo;&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;div class="article"&gt;
+&lt;p&gt;A common malicious functionality is to snoop on the user.  This page
+records &lt;strong&gt;clearly established cases of proprietary software that
+spies on or tracks users&lt;/strong&gt;.  Manufacturers even refuse
+to &lt;a 
href="https://techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/"&gt;say
+whether they snoop on users for the state&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;All appliances and applications that are tethered to a specific
+server are snoopers by nature.  We do not list them here because they
+have their own page: &lt;a
+href="/proprietary/proprietary-tethers.html#about-page"&gt;Proprietary
+    Tethers&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;There is a similar site named &lt;a 
href="https://spyware.neocities.org"&gt;Spyware Watchdog&lt;/a&gt; that 
classifies spyware programs, so that users can be more aware that they are 
installing spyware.&lt;/p&gt;
+
+&lt;div class="important" style="clear: both"&gt;
+&lt;p&gt;If you know of an example that ought to be in this page but isn't
+here, please write
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;
+to inform us. Please include the URL of a trustworthy reference or two
+to serve as specific substantiation.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;div id="TOC" class="toc-inline"&gt;
+    &lt;h3 id="TableOfContents"&gt;Table of Contents&lt;/h3&gt;
+    &lt;h4&gt;&lt;a href="#Introduction"&gt;Introduction&lt;/a&gt;&lt;/h4&gt;
+    &lt;h4&gt;&lt;a href="#OSSpyware"&gt;Spyware in Laptops and 
Desktops&lt;/a&gt;&lt;/h4&gt;
+    &lt;ul&gt;
+      &lt;li&gt;&lt;a href="#SpywareInWindows"&gt;Windows&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a href="#SpywareInMacOS"&gt;MacOS&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a href="#SpywareInBIOS"&gt;BIOS&lt;/a&gt;&lt;/li&gt;
+    &lt;/ul&gt;
+    &lt;h4&gt;&lt;a href="#SpywareOnMobiles"&gt;Spyware on 
Mobiles&lt;/a&gt;&lt;/h4&gt;
+    &lt;ul&gt;
+      &lt;li&gt;&lt;a href="#SpywareInTelephones"&gt;All &ldquo;Smart&rdquo; 
Phones&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a href="#SpywareIniThings"&gt;iThings&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a href="#SpywareInAndroid"&gt;Android 
Telephones&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a 
href="#SpywareInElectronicReaders"&gt;E-Readers&lt;/a&gt;&lt;/li&gt;
+     &lt;/ul&gt;
+    &lt;h4&gt;&lt;a href="#SpywareInApplications"&gt;Spyware in 
Applications&lt;/a&gt;&lt;/h4&gt;
+    &lt;ul&gt;
+      &lt;li&gt;&lt;a href="#SpywareInDesktopApps"&gt;Desktop 
Apps&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a href="#SpywareInMobileApps"&gt;Mobile 
Apps&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a href="#SpywareInSkype"&gt;Skype&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a href="#SpywareInGames"&gt;Games&lt;/a&gt;&lt;/li&gt;
+    &lt;/ul&gt;
+    &lt;h4&gt;&lt;a href="#SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/a&gt;&lt;/h4&gt;
+    &lt;ul&gt;
+      &lt;li&gt;&lt;a href="#SpywareInTVSets"&gt;TV Sets&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a href="#SpywareInCameras"&gt;Cameras&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a href="#SpywareInToys"&gt;Toys&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a href="#SpywareInDrones"&gt;Drones&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a href="#SpywareAtHome"&gt;Other 
Appliances&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a href="#SpywareOnWearables"&gt;Wearables&lt;/a&gt;
+        &lt;ul&gt;
+          &lt;li&gt;&lt;a href="#SpywareOnSmartWatches"&gt;&ldquo;Smart&rdquo; 
Watches&lt;/a&gt;&lt;/li&gt;
+        &lt;/ul&gt;
+      &lt;/li&gt;
+      &lt;li&gt;&lt;a 
href="#SpywareInVehicles"&gt;Vehicles&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a href="#SpywareInVR"&gt;Virtual 
Reality&lt;/a&gt;&lt;/li&gt;
+    &lt;/ul&gt;
+    &lt;h4&gt;&lt;a href="#SpywareOnTheWeb"&gt;Spyware on the 
Web&lt;/a&gt;&lt;/h4&gt;
+    &lt;ul&gt;
+      &lt;li&gt;&lt;a href="#SpywareInChrome"&gt;Chrome&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a 
href="#SpywareInJavaScript"&gt;JavaScript&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a href="#SpywareInFlash"&gt;Flash&lt;/a&gt;&lt;/li&gt;
+    &lt;/ul&gt;
+    &lt;h4&gt;&lt;a href="#SpywareInNetworks"&gt;Spyware in 
Networks&lt;/a&gt;&lt;/h4&gt;
+&lt;/div&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="Introduction"&gt;Introduction&lt;/h3&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;p&gt;For decades, the Free Software movement has been denouncing the
+abusive surveillance machine of
+&lt;a href="/proprietary/proprietary.html"&gt;proprietary software&lt;/a&gt;
+companies such as
+&lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;
+and
+&lt;a href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;.
+
+In the recent years, this tendency to watch people has spread across
+industries, not only in the software business, but also in the
+hardware.  Moreover, it also spread dramatically away from the
+keyboard, in the mobile computing industry, in the office, at home, in
+transportation systems, and in the classroom.&lt;/p&gt;
+
+&lt;h4 id="AggregateInfoCollection"&gt;Aggregate or anonymized data&lt;/h4&gt;
+
+&lt;p&gt;Many companies, in their privacy policy, have a clause that claims
+they share aggregate, non-personally identifiable information with
+third parties/partners. Such claims are worthless, for several
+reasons:&lt;/p&gt;
+
+&lt;ul&gt;
+    &lt;li&gt;They could change the policy at any time.&lt;/li&gt;
+    &lt;li&gt;They can twist the words by distributing an 
&ldquo;aggregate&rdquo; of
+        &ldquo;anonymized&rdquo; data which can be reidentified and attributed 
to
+        individuals.&lt;/li&gt;
+    &lt;li&gt;The raw data they don't normally distribute can be taken by
+        data breaches.&lt;/li&gt;
+    &lt;li&gt;The raw data they don't normally distribute can be taken by
+        subpoena.&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;p&gt;Therefore, we must not be distracted by companies' statements of
+what they will &lt;em&gt;do&lt;/em&gt; with the data they collect. The wrong 
is that
+they collect it at all.&lt;/p&gt;
+
+&lt;h4 id="LatestAdditions"&gt;Latest additions&lt;/h4&gt;
+
+&lt;p&gt;Entries in each category are in reverse chronological order, based
+on the dates of publication of linked articles.
+The latest additions are listed on the &lt;a
+href="/proprietary/proprietary.html#latest"&gt;main page&lt;/a&gt; of the
+Malware section.&lt;/p&gt;
+
+
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="OSSpyware"&gt;Spyware in Laptops and Desktops&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#OSSpyware"&gt;#OSSpyware&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInWindows"&gt;Windows&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInWindows"&gt;#SpywareInWindows&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201912160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Microsoft is &lt;a
+    
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/"&gt;tricking
+    users to create an account on their network&lt;/a&gt; to be able to install
+    and use the Windows operating system, which is malware. The account can
+    be used for surveillance and/or violating people's rights in many ways,
+    such as turning their purchased software to a subscription 
product.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201712110"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;HP's proprietary operating system &lt;a
+    href="http://www.bbc.com/news/technology-42309371"&gt;includes a
+    proprietary keyboard driver with a key logger in it&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201710134"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Windows 10 telemetry program sends information to Microsoft about
+    the user's computer and their use of the computer.&lt;/p&gt;
+
+    &lt;p&gt;Furthermore, for users who installed the
+    fourth stable build of Windows 10, called the
+    &ldquo;Creators Update,&rdquo; Windows maximized the surveillance &lt;a
+    
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law"&gt;
+    by force setting the telemetry mode to 
&ldquo;Full&rdquo;&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The &lt;a
+    
href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level"&gt;
+    &ldquo;Full&rdquo; telemetry mode&lt;/a&gt; allows Microsoft Windows
+    engineers to access, among other things, registry keys &lt;a
+    
href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)"&gt;
+    which can contain sensitive information like administrator's login
+    password&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201702020"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;DRM-restricted files can be used to &lt;a
+    
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;
+    identify people browsing through Tor&lt;/a&gt;. The vulnerability exists
+    only if you use Windows.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201611240"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;By default, Windows 10 &lt;a
+    
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties"&gt;sends
+    debugging information to Microsoft, including core dumps&lt;/a&gt;. 
Microsoft
+    now distributes them to another company.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201608170.1"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;In order to increase Windows 10's install base, Microsoft &lt;a 
class="not-a-duplicate" 
+    
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
+    blatantly disregards user choice and privacy&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201603170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security"&gt;
+    Windows 10 comes with 13 screens of snooping options&lt;/a&gt;, all enabled
+    by default, and turning them off would be daunting to most users.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201601050"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;It appears &lt;a
+    
href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/"&gt;
+    Windows 10 sends data to Microsoft about what applications are
+    running&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201512280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Microsoft has &lt;a
+    
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/"&gt;
+    backdoored its disk encryption&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511264"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A downgrade to Windows 10 deleted surveillance-detection
+    applications.  Then another downgrade inserted a general spying
+    program.  Users noticed this and complained, so Microsoft renamed it &lt;a
+    
href="https://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/"&gt;
+    to give users the impression it was gone&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;To use proprietary software is to invite such treatment.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201508180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://web.archive.org/web/20150905163414/http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
+    Intel devices will be able to listen for speech all the time, even
+    when &ldquo;off.&rdquo;&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201508130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;
+    Windows 10 sends identifiable information to Microsoft&lt;/a&gt;, even if
+    a user turns off its Bing search and Cortana features, and activates
+    the privacy-protection settings.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201507300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Windows 10 &lt;a
+    
href="https://web.archive.org/web/20180923125732/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;
+    ships with default settings that show no regard for the privacy of
+    its users&lt;/a&gt;, giving Microsoft the &ldquo;right&rdquo; to snoop on
+    the users' files, text input, voice input, location info, contacts,
+    calendar records and web browsing history, as well as automatically
+    connecting the machines to open hotspots and showing targeted 
ads.&lt;/p&gt;
+
+    &lt;p&gt;We can suppose Microsoft looks at users' files for the US 
government
+    on demand, though the &ldquo;privacy policy&rdquo; does not explicitly
+    say so. Will it look at users' files for the Chinese government
+    on demand?&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201506170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Microsoft uses Windows 10's &ldquo;privacy policy&rdquo;
+    to overtly impose a &ldquo;right&rdquo; to look at
+    users' files at any time. Windows 10 full disk encryption &lt;a
+    
href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/"&gt;
+    gives Microsoft a key&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Thus, Windows is overt malware in regard to surveillance, as in
+    other issues.&lt;/p&gt;
+
+    &lt;p&gt;The unique &ldquo;advertising ID&rdquo; for each user enables
+    other companies to track the browsing of each specific user.&lt;/p&gt;
+
+    &lt;p&gt;It's as if Microsoft has deliberately chosen to make Windows 10
+    maximally evil on every dimension; to make a grab for total power
+    over anyone that doesn't drop Windows now.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201410040"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;It only gets worse with time.  &lt;a
+    
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html"&gt;
+    Windows 10 requires users to give permission for total snooping&lt;/a&gt;,
+    including their files, their commands, their text input, and their
+    voice input.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201401150"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p id="baidu-ime"&gt;&lt;a
+    
href="https://www.techrepublic.com/blog/asian-technology/japanese-government-warns-baidu-ime-is-spying-on-users/"&gt;
+    Baidu's Japanese-input and Chinese-input apps spy on 
users&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201307080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Spyware in older versions of Windows: &lt;a
+    
href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/"&gt;
+    Windows Update snoops on the user&lt;/a&gt;. &lt;a
+    
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"&gt;
+    Windows 8.1 snoops on local searches&lt;/a&gt;. And there's a &lt;a
+    href="http://www.marketoracle.co.uk/Article40836.html"&gt; secret NSA
+    key in Windows&lt;/a&gt;, whose functions we don't know.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;p&gt;Microsoft's snooping on users did not start with Windows 10.
+   There's a lot more &lt;a href="/proprietary/malware-microsoft.html"&gt;
+   Microsoft malware&lt;/a&gt;.&lt;/p&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMacOS"&gt;MacOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMacOS"&gt;#SpywareInMacOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202011120"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple has &lt;a
+    
href="https://sneak.berlin/20201112/your-computer-isnt-yours"&gt;implemented
+    a malware in its computers that imposes surveillance&lt;/a&gt; on users
+    and reports users' computing to Apple.&lt;/p&gt;
+
+    &lt;p&gt;The reports are even unencrypted and they've been leaking this
+    data for two years already. This malware is reporting to Apple what
+    user opens what program at what time. It also gives Apple
+    power to sabotage users' computing.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201809070"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Adware Doctor, an ad blocker for MacOS, &lt;a
+    
href="https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
+    the user's browsing history&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201411040"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple has made various &lt;a
+    
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"&gt;
+    MacOS programs send files to Apple servers without asking
+    permission&lt;/a&gt;.  This exposes the files to Big Brother and perhaps
+    to other snoops.&lt;/p&gt;
+
+    &lt;p&gt;It also demonstrates how you can't trust proprietary software,
+    because even if today's version doesn't have a malicious functionality,
+    tomorrow's version might add it. The developer won't remove the
+    malfeature unless many users push back hard, and the users can't
+    remove it themselves.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201410300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt; MacOS automatically &lt;a
+    
href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
+    sends to Apple servers unsaved documents being edited&lt;/a&gt;. The
+    things you have not decided to save are &lt;a
+    
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/"&gt;
+    even more sensitive&lt;/a&gt; than the things you have stored in 
files.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201410220"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple admits the &lt;a
+    
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/"&gt;
+    spying in a search facility&lt;/a&gt;, but there's a lot &lt;a
+    href="https://github.com/fix-macosx/yosemite-phone-home"&gt; more snooping
+    that Apple has not talked about&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201410200"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Various operations in &lt;a
+    
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;
+    the latest MacOS send reports to Apple&lt;/a&gt; servers.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201401100.1"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+    Spotlight search&lt;/a&gt; sends users' search terms to Apple.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;p&gt;There's a lot more &lt;a href="#SpywareIniThings"&gt;iThing 
spyware&lt;/a&gt;, and
+&lt;a href="/proprietary/malware-apple.html"&gt;Apple 
malware&lt;/a&gt;.&lt;/p&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;span id="SpywareAtLowLevel"&gt;&lt;/span&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201509220"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+    Lenovo stealthily installed crapware and spyware via
+    BIOS&lt;/a&gt; on Windows installs.  Note that the specific
+    sabotage method Lenovo used did not affect GNU/Linux; also, a
+    &ldquo;clean&rdquo; Windows install is not really clean since &lt;a
+    href="/proprietary/malware-microsoft.html"&gt;Microsoft puts in its
+    own malware&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTelephones"&gt;All &ldquo;Smart&rdquo; Phones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li <span class="inserted"><ins><em>id="M202106250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/"&gt;El
+    Salvador Dictatorship's Chivo wallet is spyware&lt;/a&gt;, it's a
+    proprietary program that breaks users' freedom and spies on people;
+    demands personal data such as the national ID number and does face
+    recognition, and it is bad security for its data. It also asks for
+    almost every malware permission in people's smartphones.&lt;/p&gt;
+
+    &lt;p&gt;The article criticizes it for faults in &ldquo;data
+    protection&rdquo;, though &lt;a
+    href="/philosophy/surveillance-vs-democracy.html"&gt;&ldquo;data 
protection&rdquo;
+    is the wrong approach to privacy anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li</em></ins></span> id="M202106170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-health-apps-harvest-user-data-global-study-shows"&gt;Almost
+    all proprietary health apps harvest users' data&lt;/a&gt;, including
+    sensitive health information, tracking identifiers, and cookies to
+    track user activities. Some of these applications are tracking users
+    across different platforms.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202102200"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The proprietary program Clubhouse
+    is malware and a privacy disaster. Clubhouse &lt;a
+    
href="https://www.theguardian.com/commentisfree/2021/feb/20/why-hot-new-social-app-clubhouse-spells-nothing-but-trouble"&gt;collects
+    people's personal data such as recordings of people's
+    conversations&lt;/a&gt;, and, as a secondary problem, does not encrypt 
them,
+    which shows a bad security part of the issue.&lt;/p&gt;
+
+    &lt;p&gt;A user's unique Clubhouse ID number and chatroom ID are 
transmitted
+    in plaintext, and Agora (the company behind the app) would likely
+    have access to users' raw audio, potentially providing access to
+    the Chinese government.&lt;/p&gt;
+
+    &lt;p&gt;Even with good security of data transmission, collecting personal
+    data of people is wrong and a violation of people's privacy 
rights.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202101080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;As of 2021, WhatsApp (one of Facebook's subsidiaries) is &lt;a
+    
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/"&gt;forcing
+    its users to hand over sensitive personal data&lt;/a&gt; to its parent
+    company. This increases Facebook's power over users, and further
+    jeopardizes people's privacy and security.&lt;/p&gt;
+
+    &lt;p&gt;Instead of WhatsApp you can use &lt;a
+    href="https://directory.fsf.org/wiki/Jami"&gt;GNU Jami&lt;/a&gt;, which is
+    free software and will not collect your data.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202006260"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Most apps are malware, but
+    Trump's campaign app, like Modi's campaign app, is &lt;a
+    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"&gt;
+    especially nasty malware, helping companies snoop on users as well
+    as snooping on them itself&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article says that Biden's app has a less manipulative overall
+    approach, but that does not tell us whether it has functionalities we
+    consider malicious, such as sending data the user has not explicitly
+    asked to send.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201809121"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Tiny Lab Productions, along with online ad businesses run
+    by Google, Twitter and three other companies are facing a lawsuit &lt;a
+    
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html"&gt;for
+    violating people's privacy by collecting their data from mobile games
+    and handing over these data to other 
companies/advertisers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201601110"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The natural extension of monitoring
+    people through &ldquo;their&rdquo; phones is &lt;a
+    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+    proprietary software to make sure they can't &ldquo;fool&rdquo;
+    the monitoring&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201510050"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;According to Edward Snowden, &lt;a
+    href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take over
+    smartphones&lt;/a&gt; by sending hidden text messages which enable
+    them to turn the phones on and off, listen to the microphone,
+    retrieve geo-location data from the GPS, take photographs, read
+    text messages, read call, location and web browsing history, and
+    read the contact list. This malware is designed to disguise itself
+    from investigation.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201311120"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
+    The NSA can tap data in smart phones, including iPhones,
+    Android, and BlackBerry&lt;/a&gt;.  While there is not much
+    detail here, it seems that this does not operate via
+    the universal back door that we know nearly all portable
+    phones have. It may involve exploiting various bugs.  There are &lt;a
+    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+    lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201307000"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Portable phones with GPS &lt;a
+    
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+    will send their GPS location on remote command, and users cannot stop
+    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones
+    to have GPS.)&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareIniThings"&gt;iThings&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202105240"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/"&gt;Apple
+    is moving its Chinese customers' iCloud data to a datacenter controlled
+    by the Chinese government&lt;/a&gt;. Apple is already storing the 
encryption
+    keys on these servers, obeying Chinese authority, making all Chinese
+    user data available to the government.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202009183"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Facebook &lt;a
+    
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html"&gt;snoops
+    on Instagram&lt;/a&gt; users by surreptitously turning on the device's
+    camera.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202004200"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple whistleblower Thomas Le Bonniec reports that Apple
+    made a practice of surreptitiously activating the Siri software to &lt;a
+    
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"&gt;
+    record users' conversations when they had not activated Siri&lt;/a&gt;.
+    This was not just occasional, it was systematic practice.&lt;/p&gt;
+
+    &lt;p&gt;His job was to listen to these recordings, in a group that made
+    transcripts of them. He does not believes that Apple has ceased this
+    practice.&lt;/p&gt;
+
+    &lt;p&gt;The only reliable way to prevent this is, for the program that
+    controls access to the microphone to decide when the user has
+    &ldquo;activated&rdquo; any service, to be free software, and the
+    operating system under it free as well. This way, users could make
+    sure Apple can't listen to them.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201910131"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Safari occasionally &lt;a
+    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"&gt;
+    sends browsing data from Apple devices in China to the Tencent Safe
+    Browsing service&lt;/a&gt;, to check URLs that possibly correspond to
+    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
+    with the Chinese government, its Safe Browsing black list most certainly
+    contains the websites of political opponents. By linking the requests
+    originating from single IP addresses, the government can identify
+    dissenters in China and Hong Kong, thus endangering their lives.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201905280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;In spite of Apple's supposed commitment to
+    privacy, iPhone apps contain trackers that are busy at night &lt;a
+    
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"&gt;
+    sending users' personal information to third parties&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article mentions specific examples: Microsoft OneDrive,
+    Intuit's Mint, Nike, Spotify, The Washington Post, The Weather
+    Channel (owned by IBM), the crime-alert service Citizen, Yelp
+    and DoorDash. But it is likely that most nonfree apps contain
+    trackers. Some of these send personally identifying data such as phone
+    fingerprint, exact location, email address, phone number or even
+    delivery address (in the case of DoorDash). Once this information
+    is collected by the company, there is no telling what it will be
+    used for.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
+    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
+    this would require circumventing the iOS DRM.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201709210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;In the latest iThings system,
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
+    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
+    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
+    know you want to be spied on&rdquo;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201702150"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple proposes &lt;a
+    
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
+    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
+    to use it without having your fingerprints taken. Users would have
+    no way to tell whether the phone is snooping on them.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201611170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;iPhones &lt;a
+    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
+    lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
+    them from there.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201609280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The iMessage app on iThings &lt;a
+    
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+    a server every phone number that the user types into it&lt;/a&gt;; the
+    server records these numbers for at least 30 days.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201509240"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;iThings automatically upload to Apple's servers all the photos
+    and videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
+    take, and keeps them up to date on all your devices. Any edits you
+    make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
+    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+    startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means &ldquo;please
+    don't ask where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There is a way to
+    &lt;a href="https://support.apple.com/en-us/HT201104"&gt; deactivate
+    iCloud&lt;/a&gt;, but it's active by default so it still counts as a
+    surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
+    
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+    nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
+    security to get at them, but NSA can access any of them through &lt;a
+    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201409220"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apple can, and regularly does, &lt;a
+    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+    remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This may have improved with &lt;a
+    
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"&gt;
+    iOS 8 security improvements&lt;/a&gt;; but &lt;a
+    href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+    not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201407230"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+    Several &ldquo;features&rdquo; of iOS seem to exist
+    for no possible purpose other than surveillance&lt;/a&gt;.  Here is the 
&lt;a
+    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+    Technical presentation&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201401100"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The &lt;a class="not-a-duplicate"
+    
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
+    get other info too.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201312300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+    Either Apple helps the NSA snoop on all the data in an iThing, or it
+    is totally incompetent&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201308080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The iThing also &lt;a
+    
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+    tells Apple its geolocation&lt;/a&gt; by default, though that can be
+    turned off.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201210170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;There is also a feature for web sites to track users, which is 
&lt;a
+    
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
+    still true in iOS 7.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201204280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Users cannot make an Apple ID (&lt;a
+    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary
+    to install even gratis apps&lt;/a&gt;) without giving a valid
+    email address and receiving the verification code Apple sends
+    to it.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInAndroid"&gt;Android Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202012070"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Baidu apps were &lt;a
+    
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/"&gt;
+    caught collecting sensitive personal data&lt;/a&gt; that can be used for
+    lifetime tracking of users, and putting them in danger. More than 1.4
+    billion people worldwide are affected by these proprietary apps, and
+    users' privacy is jeopardized by this surveillance tool. Data collected
+    by Baidu may be handed over to the Chinese government, possibly
+    putting Chinese people in danger.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202010120"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Samsung is forcing its smartphone users in Hong Kong (and Macau) 
&lt;a
+    
href="https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-dns-service-upon-hong-kong-wifi-users/"&gt;to
+    use a public DNS in Mainland China&lt;/a&gt;, using software update 
released
+    in September 2020, which causes many unease and privacy concerns.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202004300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Xiaomi phones &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/"&gt;report
+    many actions the user takes&lt;/a&gt;: starting an app, looking at a 
folder,
+    visiting a website, listening to a song.  They send device identifying
+    information too.&lt;/p&gt;
+
+    &lt;p&gt;Other nonfree programs snoop too. For instance, Spotify and
+    other streaming dis-services make a dossier about each user, and &lt;a
+    href="/malware/proprietary-surveillance.html#M201508210"&gt; they make
+    users identify themselves to pay&lt;/a&gt;.  Out, out, damned 
Spotify!&lt;/p&gt;
+
+    &lt;p&gt;Forbes exonerates the same wrongs when the culprits are not 
Chinese,
+    but we condemn this no matter who does it.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201812060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
+    
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
+    upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
+    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201811230"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;An Android phone was observed to track location even while
+    in airplane mode. It didn't send the location data while in
+    airplane mode.  Instead, &lt;a
+    
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
+    it saved up the data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Android tracks location for Google &lt;a
+    
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+    even when &ldquo;location services&rdquo; are turned off, even when
+    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201611150"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some portable phones &lt;a
+    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201609140"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google Play (a component of Android) &lt;a
+    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself to completely stop the tracking.  This is
+    yet another example of nonfree software pretending to obey the user,
+    when it's actually doing something else.  Such a thing would be almost
+    unthinkable with free software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201507030"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Samsung phones come with &lt;a
+    
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
+    that users can't delete&lt;/a&gt;, and they send so much data that their
+    transmission is a substantial expense for users.  Said transmission,
+    not wanted or requested by the user, clearly must constitute spying
+    of some kind.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201403120"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+    Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201308010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall Street
+    Journal (in an article blocked from us by a paywall) reports that &lt;a
+    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+    the FBI can remotely activate the GPS and microphone in Android phones
+    and laptops&lt;/a&gt; (presumably Windows laptops).  Here is &lt;a
+    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201307280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Spyware is present in some Android devices when they are
+    sold.  Some Motorola phones, made when this company was owned
+    by Google, use a modified version of Android that &lt;a
+    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    sends personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201307250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A Motorola phone &lt;a
+    
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201302150"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google Play intentionally sends app developers &lt;a
+    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
+    legitimize actions like this.  At this point, most users have stopped
+    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
+    they are &ldquo;consenting&rdquo; to.  Google should clearly and
+    honestly identify the information it collects on users, instead of
+    hiding it in an obscurely worded EULA.&lt;/p&gt;
+
+    &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
+    and other companies from getting this personal information in the
+    first place!&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201111170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2011-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some manufacturers add a &lt;a
+    
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+    hidden general surveillance package such as Carrier IQ&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201603080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
+    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201410080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
+    the e-reader used by most US libraries, &lt;a
+    
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+    send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    needed to check DRM!&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201212030"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Spyware in many e-readers&mdash;not only the Kindle: &lt;a
+    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
+    report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareInApplications"&gt;Spyware in Applications&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInDesktopApps"&gt;Desktop Apps&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDesktopApps"&gt;#SpywareInDesktopApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202011260"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Microsoft's Office 365 suite enables employers &lt;a
+    
href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance"&gt;to
+    snoop on each employee&lt;/a&gt;. After
+    a public outburst, Microsoft stated that &lt;a
+    
href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance"&gt;it
+    would remove this capability&lt;/a&gt;. Let's hope so.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201912190"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some Avast and AVG extensions
+    for Firefox and Chrome were found to &lt;a
+    
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"&gt;
+    snoop on users' detailed browsing habits&lt;/a&gt;. Mozilla and Google
+    removed the problematic extensions from their stores, but this shows
+    once more how unsafe nonfree software can be. Tools that are supposed
+    to protect a proprietary system are, instead, infecting it with
+    additional malware (the system itself being the original 
malware).&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201811020"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Foundry's graphics software &lt;a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information to identify who is running it&lt;/a&gt;. The result is
+    often a legal threat demanding a lot of money.&lt;/p&gt;
+
+    &lt;p&gt;The fact that this is used for repression of forbidden sharing
+    makes it even more vicious.&lt;/p&gt;
+
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
+    is not a cure for the injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li <span class="inserted"><ins><em>id="M202111090"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A building in LA, with a supermarket in it, &lt;a
+    
href="https://www.latimes.com/business/story/2021-11-09/column-trader-joes-parking-app"&gt;demands
+    customers load a particular app to pay for parking in the parking
+    lot&lt;/a&gt;, and accept pervasive surveillance. They also have the
+    option of entering their license plate numbers in a kiosk. That is
+    an injustice, too.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li</em></ins></span> id="M202106030"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/"&gt;TikTok
+    apps collect biometric identifiers and biometric information from
+    users' smartphones&lt;/a&gt;. The company behind it does whatever it wants
+    and collects whatever data it can.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202104060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The &lt;a
+    
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/"&gt;WeddingWire
+    app saves people's wedding photos forever and hands over data
+    to others&lt;/a&gt;, giving users no control over their personal 
+    information/data. The app also sometimes shows old photos and
+    memories to users, without giving them any control over this
+    either.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202102010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many cr&hellip;apps, developed by various
+    companies for various organizations, do &lt;a
+    
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"&gt;
+    location tracking unknown to those companies and those
+    organizations&lt;/a&gt;.  It's actually some widely used libraries that do
+    the tracking.&lt;/p&gt;
+
+    &lt;p&gt;What's unusual here is that proprietary software developer A 
tricks
+    proprietary software developers B1 &hellip; B50 into making platforms for
+    A to mistreat the end user.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202003260"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Apple iOS version of Zoom &lt;a
+    
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account"&gt;is
+    sending users' data to Facebook&lt;/a&gt; even if the user doesn't have
+    a Facebook account. According to the article, Zoom and Facebook
+    don't even mention this surveillance on their privacy policy page,
+    making this an obvious violation of people's privacy even in their
+    own terms.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202003010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Alipay Health Code app
+    estimates whether the user has Covid-19 and &lt;a
+    
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"&gt;
+    tells the cops directly&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202001290"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Amazon Ring app does &lt;a
+    
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"&gt;
+    surveillance for other companies as well as for Amazon&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201912220"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The ToToc messaging app seems to be a &lt;a
+    
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"&gt;
+    spying tool for the government of the United Arab Emirates&lt;/a&gt;.
+    Any nonfree program could be doing this, and that is a good
+    reason to use free software instead.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;Note: this article uses the word &ldquo;free&rdquo; 
in
+    the sense of &ldquo;gratis.&rdquo;&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201912090"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;iMonsters and Android phones,
+    when used for work, give employers powerful &lt;a
+    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"&gt;
+    snooping and sabotage capabilities&lt;/a&gt; if they install their own
+    software on the device.  Many employers demand to do this.  For the
+    employee, this is simply nonfree software, as fundamentally unjust
+    and as dangerous as any other nonfree software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201910130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Chinese Communist Party's &ldquo;Study
+    the Great Nation&rdquo; app requires users to grant it &lt;a
+    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"&gt;
+    access to the phone's microphone, photos, text messages, contacts, and
+    internet history&lt;/a&gt;, and the Android version was found to contain a
+    back-door allowing developers to run any code they wish in the users'
+    phone, as &ldquo;superusers.&rdquo; Downloading and using this
+    app is mandatory at some workplaces.&lt;/p&gt;
+
+    &lt;p&gt;Note: The &lt;a
+    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"&gt;
+    Washington Post version of the article&lt;/a&gt; (partly obfuscated, but
+    readable after copy-pasting in a text editor) includes a clarification
+    saying that the tests were only performed on the Android version
+    of the app, and that, according to Apple, &ldquo;this kind of
+    &lsquo;superuser&rsquo; surveillance could not be conducted on
+    Apple's operating system.&rdquo;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201909091"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Facebook app &lt;a
+    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"&gt;
+    tracks users even when it is turned off&lt;/a&gt;, after tricking them
+    into giving the app broad permissions in order to use one of its
+    functionalities.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201909090"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some nonfree period-tracking apps including MIA Fem and Maya &lt;a
+    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"&gt;
+    send intimate details of users' lives to Facebook&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201909060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Keeping track of who downloads a proprietary
+    program is a form of surveillance.  There is a
+    proprietary program for adjusting a certain telescopic rifle sight. &lt;a
+    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"&gt;
+    A US prosecutor has demanded the list of all the 10,000 or more people
+    who have installed it&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;With a free program there would not be a list of who has installed
+    it.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201907081"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many unscrupulous mobile-app developers keep finding ways to &lt;a
+    
href="https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"&gt;
+    bypass user's settings&lt;/a&gt;, regulations, and privacy-enhancing 
features
+    of the operating system, in order to gather as much private data as
+    they possibly can.&lt;/p&gt;
+
+    &lt;p&gt;Thus, we can't trust rules against spying.  What we can trust is
+    having control over the software we run.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201907080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many Android apps can track
+    users' movements even when the user says &lt;a
+    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"&gt;
+    not to allow them access to locations&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This involves an apparently unintentional weakness in Android,
+    exploited intentionally by malicious apps.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201905300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Femm &ldquo;fertility&rdquo; app is secretly a &lt;a
+    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"&gt;
+    tool for propaganda&lt;/a&gt; by natalist Christians.  It spreads distrust
+    for contraception.&lt;/p&gt;
+
+    &lt;p&gt;It snoops on users, too, as you must expect from nonfree
+    programs.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201905060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;BlizzCon 2019 imposed a &lt;a
+    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"&gt;
+    requirement to run a proprietary phone app&lt;/a&gt; to be allowed into
+    the event.&lt;/p&gt;
+
+    &lt;p&gt;This app is a spyware that can snoop on a lot of
+    sensitive data, including user's location and contact list, and has &lt;a
+    
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"&gt;
+    near-complete control&lt;/a&gt; over the phone.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201904131"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
+    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
+    available to employers and insurance companies&lt;/a&gt;. Even though the
+    data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
+    traced back to the woman who uses the app.&lt;/p&gt;
+
+    &lt;p&gt;This has harmful implications for women's rights to equal 
employment
+    and freedom to make their own pregnancy choices. Don't use
+    these apps, even if someone offers you a reward to do so. A
+    free-software app that does more or less the same thing without
+    spying on you is available from &lt;a
+    href="https://search.f-droid.org/?q=menstr"&gt;F-Droid&lt;/a&gt;, and &lt;a
+    
href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"&gt;
+    a new one is being developed&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201904130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google tracks the movements of Android phones and iPhones
+    running Google apps, and sometimes &lt;a
+    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves the data for years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
+    the location data to Google.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201903251"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many Android phones come with a huge number of &lt;a
+    <span 
class="removed"><del><strong>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20190326145122/https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;</em></ins></span>
+    preinstalled nonfree apps that have access to sensitive data without
+    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
+    the data, or pass it on to user-installed apps that have access to
+    the network but no direct access to the data. This results in massive
+    surveillance on which the user has absolutely no control.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201903201"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
+    
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data to third parties&lt;/a&gt;, which can use it
+    for invasive advertising or discriminating against people in poor
+    medical condition.&lt;/p&gt;
+
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
+    lengthy terms of service that are difficult to understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902230"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Facebook offered a convenient proprietary
+    library for building mobile apps, which also &lt;a
+    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
+    way and released them, apparently not realizing that all the personal
+    data they collected would go to Facebook as well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902140"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The AppCensus database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt; to other companies, and &lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry to take action. This proves
+    that the policies of a development platform are ineffective at
+    preventing nonfree software developers from including malware in
+    their programs.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902041.1"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
+    be on Google Play had one or more malicious functionalities, such as &lt;a
+    
href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"&gt;
+    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
+    pushing unwanted and often malicious ads on users, and redirecting
+    them to phishing sites that stole their credentials. Furthermore,
+    the user interface of most of them was designed to make uninstallation
+    difficult.&lt;/p&gt;
+
+    &lt;p&gt;Users should of course uninstall these dangerous apps if they
+    haven't yet, but they should also stay away from nonfree apps in
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
+    there is no easy way of knowing what they really do.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;An investigation of the 150 most popular
+    gratis VPN apps in Google Play found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail to protect their users' privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions in their
+    source code&mdash;often used for invasive advertising&mdash;that could
+    potentially also be used to spy on users. Other technical flaws were
+    found as well.&lt;/p&gt;
+
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
+    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(It is unfortunate that these articles talk about 
&ldquo;free
+    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
+    href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201901050"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Weather Channel app &lt;a
+    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    stored users' locations to the company's server&lt;/a&gt;. The company is
+    being sued, demanding that it notify the users of what it will do
+    with the data.&lt;/p&gt;
+
+    &lt;p&gt;We think that lawsuit is about a side issue. What the company does
+    with the data is a secondary issue. The principal wrong here is that
+    the company gets that data at all.&lt;/p&gt;
+
+    &lt;p&gt;&lt;a
+    
href="https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps"&gt;
+    Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
+    tracking people's locations.&lt;/p&gt; 
+  &lt;/li&gt;
+
+  &lt;li id="M201812290"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Around 40% of gratis Android apps &lt;a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities in the app; others only say that the user is
+    using that app, but that alone is often quite informative.&lt;/p&gt;
+
+    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    account.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810244"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201808030"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some Google apps on Android &lt;a
+    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record the user's location even when users disable &ldquo;location
+    tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;There are other ways to turn off the other kinds of location
+    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201806110"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Spanish football streaming app &lt;a
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
+
+    &lt;p&gt;We expect it implements DRM, too&mdash;that there is no way to 
save
+    a recording. But we can't be sure from the article.&lt;/p&gt;
+
+    &lt;p&gt;If you learn to care much less about sports, you will benefit in
+    many ways. This is one more.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201804160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;More than &lt;a
+    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of the 5,855 Android apps studied by researchers were found to snoop
+    and collect information about its users&lt;/a&gt;.  40% of the apps were
+    found to insecurely snitch on its users.  Furthermore, they could
+    detect only some methods of snooping, in these proprietary apps whose
+    source code they cannot look at.  The other apps might be snooping
+    in other ways.&lt;/p&gt;
+
+    &lt;p&gt;This is evidence that proprietary apps generally work against
+    their users.  To protect their privacy and freedom, Android users
+    need to get rid of the proprietary software&mdash;both proprietary
+    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    and the proprietary apps by getting apps from the free software
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
+    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201804020"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Grindr collects information about &lt;a
+    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
+    which users are HIV-positive, then provides the information to
+    companies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Grindr should not have so much information about its users.
+    It could be designed so that users communicate such info to each
+    other but not to the server's database.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201803050"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The moviepass app and dis-service
+    spy on users even more than users expected. It &lt;a
+    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li <span class="inserted"><ins><em>id="M201802280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Spotify app &lt;a
+    
href="https://www.sec.gov/Archives/edgar/data/1639920/000119312518063434/d494294df1.htm"&gt;harvests
+    users' data to personally identify and know people&lt;/a&gt; through music,
+    their mood, mindset, activities, and tastes. There are over 150
+    billion events logged daily on the program which contains users'
+    data and personal information.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li</em></ins></span> id="M201711240"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Tracking software in popular Android apps
+    is pervasive and sometimes very clever. Some trackers can &lt;a
+    
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+    follow a user's movements around a physical store by noticing WiFi
+    networks&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201708270"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Sarahah app &lt;a
+    
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+    uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+    book to developer's server.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses the words
+    &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+    referring to zero price.)&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201707270"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;20 dishonest Android apps recorded &lt;a
+    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
+    worked in various ways to prevent that, and deleted these apps after
+    discovering what they did. So we cannot blame Google specifically
+    for the snooping of these apps.&lt;/p&gt;
+
+    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
+    therefore shares in the responsibility for the injustice of their being
+    nonfree. It also distributes its own nonfree apps, such as Google Play,
+    &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
+    are malicious&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Could Google have done a better job of preventing apps from
+    cheating? There is no systematic way for Google, or Android users,
+    to inspect executable proprietary apps to see what they do.&lt;/p&gt;
+
+    &lt;p&gt;Google could demand the source code for these apps, and study
+    the source code somehow to determine whether they mistreat users in
+    various ways. If it did a good job of this, it could more or less
+    prevent such snooping, except when the app developers are clever
+    enough to outsmart the checking.&lt;/p&gt;
+
+    &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
+    Google to protect us. We must demand release of source code to the
+    public, so we can depend on each other.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201705230"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apps for BART &lt;a
+    
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
+    snoop on users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
+    don't snoop.&lt;/p&gt;
+
+    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201705040"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
+    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+    to ultrasound from beacons placed in stores or played by TV
+    programs&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201704260"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
+    
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+    how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201704190"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Users are suing Bose for &lt;a
+    
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+    distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
+    the app would record the names of the audio files users listen to
+    along with the headphone's unique serial number.&lt;/p&gt;
+
+    &lt;p&gt;The suit accuses that this was done without the users' consent.
+    If the fine print of the app said that users gave consent for this,
+    would that make it acceptable? No way! It should be flat out &lt;a
+    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
+    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201704074"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Pairs of Android apps can collude
+    to transmit users' personal data to servers. &lt;a
+    
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
+    study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201703300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Verizon &lt;a
+    
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
+    on some of its phones. The app will give Verizon the same information
+    about the users' searches that Google normally gets when they use
+    its search engine.&lt;/p&gt;
+
+    &lt;p&gt;Currently, the app is &lt;a
+    
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and the user must
+    explicitly opt-in before the app takes effect. However, the app
+    remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201701210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Meitu photo-editing app &lt;a
+    
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201611280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Uber app tracks &lt;a
+    
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+    movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This example illustrates how &ldquo;getting the user's
+    consent&rdquo; for surveillance is inadequate as a protection against
+    massive surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201611160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A &lt;a
+    
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+    research paper&lt;/a&gt; that investigated the privacy and security of
+    283 Android VPN apps concluded that &ldquo;in spite of the promises
+    for privacy, security, and anonymity given by the majority of VPN
+    apps&mdash;millions of users may be unawarely subject to poor security
+    guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
+    of some proprietary VPN apps that track users and infringe their
+    privacy:&lt;/p&gt;
+
+    &lt;dl class="compact"&gt;
+      &lt;dt&gt;SurfEasy&lt;/dt&gt;
+      &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
+      meant to track users and show them targeted ads.&lt;/dd&gt;
+
+      &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
+      &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
+      permissions upon installation, meaning it has full access to users'
+      text messages.&lt;/dd&gt;
+
+      &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
+      &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
+      for other apps and also core system logs. TigerVPN developers have
+      confirmed this.&lt;/dd&gt;
+
+      &lt;dt&gt;HideMyAss&lt;/dt&gt;
+      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs and
+      may turn them over to the UK government if requested.&lt;/dd&gt;
+
+      &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
+      &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
+      users. The stated purpose of the JS injection is to display ads. Uses
+      roughly five tracking libraries. Also, it redirects the user's
+      traffic through valueclick.com (an advertising website).&lt;/dd&gt;
+
+      &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
+      five tracking libraries. Developers of this app have confirmed that
+      the non-premium version of the app does JavaScript injection for
+      tracking the user and displaying ads.&lt;/dd&gt;
+    &lt;/dl&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201609210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google's new voice messaging app &lt;a
+    
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+    all conversations&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201606050"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Facebook's new Magic Photo app &lt;a
+    
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+    scans your mobile phone's photo collections for known faces&lt;/a&gt;,
+    and suggests you circulate the picture you take according to who is
+    in the frame.&lt;/p&gt;
+
+    &lt;p&gt;This spyware feature seems to require online access to some
+    known-faces database, which means the pictures are likely to be
+    sent across the wire to Facebook's servers and face-recognition
+    algorithms.&lt;/p&gt;
+
+    &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
+    even if the user didn't &ldquo;upload&rdquo; them to the service.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201605310"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Facebook's app listens all the time, &lt;a
+    
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html"&gt;to
+    snoop on what people are listening to or watching&lt;/a&gt;. In addition,
+    it may be analyzing people's conversations to serve them with targeted
+    advertisements.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201604250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A pregnancy test controller application not only can &lt;a
+    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
+    spy on many sorts of data in the phone, and in server accounts,
+    it can alter them too&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201601130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Apps that include &lt;a
+    
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+    Symphony surveillance software snoop on what radio and TV programs
+    are playing nearby&lt;/a&gt;.  Also on what users post on various sites
+    such as Facebook, Google+ and Twitter.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511190"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
+    unrelated to the app's functionality, was &lt;a
+    
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+    found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article should not have described these apps as
+    &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
+    to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;The article takes for granted that the usual analytics tools are
+    legitimate, but is that valid? Software developers have no right to
+    analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
+    that snoop are just as wrong as any other snooping.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201510300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;More than 73% and 47% of mobile applications, for Android and iOS
+    respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;hand 
over
+    personal, behavioral and location information&lt;/a&gt; of their users to
+    third parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201508210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, Spotify is
+    based on proprietary malware (DRM and snooping). In August 2015 it &lt;a
+    
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+    demanded users submit to increased snooping&lt;/a&gt;, and some are 
starting
+    to realize that it is nasty.&lt;/p&gt;
+
+    &lt;p&gt;This article shows the &lt;a
+    
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+    twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
+    users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
+    typical example of the attitude of the proprietary software industry
+    towards those they have subjugated.&lt;/p&gt;
+
+    &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201506264"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf"&gt;
+    A study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis 
proprietary
+    Android apps contained recognizable tracking libraries. For the paid
+    proprietary apps, it was only 60%.&lt;/p&gt;
+
+    &lt;p&gt;The article confusingly describes gratis apps as
+    &ldquo;free&rdquo;, but most of them are not in fact &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
+    ugly word &ldquo;monetize&rdquo;. A good replacement for that word
+    is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201505060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Gratis Android apps (but not &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
+    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
+    and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201504060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Widely used &lt;a
+    
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+    QR-code scanner apps snoop on the user&lt;/a&gt;. This is in addition to
+    the snooping done by the phone company, and perhaps by the OS in
+    the phone.&lt;/p&gt;
+
+    &lt;p&gt;Don't be distracted by the question of whether the app developers
+    get users to say &ldquo;I agree&rdquo;. That is no excuse for
+    malware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201411260"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many proprietary apps for mobile devices
+    report which other apps the user has installed.  &lt;a
+    href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way that at least is visible and optional&lt;/a&gt;. Not
+    as bad as what the others do.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201401150.1"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Simeji keyboard is a smartphone version of Baidu's &lt;a
+    href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying 
&lt;abbr
+    title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201312270"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The nonfree Snapchat app's principal purpose is to restrict the
+    use of data on the user's computer, but it does surveillance too: &lt;a
+    
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+    it tries to get the user's list of other people's phone
+    numbers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201312060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Brightest Flashlight app &lt;a
+    
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+    sends user data, including geolocation, for use by 
companies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The FTC criticized this app because it asked the user to
+    approve sending personal data to the app developer but did not ask
+    about sending it to other companies.  This shows the weakness of
+    the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
+    surveillance: why should a flashlight app send any information to
+    anyone? A free software flashlight app would not.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201212100"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;FTC says most mobile apps for children don't respect privacy: 
&lt;a
+    
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201908151"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Skype refuses to say whether it can &lt;a
+    
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"&gt;eavesdrop
+    on calls&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That almost certainly means it can do so.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201307110"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Skype contains &lt;a
+    
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
+    Microsoft changed Skype &lt;a
+    
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+    specifically for spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInGames"&gt;Games&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202010221"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Microsoft is imposing its
+    surveillance on the game of Minecraft by &lt;a
+    
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java"&gt;requiring
+    every player to open an account on Microsoft's network&lt;/a&gt;. Microsoft
+    has bought the game and will merge all accounts into its network,
+    which will give them access to people's data.&lt;/p&gt;
+
+    &lt;p&gt;Minecraft players &lt;a
+    href="https://directory.fsf.org/wiki/Minetest"&gt;can play 
Minetest&lt;/a&gt;
+    instead. The essential advantage of Minetest is that it is free
+    software, meaning it respects the user's computer freedom. As a bonus,
+    it offers more options.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201908210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Microsoft recorded users of Xboxes and had &lt;a
+    
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"&gt;
+    human workers listen to the recordings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Morally, we see no difference between having human workers listen 
and
+    having speech-recognition systems listen.  Both intrude on 
privacy.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201806240"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Red Shell is a spyware that
+    is found in many proprietary games. It &lt;a
+    
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
+    tracks data on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201804144"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;ArenaNet surreptitiously installed a spyware
+    program along with an update to the massive
+    multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
+    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
+    to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711070"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The driver for a certain gaming keyboard &lt;a
+    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
+    information to China&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201512290"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many &lt;a
+    
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+    video game consoles snoop on their users and report to the
+    internet&lt;/a&gt;&mdash;even what their users weigh.&lt;/p&gt;
+
+    &lt;p&gt;A game console is a computer, and you can't trust a computer with
+    a nonfree operating system.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201509160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Modern gratis game cr&hellip;apps &lt;a
+    
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+    collect a wide range of data about their users and their users'
+    friends and associates&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even nastier, they do it through ad networks that merge the data
+    collected by various cr&hellip;apps and sites made by different
+    companies.&lt;/p&gt;
+
+    &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
+    &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
+    use a back door to manipulate the game play for specific players.&lt;/p&gt;
+
+    &lt;p&gt;While the article describes gratis games, games that cost money
+    can use the same tactics.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201401280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Angry Birds &lt;a
+    
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+    spies for companies, and the NSA takes advantage
+    to spy through it too&lt;/a&gt;.  Here's information on &lt;a
+    
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+    more spyware apps&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;&lt;a
+    
href="https://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M200510200"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2005-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Blizzard Warden is a hidden
+    &ldquo;cheating-prevention&rdquo; program that &lt;a
+    href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
+    spies on every process running on a gamer's computer and sniffs a
+    good deal of personal data&lt;/a&gt;, including lots of activities which
+    have nothing to do with cheating.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202101050"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Most Internet connected devices in Mozilla's &lt;a
+    
href="https://foundation.mozilla.org/en/privacynotincluded"&gt;&ldquo;Privacy
+    Not Included&rdquo;&lt;/a&gt; list &lt;a
+    
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell"&gt;are
+    designed to snoop on users&lt;/a&gt; even if they meet
+    Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
+    design of the program running on some of these devices &lt;a
+    
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster"&gt;makes
+    the user susceptible to be snooped and exploited by crackers as
+    well&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201708280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
+    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(It is unfortunate that the article uses the term 
&lt;a
+    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;TV Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202010282"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;TV manufacturers are turning to produce only
+    &ldquo;Smart&rdquo; TV sets (which include spyware) that &lt;a
+    href="https://frame.work/blog/in-defense-of-dumb-tvs"&gt;it's now very
+    hard to find a TV that doesn't spy on you&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;It appears that those manufacturers business model is not to 
produce
+    TV and sell them for money, but to collect your personal data and
+    (possibly) hand over them to others for benefit.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202006250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;TV manufacturers are able to &lt;a
+    
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/"&gt;snoop
+    every second of what the user is watching&lt;/a&gt;. This is illegal due to
+    the Video Privacy Protection Act of 1988, but they're circumventing
+    it through EULAs.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201901070"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Vizio TVs &lt;a
+    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
+    CTO, and this data is sold to third parties. This is in return for
+    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
+    lower retail prices.&lt;/p&gt;
+
+    &lt;p&gt;What is supposed to make this spying acceptable, according to him,
+    is that it is opt-in in newer models. But since the Vizio software is
+    nonfree, we don't know what is actually happening behind the scenes,
+    and there is no guarantee that all future updates will leave the
+    settings unchanged.&lt;/p&gt;
+
+    &lt;p&gt;If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV, for that
+    matter), the easiest way to make sure it isn't spying on you is
+    to disconnect it from the Internet, and use a terrestrial antenna
+    instead. Unfortunately, this is not always possible. Another option,
+    if you are technically oriented, is to get your own router (which can
+    be an old computer running completely free software), and set up a
+    firewall to block connections to Vizio's servers. Or, as a last resort,
+    you can replace your TV with another model.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201804010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
+    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;We link to the article for the facts it presents. It
+    is too bad that the article finishes by advocating the
+    moral weakness of surrendering to Netflix. The Netflix app &lt;a
+    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    malware too&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201702060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
+    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them, and not just broadcasts and
+    cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
+    the TV reports what it is. The existence of a way to disable the
+    surveillance, even if it were not hidden as it was in these TVs,
+    does not legitimize the surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some web and TV advertisements play inaudible
+    sounds to be picked up by proprietary malware running
+    on other devices in range so as to determine that they
+    are nearby.  Once your Internet devices are paired with
+    your TV, advertisers can correlate ads with Web activity, and other &lt;a
+    
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
+    cross-device tracking&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Vizio goes a step further than other TV
+    manufacturers in spying on their users: their &lt;a
+    
href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
+    link them your IP address&lt;/a&gt; so that advertisers can track you
+    across devices.&lt;/p&gt;
+
+    &lt;p&gt;It is possible to turn this off, but having it enabled by default
+    is an injustice already.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511020"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
+    to the 600 millions social media profiles the company
+    already monitors. Tivo customers are unaware they're
+    being watched by advertisers. By combining TV viewing
+    information with online social media participation, Tivo can now &lt;a
+    href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+    correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
+    users to new combined surveillance by default.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201507240"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
+    href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
+    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201505290"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Verizon cable TV &lt;a
+    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops on what programs people watch, and even what they wanted to
+    record&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201504300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Vizio &lt;a
+    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
+    users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201502090"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
+    <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;</em></ins></span>
+    transmits users' voice on the internet to another company, 
Nuance&lt;/a&gt;.
+    Nuance can save it and would then have to give it to the US or some
+    other government.&lt;/p&gt;
+
+    &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
+    software in your own computer.&lt;/p&gt;
+
+    &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
+    
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
+    data containing sensitive information will be transmitted to third
+    parties&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201411090"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
+    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
+    snooping all the time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201409290"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
+    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+    on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got
+    better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products to get users' formal
+    consent before collecting personal data are totally inadequate.
+    And what happens if a user declines consent? Probably the TV will
+    say, &ldquo;Without your consent to tracking, the TV will not
+    work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
+    user watches&mdash;no exceptions!&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201405200"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
+    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what the user watches, and the switch to turn this off has
+    no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
+    really means nothing; the server could save that data anyway.)&lt;/p&gt; 
+
+    &lt;p&gt;Even worse, it &lt;a
+    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;LG later said it had installed a patch to stop this, but any
+    product could spy this way.&lt;/p&gt;
+
+    &lt;p&gt;Meanwhile, LG TVs &lt;a
+    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201212170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p id="break-security-smarttv"&gt;&lt;a
+    
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
+    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
+    and use its camera to watch the people who are watching TV.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201901100"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
+    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send the video they capture to Amazon servers&lt;/a&gt;, which save it
+    long-term.&lt;/p&gt;
+
+    &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
+    passes by, the user's front door.&lt;/p&gt;
+
+    &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
+    at the videos freely.  It appears Amazon has tried to prevent that
+    secondary abuse, but the primary abuse&mdash;that Amazon gets the
+    video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
+    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give the manufacturer an unencrypted copy of everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
+    name!&lt;/p&gt;
+
+    &lt;p&gt;When Consumer Reports tested them, it suggested that these
+    manufacturers promise not to look at what's in the videos. That's not
+    security for your home. Security means making sure they don't get to
+    see through your camera.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201603220"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
+    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
+    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
+    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
+    to outsmart you.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201711244"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Furby Connect has a &lt;a
+    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
+    listening device, remote changes to the code could surely convert it
+    into one.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711100"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A remote-control sex toy was found to make &lt;a
+    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201703140"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A computerized vibrator &lt;a
+    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
+    minute (thus, indirectly, whether it was surrounded by a person's
+    body), as well as the vibration frequency.&lt;/p&gt;
+
+    &lt;p&gt;Note the totally inadequate proposed response: a labeling
+    standard with which manufacturers would make statements about their
+    products, rather than free software which users could have checked
+    and changed.&lt;/p&gt;
+
+    &lt;p&gt;The company that made the vibrator &lt;a
+    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+    was sued for collecting lots of personal information about how people
+    used it&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The company's statement that it was anonymizing the data may be
+    true, but it doesn't really matter. If it had sold the data to a data
+    broker, the data broker would have been able to figure out who the
+    user was.&lt;/p&gt;
+
+    &lt;p&gt;Following this lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
+    customers.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201702280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
+    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
+    
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found a way to access the data&lt;/a&gt; collected by the
+    manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That the manufacturer and the FBI could listen to these
+    conversations was unacceptable by itself.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201612060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
+    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
+    company based in the U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+    can remotely control the toys with a mobile phone. This would enable
+    crackers to listen in on a child's speech, and even speak into the
+    toys themselves.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201502180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Barbie &lt;a
+    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201708040"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;While you're using a DJI drone
+    to snoop on other people, DJI is in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    on you&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202009270"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many employers are using nonfree
+    software, including videoconference software, to &lt;a
+    
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"&gt;
+    surveil and monitor staff working at home&lt;/a&gt;. If the program reports
+    whether you are &ldquo;active,&rdquo; that is in effect a malicious
+    surveillance feature.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202008030"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google Nest &lt;a
+    
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"&gt;
+    is taking over ADT&lt;/a&gt;. Google sent out a software
+    update to its speaker devices using their back door &lt;a
+    href="https://www.protocol.com/google-smart-speaker-alarm-adt"&gt; that
+    listens for things like smoke alarms&lt;/a&gt; and then notifies your phone
+    that an alarm is happening. This means the devices now listen for more
+    than just their wake words. Google says the software update was sent
+    out prematurely and on accident and Google was planning on disclosing
+    this new feature and offering it to customers who pay for it.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202006300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&ldquo;Bossware&rdquo; is malware that bosses &lt;a
+    
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"&gt;
+    coerce workers into installing in their own computers&lt;/a&gt;, so the
+    bosses can spy on them.&lt;/p&gt;
+
+    &lt;p&gt;This shows why requiring the user's &ldquo;consent&rdquo; is not
+    an adequate basis for protecting digital privacy.  The boss can coerce
+    most workers into consenting to almost anything, even probable exposure
+    to contagious disease that can be fatal.  Software like this should
+    be illegal and bosses that demand it should be prosecuted for it.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201911190"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Internet-tethered Amazon Ring had
+    a security vulnerability that enabled attackers to &lt;a
+    
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"&gt;
+    access the user's wifi password&lt;/a&gt;, and snoop on the household
+    through connected surveillance devices.&lt;/p&gt;
+
+    &lt;p&gt;Knowledge of the wifi password would not be sufficient to carry
+    out any significant surveillance if the devices implemented proper
+    security, including encryption. But many devices with proprietary
+    software lack this. Of course, they are also used by their
+    manufacturers for snooping.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201907210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google &ldquo;Assistant&rdquo; records users' conversations &lt;a
+    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/"&gt;even
+    when it is not supposed to listen&lt;/a&gt;. Thus, when one of Google's
+    subcontractors discloses a thousand confidential voice recordings,
+    users were easily identified from these recordings.&lt;/p&gt;
+
+    &lt;p&gt;Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is no
+    way to see or control what it records or sends.&lt;/p&gt;
+
+    &lt;p&gt;Rather than trying to better control the use of recordings, Google
+    should not record or listen to the person's voice.  It should only
+    get commands that the user wants to send to some Google service.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201905061"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Amazon Alexa collects a lot more information from users
+    than is necessary for correct functioning (time, location,
+    recordings made without a legitimate prompt), and sends
+    it to Amazon's servers, which store it indefinitely. Even
+    worse, Amazon forwards it to third-party companies. Thus,
+    even if users request deletion of their data from Amazon's servers, &lt;a
+    
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"&gt;
+    the data remain on other servers&lt;/a&gt;, where they can be accessed by
+    advertising companies and government agencies. In other words,
+    deleting the collected information doesn't cancel the wrong of
+    collecting it.&lt;/p&gt;
+
+    &lt;p&gt;Data collected by devices such as the Nest thermostat, the Philips
+    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
+    speakers are likewise stored longer than necessary on the servers
+    the devices are tethered to. Moreover, they are made available to
+    Alexa. As a result, Amazon has a very precise picture of users' life
+    at home, not only in the present, but in the past (and, who knows,
+    in the future too?)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201904240"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
+    voice assistants do similar things.&lt;/p&gt;
+
+    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
+    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
+    location and other personal data&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Since the client program is nonfree, and data processing is done
+    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
+    the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
+    tell you how and where it's done&rdquo;), users have no way
+    to know what happens to the recordings unless human eavesdroppers &lt;a
+    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
+    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902080"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The HP &lt;a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
+    communicates with HP servers&lt;/a&gt; to make sure the user is still
+    paying for the subscription, and hasn't printed more pages than were
+    paid for.&lt;/p&gt;
+
+    &lt;p&gt;Even though the ink subscription program may be cheaper in some
+    specific cases, it spies on users, and involves totally unacceptable
+    restrictions in the use of ink cartridges that would otherwise be in
+    working order.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201808120"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
+    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
+
+    &lt;p&gt;It was very difficult for them to do this. The job would be much
+    easier for Amazon. And if some government such as China or the US
+    told Amazon to do this, or cease to sell the product in that country,
+    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(These crackers are probably hackers too, but please 
&lt;a
+    href="https://stallman.org/articles/on-hacking.html"&gt; don't use
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.)&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201804140"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A medical insurance company &lt;a
+    
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
+    offers a gratis electronic toothbrush that snoops on its user by
+    sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201706204"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
+    
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
+    listen to everyone in the house, all the time&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Today's technological practice does not include any way of making
+    a device that can obey your voice commands without potentially spying
+    on you.  Even if it is air-gapped, it could be saving up records
+    about you for later examination.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201407170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
+    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
+    data about the user&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201310260"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+    Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201807260"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Tommy Hilfiger clothing &lt;a
+    
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
+    monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This will teach the sheeple to find it normal that companies
+    monitor every aspect of what they do.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h5 id="SpywareOnSmartWatches"&gt;&ldquo;Smart&rdquo; Watches&lt;/h5&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202009100"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Internet-enabled watches with proprietary software
+    are malware, violating people (specially children's)
+    privacy. In addition, they have a lot of security flaws. They &lt;a
+    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"&gt;
+    permit security breakers (and unauthorized people) to access&lt;/a&gt; the 
watch.&lt;/p&gt;
+
+    &lt;p&gt;Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages to and from the 
watch, possibly endangering the child.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;(Note that this article misuses the word &ldquo;&lt;a
+    href="/philosophy/words-to-avoid.html#Hacker"&gt;hackers&lt;/a&gt;&rdquo;
+    to mean &ldquo;crackers.&rdquo;)&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201603020"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
+    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+    that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article says this is a back door, but that could be a
+    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201407090"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
+    
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+    to report its location to someone else and to transmit conversations
+    too&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202105130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    href="https://gizmodo.com/get-ready-for-in-car-ads-1846888390"&gt;Ford
+    is planning to force ads on drivers in cars&lt;/a&gt;, with the ability for
+    the owner to pay extra to turn them off. The system probably imposes
+    surveillance on drivers too.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202008181"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;New Toyotas will &lt;a
+    href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/"&gt;
+    upload data to AWS to help create custom insurance premiums&lt;/a&gt;
+    based on driver behaviour.&lt;/p&gt;
+
+    &lt;p&gt;Before you buy a &ldquo;connected&rdquo; car, make sure you can
+    disconnect its cellular antenna and its GPS antenna.  If you want
+    GPS navigation, get a separate navigator which runs free software
+    and works with Open Street Map.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201912171"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Most modern cars now &lt;a
+    
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"&gt;
+    record and send various kinds of data to the manufacturer&lt;/a&gt;. For
+    the user, access to the data is nearly impossible, as it involves
+    cracking the car's computer, which is always hidden and running with
+    proprietary software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201903290"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Tesla cars collect lots of personal data, and &lt;a
+    
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
+    when they go to a junkyard the driver's personal data goes with
+    them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902011"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
+    
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
+    near-complete access to the internal car network&lt;/a&gt;. It is 
constantly
+    connected to the cellular phone network and sends Ford a lot of data,
+    including car location. This feature operates even when the ignition
+    key is removed, and users report that they can't disable it.&lt;/p&gt;
+
+    &lt;p&gt;If you own one of these cars, have you succeeded in breaking the
+    connectivity by disconnecting the cellular modem, or wrapping the
+    antenna in aluminum foil?&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201811300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;In China, it is mandatory for electric
+    cars to be equipped with a terminal that &lt;a
+    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+    transfers technical data, including car location,
+    to a government-run platform&lt;/a&gt;. In practice, &lt;a
+    href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
+    manufacturers collect this data&lt;/a&gt; as part of their own spying, then
+    forward it to the government-run platform.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810230"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;GM &lt;a
+    href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
+    tracked the choices of radio programs&lt;/a&gt; in its
+    &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
+
+    &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
+    sneaking it into the contract that users sign for some digital service
+    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
+
+    &lt;p&gt;The cars can also collect lots of other data: listening to you,
+    watching you, following your movements, tracking passengers' cell
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
+
+    &lt;p&gt;But if you really want to be safe, we must make sure the car's
+    hardware cannot collect any of that data, or that the software
+    is free so we know it won't collect any of that data.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711230"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;AI-powered driving apps can &lt;a
+    
href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    track your every move&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201607160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p id="car-spying"&gt;Computerized cars with nonfree software are &lt;a
+    
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+    snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201602240"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
+    cell phone modem which allows effectively anyone to &lt;a
+    href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
+    access its computers remotely and make changes in various
+    settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy to do because the system has no authentication
+    when accessed through the modem.  However, even if it asked
+    for authentication, you couldn't be confident that Nissan
+    has no access.  The software in the car is proprietary, &lt;a
+    href="/philosophy/free-software-even-more-important.html"&gt;which means
+    it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects to the car remotely, the cell phone modem
+    enables the phone company to track the car's movements all the time;
+    it is possible to physically remove the cell phone modem, though.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201306140"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Tesla cars allow the company to extract
+    data remotely and determine the car's location
+    at any time. (See Section 2, paragraphs b and c of the &lt;a
+    
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+    privacy statement&lt;/a&gt;.) The company says it doesn't store this
+    information, but if the state orders it to get the data and hand it
+    over, the state can store it.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201303250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p id="records-drivers"&gt;Proprietary software in cars &lt;a
+    
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
+    records information about drivers' movements&lt;/a&gt;, which is made
+    available to car manufacturers, insurance companies, and others.&lt;/p&gt;
+
+    &lt;p&gt;The case of toll-collection systems, mentioned in this article,
+    is not really a matter of proprietary surveillance. These systems
+    are an intolerable invasion of privacy, and should be replaced with
+    anonymous payment systems, but the invasion isn't done by malware. The
+    other cases mentioned are done by proprietary malware in the car.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVR"&gt;Virtual Reality&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVR"&gt;#SpywareInVR&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M202008182"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Oculus headsets &lt;a
+    
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october"&gt;require
+    users to identify themselves to Facebook&lt;/a&gt;. This will give Facebook
+    free rein to pervasively snoop on Oculus users.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201612230"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;VR equipment, measuring every slight motion,
+    creates the potential for the most intimate
+    surveillance ever. All it takes to make this potential real &lt;a
+    
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
+    software as malicious as many other programs listed in this
+    page&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;You can bet Facebook will implement the maximum possible
+    surveillance on Oculus Rift devices. The moral is, never trust a VR
+    system with nonfree software in it.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheWeb"&gt;Spyware on the Web&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheWeb"&gt;#SpywareOnTheWeb&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;p&gt;In addition, many web sites spy on their visitors.  Web sites are not
+   programs, so it
+   &lt;a href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
+   makes no sense to call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;&lt;/a&gt;,
+   but the surveillance is an abuse all the same.&lt;/p&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201904210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;As of April 2019, it is &lt;a
+    
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"&gt;no
+    longer possible to disable an
+    unscrupulous tracking anti-feature&lt;/a&gt; that &lt;a
+    
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing"&gt;reports
+    users when they follow ping links&lt;/a&gt; in Apple Safari, Google Chrome,
+    Opera, Microsoft Edge and also in the upcoming Microsoft Edge that is
+    going to be based on Chromium.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201901101"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
+    
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
+    sent the precise GPS location to Twitter's server&lt;/a&gt;. It still
+    contains these GPS locations.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201805170"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Storyful program &lt;a
+    
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies
+    on the reporters that use it&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201701060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-01&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;When a page uses Disqus
+    for comments, the proprietary Disqus software &lt;a
+    
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;loads
+    a Facebook software package into the browser of every anonymous visitor
+    to the page, and makes the page's URL available to 
Facebook&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201612064"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Online sales, with tracking and surveillance of customers, &lt;a
+    
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
+    businesses to show different people different prices&lt;/a&gt;. Most of
+    the tracking is done by recording interactions with servers, but
+    proprietary software contributes.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201405140"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2014-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
+    Microsoft SkyDrive allows the NSA to directly examine users'
+    data&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201210240"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many web sites rat their visitors to advertising
+    networks that track users.  Of the top 1000 web sites, &lt;a
+    
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
+    (as of 5/17/2012) fed their visitors third-party cookies, allowing
+    other sites to track them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201208210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many web sites report all their visitors
+    to Google by using the Google Analytics service, which &lt;a
+    
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
+    tells Google the IP address and the page that was 
visited&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201200000"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;[2012]&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many web sites try to collect users' address books (the user's 
list
+    of other people's phone numbers or email addresses).  This violates
+    the privacy of those other people.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201110040"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2011-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons &lt;a
+    
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
+    enable Facebook to track visitors to those pages&lt;/a&gt;&mdash;even users
+    that don't have Facebook accounts.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInJavaScript"&gt;JavaScript&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInJavaScript"&gt;#SpywareInJavaScript&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201811270"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Many web sites use JavaScript code &lt;a
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
+    to snoop on information that users have typed into a
+    form but not sent&lt;/a&gt;, in order to learn their identity. Some are 
&lt;a
+    
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege"&gt;
+    getting sued&lt;/a&gt; for this.&lt;/p&gt;
+
+    &lt;p&gt;The chat facilities of some customer services use the same sort of
+    malware to &lt;a
+    
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119"&gt;
+    read what the user is typing before it is posted&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201807190"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;British Airways used &lt;a
+    
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
+    JavaScript on its web site to give other companies personal data on
+    its customers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201712300"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some JavaScript malware &lt;a
+    
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
+    swipes usernames from browser-based password managers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711150"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-11&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Some websites send
+    JavaScript code to collect all the user's input, &lt;a
+    
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
+    can then be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
+    code.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInFlash"&gt;Flash&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201310110"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Flash and JavaScript are used for &lt;a
+    
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
+    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt; to identify users.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201003010"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2010-03&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Flash Player's &lt;a
+    
href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/"&gt;
+    cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInChrome"&gt;Chrome&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li <span class="inserted"><ins><em>id="M202109210"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google's proprietary Chrome web browser &lt;a
+    
href="https://www.techrepublic.com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"&gt;
+    added a surveillance API (idle detection API)&lt;/a&gt; which lets
+    websites ask Chrome to report when a user with a web page open is
+    idle.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li</em></ins></span> id="M201906220"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google Chrome is an &lt;a
+    
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/"&gt;
+    instrument of surveillance&lt;/a&gt;. It lets thousands of trackers invade
+    users' computers and report the sites they visit to advertising and
+    data companies, first of all to Google. Moreover, if users have a
+    Gmail account, Chrome automatically logs them in to the browser for
+    more convenient profiling. On Android, Chrome also reports their
+    location to Google.&lt;/p&gt;
+
+    &lt;p&gt;The best way to escape surveillance is to switch to &lt;a
+    href="/software/icecat/"&gt;IceCat&lt;/a&gt;, a modified version of Firefox
+    with several changes to protect users' privacy.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201704131"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2017-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Low-priced Chromebooks for schools are &lt;a
+    href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
+    collecting far more data on students than is necessary, and store
+    it indefinitely&lt;/a&gt;. Parents and students complain about the lack
+    of transparency on the part of both the educational services and the
+    schools, the difficulty of opting out of these services, and the lack
+    of proper privacy policies, among other things.&lt;/p&gt;
+
+    &lt;p&gt;But complaining is not sufficient. Parents, students and teachers
+    should realize that the software Google uses to spy on students is
+    nonfree, so they can't verify what it really does. The only remedy is
+    to persuade school officials to &lt;a 
href="/education/edu-schools.html"&gt;
+    exclusively use free software&lt;/a&gt; for both education and school
+    administration. If the school is run locally, parents and teachers
+    can mandate their representatives at the School Board to refuse the
+    budget unless the school initiates a switch to free software. If
+    education is run nation-wide, they need to persuade legislators
+    (e.g., through free software organizations, political parties,
+    etc.) to migrate the public schools to free software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201507280"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-07&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google Chrome makes it easy for an extension to do &lt;a
+    
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
+    snooping on the user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201506180"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2015-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google Chrome includes a module that &lt;a
+    
href="https://www.privateinternetaccess.com/blog/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
+    activates microphones and transmits audio to its 
servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201308040"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2013-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google Chrome &lt;a
+    href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"&gt;
+    spies on browser history, affiliations&lt;/a&gt;, and other installed
+    software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M200809060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2008-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google Chrome contains a key logger that &lt;a
+    
href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
+    sends Google every URL typed in&lt;/a&gt;, one key at a time.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareInNetworks"&gt;Spyware in Networks&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInNetworks"&gt;#SpywareInNetworks&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li <span class="inserted"><ins><em>id="M202110250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-10&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Ed Tech companies use their surveillance power to
+    manipulate students, and direct them into tracks towards various
+    levels of knowledge, power and prestige. The article argues that &lt;a
+    
href="https://blogs.lse.ac.uk/medialse/2021/10/25/algorithmic-injustice-in-education-why-tech-companies-should-require-a-license-to-operate-in-childrens-education/"&gt;these
+    companies should obtain licenses to operate&lt;/a&gt;. That wouldn't hurt,
+    but it doesn't address the root of the problem. All data acquired
+    in a school about any student, teacher, or employee must not leave
+    the school, and must be kept in computers that belong to the school
+    and run free (as in freedom) software. That way, the school district
+    and/or parents can control what is done with those data.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li</em></ins></span> id="M202105060"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://me2ba.org/me2ba-product-testing-spotlight-report-published-data-sharing-in-primary-secondary-school-mobile-apps-2/"&gt;60%
+    of school apps are sending student data to potentially high-risk
+    third parties&lt;/a&gt;, putting students and possibly all other school
+    workers under surveillance. This is made possible by using unsafe
+    and proprietary programs made by data-hungry corporations.&lt;/p&gt;
+
+    &lt;p&gt;&lt;small&gt;Please note that whether students consent to this or 
not,
+    doesn't justify the surveillance they're imposed 
to.&lt;/small&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202105030"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The United States' government is reportedly considering &lt;a
+    
href="https://www.infosecurity-magazine.com/news/private-companies-may-spy-on/"&gt;teaming
+    up with private companies to monitor American citizens' private online
+    activity and digital communications&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;What creates the opportunity to try this is the fact that these
+    companies are already snooping on users' private activities. That
+    in turn is due to people's use of nonfree software which snoops,
+    and online dis-services which snoop.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202102160"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2021-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google &lt;a
+    
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16"&gt;handed
+    over personal data of Indian protesters and activists to Indian
+    police&lt;/a&gt; which led to their arrest. The cops requested the IP
+    address and the location where a document was created and with that
+    information, they identified protesters and activists.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202012250"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The HonorLock online exam
+    proctoring program is a surveillance tool that &lt;a
+    
href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps"&gt;tracks
+    students and collects data&lt;/a&gt; such as face, driving license, and
+    network information, among others, in blatant violation of students'
+    privacy.&lt;/p&gt;
+
+    &lt;p&gt;Preventing students from cheating should not be an excuse for
+    running malware/spyware on their computers, and it's good that students
+    are protesting. But their petitions overlook a crucial issue, namely,
+    the injustice of being forced to run nonfree software in order to
+    get an education.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202009070"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-09&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;While the world is still
+    struggling with COVID-19 coronavirus, many &lt;a
+    
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/"&gt;people
+    are in danger of surveillance&lt;/a&gt; and their computers are infected
+    with malware as a result of installing proprietary software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M202004301"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2020-04&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Proprietary programs Google Meet, Microsoft Teams, and WebEx &lt;a
+    
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/"&gt;are
+    collecting user's personal and identifiable data&lt;/a&gt; including how 
long
+    a call lasts, who's participating in the call, and the IP addresses
+    of everyone taking part. From experience, this can even harm users
+    physically if those companies hand over data to governments.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201905281"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-05&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Microsoft &lt;a
+    
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08"&gt;forces
+    people to give their phone number&lt;/a&gt; in order to be able to create 
an account on
+    the company's network. On top of mistreating their users by providing
+    nonfree software, Microsoft is tracking their lives outside the computer 
and
+    violates their privacy.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902040"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2019-02&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Google invites people to &lt;a
+    
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss"&gt;
+    let Google monitor their phone use, and all internet use in their
+    homes, for an extravagant payment of $20&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This is not a malicious functionality of a program with some other
+    purpose; this is the software's sole purpose, and Google says so. But
+    Google says it in a way that encourages most people to ignore the
+    details. That, we believe, makes it fitting to list here.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201808131"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.theverge.com/2018/8/13/17684660/google-turn-off-location-history-data"&gt;Google
+    will track people even if people turn off location history&lt;/a&gt;, using
+    Google Maps, weather updates, and browser searches. Google basically
+    uses any app activity to track people.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201808130"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2018-08&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Since the beginning of 2017, &lt;a
+    
href="https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/"&gt;Android
+    phones have been collecting the addresses of nearby cellular
+    towers&lt;/a&gt;, even when location services are disabled, and sending
+    that data back to Google.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201606030"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2016-06&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;Investigation Shows &lt;a
+    
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+    Using US Companies, NSA To Route Around Domestic Surveillance
+    Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Specifically, it can collect the emails of members of Parliament
+    this way, because they pass it through Microsoft.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201212290"&gt;
+    &lt;!--#set var="DATE" value='&lt;small 
class="date-tag"&gt;2012-12&lt;/small&gt;'
+    --&gt;&lt;!--#echo encoding="none" var="DATE" --&gt;
+    &lt;p&gt;The Cisco TNP IP phones are &lt;a
+    
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+    spying devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+&lt;/div&gt;
+
+&lt;/div&gt;
+&lt;!--#include virtual="/proprietary/proprietary-menu.html" --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer" role="contentinfo"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:gnu@gnu.org"&gt;&lt;gnu@gnu.org&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:webmasters@gnu.org"&gt;&lt;webmasters@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:web-translators@gnu.org"&gt;
+        &lt;web-translators@gnu.org&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and contributing translations 
of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and contributing translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2015-2021 Free Software Foundation, Inc.&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative
+Commons Attribution 4.0 International License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2021/12/07 19:30:34 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;&lt;!-- for class="inner", starts in the banner include --&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]