trans-coord-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[GNUN Error] proprietary/proprietary-surveillance.html is not valid HTML


From: Gnun user for www translation team
Subject: [GNUN Error] proprietary/proprietary-surveillance.html is not valid HTML
Date: Sat, 05 Oct 2024 08:55:57 -0400

/tmp/gnun.1.QAOUDo:3309: parser error : EntityRef: expecting ';'
.cnet.com/pictures/products-with-alexa-built-in-smart-home/?ftag=CAD6b2b181&bhid
                                                                               ^
Expanded HTML file (with added line numbers) is:

1:<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
2: "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
3:<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
4:<head>
5:<meta http-equiv="content-type" content="text/html; charset=utf-8" />
6:<link rel="author" href="mailto:webmasters@gnu.org"; />
7:<link rel="icon" type="image/png" href="/graphics/gnu-head-mini.png" />
8:<meta name="ICBM" content="42.355469,-71.058627" />
9:<link rel="stylesheet" type="text/css" href="/layout.min.css" media="screen" 
/>
10:<link rel="stylesheet" type="text/css" href="/print.min.css" media="print" />
11:
12:
13:
14:<!-- Parent-Version: 1.96 -->
15:
16:<!-- 
17:~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
18:                  Please do not edit <ul class="blurbs">!
19:    Instead, edit /proprietary/workshop/mal.rec, then regenerate pages.
20:           See explanations in /proprietary/workshop/README.md.
21:~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
22:-->
23:<title>Proprietary Surveillance - GNU Project - Free Software 
Foundation</title>
24:<link rel="stylesheet" type="text/css" href="/side-menu.css" 
media="screen,print" />
25:<style type="text/css" media="screen,print"><!--
26:.pict {
27:    width: 18em;
28:    margin: 2em auto;
29:}
30:.pict p {
31:    font-size: .9em;
32:}
33:@media (min-width: 46em) {
34:    .pict {
35:        width: 18em;
36:        float: right;
37:        margin: .3em 0 1em 2em;
38:    }
39:}
40:--></style>
41:<!-- GNUN: localize URL /graphics/dog.small.jpg -->
42:<!-- begin translist file -->
43:
44:<link rel="alternate" type="text/html" 
href="/proprietary/proprietary-surveillance.html" hreflang="x-default" />
45:<link rel="alternate" type="text/html" lang="en" hreflang="en" 
href="/proprietary/proprietary-surveillance.en.html" title="English" />
46:<link rel="alternate" type="text/html" lang="es" hreflang="es" 
href="/proprietary/proprietary-surveillance.es.html" title="español" />
47:<link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/proprietary/proprietary-surveillance.fr.html" title="français" />
48:<link rel="alternate" type="text/html" lang="it" hreflang="it" 
href="/proprietary/proprietary-surveillance.it.html" title="italiano" />
49:<link rel="alternate" type="text/html" lang="ja" hreflang="ja" 
href="/proprietary/proprietary-surveillance.ja.html" title="日本語" />
50:<link rel="alternate" type="text/html" lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-surveillance.pt-br.html" title="português" />
51:<link rel="alternate" type="text/html" lang="ru" hreflang="ru" 
href="/proprietary/proprietary-surveillance.ru.html" title="русский" />
52:<!-- end translist file -->
53:
54:<!-- start of server/banner.html -->
55:<!-- start of head-include-2.html -->
56:<meta name="viewport" content="width=device-width, initial-scale=1" />
57:<!-- end of head-include-2.html -->
58:
59:</head>
60:<body>
61:<div class="inner">
62:<!-- start of server/body-include-1.html -->
63:<div id="top">
64:<a class="skip" href="#content"><b>Skip to main text</b></a>
65:</div>
66:
67:<div id="fsf-frame" role="complementary">
68:<form id="fssbox" 
action="https://my.fsf.org/civicrm/profile/create?reset=1&amp;gid=31";
69:      method="post">
70: <div>
71:  <input name="postURL" type="hidden" value="" />
72:  <input type="hidden" name="group[25]" value="1" />
73:  <input name="cancelURL" type="hidden" 
value="https://crm.fsf.org/civicrm/profile?reset=1&amp;gid=31"; />
74:  <input name="_qf_default" type="hidden" value="Edit:cancel" />
75:  <label for="frmEmail">
76:   <a href="//www.fsf.org/fss">Free Software Supporter</a>:
77:  </label>
78:  <input type="text" id="frmEmail" name="email-Primary" size="18" 
maxlength="80"
79:         value="email address" onfocus="this.value=''"/>
80:  <input type="submit" name="_qf_Edit_next" value="Sign up" />
81: </div>
82:</form>
83:
84:<div id="join-fsf" class="button"><a
85:href="https://www.fsf.org/associate/support_freedom?referrer=4052";>JOIN&nbsp;THE&nbsp;FSF</a>
86:</div>
87:</div>
88:
89:<div id="header" role="banner">
90:<p id="gnu-banner">
91: <a href="/">
92: <img src="/graphics/heckert_gnu.transp.small.png" height="48" width="49"
93:      alt="&nbsp;[A GNU head]&nbsp;" /><strong>GNU</strong> <span
94: class="hide">Operating System</span></a><br />
95: <small id="fsf-support">Supported by the
96: <a href="#mission-statement">Free Software Foundation</a></small>
97:</p>
98:
99:<div id="switches">
100:<!-- Oh well. We can't have nice things.
101: <div  id="search-button" class="switch">
102:  <img id="search-icon" height="30" width="30"
103:       src="/graphics/icons/search.png"
104:       alt="&nbsp;[Search www.gnu.org]&nbsp;" />
105: </div>
106:end search button -->
107:
108: <div id="language-button" class="switch">
109:  <a href="#language-container">
110:  <img id="language-icon" height="30" width="37"
111:       src="/graphics/icons/translations.png"
112:       alt="&nbsp;[Other languages]&nbsp;" /></a>
113: </div>
114:
115:</div>
116:</div>
117:<!-- end of server/body-include-1.html -->
118:
119:<!-- start of server/body-include-2 -->
120:
121:
122:<div style="clear: both"></div>
123:
124:<div id="navigation" role="navigation">
125: <a id="more-links" href="#navigation" title="More...">
126:   <span>Site navigation</span></a>
127: <a id="less-links" href="#content"><b>Skip</b></a>
128: <ul>
129:
130:   <li id="tabAboutGNU"><a href="/gnu/gnu.html">ABOUT&nbsp;GNU</a></li>
131:
132:
133:  <li id="tabPhilosophy"><a 
href="/philosophy/philosophy.html">PHILOSOPHY</a></li>
134:
135:
136:  <li id="tabLicenses"><a href="/licenses/licenses.html">LICENSES</a></li>
137:
138:
139:  <li id="tabEducation"><a 
href="/education/education.html">EDUCATION</a></li>
140:
141:
142:  <li id="tabSoftware"><a href="/software/software.html">SOFTWARE</a></li>
143:
144:
145:  <li id="tabDistros"><a href="/distros/distros.html">DISTROS</a></li>
146:
147:
148:  <li id="tabDoc"><a href="/doc/doc.html">DOCS</a></li>
149:
150:
151:  <li id="tabMalware" class="active">
152:     <span class='no-display'>=</span> 
153:    <a href="/proprietary/proprietary.html">MALWARE</a>
154:    <span class="gnun-split"></span>
155:     <span class='no-display'>=</span> 
156:  </li>
157:
158:
159:  <li id="tabHelp"><a href="/help/help.html">HELP&nbsp;GNU</a></li>
160:
161:
162:  <li id="tabAV"><a 
href="/audio-video/audio-video.html">AUDIO&nbsp;&amp;&nbsp;VIDEO</a></li>
163:
164:
165:  <li id="tabArt"><a href="/graphics/graphics.html">GNU&nbsp;ART</a></li>
166:
167:
168:  <li id="tabFun"><a href="/fun/humor.html">FUN</a></li>
169:
170:
171:  <li id="tabPeople"><a href="/people/people.html">GNU'S&nbsp;WHO?</a></li>
172:
173:  <li><a href="//directory.fsf.org">SOFTWARE&nbsp;DIRECTORY</a></li>
174:  <li><a href="https://h-node.org/";>HARDWARE</a></li>
175:  <li><a href="/server/sitemap.html">SITEMAP</a></li>
176: </ul>
177: <div style="clear: both"></div>
178:</div><!-- /"navigation -->
179:<!-- end of server/body-include-2 -->
180:
181:<div id="content" role="main">
182:<!-- end of server/banner.html -->
183:
184:<div class="nav">
185:<a id="side-menu-button" class="switch" href="#navlinks">
186: <img id="side-menu-icon" height="32"
187:      src="/graphics/icons/side-menu.png"
188:      title="Section contents"
189:      alt="&nbsp;[Section contents]&nbsp;" />
190:</a>
191:
192:<p class="breadcrumb">
193: <a href="/"><img src="/graphics/icons/home.png" height="24"
194:    alt="GNU Home" title="GNU Home" /></a>&nbsp;/
195: <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/
196: By type&nbsp;/
197:</p>
198:</div>
199:<!--GNUN: OUT-OF-DATE NOTICE-->
200:
201:
202:
203:<div style="clear: both"></div>
204:<div id="last-div" class="reduced-width">
205:<h2>Proprietary Surveillance</h2>
206:
207:<div class="infobox">
208:<hr class="full-width" />
209:<p>Nonfree (proprietary) software is very often malware (designed to
210:mistreat the user). Nonfree software is controlled by its developers,
211:which puts them in a position of power over the users; <a
212:href="/philosophy/free-software-even-more-important.html">that is the
213:basic injustice</a>. The developers and manufacturers often exercise
214:that power to the detriment of the users they ought to serve.</p>
215:
216:<p>This typically takes the form of malicious functionalities.</p>
217:<hr class="full-width" />
218:</div>
219:
220:<div id="surveillance" class="pict">
221:<a href="/graphics/dog.html">
222:<img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the 
three ads that popped up on his computer screen..." /></a>
223:<p>&ldquo;How did they find out I'm a dog?&rdquo;</p>
224:</div>
225:
226:<div class="article">
227:<p>A common malicious functionality is to snoop on the user.  This page
228:records <strong>clearly established cases of proprietary software that
229:spies on or tracks users</strong>.  Manufacturers even refuse
230:to <a 
href="https://techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/";>say
231:whether they snoop on users for the state</a>.</p>
232:
233:<p>All appliances and applications that are tethered to a specific
234:server are snoopers by nature.  We do not list them here because they
235:have their own page: <a
236:href="/proprietary/proprietary-tethers.html#about-page">Proprietary
237:    Tethers</a>.</p>
238:
239:<p>There is a similar site named <a 
href="https://spyware.neocities.org";>Spyware Watchdog</a> that classifies 
spyware programs, so that users can be more aware that they are installing 
spyware.</p>
240:
241:<div class="important" style="clear: both">
242:<p>If you know of an example that ought to be in this page but isn't
243:here, please write
244:to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>
245:to inform us. Please include the URL of a trustworthy reference or two
246:to serve as specific substantiation.</p>
247:</div>
248:
249:<div id="TOC" class="toc-inline">
250:    <h3 id="TableOfContents">Table of Contents</h3>
251:    <h4><a href="#Introduction">Introduction</a></h4>
252:    <h4><a href="#OSSpyware">Spyware in Laptops and Desktops</a></h4>
253:    <ul>
254:      <li><a href="#SpywareInWindows">Windows</a></li>
255:      <li><a href="#SpywareInMacOS">MacOS</a></li>
256:      <li><a href="#SpywareInBIOS">BIOS</a></li>
257:    </ul>
258:    <h4><a href="#SpywareOnMobiles">Spyware on Mobiles</a></h4>
259:    <ul>
260:      <li><a href="#SpywareInTelephones">All &ldquo;Smart&rdquo; 
Phones</a></li>
261:      <li><a href="#SpywareIniThings">iThings</a></li>
262:      <li><a href="#SpywareInAndroid">Android Telephones</a></li>
263:      <li><a href="#SpywareInElectronicReaders">E-Readers</a></li>
264:     </ul>
265:    <h4><a href="#SpywareInApplications">Spyware in Applications</a></h4>
266:    <ul>
267:      <li><a href="#SpywareInDesktopApps">Desktop Apps</a></li>
268:      <li><a href="#SpywareInMobileApps">Mobile Apps</a></li>
269:      <li><a href="#SpywareInSkype">Skype</a></li>
270:      <li><a href="#SpywareInGames">Games</a></li>
271:    </ul>
272:    <h4><a href="#SpywareInEquipment">Spyware in Connected 
Equipment</a></h4>
273:    <ul>
274:      <li><a href="#SpywareInTVSets">TV Sets</a></li>
275:      <li><a href="#SpywareInCameras">Cameras</a></li>
276:      <li><a href="#SpywareInToys">Toys</a></li>
277:      <li><a href="#SpywareInDrones">Drones</a></li>
278:      <li><a href="#SpywareAtHome">Other Appliances</a></li>
279:      <li><a href="#SpywareOnWearables">Wearables</a>
280:        <ul>
281:          <li><a href="#SpywareOnSmartWatches">&ldquo;Smart&rdquo; 
Watches</a></li>
282:        </ul>
283:      </li>
284:      <li><a href="#SpywareInVehicles">Vehicles</a></li>
285:      <li><a href="#SpywareInVR">Virtual Reality</a></li>
286:    </ul>
287:    <h4><a href="#SpywareOnTheWeb">Spyware on the Web</a></h4>
288:    <ul>
289:      <li><a href="#SpywareInChrome">Chrome</a></li>
290:      <li><a href="#SpywareInJavaScript">JavaScript</a></li>
291:      <li><a href="#SpywareInFlash">Flash</a></li>
292:    </ul>
293:    <h4><a href="#SpywareInNetworks">Spyware in Networks</a></h4>
294:</div>
295:
296:<div class="big-section">
297:  <h3 id="Introduction">Introduction</h3>
298:</div>
299:<div style="clear: left;"></div>
300:
301:<p>For decades, the Free Software movement has been denouncing the
302:abusive surveillance machine of
303:<a href="/proprietary/proprietary.html">proprietary software</a>
304:companies such as
305:<a href="/proprietary/malware-microsoft.html">Microsoft</a>
306:and
307:<a href="/proprietary/malware-apple.html">Apple</a>.
308:
309:In the recent years, this tendency to watch people has spread across
310:industries, not only in the software business, but also in the
311:hardware.  Moreover, it also spread dramatically away from the
312:keyboard, in the mobile computing industry, in the office,
313:at <a
314:href="https://www.theguardian.com/world/2023/sep/07/uk-owners-of-smart-home-devices-being-asked-for-swathes-of-personal-data";>
315:home</a>, in transportation systems, and in the classroom.</p>
316:
317:<h4 id="AggregateInfoCollection">Aggregate or anonymized data</h4>
318:
319:<p>Many companies, in their privacy policy, have a clause that claims
320:they share aggregate, non-personally identifiable information with
321:third parties/partners. Such claims are worthless, for several
322:reasons:</p>
323:
324:<ul>
325:    <li>They could change the policy at any time.</li>
326:    <li>They can twist the words by distributing an &ldquo;aggregate&rdquo; 
of
327:        &ldquo;anonymized&rdquo; data which can be reidentified and 
attributed to
328:        individuals.</li>
329:    <li>The raw data they don't normally distribute can be taken by
330:        data breaches.</li>
331:    <li>The raw data they don't normally distribute can be taken by
332:        subpoena.</li>
333:</ul>
334:
335:<p>Therefore, we must not be distracted by companies' statements of
336:what they will <em>do</em> with the data they collect. The wrong is that
337:they collect it at all.</p>
338:
339:<h4 id="LatestAdditions">Latest additions</h4>
340:
341:<p>Entries in each category are in reverse chronological order, based
342:on the dates of publication of linked articles.
343:The latest additions are listed on the <a
344:href="/proprietary/proprietary.html#latest">main page</a> of the
345:Malware section.</p>
346:
347:
348:
349:<div class="big-section">
350:  <h3 id="OSSpyware">Spyware in Laptops and Desktops</h3>
351:  <span class="anchor-reference-id">(<a 
href="#OSSpyware">#OSSpyware</a>)</span>
352:</div>
353:<div style="clear: left;"></div>
354:
355:<div class="big-subsection">
356:  <h4 id="SpywareInWindows">Windows</h4>
357:  <span class="anchor-reference-id">(<a 
href="#SpywareInWindows">#SpywareInWindows</a>)</span>
358:</div>
359:
360:<ul class="blurbs">
361:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
362:  <li id="M202302080">
363:    <small class="date-tag">2023-02</small>
364:    <p>As soon as it boots, and without asking any permission, <a
365:    
href="https://www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html";>Windows
366:    11 starts to send data to online servers</a>. The user's personal
367:    details, location or hardware information are reported to Microsoft and
368:    other companies to be used as telemetry data. All of this is done is
369:    the background, and users have no easy way to prevent it&mdash;unless
370:    they switch the computer offline.</p>
371:  </li>
372:
373:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
374:  <li id="M202301190">
375:    <small class="date-tag">2023-01</small>
376:    <p>Microsoft <a
377:    
href="https://betanews.com/2023/01/19/microsoft-is-using-the-kb5021751-update-to-see-if-you-have-an-unsupported-version-of-office-installed/";>
378:    released an &ldquo;update&rdquo; that installs a surveillance
379:    program</a> on users' computers to gather data on some installed
380:    programs for Microsoft's benefit. The update is rolling out
381:    automatically, and the program runs &ldquo;one time silently.&rdquo;</p>
382:  </li>
383:
384:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
385:  <li id="M202209220">
386:    <small class="date-tag">2022-09</small>
387:    <p>Windows 11 Home and Pro now <a
388:    href="https://www.microsoft.com/windows/windows-11-specifications";>
389:    require internet connection and a Microsoft account</a> to
390:    complete the installation. Windows 11 Pro had an option to create
391:    a local account instead, but the option has been removed. This
392:    account can (and most certainly will) be used for surveillance
393:    and privacy violations. Thankfully, a free software tool named <a
394:    
href="https://gothub.frontendfriendly.xyz/pbatard/rufus/blob/master/README.md";>Rufus</a>
 can bypass those
395:    requirements, or help users install a <a href="/distros/distros.html">
396:    free operating system</a> instead.</p>
397:  </li>
398:
399:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
400:  <li id="M201912160">
401:    <small class="date-tag">2019-12</small>
402:    <p>Microsoft is <a
403:    
href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/";>tricking
404:    users to create an account on their network</a> to be able to install
405:    and use the Windows operating system, which is malware. The account can
406:    be used for surveillance and/or violating people's rights in many ways,
407:    such as turning their purchased software to a subscription product.</p>
408:  </li>
409:
410:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
411:  <li id="M201712110">
412:    <small class="date-tag">2017-12</small>
413:    <p>HP's proprietary operating system <a
414:    href="https://www.bbc.com/news/technology-42309371";>includes a
415:    proprietary keyboard driver with a key logger in it</a>.</p>
416:  </li>
417:
418:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
419:  <li id="M201710134">
420:    <small class="date-tag">2017-10</small>
421:    <p>Windows 10 telemetry program sends information to Microsoft about
422:    the user's computer and their use of the computer.</p>
423:
424:    <p>Furthermore, for users who installed the
425:    fourth stable build of Windows 10, called the
426:    &ldquo;Creators Update,&rdquo; Windows maximized the surveillance <a
427:    
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law/";>
428:    by force setting the telemetry mode to &ldquo;Full&rdquo;</a>.</p>
429:
430:    <p>The <a
431:    
href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level";>
432:    &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows
433:    engineers to access, among other things, registry keys <a
434:    
href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)">
435:    which can contain sensitive information like administrator's login
436:    password</a>.</p>
437:  </li>
438:
439:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
440:  <li id="M201702020">
441:    <small class="date-tag">2017-02</small>
442:    <p>DRM-restricted files can be used to <a
443:    
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users";>
444:    identify people browsing through Tor</a>. The vulnerability exists
445:    only if you use Windows.</p>
446:  </li>
447:
448:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
449:  <li id="M201611240">
450:    <small class="date-tag">2016-11</small>
451:    <p>By default, Windows 10 <a
452:    
href="https://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties/";>sends
453:    debugging information to Microsoft, including core dumps</a>. Microsoft
454:    now distributes them to another company.</p>
455:  </li>
456:
457:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
458:  <li id="M201608170.1">
459:    <small class="date-tag">2016-08</small>
460:    <p>In order to increase Windows 10's install base, Microsoft <a 
class="not-a-duplicate" 
461:    
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
462:    blatantly disregards user choice and privacy</a>.</p>
463:  </li>
464:
465:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
466:  <li id="M201603170">
467:    <small class="date-tag">2016-03</small>
468:    <p><a
469:    
href="https://duo.com/decipher/bring-your-own-dilemma-oem-laptops-and-windows-10-security";>
470:    Windows 10 comes with 13 screens of snooping options</a>, all enabled
471:    by default, and turning them off would be daunting to most users.</p>
472:  </li>
473:
474:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
475:  <li id="M201601050">
476:    <small class="date-tag">2016-01</small>
477:    <p>It appears <a
478:    
href="https://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/";>
479:    Windows 10 sends data to Microsoft about what applications are
480:    running</a>.</p>
481:  </li>
482:
483:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
484:  <li id="M201512280">
485:    <small class="date-tag">2015-12</small>
486:    <p>Microsoft has <a
487:    
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
488:    backdoored its disk encryption</a>.</p>
489:  </li>
490:
491:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
492:  <li id="M201511264">
493:    <small class="date-tag">2015-11</small>
494:    <p>A downgrade to Windows 10 deleted surveillance-detection
495:    applications.  Then another downgrade inserted a general spying
496:    program.  Users noticed this and complained, so Microsoft renamed it <a
497:    
href="https://www.theregister.com/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/";>
498:    to give users the impression it was gone</a>.</p>
499:
500:    <p>To use proprietary software is to invite such treatment.</p>
501:  </li>
502:
503:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
504:  <li id="M201508180">
505:    <small class="date-tag">2015-08</small>
506:    <p><a
507:    
href="https://web.archive.org/web/20150905163414/http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping";>
508:    Intel devices will be able to listen for speech all the time, even
509:    when &ldquo;off.&rdquo;</a></p>
510:  </li>
511:
512:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
513:  <li id="M201508130">
514:    <small class="date-tag">2015-08</small>
515:    <p><a
516:    
href="https://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/";>
517:    Windows 10 sends identifiable information to Microsoft</a>, even if
518:    a user turns off its Bing search and Cortana features, and activates
519:    the privacy-protection settings.</p>
520:  </li>
521:
522:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
523:  <li id="M201507300">
524:    <small class="date-tag">2015-07</small>
525:    <p>Windows 10 <a
526:    
href="https://web.archive.org/web/20180923125732/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/";>
527:    ships with default settings that show no regard for the privacy of
528:    its users</a>, giving Microsoft the &ldquo;right&rdquo; to snoop on
529:    the users' files, text input, voice input, location info, contacts,
530:    calendar records and web browsing history, as well as automatically
531:    connecting the machines to open hotspots and showing targeted ads.</p>
532:
533:    <p>We can suppose Microsoft looks at users' files for the US government
534:    on demand, though the &ldquo;privacy policy&rdquo; does not explicitly
535:    say so. Will it look at users' files for the Chinese government
536:    on demand?</p>
537:  </li>
538:
539:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
540:  <li id="M201506170">
541:    <small class="date-tag">2015-06</small>
542:    <p>Microsoft uses Windows 10's &ldquo;privacy policy&rdquo;
543:    to overtly impose a &ldquo;right&rdquo; to look at
544:    users' files at any time. Windows 10 full disk encryption <a
545:    
href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/";>
546:    gives Microsoft a key</a>.</p>
547:
548:    <p>Thus, Windows is overt malware in regard to surveillance, as in
549:    other issues.</p>
550:
551:    <p>The unique &ldquo;advertising ID&rdquo; for each user enables
552:    other companies to track the browsing of each specific user.</p>
553:
554:    <p>It's as if Microsoft has deliberately chosen to make Windows 10
555:    maximally evil on every dimension; to make a grab for total power
556:    over anyone that doesn't drop Windows now.</p>
557:  </li>
558:
559:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
560:  <li id="M201410040">
561:    <small class="date-tag">2014-10</small>
562:    <p>It only gets worse with time.  <a
563:    
href="https://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html";>
564:    Windows 10 requires users to give permission for total snooping</a>,
565:    including their files, their commands, their text input, and their
566:    voice input.</p>
567:  </li>
568:
569:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
570:  <li id="M201405140">
571:    <small class="date-tag">2014-05</small>
572:    <p><a
573:    
href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/";>
574:    Microsoft SkyDrive allows the NSA to directly examine users'
575:    data</a>.</p>
576:  </li>
577:
578:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
579:  <li id="M201401150">
580:    <small class="date-tag">2014-01</small>
581:    <p id="baidu-ime"><a
582:    
href="https://web.archive.org/web/20140219183154/http://www.techrepublic.com/blog/asian-technology/japanese-government-warns-baidu-ime-is-spying-on-users/";>
583:    Baidu's Japanese-input and Chinese-input apps spy on users</a>.</p>
584:  </li>
585:
586:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
587:  <li id="M201307080">
588:    <small class="date-tag">2013-07</small>
589:    <p>Spyware in older versions of Windows: <a
590:    
href="https://www.theregister.com/2003/02/28/windows_update_keeps_tabs/";>
591:    Windows Update snoops on the user</a>. <a
592:    
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>
593:    Windows 8.1 snoops on local searches</a>. And there's a <a
594:    href="http://www.marketoracle.co.uk/Article40836.html";> secret NSA
595:    key in Windows</a>, whose functions we don't know.</p>
596:  </li>
597:</ul>
598:
599:
600:<p>Microsoft's snooping on users did not start with Windows 10.
601:   There's a lot more <a href="/proprietary/malware-microsoft.html">
602:   Microsoft malware</a>.</p>
603:
604:
605:<div class="big-subsection">
606:  <h4 id="SpywareInMacOS">MacOS</h4>
607:  <span class="anchor-reference-id">(<a 
href="#SpywareInMacOS">#SpywareInMacOS</a>)</span>
608:</div>
609:
610:<ul class="blurbs">
611:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
612:  <li id="M202011120">
613:    <small class="date-tag">2020-11</small>
614:    <p>Apple has <a
615:    
href="https://sneak.berlin/20201112/your-computer-isnt-yours/";>implemented
616:    a malware in its computers that imposes surveillance</a> on users
617:    and reports users' computing to Apple.</p>
618:
619:    <p>The reports are even unencrypted and they've been leaking this
620:    data for two years already. This malware is reporting to Apple what
621:    user opens what program at what time. It also gives Apple
622:    power to sabotage users' computing.</p>
623:  </li>
624:
625:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
626:  <li id="M201809070">
627:    <small class="date-tag">2018-09</small>
628:    <p>Adware Doctor, an ad blocker for MacOS, <a
629:    
href="https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history";>reports
630:    the user's browsing history</a>.</p>
631:  </li>
632:
633:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
634:  <li id="M201411040">
635:    <small class="date-tag">2014-11</small>
636:    <p>Apple has made various <a
637:    
href="https://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud";>
638:    MacOS programs send files to Apple servers without asking
639:    permission</a>.  This exposes the files to Big Brother and perhaps
640:    to other snoops.</p>
641:
642:    <p>It also demonstrates how you can't trust proprietary software,
643:    because even if today's version doesn't have a malicious functionality,
644:    tomorrow's version might add it. The developer won't remove the
645:    malfeature unless many users push back hard, and the users can't
646:    remove it themselves.</p>
647:  </li>
648:
649:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
650:  <li id="M201410300">
651:    <small class="date-tag">2014-10</small>
652:    <p> MacOS automatically <a
653:    
href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/";>
654:    sends to Apple servers unsaved documents being edited</a>. The
655:    things you have not decided to save are <a
656:    
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/";>
657:    even more sensitive</a> than the things you have stored in files.</p>
658:  </li>
659:
660:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
661:  <li id="M201410220">
662:    <small class="date-tag">2014-10</small>
663:    <p>Apple admits the <a
664:    
href="https://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/";>
665:    spying in a search facility</a>, but there's a lot <a
666:    
href="https://gothub.frontendfriendly.xyz/fix-macosx/yosemite-phone-home/blob/master/README.md";>
 more snooping
667:    that Apple has not talked about</a>.</p>
668:  </li>
669:
670:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
671:  <li id="M201410200">
672:    <small class="date-tag">2014-10</small>
673:    <p>Various operations in <a
674:    
href="https://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540";>
675:    the latest MacOS send reports to Apple</a> servers.</p>
676:  </li>
677:
678:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
679:  <li id="M201401100.1">
680:    <small class="date-tag">2014-01</small>
681:    <p><a
682:    
href="https://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
683:    Spotlight search</a> sends users' search terms to Apple.</p>
684:  </li>
685:</ul>
686:
687:
688:<p>There's a lot more <a href="#SpywareIniThings">iThing spyware</a>, and
689:<a href="/proprietary/malware-apple.html">Apple malware</a>.</p>
690:
691:
692:<div class="big-subsection">
693:  <span id="SpywareAtLowLevel"></span>
694:  <h4 id="SpywareInBIOS">BIOS</h4>
695:  <span class="anchor-reference-id">(<a 
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
696:</div>
697:
698:<ul class="blurbs">
699:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
700:  <li id="M201509220">
701:    <small class="date-tag">2015-09</small>
702:    <p><a
703:    
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
704:    Lenovo stealthily installed crapware and spyware via
705:    BIOS</a> on Windows installs.  Note that the specific
706:    sabotage method Lenovo used did not affect GNU/Linux; also, a
707:    &ldquo;clean&rdquo; Windows install is not really clean since <a
708:    href="/proprietary/malware-microsoft.html">Microsoft puts in its
709:    own malware</a>.</p>
710:  </li>
711:</ul>
712:
713:
714:
715:<div class="big-section">
716:  <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
717:  <span class="anchor-reference-id">(<a 
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
718:</div>
719:<div style="clear: left;"></div>
720:
721:<div class="big-subsection">
722:  <h4 id="SpywareInTelephones">All &ldquo;Smart&rdquo; Phones</h4>
723:  <span class="anchor-reference-id">(<a 
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
724:</div>
725:
726:<ul class="blurbs">
727:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
728:  <li id="M202106250">
729:    <small class="date-tag">2021-06</small>
730:    <p><a
731:    
href="https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/";>El
732:    Salvador Dictatorship's Chivo wallet is spyware</a>, it's a
733:    proprietary program that breaks users' freedom and spies on people;
734:    demands personal data such as the national ID number and does face
735:    recognition, and it is bad security for its data. It also asks for
736:    almost every malware permission in people's smartphones.</p>
737:
738:    <p>The article criticizes it for faults in &ldquo;data
739:    protection&rdquo;, though <a
740:    href="/philosophy/surveillance-vs-democracy.html">&ldquo;data 
protection&rdquo;
741:    is the wrong approach to privacy anyway</a>.</p>
742:  </li>
743:
744:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
745:  <li id="M202106170">
746:    <small class="date-tag">2021-06</small>
747:    <p><a
748:    
href="https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-health-apps-harvest-user-data-global-study-shows";>Almost
749:    all proprietary health apps harvest users' data</a>, including
750:    sensitive health information, tracking identifiers, and cookies to
751:    track user activities. Some of these applications are tracking users
752:    across different platforms.</p>
753:  </li>
754:
755:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
756:  <li id="M202102200">
757:    <small class="date-tag">2021-02</small>
758:    <p>The proprietary program Clubhouse
759:    is malware and a privacy disaster. Clubhouse <a
760:    
href="https://www.theguardian.com/commentisfree/2021/feb/20/why-hot-new-social-app-clubhouse-spells-nothing-but-trouble";>collects
761:    people's personal data such as recordings of people's
762:    conversations</a>, and, as a secondary problem, does not encrypt them,
763:    which shows a bad security part of the issue.</p>
764:
765:    <p>A user's unique Clubhouse ID number and chatroom ID are transmitted
766:    in plaintext, and Agora (the company behind the app) would likely
767:    have access to users' raw audio, potentially providing access to
768:    the Chinese government.</p>
769:
770:    <p>Even with good security of data transmission, collecting personal
771:    data of people is wrong and a violation of people's privacy rights.</p>
772:  </li>
773:
774:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
775:  <li id="M202101080">
776:    <small class="date-tag">2021-01</small>
777:    <p>As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a
778:    
href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/";>forcing
779:    its users to hand over sensitive personal data</a> to its parent
780:    company. This increases Facebook's power over users, and further
781:    jeopardizes people's privacy and security.</p>
782:
783:    <p>Instead of WhatsApp you can use <a
784:    href="https://directory.fsf.org/wiki/Jami";>GNU Jami</a>, which is
785:    free software and will not collect your data.</p>
786:  </li>
787:
788:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
789:  <li id="M202006260">
790:    <small class="date-tag">2020-06</small>
791:    <p>Most apps are malware, but
792:    Trump's campaign app, like Modi's campaign app, is <a
793:    
href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/";>
794:    especially nasty malware, helping companies snoop on users as well
795:    as snooping on them itself</a>.</p>
796:
797:    <p>The article says that Biden's app has a less manipulative overall
798:    approach, but that does not tell us whether it has functionalities we
799:    consider malicious, such as sending data the user has not explicitly
800:    asked to send.</p>
801:  </li>
802:
803:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
804:  <li id="M201809121">
805:    <small class="date-tag">2018-09</small>
806:    <p>Tiny Lab Productions, along with online ad businesses run
807:    by Google, Twitter and three other companies are facing a lawsuit <a
808:    
href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html";>for
809:    violating people's privacy by collecting their data from mobile games
810:    and handing over these data to other companies/advertisers</a>.</p>
811:  </li>
812:
813:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
814:  <li id="M201601110">
815:    <small class="date-tag">2016-01</small>
816:    <p>The natural extension of monitoring
817:    people through &ldquo;their&rdquo; phones is <a
818:    
href="https://news.northwestern.edu/stories/2016/01/fool-activity-tracker";>
819:    proprietary software to make sure they can't &ldquo;fool&rdquo;
820:    the monitoring</a>.</p>
821:  </li>
822:
823:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
824:  <li id="M201510050">
825:    <small class="date-tag">2015-10</small>
826:    <p>According to Edward Snowden, <a
827:    href="https://www.bbc.com/news/uk-34444233";>agencies can take over
828:    smartphones</a> by sending hidden text messages which enable
829:    them to turn the phones on and off, listen to the microphone,
830:    retrieve geo-location data from the GPS, take photographs, read
831:    text messages, read call, location and web browsing history, and
832:    read the contact list. This malware is designed to disguise itself
833:    from investigation.</p>
834:  </li>
835:
836:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
837:  <li id="M201311120">
838:    <small class="date-tag">2013-11</small>
839:    <p><a
840:    
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html";>
841:    The NSA can tap data in smart phones, including iPhones,
842:    Android, and BlackBerry</a>.  While there is not much
843:    detail here, it seems that this does not operate via
844:    the universal back door that we know nearly all portable
845:    phones have. It may involve exploiting various bugs.  There are <a
846:    
href="https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/";>
847:    lots of bugs in the phones' radio software</a>.</p>
848:  </li>
849:
850:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
851:  <li id="M201307000">
852:    <small class="date-tag">2013-07</small>
853:    <p>Portable phones with GPS <a
854:    
href="https://www.aclu.org/issues/privacy-technology/location-tracking/you-are-being-tracked";>
855:    will send their GPS location on remote command, and users cannot stop
856:    them</a>. (The US says it will eventually require all new portable 
phones
857:    to have GPS.)</p>
858:  </li>
859:</ul>
860:
861:
862:<div class="big-subsection">
863:  <h4 id="SpywareIniThings">iThings</h4>
864:  <span class="anchor-reference-id">(<a 
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
865:</div>
866:
867:<ul class="blurbs">
868:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
869:  <li id="M202211140">
870:    <small class="date-tag">2022-11</small>
871:    <p><a
872:    
href="https://web.archive.org/web/20230101185726/https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558";>
873:    The iMonster app store client programs collect many kinds of data</a>
874:    about the user's actions and private communications. &ldquo;Do not
875:    track&rdquo; options are available, but tracking doesn't stop if
876:    the user activates them: Apple keeps on collecting data for itself,
877:    although it claims not to send it to third parties.</p>
878:
879:    <p><a
880:    
href="https://www.theregister.com/2022/11/14/apple_data_collection_lawsuit/";>
881:    Apple is being sued</a> for that.</p>
882:  </li>
883:
884:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
885:  <li id="M202105240">
886:    <small class="date-tag">2021-05</small>
887:    <p><a
888:    
href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/";>Apple
889:    is moving its Chinese customers' iCloud data to a datacenter controlled
890:    by the Chinese government</a>. Apple is already storing the encryption
891:    keys on these servers, obeying Chinese authority, making all Chinese
892:    user data available to the government.</p>
893:  </li>
894:
895:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
896:  <li id="M202009183">
897:    <small class="date-tag">2020-09</small>
898:    <p>Facebook <a
899:    
href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html";>snoops
900:    on Instagram</a> users by surreptitously turning on the device's
901:    camera.</p>
902:  </li>
903:
904:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
905:  <li id="M202004200">
906:    <small class="date-tag">2020-04</small>
907:    <p>Apple whistleblower Thomas Le Bonniec reports that Apple
908:    made a practice of surreptitiously activating the Siri software to <a
909:    
href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf";>
910:    record users' conversations when they had not activated Siri</a>.
911:    This was not just occasional, it was systematic practice.</p>
912:
913:    <p>His job was to listen to these recordings, in a group that made
914:    transcripts of them. He does not believes that Apple has ceased this
915:    practice.</p>
916:
917:    <p>The only reliable way to prevent this is, for the program that
918:    controls access to the microphone to decide when the user has
919:    &ldquo;activated&rdquo; any service, to be free software, and the
920:    operating system under it free as well. This way, users could make
921:    sure Apple can't listen to them.</p>
922:  </li>
923:
924:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
925:  <li id="M201910131">
926:    <small class="date-tag">2019-10</small>
927:    <p>Safari occasionally <a
928:    
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/";>
929:    sends browsing data from Apple devices in China to the Tencent Safe
930:    Browsing service</a>, to check URLs that possibly correspond to
931:    &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates
932:    with the Chinese government, its Safe Browsing black list most certainly
933:    contains the websites of political opponents. By linking the requests
934:    originating from single IP addresses, the government can identify
935:    dissenters in China and Hong Kong, thus endangering their lives.</p>
936:  </li>
937:
938:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
939:  <li id="M201905280">
940:    <small class="date-tag">2019-05</small>
941:    <p>In spite of Apple's supposed commitment to
942:    privacy, iPhone apps contain trackers that are busy at night <a
943:    
href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html";>
944:    sending users' personal information to third parties</a>.</p>
945:
946:    <p>The article mentions specific examples: Microsoft OneDrive,
947:    Intuit's Mint, Nike, Spotify, The Washington Post, The Weather
948:    Channel (owned by IBM), the crime-alert service Citizen, Yelp
949:    and DoorDash. But it is likely that most nonfree apps contain
950:    trackers. Some of these send personally identifying data such as phone
951:    fingerprint, exact location, email address, phone number or even
952:    delivery address (in the case of DoorDash). Once this information
953:    is collected by the company, there is no telling what it will be
954:    used for.</p>
955:  </li>
956:
957:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
958:  <li id="M201711250">
959:    <small class="date-tag">2017-11</small>
960:    <p>The DMCA and the EU Copyright Directive make it <a
961:    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html";>
962:    illegal to study how iOS cr&hellip;apps spy on users</a>, because
963:    this would require circumventing the iOS DRM.</p>
964:  </li>
965:
966:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
967:  <li id="M201709210">
968:    <small class="date-tag">2017-09</small>
969:    <p>In the latest iThings system,
970:    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way <a
971:    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off";>
972:    doesn't really turn them off</a>.  A more advanced way really does turn
973:    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
974:    know you want to be spied on&rdquo;.</p>
975:  </li>
976:
977:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
978:  <li id="M201702150">
979:    <small class="date-tag">2017-02</small>
980:    <p>Apple proposes <a
981:    
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen";>a
982:    fingerprint-scanning touch screen</a>&mdash;which would mean no way
983:    to use it without having your fingerprints taken. Users would have
984:    no way to tell whether the phone is snooping on them.</p>
985:  </li>
986:
987:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
988:  <li id="M201611170">
989:    <small class="date-tag">2016-11</small>
990:    <p>iPhones <a
991:    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/";>send
992:    lots of personal data to Apple's servers</a>.  Big Brother can get
993:    them from there.</p>
994:  </li>
995:
996:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
997:  <li id="M201609280">
998:    <small class="date-tag">2016-09</small>
999:    <p>The iMessage app on iThings <a
1000:    
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/";>tells
1001:    a server every phone number that the user types into it</a>; the
1002:    server records these numbers for at least 30 days.</p>
1003:  </li>
1004:
1005:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1006:  <li id="M201509240">
1007:    <small class="date-tag">2015-09</small>
1008:    <p>iThings automatically upload to Apple's servers all the photos
1009:    and videos they make.</p>
1010:
1011:    <blockquote><p> iCloud Photo Library stores every photo and video you
1012:    take, and keeps them up to date on all your devices. Any edits you
1013:    make are automatically updated everywhere. [&hellip;] </p></blockquote>
1014:
1015:    <p>(From <a 
href="https://web.archive.org/web/20150921152044/https://www.apple.com/icloud/photos/";>Apple's
 iCloud
1016:    information</a> as accessed on 24 Sep 2015.) The iCloud feature is
1017:    <a href="https://support.apple.com/en-us/HT202033";>activated by the
1018:    startup of iOS</a>. The term &ldquo;cloud&rdquo; means &ldquo;please
1019:    don't ask where.&rdquo;</p>
1020:
1021:    <p>There is a way to
1022:    <a href="https://support.apple.com/en-us/HT201104";> deactivate
1023:    iCloud</a>, but it's active by default so it still counts as a
1024:    surveillance functionality.</p>
1025:
1026:    <p>Unknown people apparently took advantage of this to <a
1027:    
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence";>get
1028:    nude photos of many celebrities</a>. They needed to break Apple's
1029:    security to get at them, but NSA can access any of them through <a
1030:    
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
1031:  </li>
1032:
1033:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1034:  <li id="M201409220">
1035:    <small class="date-tag">2014-09</small>
1036:    <p>Apple can, and regularly does, <a
1037:    
href="https://arstechnica.com/gadgets/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>
1038:    remotely extract some data from iPhones for the state</a>.</p>
1039:
1040:    <p>This may have improved with <a
1041:    
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/";>
1042:    iOS 8 security improvements</a>; but <a
1043:    href="https://theintercept.com/2014/09/22/apple-data/";>
1044:    not as much as Apple claims</a>.</p>
1045:  </li>
1046:
1047:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1048:  <li id="M201407230">
1049:    <small class="date-tag">2014-07</small>
1050:    <p><a
1051:    
href="https://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services";>
1052:    Several &ldquo;features&rdquo; of iOS seem to exist
1053:    for no possible purpose other than surveillance</a>.  Here is the <a
1054:    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf";>
1055:    Technical presentation</a>.</p>
1056:  </li>
1057:
1058:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1059:  <li id="M201401100">
1060:    <small class="date-tag">2014-01</small>
1061:    <p>The <a class="not-a-duplicate"
1062:    
href="https://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
1063:    iBeacon</a> lets stores determine exactly where the iThing is, and
1064:    get other info too.</p>
1065:  </li>
1066:
1067:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1068:  <li id="M201312300">
1069:    <small class="date-tag">2013-12</small>
1070:    <p><a
1071:    
href="https://web.archive.org/web/20190924053515/https://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep";>
1072:    Either Apple helps the NSA snoop on all the data in an iThing, or it
1073:    is totally incompetent</a>.</p>
1074:  </li>
1075:
1076:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1077:  <li id="M201308080">
1078:    <small class="date-tag">2013-08</small>
1079:    <p>The iThing also <a
1080:    
href="https://www.theregister.com/2013/08/08/ios7_tracking_now_its_a_favourite_feature/";>
1081:    tells Apple its geolocation</a> by default, though that can be
1082:    turned off.</p>
1083:  </li>
1084:
1085:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1086:  <li id="M201210170">
1087:    <small class="date-tag">2012-10</small>
1088:    <p>There is also a feature for web sites to track users, which is <a
1089:    
href="https://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/";>
1090:    enabled by default</a>.  (That article talks about iOS 6, but it is
1091:    still true in iOS 7.)</p>
1092:  </li>
1093:
1094:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1095:  <li id="M201204280">
1096:    <small class="date-tag">2012-04</small>
1097:    <p>Users cannot make an Apple ID (<a
1098:    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id";>necessary
1099:    to install even gratis apps</a>) without giving a valid
1100:    email address and receiving the verification code Apple sends
1101:    to it.</p>
1102:  </li>
1103:</ul>
1104:
1105:
1106:<div class="big-subsection">
1107:  <h4 id="SpywareInAndroid">Android Telephones</h4>
1108:  <span class="anchor-reference-id">(<a 
href="#SpywareInAndroid">#SpywareInAndroid</a>)</span>
1109:</div>
1110:
1111:<ul class="blurbs">
1112:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1113:  <li id="M202012070">
1114:    <small class="date-tag">2020-12</small>
1115:    <p>Baidu apps were <a
1116:    
href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/";>
1117:    caught collecting sensitive personal data</a> that can be used for
1118:    lifetime tracking of users, and putting them in danger. More than 1.4
1119:    billion people worldwide are affected by these proprietary apps, and
1120:    users' privacy is jeopardized by this surveillance tool. Data collected
1121:    by Baidu may be handed over to the Chinese government, possibly
1122:    putting Chinese people in danger.</p>
1123:  </li>
1124:
1125:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1126:  <li id="M202010120">
1127:    <small class="date-tag">2020-10</small>
1128:    <p>Samsung is forcing its smartphone users in Hong Kong (and Macau) <a
1129:    
href="https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-dns-service-upon-hong-kong-wifi-users/";>to
1130:    use a public DNS in Mainland China</a>, using software update released
1131:    in September 2020, which causes many unease and privacy concerns.</p>
1132:  </li>
1133:
1134:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1135:  <li id="M202004300">
1136:    <small class="date-tag">2020-04</small>
1137:    <p>Xiaomi phones <a
1138:    
href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/";>report
1139:    many actions the user takes</a>: starting an app, looking at a folder,
1140:    visiting a website, listening to a song.  They send device identifying
1141:    information too.</p>
1142:
1143:    <p>Other nonfree programs snoop too. For instance, Spotify and
1144:    other streaming dis-services make a dossier about each user, and <a
1145:    href="/malware/proprietary-surveillance.html#M201508210"> they make
1146:    users identify themselves to pay</a>.  Out, out, damned Spotify!</p>
1147:
1148:    <p>Forbes exonerates the same wrongs when the culprits are not Chinese,
1149:    but we condemn this no matter who does it.</p>
1150:  </li>
1151:
1152:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1153:  <li id="M201812060">
1154:    <small class="date-tag">2018-12</small>
1155:    <p>Facebook's app got &ldquo;consent&rdquo; to <a
1156:    
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent";>
1157:    upload call logs automatically from Android phones</a> while disguising
1158:    what the &ldquo;consent&rdquo; was for.</p>
1159:  </li>
1160:
1161:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1162:  <li id="M201811230">
1163:    <small class="date-tag">2018-11</small>
1164:    <p>An Android phone was observed to track location even while
1165:    in airplane mode. It didn't send the location data while in
1166:    airplane mode.  Instead, <a
1167:    
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/";>
1168:    it saved up the data, and sent them all later</a>.</p>
1169:  </li>
1170:
1171:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1172:  <li id="M201711210">
1173:    <small class="date-tag">2017-11</small>
1174:    <p>Android tracks location for Google <a
1175:    
href="https://www.techdirt.com/2017/11/21/investigation-finds-google-collected-location-data-even-with-location-services-turned-off/";>
1176:    even when &ldquo;location services&rdquo; are turned off, even when
1177:    the phone has no SIM card</a>.</p>
1178:  </li>
1179:
1180:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1181:  <li id="M201611150">
1182:    <small class="date-tag">2016-11</small>
1183:    <p>Some portable phones <a
1184:    
href="https://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html";>are
1185:    sold with spyware sending lots of data to China</a>.</p>
1186:  </li>
1187:
1188:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1189:  <li id="M201609140">
1190:    <small class="date-tag">2016-09</small>
1191:    <p>Google Play (a component of Android) <a
1192:    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg";>
1193:    tracks the users' movements without their permission</a>.</p>
1194:
1195:    <p>Even if you disable Google Maps and location tracking, you must
1196:    disable Google Play itself to completely stop the tracking.  This is
1197:    yet another example of nonfree software pretending to obey the user,
1198:    when it's actually doing something else.  Such a thing would be almost
1199:    unthinkable with free software.</p>
1200:  </li>
1201:
1202:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1203:  <li id="M201507030">
1204:    <small class="date-tag">2015-07</small>
1205:    <p>Samsung phones come with <a
1206:    
href="https://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/";>apps
1207:    that users can't delete</a>, and they send so much data that their
1208:    transmission is a substantial expense for users.  Said transmission,
1209:    not wanted or requested by the user, clearly must constitute spying
1210:    of some kind.</p>
1211:  </li>
1212:
1213:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1214:  <li id="M201403120">
1215:    <small class="date-tag">2014-03</small>
1216:    <p><a href="/proprietary/proprietary-back-doors.html#samsung">
1217:    Samsung's back door</a> provides access to any file on the system.</p>
1218:  </li>
1219:
1220:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1221:  <li id="M201308010">
1222:    <small class="date-tag">2013-08</small>
1223:    <p>Spyware in Android phones (and Windows? laptops): The Wall Street
1224:    Journal (in an article blocked from us by a paywall) reports that <a
1225:    
href="https://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj";>
1226:    the FBI can remotely activate the GPS and microphone in Android phones
1227:    and laptops</a> (presumably Windows laptops).  Here is <a
1228:    href="https://cryptome.org/2013/08/fbi-hackers.htm";>more info</a>.</p>
1229:  </li>
1230:
1231:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1232:  <li id="M201307280">
1233:    <small class="date-tag">2013-07</small>
1234:    <p>Spyware is present in some Android devices when they are
1235:    sold.  Some Motorola phones, made when this company was owned
1236:    by Google, use a modified version of Android that <a
1237:    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html";>
1238:    sends personal data to Motorola</a>.</p>
1239:  </li>
1240:
1241:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1242:  <li id="M201307250">
1243:    <small class="date-tag">2013-07</small>
1244:    <p>A Motorola phone <a
1245:    
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/";>
1246:    listens for voice all the time</a>.</p>
1247:  </li>
1248:
1249:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1250:  <li id="M201302150">
1251:    <small class="date-tag">2013-02</small>
1252:    <p>Google Play intentionally sends app developers <a
1253:    
href="https://gadgets360.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116";>
1254:    the personal details of users that install the app</a>.</p>
1255:
1256:    <p>Merely asking the &ldquo;consent&rdquo; of users is not enough to
1257:    legitimize actions like this.  At this point, most users have stopped
1258:    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
1259:    they are &ldquo;consenting&rdquo; to.  Google should clearly and
1260:    honestly identify the information it collects on users, instead of
1261:    hiding it in an obscurely worded EULA.</p>
1262:
1263:    <p>However, to truly protect people's privacy, we must prevent Google
1264:    and other companies from getting this personal information in the
1265:    first place!</p>
1266:  </li>
1267:
1268:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1269:  <li id="M201111170">
1270:    <small class="date-tag">2011-11</small>
1271:    <p>Some manufacturers add a <a
1272:    
href="https://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/";>
1273:    hidden general surveillance package such as Carrier IQ</a>.</p>
1274:  </li>
1275:</ul>
1276:
1277:
1278:<div class="big-subsection">
1279:  <h4 id="SpywareInElectronicReaders">E-Readers</h4>
1280:  <span class="anchor-reference-id">(<a 
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
1281:</div>
1282:
1283:<ul class="blurbs">
1284:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1285:  <li id="M201603080">
1286:    <small class="date-tag">2016-03</small>
1287:    <p>E-books can contain JavaScript code, and <a
1288:    
href="https://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds";>
1289:    sometimes this code snoops on readers</a>.</p>
1290:  </li>
1291:
1292:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1293:  <li id="M201410080">
1294:    <small class="date-tag">2014-10</small>
1295:    <p>Adobe made &ldquo;Digital Editions,&rdquo;
1296:    the e-reader used by most US libraries, <a
1297:    
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/";>
1298:    send lots of data to Adobe</a>.  Adobe's &ldquo;excuse&rdquo;: it's
1299:    needed to check DRM!</p>
1300:  </li>
1301:
1302:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1303:  <li id="M201212030">
1304:    <small class="date-tag">2012-12</small>
1305:    <p>Spyware in many e-readers&mdash;not only the Kindle: <a
1306:    href="https://www.eff.org/pages/reader-privacy-chart-2012";> they
1307:    report even which page the user reads at what time</a>.</p>
1308:  </li>
1309:</ul>
1310:
1311:
1312:
1313:<div class="big-section">
1314:  <h3 id="SpywareInApplications">Spyware in Applications</h3>
1315:  <span class="anchor-reference-id">(<a 
href="#SpywareInApplications">#SpywareInApplications</a>)</span>
1316:</div>
1317:<div style="clear: left;"></div>
1318:
1319:<ul class="blurbs">
1320:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1321:  <li id="M202306120">
1322:    <small class="date-tag">2023-06</small>
1323:    <p>Edge <a
1324:    
href="https://www.neowin.net/news/edge-sends-images-you-view-online-to-microsoft-here-is-how-to-disable-that/";>sends
1325:    the URLs of images the user views to Microsoft's servers</a> by
1326:    default, supposedly to &ldquo;enhance&rdquo; them.  And these images
1327:    <a href="/proprietary/proprietary-surveillance.html#M201405140">may
1328:    end up on the NSA's servers</a>.</p>
1329:
1330:    <p>Microsoft claims its nonfree browser sends the URLs without
1331:    identifying you, which cannot be true, since at least your IP
1332:    address is known to the server if you don't take extra measures.
1333:    Either way, such enhancer service is unjust because any image editing
1334:    <a href="/philosophy/who-does-that-server-really-serve.html">should
1335:    be done on your own computer using installed free software</a>.</p>
1336:
1337:    <p>The article describes how to disable sending the URLs.  That makes
1338:    a change for the better, but we suggest that you instead switch to a
1339:    freedom-respecting browser with additional privacy features such as
1340:    <a href="/software/gnuzilla/">IceCat</a>.</p>
1341:  </li>
1342:
1343:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1344:  <li id="M202305300">
1345:    <small class="date-tag">2023-05</small>
1346:    <p>Some employers are <a
1347:    
href="https://www.theguardian.com/money/2023/may/30/i-feel-constantly-watched-employees-working-under-surveillance-monitorig-software-productivity";>
1348:    forcing employees to run &ldquo;monitoring software&rdquo;</a> on
1349:    their computers. These extremely intrusive proprietary programs
1350:    can take screenshots at regular intervals, log keystrokes,
1351:    record audio and video, etc. Such practices have been shown to <a
1352:    
href="https://www.eurofound.europa.eu/publications/report/2020/employee-monitoring-and-surveillance-the-challenges-of-digitalisation";>
1353:    deteriorate employees' well-being</a>, and trade unions in the
1354:    European union have voiced their concerns about them. The requirement
1355:    for employee's consent, which exists in some countries, is a sham
1356:    because most often the employee is not free to refuse. In short,
1357:    these practices should be abolished.</p>
1358:  </li>
1359:
1360:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1361:  <li id="M202205240">
1362:    <small class="date-tag">2022-05</small>
1363:    <p>A worldwide investigation found that
1364:    most of the applications that school districts
1365:    recommended for remote education during the COVID-19 pandemic <a
1366:    
href="https://web.archive.org/web/20220525011540/https://www.washingtonpost.com/technology/2022/05/24/remote-school-app-tracking-privacy/";>track
1367:    and collect personal data from children as young as below the age of
1368:    five</a>. These applications, and their websites,  send the collected
1369:    information to ad giants such as Facebook and Google, and they are
1370:    still being used in the classrooms even after some of the schools
1371:    reopened.</p>
1372:  </li>
1373:
1374:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1375:  <li id="M201805170">
1376:    <small class="date-tag">2018-05</small>
1377:    <p>The Verify browser extension by Storyful <a
1378:    
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch";>spies
1379:    on the reporters that use it</a>.</p>
1380:  </li>
1381:</ul>
1382:
1383:<div class="big-subsection">
1384:  <h4 id="SpywareInDesktopApps">Desktop Apps</h4>
1385:  <span class="anchor-reference-id">(<a 
href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span>
1386:</div>
1387:
1388:<ul class="blurbs">
1389:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1390:  <li id="M202011260">
1391:    <small class="date-tag">2020-11</small>
1392:    <p>Microsoft's Office 365 suite enables employers <a
1393:    
href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance";>to
1394:    snoop on each employee</a>. After
1395:    a public outburst, Microsoft stated that <a
1396:    
href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance";>it
1397:    would remove this capability</a>. Let's hope so.</p>
1398:  </li>
1399:
1400:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1401:  <li id="M201912190">
1402:    <small class="date-tag">2019-12</small>
1403:    <p>Some Avast and AVG extensions
1404:    for Firefox and Chrome were found to <a
1405:    
href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome";>
1406:    snoop on users' detailed browsing habits</a>. Mozilla and Google
1407:    removed the problematic extensions from their stores, but this shows
1408:    once more how unsafe nonfree software can be. Tools that are supposed
1409:    to protect a proprietary system are, instead, infecting it with
1410:    additional malware (the system itself being the original malware).</p>
1411:  </li>
1412:
1413:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1414:  <li id="M201904210">
1415:    <small class="date-tag">2019-04</small>
1416:    <p>As of April 2019, it is <a
1417:    
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/";>no
1418:    longer possible to disable an
1419:    unscrupulous tracking anti-feature</a> that <a
1420:    
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing";>reports
1421:    users when they follow ping links</a> in Apple Safari, Google Chrome,
1422:    Opera, Microsoft Edge and also in the upcoming Microsoft Edge that is
1423:    going to be based on Chromium.</p>
1424:  </li>
1425:
1426:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1427:  <li id="M201811020">
1428:    <small class="date-tag">2018-11</small>
1429:    <p>Foundry's graphics software <a
1430:    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/";>
1431:    reports information to identify who is running it</a>. The result is
1432:    often a legal threat demanding a lot of money.</p>
1433:
1434:    <p>The fact that this is used for repression of forbidden sharing
1435:    makes it even more vicious.</p>
1436:
1437:    <p>This illustrates that making unauthorized copies of nonfree software
1438:    is not a cure for the injustice of nonfree software. It may avoid
1439:    paying for the nasty thing, but cannot make it less nasty.</p>
1440:  </li>
1441:</ul>
1442:
1443:<div class="big-subsection">
1444:  <h4 id="SpywareInMobileApps">Mobile Apps</h4>
1445:  <span class="anchor-reference-id">(<a 
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
1446:</div>
1447:
1448:<ul class="blurbs">
1449:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1450:  <li id="M202308080">
1451:    <small class="date-tag">2023-08</small>
1452:    <p>The Yandex company has started to <a
1453:    
href="https://meduza.io/en/feature/2023/08/08/user-x-with-driver-y-traveled-from-point-a-to-point-b";>
1454:    give away Yango taxi ride data to Russia's Federal Security Service
1455:    (FSB)</a>. The Russian government (and whoever else receives the
1456:    the data) thus has access to a wealth of personal information,
1457:    including who traveled where, when, and with which driver. Yandex <a
1458:    href="https://yandex.ru/legal/confidential/?lang=en";>
1459:    claims that it complies with European regulations</a> for data
1460:    collected in the European Economic Area, Switzerland or Israel.
1461:    But what about the rest of the world?</p>
1462:  </li>
1463:
1464:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1465:  <li id="M202304030">
1466:    <small class="date-tag">2023-04</small>
1467:    <p>The Pinduoduo app <a
1468:    
href="https://edition.cnn.com/2023/04/02/tech/china-pinduoduo-malware-cybersecurity-analysis-intl-hnk/index.html";>
1469:    snoops on other apps, and takes control of them</a>.  It also installs
1470:    additional malware that is hard to remove.</p>
1471:  </li>
1472:
1473:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1474:  <li id="M202206020">
1475:    <small class="date-tag">2022-06</small>
1476:    <p>Canada has fined the company Tim Hortons for making <a
1477:    
href="https://arstechnica.com/tech-policy/2022/06/tim-hortons-coffee-app-broke-law-by-constantly-recording-users-movements/";>
1478:    an app that tracks people's movements</a> to learn things such as
1479:    where they live, where they work, and when they visit competitors'
1480:    stores.</p>
1481:  </li>
1482:
1483:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1484:  <li id="M202204040">
1485:    <small class="date-tag">2022-04</small>
1486:    <p>New Amazon worker chat app <a
1487:    
href="https://theintercept.com/2022/04/04/amazon-union-living-wage-restrooms-chat-app/";>would
1488:    ban specific words Amazon doesn't like</a>, such as
1489:    &ldquo;union&rdquo;, &ldquo;restrooms&rdquo;, and &ldquo;pay
1490:    raise&rdquo;. If the app was free, workers could modify the program
1491:    so it acts as they wish, not how Amazon wants it.</p>
1492:  </li>
1493:
1494:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1495:  <li id="M202203010">
1496:    <small class="date-tag">2022-03</small>
1497:    <p>The nonfree app &ldquo;Along,&rdquo;
1498:    developed by a company controlled by Zuckerberg, <a
1499:    
href="https://kappanonline.org/dont-go-along-with-corporate-schemes-to-gather-up-student-data/";>
1500:    leads students to reveal to their teacher personal information</a>
1501:    about themselves and their families. Conversations are recorded 
1502:    and the collected data sent to the company, which grants itself the
1503:    right to sell it. See also <a
1504:    
href="/education/educational-malware-app-along.html#content">Educational 
Malware App &ldquo;Along&rdquo;</a>.</p>
1505:  </li>
1506:
1507:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1508:  <li id="M202201270">
1509:    <small class="date-tag">2022-01</small>
1510:    <p>The data broker X-Mode <a
1511:    
href="https://themarkup.org/privacy/2022/01/27/gay-bi-dating-app-muslim-prayer-apps-sold-data-on-peoples-location-to-a-controversial-data-broker";>bought
1512:    location data about 20,000 people collected by around 100 different
1513:    malicious apps</a>.</p>
1514:  </li>
1515:
1516:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1517:  <li id="M202111090">
1518:    <small class="date-tag">2021-11</small>
1519:    <p>A building in LA, with a supermarket in it, <a
1520:    
href="https://www.latimes.com/business/story/2021-11-09/column-trader-joes-parking-app";>demands
1521:    customers load a particular app to pay for parking in the parking
1522:    lot</a>, and accept pervasive surveillance. They also have the
1523:    option of entering their license plate numbers in a kiosk. That is
1524:    an injustice, too.</p>
1525:  </li>
1526:
1527:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1528:  <li id="M202106030">
1529:    <small class="date-tag">2021-06</small>
1530:    <p><a
1531:    
href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/";>TikTok
1532:    apps collect biometric identifiers and biometric information from
1533:    users' smartphones</a>. The company behind it does whatever it wants
1534:    and collects whatever data it can.</p>
1535:  </li>
1536:
1537:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1538:  <li id="M202104060">
1539:    <small class="date-tag">2021-04</small>
1540:    <p>The <a
1541:    
href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/";>WeddingWire
1542:    app saves people's wedding photos forever and hands over data
1543:    to others</a>, giving users no control over their personal 
1544:    information/data. The app also sometimes shows old photos and
1545:    memories to users, without giving them any control over this
1546:    either.</p>
1547:  </li>
1548:
1549:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1550:  <li id="M202102010">
1551:    <small class="date-tag">2021-02</small>
1552:    <p>Many cr&hellip;apps, developed by various
1553:    companies for various organizations, do <a
1554:    
href="https://www.expressvpn.com/digital-security-lab/investigation-xoth";>
1555:    location tracking unknown to those companies and those
1556:    organizations</a>.  It's actually some widely used libraries that do
1557:    the tracking.</p>
1558:
1559:    <p>What's unusual here is that proprietary software developer A tricks
1560:    proprietary software developers B1 &hellip; B50 into making platforms 
for
1561:    A to mistreat the end user.</p>
1562:  </li>
1563:
1564:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1565:  <li id="M202003260">
1566:    <small class="date-tag">2020-03</small>
1567:    <p>The Apple iOS version of Zoom <a
1568:    
href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account";>is
1569:    sending users' data to Facebook</a> even if the user doesn't have
1570:    a Facebook account. According to the article, Zoom and Facebook
1571:    don't even mention this surveillance on their privacy policy page,
1572:    making this an obvious violation of people's privacy even in their
1573:    own terms.</p>
1574:  </li>
1575:
1576:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1577:  <li id="M202003010">
1578:    <small class="date-tag">2020-03</small>
1579:    <p>The Alipay Health Code app
1580:    estimates whether the user has Covid-19 and <a
1581:    
href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html";>
1582:    tells the cops directly</a>.</p>
1583:  </li>
1584:
1585:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1586:  <li id="M202001290">
1587:    <small class="date-tag">2020-01</small>
1588:    <p>The Amazon Ring app does <a
1589:    
href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report";>
1590:    surveillance for other companies as well as for Amazon</a>.</p>
1591:  </li>
1592:
1593:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1594:  <li id="M201912220">
1595:    <small class="date-tag">2019-12</small>
1596:    <p>The ToToc messaging app seems to be a <a
1597:    
href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html";>
1598:    spying tool for the government of the United Arab Emirates</a>.
1599:    Any nonfree program could be doing this, and that is a good
1600:    reason to use free software instead.</p>
1601:
1602:    <p><small>Note: this article uses the word &ldquo;free&rdquo; in
1603:    the sense of &ldquo;gratis.&rdquo;</small></p>
1604:  </li>
1605:
1606:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1607:  <li id="M201912090">
1608:    <small class="date-tag">2019-12</small>
1609:    <p>iMonsters and Android phones,
1610:    when used for work, give employers powerful <a
1611:    
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy";>
1612:    snooping and sabotage capabilities</a> if they install their own
1613:    software on the device.  Many employers demand to do this.  For the
1614:    employee, this is simply nonfree software, as fundamentally unjust
1615:    and as dangerous as any other nonfree software.</p>
1616:  </li>
1617:
1618:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1619:  <li id="M201910130">
1620:    <small class="date-tag">2019-10</small>
1621:    <p>The Chinese Communist Party's &ldquo;Study
1622:    the Great Nation&rdquo; app requires users to grant it <a
1623:    
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962";>
1624:    access to the phone's microphone, photos, text messages, contacts, and
1625:    internet history</a>, and the Android version was found to contain a
1626:    back-door allowing developers to run any code they wish in the users'
1627:    phone, as &ldquo;superusers.&rdquo; Downloading and using this
1628:    app is mandatory at some workplaces.</p>
1629:
1630:    <p>Note: The <a
1631:    
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html";>
1632:    Washington Post version of the article</a> (partly obfuscated, but
1633:    readable after copy-pasting in a text editor) includes a clarification
1634:    saying that the tests were only performed on the Android version
1635:    of the app, and that, according to Apple, &ldquo;this kind of
1636:    &lsquo;superuser&rsquo; surveillance could not be conducted on
1637:    Apple's operating system.&rdquo;</p>
1638:  </li>
1639:
1640:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1641:  <li id="M201909091">
1642:    <small class="date-tag">2019-09</small>
1643:    <p>The Facebook app <a
1644:    
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/";>
1645:    tracks users even when it is turned off</a>, after tricking them
1646:    into giving the app broad permissions in order to use one of its
1647:    functionalities.</p>
1648:  </li>
1649:
1650:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1651:  <li id="M201909090">
1652:    <small class="date-tag">2019-09</small>
1653:    <p>Some nonfree period-tracking apps including MIA Fem and Maya <a
1654:    
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem";>
1655:    send intimate details of users' lives to Facebook</a>.</p>
1656:  </li>
1657:
1658:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1659:  <li id="M201909060">
1660:    <small class="date-tag">2019-09</small>
1661:    <p>Keeping track of who downloads a proprietary
1662:    program is a form of surveillance.  There is a
1663:    proprietary program for adjusting a certain telescopic rifle sight. <a
1664:    
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/";>
1665:    A US prosecutor has demanded the list of all the 10,000 or more people
1666:    who have installed it</a>.</p>
1667:
1668:    <p>With a free program there would not be a list of who has installed
1669:    it.</p>
1670:  </li>
1671:
1672:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1673:  <li id="M201907081">
1674:    <small class="date-tag">2019-07</small>
1675:    <p>Many unscrupulous mobile-app developers keep finding ways to <a
1676:    
href="https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/";>
1677:    bypass user's settings</a>, regulations, and privacy-enhancing features
1678:    of the operating system, in order to gather as much private data as
1679:    they possibly can.</p>
1680:
1681:    <p>Thus, we can't trust rules against spying.  What we can trust is
1682:    having control over the software we run.</p>
1683:  </li>
1684:
1685:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1686:  <li id="M201907080">
1687:    <small class="date-tag">2019-07</small>
1688:    <p>Many Android apps can track
1689:    users' movements even when the user says <a
1690:    
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location";>
1691:    not to allow them access to locations</a>.</p>
1692:
1693:    <p>This involves an apparently unintentional weakness in Android,
1694:    exploited intentionally by malicious apps.</p>
1695:  </li>
1696:
1697:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1698:  <li id="M201905300">
1699:    <small class="date-tag">2019-05</small>
1700:    <p>The Femm &ldquo;fertility&rdquo; app is secretly a <a
1701:    
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners";>
1702:    tool for propaganda</a> by natalist Christians.  It spreads distrust
1703:    for contraception.</p>
1704:
1705:    <p>It snoops on users, too, as you must expect from nonfree
1706:    programs.</p>
1707:  </li>
1708:
1709:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1710:  <li id="M201905060">
1711:    <small class="date-tag">2019-05</small>
1712:    <p>BlizzCon 2019 imposed a <a
1713:    
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/";>
1714:    requirement to run a proprietary phone app</a> to be allowed into
1715:    the event.</p>
1716:
1717:    <p>This app is a spyware that can snoop on a lot of
1718:    sensitive data, including user's location and contact list, and has <a
1719:    
href="https://web.archive.org/web/20220321042716/https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/";>
1720:    near-complete control</a> over the phone.</p>
1721:  </li>
1722:
1723:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1724:  <li id="M201904131">
1725:    <small class="date-tag">2019-04</small>
1726:    <p>Data collected by menstrual and pregnancy monitoring apps is often 
<a
1727:    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance";>
1728:    available to employers and insurance companies</a>. Even though the
1729:    data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
1730:    traced back to the woman who uses the app.</p>
1731:
1732:    <p>This has harmful implications for women's rights to equal employment
1733:    and freedom to make their own pregnancy choices. Don't use
1734:    these apps, even if someone offers you a reward to do so. A
1735:    free-software app that does more or less the same thing without
1736:    spying on you is available from <a
1737:    href="https://search.f-droid.org/?q=menstr";>F-Droid</a>, and <a
1738:    
href="https://web.archive.org/web/20231230011724/https://dcs.megaphone.fm/BLM6228935164.mp3?key=23a58d3f686794e6d8b8678a5204887b&amp;request_event_id=36469053-3d0b-4724-bf2d-6dbeeeac282e";>
1739:    a new one is being developed</a>.</p>
1740:  </li>
1741:
1742:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1743:  <li id="M201904130">
1744:    <small class="date-tag">2019-04</small>
1745:    <p>Google tracks the movements of Android phones and iPhones
1746:    running Google apps, and sometimes <a
1747:    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html";>
1748:    saves the data for years</a>.</p>
1749:
1750:    <p>Nonfree software in the phone has to be responsible for sending
1751:    the location data to Google.</p>
1752:  </li>
1753:
1754:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1755:  <li id="M201903251">
1756:    <small class="date-tag">2019-03</small>
1757:    <p>Many Android phones come with a huge number of <a
1758:    
href="https://web.archive.org/web/20190326145122/https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html";>
1759:    preinstalled nonfree apps that have access to sensitive data without
1760:    users' knowledge</a>. These hidden apps may either call home with
1761:    the data, or pass it on to user-installed apps that have access to
1762:    the network but no direct access to the data. This results in massive
1763:    surveillance on which the user has absolutely no control.</p>
1764:  </li>
1765:
1766:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1767:  <li id="M201903211">
1768:    <small class="date-tag">2019-03</small>
1769:    <p>The MoviePass dis-service <a
1770:    
href="https://www.cnet.com/culture/entertainment/moviepass-founder-wants-to-use-facial-recognition-to-score-you-free-movies/";>
1771:    is planning to use face recognition to track people's eyes</a>
1772:    to make sure they won't put their phones down or look away during
1773:    ads&mdash;and trackers.</p>
1774:  </li>
1775:
1776:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1777:  <li id="M201903201">
1778:    <small class="date-tag">2019-03</small>
1779:    <p>A study of 24 &ldquo;health&rdquo; apps found that 19 of them <a
1780:    
href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows";>
1781:    send sensitive personal data to third parties</a>, which can use it
1782:    for invasive advertising or discriminating against people in poor
1783:    medical condition.</p>
1784:
1785:    <p>Whenever user &ldquo;consent&rdquo; is sought, it is buried in
1786:    lengthy terms of service that are difficult to understand. In any case,
1787:    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.</p>
1788:  </li>
1789:
1790:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1791:  <li id="M201902230">
1792:    <small class="date-tag">2019-02</small>
1793:    <p>Facebook offered a convenient proprietary
1794:    library for building mobile apps, which also <a
1795:    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html";>
1796:    sent personal data to Facebook</a>. Lots of companies built apps that
1797:    way and released them, apparently not realizing that all the personal
1798:    data they collected would go to Facebook as well.</p>
1799:
1800:    <p>It shows that no one can trust a nonfree program, not even the
1801:    developers of other nonfree programs.</p>
1802:  </li>
1803:
1804:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1805:  <li id="M201902140">
1806:    <small class="date-tag">2019-02</small>
1807:    <p>The AppCensus database gives information on <a
1808:    href="https://www.appcensus.io/";> how Android apps use and
1809:    misuse users' personal data</a>. As of March 2019, nearly
1810:    78,000 have been analyzed, of which 24,000 (31%) transmit the <a
1811:    href="/proprietary/proprietary-surveillance.html#M201812290">
1812:    Advertising ID</a> to other companies, and <a
1813:    
href="https://web.archive.org/web/20240501141046/https://blog.appcensus.io/2019/02/14/ad-ids-behaving-badly/";>
1814:    18,000 (23% of the total) link this ID to hardware identifiers</a>,
1815:    so that users cannot escape tracking by resetting it.</p>
1816:
1817:    <p>Collecting hardware identifiers is in apparent violation of
1818:    Google's policies. But it seems that Google wasn't aware of it,
1819:    and, once informed, was in no hurry to take action. This proves
1820:    that the policies of a development platform are ineffective at
1821:    preventing nonfree software developers from including malware in
1822:    their programs.</p>
1823:  </li>
1824:
1825:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1826:  <li id="M201902060">
1827:    <small class="date-tag">2019-02</small>
1828:    <p>Many nonfree apps have a surveillance feature for <a
1829:    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/";>
1830:    recording all the users' actions</a> in interacting with the app.</p>
1831:  </li>
1832:
1833:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1834:  <li id="M201902041.1">
1835:    <small class="date-tag">2019-02</small>
1836:    <p>Twenty nine &ldquo;beauty camera&rdquo; apps that used to
1837:    be on Google Play had one or more malicious functionalities, such as <a
1838:    
href="https://www.androidpolice.com/2019/02/03/google-bans-29-beauty-camera-apps-from-the-play-store-that-steal-your-photos/";>
1839:    stealing users' photos instead of &ldquo;beautifying&rdquo; them</a>,
1840:    pushing unwanted and often malicious ads on users, and redirecting
1841:    them to phishing sites that stole their credentials. Furthermore,
1842:    the user interface of most of them was designed to make uninstallation
1843:    difficult.</p>
1844:
1845:    <p>Users should of course uninstall these dangerous apps if they
1846:    haven't yet, but they should also stay away from nonfree apps in
1847:    general. <em>All</em> nonfree apps carry a potential risk because
1848:    there is no easy way of knowing what they really do.</p>
1849:  </li>
1850:
1851:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1852:  <li id="M201902010">
1853:    <small class="date-tag">2019-02</small>
1854:    <p>An investigation of the 150 most popular
1855:    gratis VPN apps in Google Play found that <a
1856:    
href="https://www.top10vpn.com/research/free-vpn-investigations/risk-index/";>
1857:    25% fail to protect their users' privacy</a> due to DNS leaks. In
1858:    addition, 85% feature intrusive permissions or functions in their
1859:    source code&mdash;often used for invasive advertising&mdash;that could
1860:    potentially also be used to spy on users. Other technical flaws were
1861:    found as well.</p>
1862:
1863:    <p>Moreover, a previous investigation had found that <a
1864:    
href="https://www.top10vpn.com/research/free-vpn-investigations/ownership/";>half
 of
1865:    the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
1866:
1867:    <p><small>(It is unfortunate that these articles talk about &ldquo;free
1868:    apps.&rdquo; These apps are gratis, but they are <em>not</em> <a
1869:    href="/philosophy/free-sw.html">free software</a>.)</small></p>
1870:  </li>
1871:
1872:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1873:  <li id="M201901050">
1874:    <small class="date-tag">2019-01</small>
1875:    <p>The Weather Channel app <a
1876:    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling";>
1877:    stored users' locations to the company's server</a>. The company is
1878:    being sued, demanding that it notify the users of what it will do
1879:    with the data.</p>
1880:
1881:    <p>We think that lawsuit is about a side issue. What the company does
1882:    with the data is a secondary issue. The principal wrong here is that
1883:    the company gets that data at all.</p>
1884:
1885:    <p><a
1886:    
href="https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps";>
1887:    Other weather apps</a>, including Accuweather and WeatherBug, are
1888:    tracking people's locations.</p> 
1889:  </li>
1890:
1891:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1892:  <li id="M201812290">
1893:    <small class="date-tag">2018-12</small>
1894:    <p>Around 40% of gratis Android apps <a
1895:    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report";>
1896:    report on the user's actions to Facebook</a>.</p>
1897:
1898:    <p>Often they send the machine's &ldquo;advertising ID,&rdquo; so that
1899:    Facebook can correlate the data it obtains from the same machine via
1900:    various apps. Some of them send Facebook detailed information about
1901:    the user's activities in the app; others only say that the user is
1902:    using that app, but that alone is often quite informative.</p>
1903:
1904:    <p>This spying occurs regardless of whether the user has a Facebook
1905:    account.</p>
1906:  </li>
1907:
1908:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1909:  <li id="M201810244">
1910:    <small class="date-tag">2018-10</small>
1911:    <p>Some Android apps <a
1912:    
href="https://web.archive.org/web/20210418052600/https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/";>
1913:    track the phones of users that have deleted them</a>.</p>
1914:  </li>
1915:
1916:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1917:  <li id="M201808030">
1918:    <small class="date-tag">2018-08</small>
1919:    <p>Some Google apps on Android <a
1920:    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile";>
1921:    record the user's location even when users disable &ldquo;location
1922:    tracking&rdquo;</a>.</p>
1923:
1924:    <p>There are other ways to turn off the other kinds of location
1925:    tracking, but most users will be tricked by the misleading control.</p>
1926:  </li>
1927:
1928:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1929:  <li id="M201806110">
1930:    <small class="date-tag">2018-06</small>
1931:    <p>The Spanish football streaming app <a
1932:    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html";>tracks
1933:    the user's movements and listens through the microphone</a>.</p>
1934:
1935:    <p>This makes them act as spies for licensing enforcement.</p>
1936:
1937:    <p>We expect it implements DRM, too&mdash;that there is no way to save
1938:    a recording. But we can't be sure from the article.</p>
1939:
1940:    <p>If you learn to care much less about sports, you will benefit in
1941:    many ways. This is one more.</p>
1942:  </li>
1943:
1944:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1945:  <li id="M201804160">
1946:    <small class="date-tag">2018-04</small>
1947:    <p>More than <a
1948:    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy";>50%
1949:    of the 5,855 Android apps studied by researchers were found to snoop
1950:    and collect information about its users</a>.  40% of the apps were
1951:    found to insecurely snitch on its users.  Furthermore, they could
1952:    detect only some methods of snooping, in these proprietary apps whose
1953:    source code they cannot look at.  The other apps might be snooping
1954:    in other ways.</p>
1955:
1956:    <p>This is evidence that proprietary apps generally work against
1957:    their users.  To protect their privacy and freedom, Android users
1958:    need to get rid of the proprietary software&mdash;both proprietary
1959:    Android by <a href="https://replicant.us";>switching to Replicant</a>,
1960:    and the proprietary apps by getting apps from the free software
1961:    only <a href="https://f-droid.org/";>F-Droid store</a> that <a
1962:    href="https://f-droid.org/docs/Anti-Features/";> prominently warns
1963:    the user if an app contains anti-features</a>.</p>
1964:  </li>
1965:
1966:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1967:  <li id="M201804020">
1968:    <small class="date-tag">2018-04</small>
1969:    <p>Grindr collects information about <a
1970:    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status";>
1971:    which users are HIV-positive, then provides the information to
1972:    companies</a>.</p>
1973:
1974:    <p>Grindr should not have so much information about its users.
1975:    It could be designed so that users communicate such info to each
1976:    other but not to the server's database.</p>
1977:  </li>
1978:
1979:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1980:  <li id="M201803050">
1981:    <small class="date-tag">2018-03</small>
1982:    <p>The moviepass app and dis-service
1983:    spy on users even more than users expected. It <a
1984:    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/";>records
1985:    where they travel before and after going to a movie</a>.</p>
1986:
1987:    <p>Don't be tracked&mdash;pay cash!</p>
1988:  </li>
1989:
1990:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
1991:  <li id="M201802280">
1992:    <small class="date-tag">2018-02</small>
1993:    <p>Spotify app <a
1994:    
href="https://www.sec.gov/Archives/edgar/data/1639920/000119312518063434/d494294df1.htm";>harvests
1995:    users' data to personally identify and know people</a> through music,
1996:    their mood, mindset, activities, and tastes. There are over 150
1997:    billion events logged daily on the program which contains users'
1998:    data and personal information.</p>
1999:  </li>
2000:
2001:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2002:  <li id="M201711240">
2003:    <small class="date-tag">2017-11</small>
2004:    <p>Tracking software in popular Android apps
2005:    is pervasive and sometimes very clever. Some trackers can <a
2006:    
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/";>
2007:    follow a user's movements around a physical store by noticing WiFi
2008:    networks</a>.</p>
2009:  </li>
2010:
2011:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2012:  <li id="M201709020">
2013:    <small class="date-tag">2017-09</small>
2014:    <p><a
2015:    
href="https://web.archive.org/web/20230607090524/https://old.reddit.com/r/Instagram/comments/6xkhi8/ig_suddenly_asking_for_phone_number_not_visible/";>Instagram
2016:    is forcing users to give away their phone numbers</a> and won't let
2017:    people continue using the app if they refuse.</p>
2018:  </li>
2019:
2020:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2021:  <li id="M201708270">
2022:    <small class="date-tag">2017-08</small>
2023:    <p>The Sarahah app <a
2024:    
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/";>
2025:    uploads all phone numbers and email addresses</a> in user's address
2026:    book to developer's server.</p>
2027:
2028:    <p><small>(Note that this article misuses the words
2029:    &ldquo;<a href="/philosophy/free-sw.html">free software</a>&rdquo;
2030:    referring to zero price.)</small></p>
2031:  </li>
2032:
2033:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2034:  <li id="M201707270">
2035:    <small class="date-tag">2017-07</small>
2036:    <p>20 dishonest Android apps recorded <a
2037:    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts/";>phone
2038:    calls and sent them and text messages and emails to snoopers</a>.</p>
2039:
2040:    <p>Google did not intend to make these apps spy; on the contrary, it
2041:    worked in various ways to prevent that, and deleted these apps after
2042:    discovering what they did. So we cannot blame Google specifically
2043:    for the snooping of these apps.</p>
2044:
2045:    <p>On the other hand, Google redistributes nonfree Android apps, and
2046:    therefore shares in the responsibility for the injustice of their being
2047:    nonfree. It also distributes its own nonfree apps, such as Google Play,
2048:    <a href="/philosophy/free-software-even-more-important.html">which
2049:    are malicious</a>.</p>
2050:
2051:    <p>Could Google have done a better job of preventing apps from
2052:    cheating? There is no systematic way for Google, or Android users,
2053:    to inspect executable proprietary apps to see what they do.</p>
2054:
2055:    <p>Google could demand the source code for these apps, and study
2056:    the source code somehow to determine whether they mistreat users in
2057:    various ways. If it did a good job of this, it could more or less
2058:    prevent such snooping, except when the app developers are clever
2059:    enough to outsmart the checking.</p>
2060:
2061:    <p>But since Google itself develops malicious apps, we cannot trust
2062:    Google to protect us. We must demand release of source code to the
2063:    public, so we can depend on each other.</p>
2064:  </li>
2065:
2066:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2067:  <li id="M201705230">
2068:    <small class="date-tag">2017-05</small>
2069:    <p>Apps for BART <a
2070:    
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/";>
2071:    snoop on users</a>.</p>
2072:
2073:    <p>With free software apps, users could <em>make sure</em> that they
2074:    don't snoop.</p>
2075:
2076:    <p>With proprietary apps, one can only hope that they don't.</p>
2077:  </li>
2078:
2079:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2080:  <li id="M201705040">
2081:    <small class="date-tag">2017-05</small>
2082:    <p>A study found 234 Android apps that track users by <a
2083:    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/";>listening
2084:    to ultrasound from beacons placed in stores or played by TV
2085:    programs</a>.</p>
2086:  </li>
2087:
2088:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2089:  <li id="M201704260">
2090:    <small class="date-tag">2017-04</small>
2091:    <p>Faceapp appears to do lots of surveillance, judging by <a
2092:    
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/";>
2093:    how much access it demands to personal data in the device</a>.</p>
2094:  </li>
2095:
2096:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2097:  <li id="M201704190">
2098:    <small class="date-tag">2017-04</small>
2099:    <p>Users are suing Bose for <a
2100:    
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/";>
2101:    distributing a spyware app for its headphones</a>.  Specifically,
2102:    the app would record the names of the audio files users listen to
2103:    along with the headphone's unique serial number.</p>
2104:
2105:    <p>The suit accuses that this was done without the users' consent.
2106:    If the fine print of the app said that users gave consent for this,
2107:    would that make it acceptable? No way! It should be flat out <a
2108:    href="/philosophy/surveillance-vs-democracy.html"> illegal to design
2109:    the app to snoop at all</a>.</p>
2110:  </li>
2111:
2112:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2113:  <li id="M201704074">
2114:    <small class="date-tag">2017-04</small>
2115:    <p>Pairs of Android apps can collude
2116:    to transmit users' personal data to servers. <a
2117:    
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/";>A
2118:    study found tens of thousands of pairs that collude</a>.</p>
2119:  </li>
2120:
2121:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2122:  <li id="M201703300">
2123:    <small class="date-tag">2017-03</small>
2124:    <p>Verizon <a
2125:    
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones";>
2126:    announced an opt-in proprietary search app that it will</a> pre-install
2127:    on some of its phones. The app will give Verizon the same information
2128:    about the users' searches that Google normally gets when they use
2129:    its search engine.</p>
2130:
2131:    <p>Currently, the app is <a
2132:    
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware";>
2133:    being pre-installed on only one phone</a>, and the user must
2134:    explicitly opt-in before the app takes effect. However, the app
2135:    remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
2136:    still spyware.</p>
2137:  </li>
2138:
2139:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2140:  <li id="M201701210">
2141:    <small class="date-tag">2017-01</small>
2142:    <p>The Meitu photo-editing app <a
2143:    
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/";>sends
2144:    user data to a Chinese company</a>.</p>
2145:  </li>
2146:
2147:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2148:  <li id="M201611280">
2149:    <small class="date-tag">2016-11</small>
2150:    <p>The Uber app tracks <a
2151:    
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/";>clients'
2152:    movements before and after the ride</a>.</p>
2153:
2154:    <p>This example illustrates how &ldquo;getting the user's
2155:    consent&rdquo; for surveillance is inadequate as a protection against
2156:    massive surveillance.</p>
2157:  </li>
2158:
2159:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2160:  <li id="M201611160">
2161:    <small class="date-tag">2016-11</small>
2162:    <p>A <a
2163:    
href="https://research.csiro.au/isp/wp-content/uploads/sites/106/2016/08/paper-1.pdf";>
2164:    research paper</a> that investigated the privacy and security of
2165:    283 Android VPN apps concluded that &ldquo;in spite of the promises
2166:    for privacy, security, and anonymity given by the majority of VPN
2167:    apps&mdash;millions of users may be unawarely subject to poor security
2168:    guarantees and abusive practices inflicted by VPN apps.&rdquo;</p>
2169:
2170:    <p>Following is a non-exhaustive list, taken from the research paper,
2171:    of some proprietary VPN apps that track users and infringe their
2172:    privacy:</p>
2173:
2174:    <dl class="compact">
2175:      <dt>SurfEasy</dt>
2176:      <dd>Includes tracking libraries such as NativeX and Appflood,
2177:      meant to track users and show them targeted ads.</dd>
2178:
2179:      <dt>sFly Network Booster</dt>
2180:      <dd>Requests the <code>READ_SMS</code> and <code>SEND_SMS</code>
2181:      permissions upon installation, meaning it has full access to users'
2182:      text messages.</dd>
2183:
2184:      <dt>DroidVPN and TigerVPN</dt>
2185:      <dd>Requests the <code>READ_LOGS</code> permission to read logs
2186:      for other apps and also core system logs. TigerVPN developers have
2187:      confirmed this.</dd>
2188:
2189:      <dt>HideMyAss</dt>
2190:      <dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
2191:      may turn them over to the UK government if requested.</dd>
2192:
2193:      <dt>VPN Services HotspotShield</dt>
2194:      <dd>Injects JavaScript code into the HTML pages returned to the
2195:      users. The stated purpose of the JS injection is to display ads. Uses
2196:      roughly five tracking libraries. Also, it redirects the user's
2197:      traffic through valueclick.com (an advertising website).</dd>
2198:
2199:      <dt>WiFi Protector VPN</dt>
2200:      <dd>Injects JavaScript code into HTML pages, and also uses roughly
2201:      five tracking libraries. Developers of this app have confirmed that
2202:      the non-premium version of the app does JavaScript injection for
2203:      tracking the user and displaying ads.</dd>
2204:    </dl>
2205:  </li>
2206:
2207:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2208:  <li id="M201609210">
2209:    <small class="date-tag">2016-09</small>
2210:    <p>Google's new voice messaging app <a
2211:    
href="https://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google";>logs
2212:    all conversations</a>.</p>
2213:  </li>
2214:
2215:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2216:  <li id="M201606050">
2217:    <small class="date-tag">2016-06</small>
2218:    <p>Facebook's new Magic Photo app <a
2219:    
href="https://www.theregister.com/2015/11/10/facebook_scans_camera_for_your_friends/";>
2220:    scans your mobile phone's photo collections for known faces</a>,
2221:    and suggests you circulate the picture you take according to who is
2222:    in the frame.</p>
2223:
2224:    <p>This spyware feature seems to require online access to some
2225:    known-faces database, which means the pictures are likely to be
2226:    sent across the wire to Facebook's servers and face-recognition
2227:    algorithms.</p>
2228:
2229:    <p>If so, none of Facebook users' pictures are private anymore,
2230:    even if the user didn't &ldquo;upload&rdquo; them to the service.</p>
2231:  </li>
2232:
2233:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2234:  <li id="M201605310">
2235:    <small class="date-tag">2016-05</small>
2236:    <p>Facebook's app listens all the time, <a
2237:    
href="https://www.independent.co.uk/tech/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html";>to
2238:    snoop on what people are listening to or watching</a>. In addition,
2239:    it may be analyzing people's conversations to serve them with targeted
2240:    advertisements.</p>
2241:  </li>
2242:
2243:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2244:  <li id="M201604250">
2245:    <small class="date-tag">2016-04</small>
2246:    <p>A pregnancy test controller application not only can <a
2247:    
href="https://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security";>
2248:    spy on many sorts of data in the phone, and in server accounts,
2249:    it can alter them too</a>.</p>
2250:  </li>
2251:
2252:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2253:  <li id="M201601130">
2254:    <small class="date-tag">2016-01</small>
2255:    <p>Apps that include <a
2256:    
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/";>
2257:    Symphony surveillance software snoop on what radio and TV programs
2258:    are playing nearby</a>.  Also on what users post on various sites
2259:    such as Facebook, Google+ and Twitter.</p>
2260:  </li>
2261:
2262:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2263:  <li id="M201511190">
2264:    <small class="date-tag">2015-11</small>
2265:    <p>&ldquo;Cryptic communication,&rdquo;
2266:    unrelated to the app's functionality, was <a
2267:    
href="https://news.mit.edu/2015/data-transferred-android-apps-hiding-1119";>
2268:    found in the 500 most popular gratis Android apps</a>.</p>
2269:
2270:    <p>The article should not have described these apps as
2271:    &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
2272:    to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;</p>
2273:
2274:    <p>The article takes for granted that the usual analytics tools are
2275:    legitimate, but is that valid? Software developers have no right to
2276:    analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
2277:    that snoop are just as wrong as any other snooping.</p>
2278:  </li>
2279:
2280:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2281:  <li id="M201510300">
2282:    <small class="date-tag">2015-10</small>
2283:    <p>More than 73% and 47% of mobile applications, for Android and iOS
2284:    respectively <a href="https://techscience.org/a/2015103001/";>hand over
2285:    personal, behavioral and location information</a> of their users to
2286:    third parties.</p>
2287:  </li>
2288:
2289:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2290:  <li id="M201508210">
2291:    <small class="date-tag">2015-08</small>
2292:    <p>Like most &ldquo;music screaming&rdquo; disservices, Spotify is
2293:    based on proprietary malware (DRM and snooping). In August 2015 it <a
2294:    
href="https://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy";>
2295:    demanded users submit to increased snooping</a>, and some are starting
2296:    to realize that it is nasty.</p>
2297:
2298:    <p>This article shows the <a
2299:    
href="https://www.theregister.com/2015/08/21/spotify_worse_than_the_nsa/";>
2300:    twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
2301:    users better</a>&mdash;never mind whether they want that. This is a
2302:    typical example of the attitude of the proprietary software industry
2303:    towards those they have subjugated.</p>
2304:
2305:    <p>Out, out, damned Spotify!</p>
2306:  </li>
2307:
2308:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2309:  <li id="M201507281">
2310:    <small class="date-tag">2015-07</small>
2311:    <p>Many retail businesses publish cr&hellip;apps that ask to <a
2312:    
href="https://www.delish.com/kitchen-tools/a43252/how-food-apps-use-data/";>
2313:    spy on the user's own data</a>&mdash;often many kinds.</p>
2314:
2315:    <p>Those companies know that snoop-phone usage trains people to say
2316:    yes to almost any snooping.</p>
2317:  </li>
2318:
2319:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2320:  <li id="M201506264">
2321:    <small class="date-tag">2015-06</small>
2322:    <p><a
2323:    
href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf";>
2324:    A study in 2015</a> found that 90% of the top-ranked gratis proprietary
2325:    Android apps contained recognizable tracking libraries. For the paid
2326:    proprietary apps, it was only 60%.</p>
2327:
2328:    <p>The article confusingly describes gratis apps as
2329:    &ldquo;free&rdquo;, but most of them are not in fact <a
2330:    href="/philosophy/free-sw.html">free software</a>.  It also uses the
2331:    ugly word &ldquo;monetize&rdquo;. A good replacement for that word
2332:    is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.</p>
2333:  </li>
2334:
2335:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2336:  <li id="M201505060">
2337:    <small class="date-tag">2015-05</small>
2338:    <p>Gratis Android apps (but not <a
2339:    href="/philosophy/free-sw.html">free software</a>) connect to 100 <a
2340:    
href="https://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites";>tracking
2341:    and advertising</a> URLs, on the average.</p>
2342:  </li>
2343:
2344:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2345:  <li id="M201504060">
2346:    <small class="date-tag">2015-04</small>
2347:    <p>Widely used <a
2348:    
href="https://freedom-to-tinker.com/2015/04/06/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/";>proprietary
2349:    QR-code scanner apps snoop on the user</a>. This is in addition to
2350:    the snooping done by the phone company, and perhaps by the OS in
2351:    the phone.</p>
2352:
2353:    <p>Don't be distracted by the question of whether the app developers
2354:    get users to say &ldquo;I agree&rdquo;. That is no excuse for
2355:    malware.</p>
2356:  </li>
2357:
2358:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2359:  <li id="M201411260">
2360:    <small class="date-tag">2014-11</small>
2361:    <p>Many proprietary apps for mobile devices
2362:    report which other apps the user has installed.  <a
2363:    href="https://techcrunch.com/2014/11/26/twitter-app-graph/";>Twitter
2364:    is doing this in a way that at least is visible and optional</a>. Not
2365:    as bad as what the others do.</p>
2366:  </li>
2367:
2368:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2369:  <li id="M201401150.1">
2370:    <small class="date-tag">2014-01</small>
2371:    <p>The Simeji keyboard is a smartphone version of Baidu's <a
2372:    href="/proprietary/proprietary-surveillance.html#baidu-ime">spying 
<abbr
2373:    title="Input Method Editor">IME</abbr></a>.</p>
2374:  </li>
2375:
2376:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2377:  <li id="M201312270">
2378:    <small class="date-tag">2013-12</small>
2379:    <p>The nonfree Snapchat app's principal purpose is to restrict the
2380:    use of data on the user's computer, but it does surveillance too: <a
2381:    
href="https://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers";>
2382:    it tries to get the user's list of other people's phone
2383:    numbers</a>.</p>
2384:  </li>
2385:
2386:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2387:  <li id="M201312060">
2388:    <small class="date-tag">2013-12</small>
2389:    <p>The Brightest Flashlight app <a
2390:    
href="https://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers";>
2391:    sends user data, including geolocation, for use by companies</a>.</p>
2392:
2393:    <p>The FTC criticized this app because it asked the user to
2394:    approve sending personal data to the app developer but did not ask
2395:    about sending it to other companies.  This shows the weakness of
2396:    the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
2397:    surveillance: why should a flashlight app send any information to
2398:    anyone? A free software flashlight app would not.</p>
2399:  </li>
2400:
2401:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2402:  <li id="M201212100">
2403:    <small class="date-tag">2012-12</small>
2404:    <p>FTC says most mobile apps for children don't respect privacy: <a
2405:    
href="https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/";>
2406:    
https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
2407:  </li>
2408:</ul>
2409:
2410:
2411:<div class="big-subsection">
2412:  <h4 id="SpywareInSkype">Skype</h4>
2413:  <span class="anchor-reference-id">(<a 
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
2414:</div>
2415:
2416:<ul class="blurbs">
2417:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2418:  <li id="M201908151">
2419:    <small class="date-tag">2019-08</small>
2420:    <p>Skype refuses to say whether it can <a
2421:    
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html";>eavesdrop
2422:    on calls</a>.</p>
2423:
2424:    <p>That almost certainly means it can do so.</p>
2425:  </li>
2426:
2427:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2428:  <li id="M201307110">
2429:    <small class="date-tag">2013-07</small>
2430:    <p>Skype contains <a
2431:    
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/";>spyware</a>.
2432:    Microsoft changed Skype <a
2433:    
href="https://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data";>
2434:    specifically for spying</a>.</p>
2435:  </li>
2436:</ul>
2437:
2438:
2439:<div class="big-subsection">
2440:  <h4 id="SpywareInGames">Games</h4>
2441:  <span class="anchor-reference-id">(<a 
href="#SpywareInGames">#SpywareInGames</a>)</span>
2442:</div>
2443:
2444:<ul class="blurbs">
2445:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2446:  <li id="M202010221">
2447:    <small class="date-tag">2020-10</small>
2448:    <p>Microsoft is imposing its
2449:    surveillance on the game of Minecraft by <a
2450:    
href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java";>requiring
2451:    every player to open an account on Microsoft's network</a>. Microsoft
2452:    has bought the game and will merge all accounts into its network,
2453:    which will give them access to people's data.</p>
2454:
2455:    <p>Minecraft players <a
2456:    href="https://directory.fsf.org/wiki/Minetest";>can play Minetest</a>
2457:    instead. The essential advantage of Minetest is that it is free
2458:    software, meaning it respects the user's computer freedom. As a bonus,
2459:    it offers more options.</p>
2460:  </li>
2461:
2462:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2463:  <li id="M201908210">
2464:    <small class="date-tag">2019-08</small>
2465:    <p>Microsoft recorded users of Xboxes and had <a
2466:    
href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana";>
2467:    human workers listen to the recordings</a>.</p>
2468:
2469:    <p>Morally, we see no difference between having human workers listen 
and
2470:    having speech-recognition systems listen.  Both intrude on privacy.</p>
2471:  </li>
2472:
2473:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2474:  <li id="M201806240">
2475:    <small class="date-tag">2018-06</small>
2476:    <p>Red Shell is a spyware that
2477:    is found in many proprietary games. It <a
2478:    
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/";>
2479:    tracks data on users' computers and sends it to third parties</a>.</p>
2480:  </li>
2481:
2482:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2483:  <li id="M201804144">
2484:    <small class="date-tag">2018-04</small>
2485:    <p>ArenaNet surreptitiously installed a spyware
2486:    program along with an update to the massive
2487:    multiplayer game Guild Wars 2.  The spyware allowed ArenaNet <a
2488:    
href="https://techraptor.net/gaming/news/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave";>
2489:    to snoop on all open processes running on its user's computer</a>.</p>
2490:  </li>
2491:
2492:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2493:  <li id="M201711070">
2494:    <small class="date-tag">2017-11</small>
2495:    <p>The driver for a certain gaming keyboard <a
2496:    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html";>sends
2497:    information to China</a>.</p>
2498:  </li>
2499:
2500:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2501:  <li id="M201512290">
2502:    <small class="date-tag">2015-12</small>
2503:    <p>Many <a
2504:    
href="https://www.thestar.com/news/canada/video-game-companies-are-collecting-massive-amounts-of-data-about-you/article_31fba9a3-2760-57ae-9ae0-4083904bcb87.html";>
2505:    video game consoles snoop on their users and report to the
2506:    internet</a>&mdash;even what their users weigh.</p>
2507:
2508:    <p>A game console is a computer, and you can't trust a computer with
2509:    a nonfree operating system.</p>
2510:  </li>
2511:
2512:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2513:  <li id="M201509160">
2514:    <small class="date-tag">2015-09</small>
2515:    <p>Modern gratis game cr&hellip;apps <a
2516:    
href="https://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/";>
2517:    collect a wide range of data about their users and their users'
2518:    friends and associates</a>.</p>
2519:
2520:    <p>Even nastier, they do it through ad networks that merge the data
2521:    collected by various cr&hellip;apps and sites made by different
2522:    companies.</p>
2523:
2524:    <p>They use this data to manipulate people to buy things, and hunt for
2525:    &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
2526:    use a back door to manipulate the game play for specific players.</p>
2527:
2528:    <p>While the article describes gratis games, games that cost money
2529:    can use the same tactics.</p>
2530:  </li>
2531:
2532:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2533:  <li id="M201401280">
2534:    <small class="date-tag">2014-01</small>
2535:    <p>Angry Birds <a
2536:    
href="https://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html";>
2537:    spies for companies, and the NSA takes advantage
2538:    to spy through it too</a>.  Here's information on <a
2539:    
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html";>
2540:    more spyware apps</a>.</p>
2541:
2542:    <p><a
2543:    
href="https://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data";>
2544:    More about NSA app spying</a>.</p>
2545:  </li>
2546:
2547:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2548:  <li id="M200510200">
2549:    <small class="date-tag">2005-10</small>
2550:    <p>Blizzard Warden is a hidden
2551:    &ldquo;cheating-prevention&rdquo; program that <a
2552:    
href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware";>
2553:    spies on every process running on a gamer's computer and sniffs a
2554:    good deal of personal data</a>, including lots of activities which
2555:    have nothing to do with cheating.</p>
2556:  </li>
2557:</ul>
2558:
2559:
2560:
2561:<div class="big-section">
2562:  <h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
2563:  <span class="anchor-reference-id">(<a 
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
2564:</div>
2565:<div style="clear: left;"></div>
2566:
2567:<ul class="blurbs">
2568:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2569:  <li id="M202101050">
2570:    <small class="date-tag">2021-01</small>
2571:    <p>Most Internet connected devices in Mozilla's <a
2572:    
href="https://web.archive.org/web/20220129065321/https://foundation.mozilla.org/en/privacynotincluded/";>&ldquo;Privacy
2573:    Not Included&rdquo;</a> list <a
2574:    
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell";>are
2575:    designed to snoop on users</a> even if they meet
2576:    Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure
2577:    design of the program running on some of these devices <a
2578:    
href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster";>makes
2579:    the user susceptible to be snooped on and exploited by crackers as
2580:    well</a>.</p>
2581:  </li>
2582:
2583:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2584:  <li id="M201912110">
2585:    <small class="date-tag">2019-12</small>
2586:    <p>As tech companies add microphones to a wide range
2587:    of products, including refrigerators and motor vehicles,
2588:    they also set up transcription farms where human employees <a
2589:    
href="https://getpocket.com/explore/item/silicon-valley-got-millions-to-let-siri-and-alexa-listen-in";>
2590:    listen to what people say</a> and tweak the recognition algorithms.</p>
2591:  </li>
2592:
2593:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2594:  <li id="M201708280">
2595:    <small class="date-tag">2017-08</small>
2596:    <p>The bad security in many Internet of Stings devices allows <a
2597:    
href="https://www.techdirt.com/2017/08/28/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you/";>ISPs
2598:    to snoop on the people that use them</a>.</p>
2599:
2600:    <p>Don't be a sucker&mdash;reject all the stings.</p>
2601:
2602:    <p><small>(It is unfortunate that the article uses the term <a
2603:    
href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.)</small></p>
2604:  </li>
2605:</ul>
2606:
2607:
2608:<div class="big-subsection">
2609:  <h4 id="SpywareInTVSets">TV Sets</h4>
2610:  <span class="anchor-reference-id">(<a 
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
2611:</div>
2612:
2613:<p>Emo Phillips made a joke: The other day a woman came up to me and
2614:said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
2615:don't know. You can't see out the other way.&rdquo; Evidently that was
2616:before Amazon &ldquo;smart&rdquo; TVs.</p>
2617:
2618:<ul class="blurbs">
2619:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2620:  <li id="M202204140">
2621:    <small class="date-tag">2022-04</small>
2622:    <p>Today's &ldquo;smart&rdquo; TVs <a
2623:    
href="https://www.techdirt.com/2022/04/14/its-still-stupidly-ridiculously-difficult-to-buy-a-dumb-tv/";>
2624:    push people to surrender to tracking via internet</a>. Some won't work
2625:    unless they have a chance to download nonfree software. And they are
2626:    designed for programmed obsolescence.</p>
2627:  </li>
2628:
2629:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2630:  <li id="M202201290">
2631:    <small class="date-tag">2022-01</small>
2632:    <p>&ldquo;Smart&rdquo; TV manufacturers <a
2633:    
href="https://www.theguardian.com/technology/2022/jan/29/what-your-smart-tv-knows-about-you-and-how-to-stop-it-harvesting-data";>
2634:    spy on people using various methods</a>, and harvest their
2635:    data. They are collecting audio, video, and TV usage data to profile
2636:    people.</p>
2637:  </li>
2638:
2639:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2640:  <li id="M202010282">
2641:    <small class="date-tag">2020-10</small>
2642:    <p>TV manufacturers are turning to produce only
2643:    &ldquo;Smart&rdquo; TV sets (which include spyware) that <a
2644:    href="https://frame.work/blog/in-defense-of-dumb-tvs";>it's now very
2645:    hard to find a TV that doesn't spy on you</a>.</p>
2646:
2647:    <p>It appears that those manufacturers business model is not to produce
2648:    TV and sell them for money, but to collect your personal data and
2649:    (possibly) hand over them to others for benefit.</p>
2650:  </li>
2651:
2652:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2653:  <li id="M202006250">
2654:    <small class="date-tag">2020-06</small>
2655:    <p>TV manufacturers are able to <a
2656:    
href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/";>snoop
2657:    every second of what the user is watching</a>. This is illegal due to
2658:    the Video Privacy Protection Act of 1988, but they're circumventing
2659:    it through EULAs.</p>
2660:  </li>
2661:
2662:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2663:  <li id="M201901070">
2664:    <small class="date-tag">2019-01</small>
2665:    <p>Vizio TVs <a
2666:    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019";>
2667:    collect &ldquo;whatever the TV sees,&rdquo;</a> in the own words of 
the company's
2668:    CTO, and this data is sold to third parties. This is in return for
2669:    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
2670:    lower retail prices.</p>
2671:
2672:    <p>What is supposed to make this spying acceptable, according to him,
2673:    is that it is opt-in in newer models. But since the Vizio software is
2674:    nonfree, we don't know what is actually happening behind the scenes,
2675:    and there is no guarantee that all future updates will leave the
2676:    settings unchanged.</p>
2677:
2678:    <p>If you already own a Vizio &ldquo;smart&rdquo; TV (or any 
&ldquo;smart&rdquo; TV, for that
2679:    matter), the easiest way to make sure it isn't spying on you is
2680:    to disconnect it from the Internet, and use a terrestrial antenna
2681:    instead. Unfortunately, this is not always possible. Another option,
2682:    if you are technically oriented, is to get your own router (which can
2683:    be an old computer running completely free software), and set up a
2684:    firewall to block connections to Vizio's servers. Or, as a last resort,
2685:    you can replace your TV with another model.</p>
2686:  </li>
2687:
2688:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2689:  <li id="M201804010">
2690:    <small class="date-tag">2018-04</small>
2691:    <p>Some &ldquo;Smart&rdquo; TVs automatically <a
2692:    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928";>
2693:    load downgrades that install a surveillance app</a>.</p>
2694:
2695:    <p>We link to the article for the facts it presents. It
2696:    is too bad that the article finishes by advocating the
2697:    moral weakness of surrendering to Netflix. The Netflix app <a
2698:    href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
2699:    malware too</a>.</p>
2700:  </li>
2701:
2702:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2703:  <li id="M201702060">
2704:    <small class="date-tag">2017-02</small>
2705:    <p>Vizio &ldquo;smart&rdquo; <a
2706:    
href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen";>TVs
2707:    report everything that is viewed on them, and not just broadcasts and
2708:    cable</a>. Even if the image is coming from the user's own computer,
2709:    the TV reports what it is. The existence of a way to disable the
2710:    surveillance, even if it were not hidden as it was in these TVs,
2711:    does not legitimize the surveillance.</p>
2712:  </li>
2713:
2714:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2715:  <li id="M201511130">
2716:    <small class="date-tag">2015-11</small>
2717:    <p>Some web and TV advertisements play inaudible
2718:    sounds to be picked up by proprietary malware running
2719:    on other devices in range so as to determine that they
2720:    are nearby.  Once your Internet devices are paired with
2721:    your TV, advertisers can correlate ads with Web activity, and other <a
2722:    
href="https://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/";>
2723:    cross-device tracking</a>.</p>
2724:  </li>
2725:
2726:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2727:  <li id="M201511060">
2728:    <small class="date-tag">2015-11</small>
2729:    <p>Vizio goes a step further than other TV
2730:    manufacturers in spying on their users: their <a
2731:    
href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you";>
2732:    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
2733:    link them your IP address</a> so that advertisers can track you
2734:    across devices.</p>
2735:
2736:    <p>It is possible to turn this off, but having it enabled by default
2737:    is an injustice already.</p>
2738:  </li>
2739:
2740:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2741:  <li id="M201511020">
2742:    <small class="date-tag">2015-11</small>
2743:    <p>Tivo's alliance with Viacom adds 2.3 million households
2744:    to the 600 millions social media profiles the company
2745:    already monitors. Tivo customers are unaware they're
2746:    being watched by advertisers. By combining TV viewing
2747:    information with online social media participation, Tivo can now <a
2748:    
href="https://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102/";>
2749:    correlate TV advertisement with online purchases</a>, exposing all
2750:    users to new combined surveillance by default.</p>
2751:  </li>
2752:
2753:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2754:  <li id="M201507240">
2755:    <small class="date-tag">2015-07</small>
2756:    <p>Vizio &ldquo;smart&rdquo; TVs recognize and <a
2757:    
href="https://www.engadget.com/2015-07-24-vizio-ipo-inscape-acr.html";>track
2758:    what people are watching</a>, even if it isn't a TV channel.</p>
2759:  </li>
2760:
2761:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2762:  <li id="M201505290">
2763:    <small class="date-tag">2015-05</small>
2764:    <p>Verizon cable TV <a
2765:    
href="https://arstechnica.com/information-technology/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/";>
2766:    snoops on what programs people watch, and even what they wanted to
2767:    record</a>.</p>
2768:  </li>
2769:
2770:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2771:  <li id="M201504300">
2772:    <small class="date-tag">2015-04</small>
2773:    <p>Vizio <a
2774:    
href="https://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";>
2775:    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
2776:    users watch</a>.  The TVs did not do that when first sold.</p>
2777:  </li>
2778:
2779:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2780:  <li id="M201502090">
2781:    <small class="date-tag">2015-02</small>
2782:    <p>The Samsung &ldquo;Smart&rdquo; TV <a
2783:    
href="https://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm";>
2784:    transmits users' voice on the internet to another company, Nuance</a>.
2785:    Nuance can save it and would then have to give it to the US or some
2786:    other government.</p>
2787:
2788:    <p>Speech recognition is not to be trusted unless it is done by free
2789:    software in your own computer.</p>
2790:
2791:    <p>In its privacy policy, Samsung explicitly confirms that <a
2792:    
href="https://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs";>voice
2793:    data containing sensitive information will be transmitted to third
2794:    parties</a>.</p>
2795:  </li>
2796:
2797:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2798:  <li id="M201411090">
2799:    <small class="date-tag">2014-11</small>
2800:    <p>The Amazon &ldquo;Smart&rdquo; TV is <a
2801:    
href="https://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance";>
2802:    snooping all the time</a>.</p>
2803:  </li>
2804:
2805:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2806:  <li id="M201409290">
2807:    <small class="date-tag">2014-09</small>
2808:    <p>More or less all &ldquo;smart&rdquo; TVs <a
2809:    
href="https://myce.wiki/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/";>spy
2810:    on their users</a>.</p>
2811:
2812:    <p>The report was as of 2014, but we don't expect this has got
2813:    better.</p>
2814:
2815:    <p>This shows that laws requiring products to get users' formal
2816:    consent before collecting personal data are totally inadequate.
2817:    And what happens if a user declines consent? Probably the TV will
2818:    say, &ldquo;Without your consent to tracking, the TV will not
2819:    work.&rdquo;</p>
2820:
2821:    <p>Proper laws would say that TVs are not allowed to report what the
2822:    user watches&mdash;no exceptions!</p>
2823:  </li>
2824:
2825:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2826:  <li id="M201405200.1">
2827:    <small class="date-tag">2014-05</small>
2828:    <p>LG <a
2829:    
href="https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/";>
2830:    disabled network features</a> on <em>previously purchased</em>
2831:    &ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG begin
2832:    to snoop on them and distribute their personal data.</p>
2833:  </li>
2834:
2835:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2836:  <li id="M201405200">
2837:    <small class="date-tag">2014-05</small>
2838:    <p>Spyware in LG &ldquo;smart&rdquo; TVs <a
2839:    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html";>
2840:    reports what the user watches, and the switch to turn this off has
2841:    no effect</a>.  (The fact that the transmission reports a 404 error
2842:    really means nothing; the server could save that data anyway.)</p> 
2843:
2844:    <p>Even worse, it <a
2845:    
href="https://rrrrambles.wordpress.com/2013/11/21/lg-tv-logging-filenames-from-network-folders/";>
2846:    snoops on other devices on the user's local network</a>.</p>
2847:
2848:    <p>LG later said it had installed a patch to stop this, but any
2849:    product could spy this way.</p>
2850:
2851:    <p>Meanwhile, LG TVs <a
2852:    
href="https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/";>
2853:    do lots of spying anyway</a>.</p>
2854:  </li>
2855:
2856:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2857:  <li id="M201311210">
2858:    <small class="date-tag">2013-11</small>
2859:    <p>Spyware in LG &ldquo;smart&rdquo; TVs <a
2860:    
href="https://doctorbeet.blogspot.com/2013/11/lg-smart-tvs-logging-usb-filenames-and.html";>
2861:    reports what the user watches, and the switch to turn this off has
2862:    no effect</a>.  (The fact that the transmission reports a 404 error
2863:    really means nothing; the server could save that data anyway.)</p> 
2864:
2865:    <p>Even worse, it <a
2866:    
href="https://rrrrambles.wordpress.com/2013/11/21/lg-tv-logging-filenames-from-network-folders/";>
2867:    snoops on other devices on the user's local network</a>.</p>
2868:
2869:    <p>LG later said it had installed a patch to stop this, but any
2870:    product could spy this way.</p>
2871:  </li>
2872:
2873:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2874:  <li id="M201212170">
2875:    <small class="date-tag">2012-12</small>
2876:    <p id="break-security-smarttv"><a
2877:    
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html";>
2878:    Crackers found a way to break security on a &ldquo;smart&rdquo; TV</a>
2879:    and use its camera to watch the people who are watching TV.</p>
2880:  </li>
2881:</ul>
2882:
2883:
2884:<div class="big-subsection">
2885:  <h4 id="SpywareInCameras">Cameras</h4>
2886:  <span class="anchor-reference-id">(<a 
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
2887:</div>
2888:
2889:<ul class="blurbs">
2890:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2891:  <li id="M202312230">
2892:    <small class="date-tag">2023-12</small>
2893:    <p>Surveillance cameras put in by government
2894:    A to surveil for it may be surveilling for
2895:    government B as well.  That's because A put in a product <a
2896:    
href="https://www.rferl.org/a/ukraine-cctv-moscow-spying-schemes-investigation/32747767.html";>
2897:    made by B with nonfree software</a>.</p>
2898:
2899:    <p><small>(Please note that this article misuses the word &ldquo;<a
2900:    href="/philosophy/words-to-avoid.html#Hacker">hack</a>&rdquo; to
2901:    mean &ldquo;break security.&rdquo;)</small></p>
2902:  </li>
2903:
2904:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2905:  <li id="M202307040">
2906:    <small class="date-tag">2023-07</small>
2907:    <p><a
2908:    
href="https://www.theguardian.com/technology/2023/jul/04/smile-youre-on-camera-self-driving-cars-are-here-and-theyre-watching-you";>
2909:    Driverless cars in San Francisco collect videos constantly</a>, using
2910:    cameras inside and outside, and governments have already collected
2911:    those videos secretly.</p>
2912:
2913:    <p>As the Surveillance Technology Oversight Project says, they are
2914:    &ldquo;driving us straight into authoritarianism.&rdquo; We must <a
2915:    href="/philosophy/surveillance-vs-democracy.html">regulate <em>all</em>
2916:    cameras that collect images that can be used to track people</a>,
2917:    to make sure they are not used for that.</p>
2918:  </li>
2919:
2920:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2921:  <li id="M201902270">
2922:    <small class="date-tag">2019-02</small>
2923:    <p>The Ring doorbell camera is designed so that the
2924:    manufacturer (now Amazon) can watch all the time. Now it turns out
2925:    that <a
2926:    
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/";>
2927:    anyone else can also watch, and fake videos too</a>.</p>
2928:
2929:    <p>The third party vulnerability is presumably
2930:    unintentional and Amazon will probably fix it. However, we
2931:    do not expect Amazon to change the design that <a
2932:    href="/proprietary/proprietary-surveillance.html#M201901100">allows
2933:    Amazon to watch</a>.</p>
2934:  </li>
2935:
2936:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2937:  <li id="M201901100">
2938:    <small class="date-tag">2019-01</small>
2939:    <p>Amazon Ring &ldquo;security&rdquo; devices <a
2940:    
href="https://www.engadget.com/2019-01-10-ring-gave-employees-access-customer-video-feeds.html";>
2941:    send the video they capture to Amazon servers</a>, which save it
2942:    long-term.</p>
2943:
2944:    <p>In many cases, the video shows everyone that comes near, or merely
2945:    passes by, the user's front door.</p>
2946:
2947:    <p>The article focuses on how Ring used to let individual employees 
look
2948:    at the videos freely.  It appears Amazon has tried to prevent that
2949:    secondary abuse, but the primary abuse&mdash;that Amazon gets the
2950:    video&mdash;Amazon expects society to surrender to.</p>
2951:  </li>
2952:
2953:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2954:  <li id="M201810300">
2955:    <small class="date-tag">2018-10</small>
2956:    <p>Nearly all &ldquo;home security cameras&rdquo; <a
2957:    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds-a8814384448/";>
2958:    give the manufacturer an unencrypted copy of everything they
2959:    see</a>. &ldquo;Home insecurity camera&rdquo; would be a better
2960:    name!</p>
2961:
2962:    <p>When Consumer Reports tested them, it suggested that these
2963:    manufacturers promise not to look at what's in the videos. That's not
2964:    security for your home. Security means making sure they don't get to
2965:    see through your camera.</p>
2966:  </li>
2967:
2968:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2969:  <li id="M201710040">
2970:    <small class="date-tag">2017-10</small>
2971:    <p>Every &ldquo;home security&rdquo; camera, if its
2972:    manufacturer can communicate with it, is a surveillance device. <a
2973:    
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change";>
2974:    Canary camera is an example</a>.</p>
2975:
2976:    <p>The article describes wrongdoing by the manufacturer, based on
2977:    the fact that the device is tethered to a server.</p>
2978:
2979:    <p><a href="/proprietary/proprietary-tethers.html">More about
2980:    proprietary tethering</a>.</p>
2981:
2982:    <p>But it also demonstrates that the device gives the company
2983:    surveillance capability.</p>
2984:  </li>
2985:
2986:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2987:  <li id="M201603220">
2988:    <small class="date-tag">2016-03</small>
2989:    <p>Over 70 brands of network-connected surveillance cameras have <a
2990:    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html";>
2991:    security bugs that allow anyone to watch through them</a>.</p>
2992:  </li>
2993:
2994:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
2995:  <li id="M201511250">
2996:    <small class="date-tag">2015-11</small>
2997:    <p>The Nest Cam &ldquo;smart&rdquo; camera is <a
2998:    href="https://www.bbc.com/news/technology-34922712";>always 
watching</a>,
2999:    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;</p>
3000:
3001:    <p>A &ldquo;smart&rdquo; device means the manufacturer is using it
3002:    to outsmart you.</p>
3003:  </li>
3004:</ul>
3005:
3006:
3007:<div class="big-subsection">
3008:  <h4 id="SpywareInToys">Toys</h4>
3009:  <span class="anchor-reference-id">(<a 
href="#SpywareInToys">#SpywareInToys</a>)</span>
3010:</div>
3011:
3012:<ul class="blurbs">
3013:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3014:  <li id="M201711244">
3015:    <small class="date-tag">2017-11</small>
3016:    <p>The Furby Connect has a <a
3017:    
href="https://web.archive.org/web/20220604212722/https://www.contextis.com/en/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>
3018:    universal back door</a>. If the product as shipped doesn't act as a
3019:    listening device, remote changes to the code could surely convert it
3020:    into one.</p>
3021:  </li>
3022:
3023:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3024:  <li id="M201711100">
3025:    <small class="date-tag">2017-11</small>
3026:    <p>A remote-control sex toy was found to make <a
3027:    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-surveillance";>audio
3028:    recordings of the conversation between two users</a>.</p>
3029:  </li>
3030:
3031:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3032:  <li id="M201703140">
3033:    <small class="date-tag">2017-03</small>
3034:    <p>A computerized vibrator <a
3035:    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack";>
3036:    was snooping on its users through the proprietary control app</a>.</p>
3037:
3038:    <p>The app was reporting the temperature of the vibrator minute by
3039:    minute (thus, indirectly, whether it was surrounded by a person's
3040:    body), as well as the vibration frequency.</p>
3041:
3042:    <p>Note the totally inadequate proposed response: a labeling
3043:    standard with which manufacturers would make statements about their
3044:    products, rather than free software which users could have checked
3045:    and changed.</p>
3046:
3047:    <p>The company that made the vibrator <a
3048:    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit";>
3049:    was sued for collecting lots of personal information about how people
3050:    used it</a>.</p>
3051:
3052:    <p>The company's statement that it was anonymizing the data may be
3053:    true, but it doesn't really matter. If it had sold the data to a data
3054:    broker, the data broker would have been able to figure out who the
3055:    user was.</p>
3056:
3057:    <p>Following this lawsuit, <a
3058:    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits";>
3059:    the company has been ordered to pay a total of C$4m</a> to its
3060:    customers.</p>
3061:  </li>
3062:
3063:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3064:  <li id="M201702280">
3065:    <small class="date-tag">2017-02</small>
3066:    <p>&ldquo;CloudPets&rdquo; toys with microphones <a
3067:    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults";>
3068:    leak childrens' conversations to the manufacturer</a>. Guess what? <a
3069:    
href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings";>
3070:    Crackers found a way to access the data</a> collected by the
3071:    manufacturer's snooping.</p>
3072:
3073:    <p>That the manufacturer and the FBI could listen to these
3074:    conversations was unacceptable by itself.</p>
3075:  </li>
3076:
3077:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3078:  <li id="M201612060.1">
3079:    <small class="date-tag">2016-12</small>
3080:    <p>The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que can be <a
3081:    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws/";>remotely
3082:    controlled with a mobile phone</a>; physical access is not
3083:    necessary. This would enable crackers to listen in on a child's
3084:    conversations, and even speak into the toys themselves.</p>
3085:
3086:    <p>This means a burglar could speak into the toys and ask the child
3087:    to unlock the front door while Mommy's not looking.</p>
3088:  </li>
3089:
3090:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3091:  <li id="M201612060">
3092:    <small class="date-tag">2016-12</small>
3093:    <p>The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit <a
3094:    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws/";>children's
3095:    conversations to Nuance Communications</a>, a speech recognition
3096:    company based in the U.S.</p>
3097:
3098:    <p>Those toys also contain major security vulnerabilities; crackers
3099:    can remotely control the toys with a mobile phone. This would enable
3100:    crackers to listen in on a child's speech, and even speak into the
3101:    toys themselves.</p>
3102:  </li>
3103:
3104:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3105:  <li id="M201502180">
3106:    <small class="date-tag">2015-02</small>
3107:    <p>Barbie <a
3108:    
href="https://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673";>is
3109:    going to spy on children and adults</a>.</p>
3110:  </li>
3111:</ul>
3112:
3113:
3114:<div class="big-subsection">
3115:  <h4 id="SpywareInDrones">Drones</h4>
3116:  <span class="anchor-reference-id">(<a 
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
3117:</div>
3118:
3119:<ul class="blurbs">
3120:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3121:  <li id="M201708040">
3122:    <small class="date-tag">2017-08</small>
3123:    <p>While you're using a DJI drone
3124:    to snoop on other people, DJI is in many cases <a
3125:    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity";>snooping
3126:    on you</a>.</p>
3127:  </li>
3128:</ul>
3129:
3130:
3131:<div class="big-subsection">
3132:  <h4 id="SpywareAtHome">Other Appliances</h4><span 
class="anchor-reference-id">(<a href="#SpywareAtHome">#SpywareAtHome</a>)</span>
3133:</div>
3134:
3135:<ul class="blurbs">
3136:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3137:  <li id="M202309270">
3138:    <small class="date-tag">2023-09</small>
3139:    <p>Philips Hue, the most ubiquitous
3140:    home automation product in the US, is planning to soon <a
3141:    
href="https://boingboing.net/2023/09/27/philips-hue-to-make-you-create-an-account-and-log-in-to-adjust-your-lightbulbs.html";>
3142:    force users to log in to the app server</a> in order to be able to
3143:    adjust a lightbulb, or use other functionalities, in what amounts to
3144:    a massive user-tracking data grab.</p>
3145:  </li>
3146:
3147:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3148:  <li id="M202009270">
3149:    <small class="date-tag">2020-09</small>
3150:    <p>Many employers are using nonfree
3151:    software, including videoconference software, to <a
3152:    
href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance";>
3153:    surveil and monitor staff working at home</a>. If the program reports
3154:    whether you are &ldquo;active,&rdquo; that is in effect a malicious
3155:    surveillance feature.</p>
3156:  </li>
3157:
3158:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3159:  <li id="M202008030">
3160:    <small class="date-tag">2020-08</small>
3161:    <p>Google Nest <a
3162:    
href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/";>
3163:    is taking over ADT</a>. Google sent out a software
3164:    update to its speaker devices using their back door <a
3165:    
href="https://web.archive.org/web/20240123114737/https://www.protocol.com/google-smart-speaker-alarm-adt";>
 that
3166:    listens for things like smoke alarms</a> and then notifies your phone
3167:    that an alarm is happening. This means the devices now listen for more
3168:    than just their wake words. Google says the software update was sent
3169:    out prematurely and on accident and Google was planning on disclosing
3170:    this new feature and offering it to customers who pay for it.</p>
3171:  </li>
3172:
3173:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3174:  <li id="M202006300">
3175:    <small class="date-tag">2020-06</small>
3176:    <p>&ldquo;Bossware&rdquo; is malware that bosses <a
3177:    
href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers";>
3178:    coerce workers into installing in their own computers</a>, so the
3179:    bosses can spy on them.</p>
3180:
3181:    <p>This shows why requiring the user's &ldquo;consent&rdquo; is not
3182:    an adequate basis for protecting digital privacy.  The boss can coerce
3183:    most workers into consenting to almost anything, even probable exposure
3184:    to contagious disease that can be fatal.  Software like this should
3185:    be illegal and bosses that demand it should be prosecuted for it.</p>
3186:  </li>
3187:
3188:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3189:  <li id="M201907210">
3190:    <small class="date-tag">2019-07</small>
3191:    <p>Google &ldquo;Assistant&rdquo; records users' conversations <a
3192:    
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/";>even
3193:    when it is not supposed to listen</a>. Thus, when one of Google's
3194:    subcontractors discloses a thousand confidential voice recordings,
3195:    users were easily identified from these recordings.</p>
3196:
3197:    <p>Since Google &ldquo;Assistant&rdquo; uses proprietary software, 
there is no
3198:    way to see or control what it records or sends.</p>
3199:
3200:    <p>Rather than trying to better control the use of recordings, Google
3201:    should not record or listen to the person's voice.  It should only
3202:    get commands that the user wants to send to some Google service.</p>
3203:  </li>
3204:
3205:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3206:  <li id="M201905061">
3207:    <small class="date-tag">2019-05</small>
3208:    <p>Amazon Alexa collects a lot more information from users
3209:    than is necessary for correct functioning (time, location,
3210:    recordings made without a legitimate prompt), and sends
3211:    it to Amazon's servers, which store it indefinitely. Even
3212:    worse, Amazon forwards it to third-party companies. Thus,
3213:    even if users request deletion of their data from Amazon's servers, <a
3214:    
href="https://web.archive.org/web/20190507014804/https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php";>
3215:    the data remain on other servers</a>, where they can be accessed by
3216:    advertising companies and government agencies. In other words,
3217:    deleting the collected information doesn't cancel the wrong of
3218:    collecting it.</p>
3219:
3220:    <p>Data collected by devices such as the Nest thermostat, the Philips
3221:    Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
3222:    speakers are likewise stored longer than necessary on the servers
3223:    the devices are tethered to. Moreover, they are made available to
3224:    Alexa. As a result, Amazon has a very precise picture of users' life
3225:    at home, not only in the present, but in the past (and, who knows,
3226:    in the future too?)</p>
3227:  </li>
3228:
3229:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3230:  <li id="M201904240">
3231:    <small class="date-tag">2019-04</small>
3232:    <p>Some of users' commands to the Alexa service are <a
3233:    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html";>
3234:    recorded for Amazon employees to listen to</a>. The Google and Apple
3235:    voice assistants do similar things.</p>
3236:
3237:    <p>A fraction of the Alexa service staff even has access to <a
3238:    
href="https://news.bloomberglaw.com/tech-and-telecom-law/amazons-alexa-reviewers-can-access-customers-home-addresses";>
3239:    location and other personal data</a>.</p>
3240:
3241:    <p>Since the client program is nonfree, and data processing is done
3242:    &ldquo;<a href="/philosophy/words-to-avoid.html#CloudComputing">in
3243:    the cloud</a>&rdquo; (a soothing way of saying &ldquo;We won't
3244:    tell you how and where it's done&rdquo;), users have no way
3245:    to know what happens to the recordings unless human eavesdroppers <a
3246:    
href="https://web.archive.org/web/20240416214211/https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033";>
3247:    break their non-disclosure agreements</a>.</p>
3248:  </li>
3249:
3250:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3251:  <li id="M201902080">
3252:    <small class="date-tag">2019-02</small>
3253:    <p>The HP <a
3254:    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html";>
3255:    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
3256:    communicates with HP servers</a> to make sure the user is still
3257:    paying for the subscription, and hasn't printed more pages than were
3258:    paid for.</p>
3259:
3260:    <p>Even though the ink subscription program may be cheaper in some
3261:    specific cases, it spies on users, and involves totally unacceptable
3262:    restrictions in the use of ink cartridges that would otherwise be in
3263:    working order.</p>
3264:  </li>
3265:
3266:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3267:  <li id="M201808120">
3268:    <small class="date-tag">2018-08</small>
3269:    <p>Crackers found a way to break the security of an Amazon device,
3270:    and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html";>
3271:    turn it into a listening device</a> for them.</p>
3272:
3273:    <p>It was very difficult for them to do this. The job would be much
3274:    easier for Amazon. And if some government such as China or the US
3275:    told Amazon to do this, or cease to sell the product in that country,
3276:    do you think Amazon would have the moral fiber to say no?</p>
3277:
3278:    <p><small>(These crackers are probably hackers too, but please <a
3279:    href="https://stallman.org/articles/on-hacking.html";> don't use
3280:    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;</a>.)</small></p>
3281:  </li>
3282:
3283:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3284:  <li id="M201804140">
3285:    <small class="date-tag">2018-04</small>
3286:    <p>A medical insurance company <a
3287:    
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next/";>
3288:    offers a gratis electronic toothbrush that snoops on its user by
3289:    sending usage data back over the Internet</a>.</p>
3290:  </li>
3291:
3292:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3293:  <li id="M201708230">
3294:    <small class="date-tag">2017-08</small>
3295:    <p>Sonos <a
3296:    
href="https://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/";>
3297:    told all its customers, &ldquo;Agree&rdquo;
3298:    to snooping or the product will stop working</a>.  <a
3299:    
href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/";>
3300:    Another article</a> says they won't forcibly change the software, but
3301:    people won't be able to get any upgrades and eventually it will
3302:    stop working.</p>
3303:  </li>
3304:
3305:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3306:  <li id="M201706204">
3307:    <small class="date-tag">2017-06</small>
3308:    <p>Lots of &ldquo;smart&rdquo; products are designed <a
3309:    
href="https://www.cnet.com/pictures/products-with-alexa-built-in-smart-home/?ftag=CAD6b2b181&bhid=27417204357610908031812337994022";>to
3310:    listen to everyone in the house, all the time</a>.</p>
3311:
3312:    <p>Today's technological practice does not include any way of making
3313:    a device that can obey your voice commands without potentially spying
3314:    on you.  Even if it is air-gapped, it could be saving up records
3315:    about you for later examination.</p>
3316:  </li>
3317:
3318:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3319:  <li id="M201407170">
3320:    <small class="date-tag">2014-07</small>
3321:    <p id="nest-thermometers">Nest thermometers send <a
3322:    href="https://bgr.com/general/google-nest-jailbreak-hack/";>a lot of
3323:    data about the user</a>.</p>
3324:  </li>
3325:
3326:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3327:  <li id="M201310260">
3328:    <small class="date-tag">2013-10</small>
3329:    <p><a
3330:    
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm";>
3331:    Rent-to-own computers were programmed to spy on their renters</a>.</p>
3332:  </li>
3333:</ul>
3334:
3335:
3336:<div class="big-subsection">
3337:  <h4 id="SpywareOnWearables">Wearables</h4>
3338:  <span class="anchor-reference-id">(<a 
href="#SpywareOnWearables">#SpywareOnWearables</a>)</span>
3339:</div>
3340:
3341:<ul class="blurbs">
3342:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3343:  <li id="M201807260">
3344:    <small class="date-tag">2018-07</small>
3345:    <p>Tommy Hilfiger clothing <a
3346:    
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers";>will
3347:    monitor how often people wear it</a>.</p>
3348:
3349:    <p>This will teach the sheeple to find it normal that companies
3350:    monitor every aspect of what they do.</p>
3351:  </li>
3352:</ul>
3353:
3354:
3355:<h5 id="SpywareOnSmartWatches">&ldquo;Smart&rdquo; Watches</h5>
3356:
3357:<ul class="blurbs">
3358:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3359:  <li id="M202009100">
3360:    <small class="date-tag">2020-09</small>
3361:    <p>Internet-enabled watches with proprietary software
3362:    are malware, violating people (specially children's)
3363:    privacy. In addition, they have a lot of security flaws. They <a
3364:    
href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/";>
3365:    permit security breakers (and unauthorized people) to access</a> the 
watch.</p>
3366:
3367:    <p>Thus, ill-intentioned unauthorized people can intercept 
communications between parent and child and spoof messages to and from the 
watch, possibly endangering the child.</p>
3368:
3369:    <p><small>(Note that this article misuses the word &ldquo;<a
3370:    href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;
3371:    to mean &ldquo;crackers.&rdquo;)</small></p>
3372:  </li>
3373:
3374:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3375:  <li id="M201603020">
3376:    <small class="date-tag">2016-03</small>
3377:    <p>A very cheap &ldquo;smart watch&rdquo; comes with an Android app <a
3378:    
href="https://www.theregister.com/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/";>
3379:    that connects to an unidentified site in China</a>.</p>
3380:
3381:    <p>The article says this is a back door, but that could be a
3382:    misunderstanding.  However, it is certainly surveillance, at least.</p>
3383:  </li>
3384:
3385:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3386:  <li id="M201407090">
3387:    <small class="date-tag">2014-07</small>
3388:    <p>An LG &ldquo;smart&rdquo; watch is designed <a
3389:    
href="https://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html";>
3390:    to report its location to someone else and to transmit conversations
3391:    too</a>.</p>
3392:  </li>
3393:</ul>
3394:
3395:
3396:<div class="big-subsection">
3397:  <h4 id="SpywareInVehicles">Vehicles</h4>
3398:  <span class="anchor-reference-id">(<a 
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
3399:</div>
3400:
3401:<ul class="blurbs">
3402:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3403:  <li id="M202403110">
3404:    <small class="date-tag">2024-03</small>
3405:    <p><a
3406:    
href="https://web.archive.org/web/20240311120515/https://www.nytimes.com/2024/03/11/technology/carmakers-driver-tracking-insurance.html";>
3407:    GM is spying on drivers</a> who own or rent their cars, and give
3408:    away detailed driving data to insurance companies through data
3409:    brokers. These companies then analyze the data, and hike up insurance
3410:    prices if they think the data denotes &ldquo;risky driving.&rdquo;
3411:    For the car to  make this data available to anyone but the owner or
3412:    renter of the car should be a crime.  If the car is owned by a rental
3413:    company, that company should not have access to it either.</p>
3414:  </li>
3415:
3416:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3417:  <li id="M202311080">
3418:    <small class="date-tag">2023-11</small>
3419:    <p>Recent autos offer a feature by which the drivers
3420:    can connect their snoop-phones to the car.  That feature <a
3421:    
href="https://therecord.media/class-action-lawsuit-cars-text-messages-privacy";>
3422:    snoops on the calls and texts</a> and gives the data to the car
3423:    manufacturer, and to the state.</p>
3424:
3425:    <p>A good privacy law would prohibit cars recording this data about
3426:    the users' activities.  But not just <em>this</em> data&mdash;lots of
3427:    other data too.</p>
3428:  </li>
3429:
3430:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3431:  <li id="M202309060">
3432:    <small class="date-tag">2023-09</small>
3433:    <p>In an article from Mozilla, every car brand they researched <a
3434:    
href="https://foundation.mozilla.org/en/privacynotincluded/articles/its-official-cars-are-the-worst-product-category-we-have-ever-reviewed-for-privacy/";>
3435:    has failed their privacy tests</a>. Some car manufacturers explicitly
3436:    mention that they collect data which includes &ldquo;sexual
3437:    activities&rdquo; and &ldquo;genetic information&rdquo;. Not only
3438:    collecting any of such data is a huge privacy violation in the first
3439:    place, some companies assume drivers and passengers' consent before
3440:    they get in the car. Notably, Tesla threatens that the car may be
3441:    &ldquo;inoperable&rdquo; if the user opts out of data collection.</p>
3442:  </li>
3443:
3444:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3445:  <li id="M202304060">
3446:    <small class="date-tag">2023-04</small>
3447:    <p>Tesla cars record videos of activity inside the car, and <a
3448:    
href="https://arstechnica.com/tech-policy/2023/04/tesla-workers-shared-images-from-car-cameras-including-scenes-of-intimacy/";>
3449:    company staff can watch those recordings and copy them</a>. Or at
3450:    least they were able to do so until last year.</p>
3451:
3452:    <p>Tesla may have changed some security functions so that this
3453:    is harder to do.  But if Tesla can get those recordings, that is
3454:    because it is planning for some people to use them in some situation,
3455:    and that is unjust already.  It should be illegal to make a car
3456:    that takes photos or videos of the people in the car&mdash;or of
3457:    people outside the car.</p>
3458:  </li>
3459:
3460:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3461:  <li id="M202304010">
3462:    <small class="date-tag">2023-04</small>
3463:    <p>GM is switching to a new
3464:    audio/video system in its cars in order to <a
3465:    
href="https://edition.cnn.com/2023/04/01/business/gm-apple-play-evs/index.html";>
3466:    collect complete information about what people in the car watch or
3467:    listen to, and also how they drive</a>.</p>
3468:
3469:    <p>The new system for navigation and &ldquo;driving assistance&rdquo;
3470:    will be tethered to various online dis-services, and GM will snoop on
3471:    everything the users do with them.  But don't feel bad about that,
3472:    because some of these subscriptions will be gratis for the first
3473:    8 years.</p>
3474:  </li>
3475:
3476:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3477:  <li id="M202302280">
3478:    <small class="date-tag">2023-02</small>
3479:    <p>Volkswagen <a
3480:    href="https://pluralistic.net/2023/02/28/kinderwagen/";>
3481:    tracks the location of every driver, and sells that data to
3482:    third-parties</a>. However, it refuses to use the data to implement a
3483:    feature for the benefit of its customers unless they pay extra money
3484:    for it.</p>
3485:
3486:    <p>This came to attention and brought controversy when Volkswagen
3487:    refused to locate a car-jacked vehicle with a toddler in it because
3488:    the owner of the car had not subscribed to the relevant service.</p>
3489:  </li>
3490:
3491:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3492:  <li id="M202105130">
3493:    <small class="date-tag">2021-05</small>
3494:    <p><a
3495:    href="https://gizmodo.com/get-ready-for-in-car-ads-1846888390";>Ford
3496:    is planning to force ads on drivers in cars</a>, with the ability for
3497:    the owner to pay extra to turn them off. The system probably imposes
3498:    surveillance on drivers too.</p>
3499:  </li>
3500:
3501:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3502:  <li id="M202008181">
3503:    <small class="date-tag">2020-08</small>
3504:    <p>New Toyotas will <a
3505:    href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/";>
3506:    upload data to AWS to help create custom insurance premiums</a>
3507:    based on driver behaviour.</p>
3508:
3509:    <p>Before you buy a &ldquo;connected&rdquo; car, make sure you can
3510:    disconnect its cellular antenna and its GPS antenna.  If you want
3511:    GPS navigation, get a separate navigator which runs free software
3512:    and works with Open Street Map.</p>
3513:  </li>
3514:
3515:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3516:  <li id="M201912171">
3517:    <small class="date-tag">2019-12</small>
3518:    <p>Most modern cars now <a
3519:    
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html";>
3520:    record and send various kinds of data to the manufacturer</a>. For
3521:    the user, access to the data is nearly impossible, as it involves
3522:    cracking the car's computer, which is always hidden and running with
3523:    proprietary software.</p>
3524:  </li>
3525:
3526:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3527:  <li id="M201903290">
3528:    <small class="date-tag">2019-03</small>
3529:    <p>Tesla cars collect lots of personal data, and <a
3530:    
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html";>
3531:    when they go to a junkyard the driver's personal data goes with
3532:    them</a>.</p>
3533:  </li>
3534:
3535:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3536:  <li id="M201902011">
3537:    <small class="date-tag">2019-02</small>
3538:    <p>The FordPass Connect feature of some Ford vehicles has <a
3539:    
href="https://web.archive.org/web/20200530023040/https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html";>
3540:    near-complete access to the internal car network</a>. It is constantly
3541:    connected to the cellular phone network and sends Ford a lot of data,
3542:    including car location. This feature operates even when the ignition
3543:    key is removed, and users report that they can't disable it.</p>
3544:
3545:    <p>If you own one of these cars, have you succeeded in breaking the
3546:    connectivity by disconnecting the cellular modem, or wrapping the
3547:    antenna in aluminum foil?</p>
3548:  </li>
3549:
3550:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3551:  <li id="M201811300">
3552:    <small class="date-tag">2018-11</small>
3553:    <p>In China, it is mandatory for electric
3554:    cars to be equipped with a terminal that <a
3555:    
href="https://apnews.com/article/north-america-ap-top-news-international-news-shanghai-china-4a749a4211904784826b45e812cff4ca";>
3556:    transfers technical data, including car location,
3557:    to a government-run platform</a>. In practice, <a
3558:    href="/proprietary/proprietary-surveillance.html#car-spying">
3559:    manufacturers collect this data</a> as part of their own spying, then
3560:    forward it to the government-run platform.</p>
3561:  </li>
3562:
3563:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3564:  <li id="M201810230">
3565:    <small class="date-tag">2018-10</small>
3566:    <p>GM <a
3567:    href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html";>
3568:    tracked the choices of radio programs</a> in its
3569:    &ldquo;connected&rdquo; cars, minute by minute.</p>
3570:
3571:    <p>GM did not get users' consent, but it could have got that easily by
3572:    sneaking it into the contract that users sign for some digital service
3573:    or other. A requirement for consent is effectively no protection.</p>
3574:
3575:    <p>The cars can also collect lots of other data: listening to you,
3576:    watching you, following your movements, tracking passengers' cell
3577:    phones. <em>All</em> such data collection should be forbidden.</p>
3578:
3579:    <p>But if you really want to be safe, we must make sure the car's
3580:    hardware cannot collect any of that data, or that the software
3581:    is free so we know it won't collect any of that data.</p>
3582:  </li>
3583:
3584:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3585:  <li id="M201711230">
3586:    <small class="date-tag">2017-11</small>
3587:    <p>AI-powered driving apps can <a
3588:    
href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move";>
3589:    track your every move</a>.</p>
3590:  </li>
3591:
3592:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3593:  <li id="M201607160">
3594:    <small class="date-tag">2016-07</small>
3595:    <p id="car-spying">Computerized cars with nonfree software are <a
3596:    
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html";>
3597:    snooping devices</a>.</p>
3598:  </li>
3599:
3600:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3601:  <li id="M201602240">
3602:    <small class="date-tag">2016-02</small>
3603:    <p id="nissan-modem">The Nissan Leaf has a built-in
3604:    cell phone modem which allows effectively anyone to <a
3605:    
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/";>
3606:    access its computers remotely and make changes in various
3607:    settings</a>.</p>
3608:
3609:    <p>That's easy to do because the system has no authentication
3610:    when accessed through the modem.  However, even if it asked
3611:    for authentication, you couldn't be confident that Nissan
3612:    has no access.  The software in the car is proprietary, <a
3613:    href="/philosophy/free-software-even-more-important.html">which means
3614:    it demands blind faith from its users</a>.</p>
3615:
3616:    <p>Even if no one connects to the car remotely, the cell phone modem
3617:    enables the phone company to track the car's movements all the time;
3618:    it is possible to physically remove the cell phone modem, though.</p>
3619:  </li>
3620:
3621:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3622:  <li id="M201306140">
3623:    <small class="date-tag">2013-06</small>
3624:    <p>Tesla cars allow the company to extract
3625:    data remotely and determine the car's location
3626:    at any time. (See Section 2, paragraphs b and c of the <a
3627:    
href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf";>
3628:    privacy statement</a>.) The company says it doesn't store this
3629:    information, but if the state orders it to get the data and hand it
3630:    over, the state can store it.</p>
3631:  </li>
3632:
3633:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3634:  <li id="M201303250">
3635:    <small class="date-tag">2013-03</small>
3636:    <p id="records-drivers">Proprietary software in cars <a
3637:    
href="https://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/";>
3638:    records information about drivers' movements</a>, which is made
3639:    available to car manufacturers, insurance companies, and others.</p>
3640:
3641:    <p>The case of toll-collection systems, mentioned in this article,
3642:    is not really a matter of proprietary surveillance. These systems
3643:    are an intolerable invasion of privacy, and should be replaced with
3644:    anonymous payment systems, but the invasion isn't done by malware. The
3645:    other cases mentioned are done by proprietary malware in the car.</p>
3646:  </li>
3647:</ul>
3648:
3649:
3650:<div class="big-subsection">
3651:  <h4 id="SpywareInVR">Virtual Reality</h4>
3652:  <span class="anchor-reference-id">(<a 
href="#SpywareInVR">#SpywareInVR</a>)</span>
3653:</div>
3654:
3655:<ul class="blurbs">
3656:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3657:  <li id="M202008182">
3658:    <small class="date-tag">2020-08</small>
3659:    <p>Oculus headsets <a
3660:    
href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october";>require
3661:    users to identify themselves to Facebook</a>. This will give Facebook
3662:    free rein to pervasively snoop on Oculus users.</p>
3663:  </li>
3664:
3665:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3666:  <li id="M201612230">
3667:    <small class="date-tag">2016-12</small>
3668:    <p>VR equipment, measuring every slight motion,
3669:    creates the potential for the most intimate
3670:    surveillance ever. All it takes to make this potential real <a
3671:    
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/";>is
3672:    software as malicious as many other programs listed in this
3673:    page</a>.</p>
3674:
3675:    <p>You can bet Facebook will implement the maximum possible
3676:    surveillance on Oculus Rift devices. The moral is, never trust a VR
3677:    system with nonfree software in it.</p>
3678:  </li>
3679:</ul>
3680:
3681:
3682:
3683:<div class="big-section">
3684:  <h3 id="SpywareOnTheWeb">Spyware on the Web</h3>
3685:  <span class="anchor-reference-id">(<a 
href="#SpywareOnTheWeb">#SpywareOnTheWeb</a>)</span>
3686:</div>
3687:<div style="clear: left;"></div>
3688:
3689:<p>In addition, many web sites spy on their visitors.  Web sites are not
3690:   programs, so it
3691:   <a href="/philosophy/network-services-arent-free-or-nonfree.html">
3692:   makes no sense to call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;</a>,
3693:   but the surveillance is an abuse all the same.</p>
3694:
3695:<ul class="blurbs">
3696:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3697:  <li id="M202009220">
3698:    <small class="date-tag">2020-09</small>
3699:    <p>The Markup investigated 80,000 popular web sites and <a
3700:    
href="https://themarkup.org/blacklight/2020/09/22/blacklight-tracking-advertisers-digital-privacy-sensitive-websites";>
3701:    reports on how much they snoop on users</a>.  Almost 70,000 had
3702:    third-party trackers. 5,000 fingerprinted the browser to identify
3703:    users.  12,000 recorded the user's mouse clicks and movements.</p>
3704:  </li>
3705:
3706:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3707:  <li id="M201901101">
3708:    <small class="date-tag">2019-01</small>
3709:    <p>Until 2015, any tweet that listed a geographical tag <a
3710:    
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/";>
3711:    sent the precise GPS location to Twitter's server</a>. It still
3712:    contains these GPS locations.</p>
3713:  </li>
3714:
3715:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3716:  <li id="M201701060">
3717:    <small class="date-tag">2017-01</small>
3718:    <p>When a page uses Disqus
3719:    for comments, the proprietary Disqus software <a
3720:    
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook/";>loads
3721:    a Facebook software package into the browser of every anonymous visitor
3722:    to the page, and makes the page's URL available to Facebook</a>.</p>
3723:  </li>
3724:
3725:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3726:  <li id="M201612064">
3727:    <small class="date-tag">2016-12</small>
3728:    <p>Online sales, with tracking and surveillance of customers, <a
3729:    
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices";>enables
3730:    businesses to show different people different prices</a>. Most of
3731:    the tracking is done by recording interactions with servers, but
3732:    proprietary software contributes.</p>
3733:  </li>
3734:
3735:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3736:  <li id="M201210240">
3737:    <small class="date-tag">2012-10</small>
3738:    <p>Many web sites rat their visitors to advertising
3739:    networks that track users.  Of the top 1000 web sites, <a
3740:    
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/";>84%
3741:    (as of 5/17/2012) fed their visitors third-party cookies, allowing
3742:    other sites to track them</a>.</p>
3743:  </li>
3744:
3745:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3746:  <li id="M201208210">
3747:    <small class="date-tag">2012-08</small>
3748:    <p>Many web sites report all their visitors
3749:    to Google by using the Google Analytics service, which <a
3750:    
href="https://www.pcworld.com/article/460787/google_analytics_breaks_norwegian_privacy_laws_local_agency_said.html";>
3751:    tells Google the IP address and the page that was visited</a>.</p>
3752:  </li>
3753:
3754:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3755:  <li id="M201200000">
3756:    <small class="date-tag">[2012]</small>
3757:    <p>Many web sites try to collect users' address books (the user's list
3758:    of other people's phone numbers or email addresses).  This violates
3759:    the privacy of those other people.</p>
3760:  </li>
3761:
3762:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3763:  <li id="M201110040">
3764:    <small class="date-tag">2011-10</small>
3765:    <p>Pages that contain &ldquo;Like&rdquo; buttons <a
3766:    
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html";>
3767:    enable Facebook to track visitors to those pages</a>&mdash;even users
3768:    that don't have Facebook accounts.</p>
3769:  </li>
3770:</ul>
3771:
3772:
3773:<div class="big-subsection">
3774:  <h4 id="SpywareInJavaScript">JavaScript</h4>
3775:  <span class="anchor-reference-id">(<a 
href="#SpywareInJavaScript">#SpywareInJavaScript</a>)</span>
3776:</div>
3777:
3778:<ul class="blurbs">
3779:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3780:  <li id="M202204280">
3781:    <small class="date-tag">2022-04</small>
3782:    <p>The US government <a
3783:    
href="https://themarkup.org/pixel-hunt/2022/04/28/applied-for-student-aid-online-facebook-saw-you";>sent
3784:    personal data to Facebook</a> for every college student that applied
3785:    for US government student aid. It justified this as being for a
3786:    &ldquo;campaign.&rdquo;</p>
3787:
3788:    <p>The data included name, phone number and email address.  This shows
3789:    the agency didn't even make a handwaving attempt to anonymize the
3790:    student.  Not that anonymization usually does much good&mdash;but
3791:    the failure to even try shows that the agency was completely blind
3792:    to the issue of respecting students' privacy.</p>
3793:  </li>
3794:
3795:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3796:  <li id="M201811270">
3797:    <small class="date-tag">2018-11</small>
3798:    <p>Many web sites use JavaScript code <a
3799:    
href="https://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
3800:    to snoop on information that users have typed into a
3801:    form but not sent</a>, in order to learn their identity. Some are <a
3802:    
href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege";>
3803:    getting sued</a> for this.</p>
3804:
3805:    <p>The chat facilities of some customer services use the same sort of
3806:    malware to <a
3807:    
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119";>
3808:    read what the user is typing before it is posted</a>.</p>
3809:  </li>
3810:
3811:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3812:  <li id="M201807190">
3813:    <small class="date-tag">2018-07</small>
3814:    <p>British Airways used <a
3815:    
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security";>nonfree
3816:    JavaScript on its web site to give other companies personal data on
3817:    its customers</a>.</p>
3818:  </li>
3819:
3820:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3821:  <li id="M201712300">
3822:    <small class="date-tag">2017-12</small>
3823:    <p>Some JavaScript malware <a
3824:    
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research";>
3825:    swipes usernames from browser-based password managers</a>.</p>
3826:  </li>
3827:
3828:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3829:  <li id="M201711150">
3830:    <small class="date-tag">2017-11</small>
3831:    <p>Some websites send
3832:    JavaScript code to collect all the user's input, <a
3833:    
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/";>which
3834:    can then be used to reproduce the whole session</a>.</p>
3835:
3836:    <p>If you use LibreJS, it will block that malicious JavaScript
3837:    code.</p>
3838:  </li>
3839:</ul>
3840:
3841:
3842:<div class="big-subsection">
3843:  <h4 id="SpywareInFlash">Flash</h4>
3844:  <span class="anchor-reference-id">(<a 
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
3845:</div>
3846:
3847:<ul class="blurbs">
3848:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3849:  <li id="M201310110">
3850:    <small class="date-tag">2013-10</small>
3851:    <p>Flash and JavaScript are used for <a
3852:    
href="https://arstechnica.com/information-technology/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/";>
3853:    &ldquo;fingerprinting&rdquo; devices</a> to identify users.</p>
3854:  </li>
3855:
3856:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3857:  <li id="M201003010">
3858:    <small class="date-tag">2010-03</small>
3859:    <p>Flash Player's <a
3860:    
href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/";>
3861:    cookie feature helps web sites track visitors</a>.</p>
3862:  </li>
3863:</ul>
3864:
3865:
3866:<div class="big-subsection">
3867:  <h4 id="SpywareInChrome">Chrome</h4>
3868:  <span class="anchor-reference-id">(<a 
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
3869:</div>
3870:
3871:<ul class="blurbs">
3872:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3873:  <li id="M202109210">
3874:    <small class="date-tag">2021-09</small>
3875:    <p>Google's proprietary Chrome web browser <a
3876:    
href="https://www.techrepublic.com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/";>
3877:    added a surveillance API (idle detection API)</a> which lets
3878:    websites ask Chrome to report when a user with a web page open is
3879:    idle.</p>
3880:  </li>
3881:
3882:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3883:  <li id="M201906220">
3884:    <small class="date-tag">2019-06</small>
3885:    <p>Google Chrome is an <a
3886:    
href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/";>
3887:    instrument of surveillance</a>. It lets thousands of trackers invade
3888:    users' computers and report the sites they visit to advertising and
3889:    data companies, first of all to Google. Moreover, if users have a
3890:    Gmail account, Chrome automatically logs them in to the browser for
3891:    more convenient profiling. On Android, Chrome also reports their
3892:    location to Google.</p>
3893:
3894:    <p>The best way to escape surveillance is to switch to <a
3895:    href="/software/icecat/">IceCat</a>, a modified version of Firefox
3896:    with several changes to protect users' privacy.</p>
3897:  </li>
3898:
3899:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3900:  <li id="M201704131">
3901:    <small class="date-tag">2017-04</small>
3902:    <p>Low-priced Chromebooks for schools are <a
3903:    
href="https://www.eff.org/wp/school-issued-devices-and-student-privacy";>
3904:    collecting far more data on students than is necessary, and store
3905:    it indefinitely</a>. Parents and students complain about the lack
3906:    of transparency on the part of both the educational services and the
3907:    schools, the difficulty of opting out of these services, and the lack
3908:    of proper privacy policies, among other things.</p>
3909:
3910:    <p>But complaining is not sufficient. Parents, students and teachers
3911:    should realize that the software Google uses to spy on students is
3912:    nonfree, so they can't verify what it really does. The only remedy is
3913:    to persuade school officials to <a href="/education/edu-schools.html">
3914:    exclusively use free software</a> for both education and school
3915:    administration. If the school is run locally, parents and teachers
3916:    can mandate their representatives at the School Board to refuse the
3917:    budget unless the school initiates a switch to free software. If
3918:    education is run nation-wide, they need to persuade legislators
3919:    (e.g., through free software organizations, political parties,
3920:    etc.) to migrate the public schools to free software.</p>
3921:  </li>
3922:
3923:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3924:  <li id="M201507280">
3925:    <small class="date-tag">2015-07</small>
3926:    <p>Google Chrome makes it easy for an extension to do <a
3927:    
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/";>total
3928:    snooping on the user's browsing</a>, and many of them do so.</p>
3929:  </li>
3930:
3931:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3932:  <li id="M201506180">
3933:    <small class="date-tag">2015-06</small>
3934:    <p>Google Chrome includes a module that <a
3935:    
href="https://www.privateinternetaccess.com/blog/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/";>
3936:    activates microphones and transmits audio to its servers</a>.</p>
3937:  </li>
3938:
3939:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3940:  <li id="M201308040">
3941:    <small class="date-tag">2013-08</small>
3942:    <p>Google Chrome <a
3943:    
href="https://web.archive.org/web/20151018132125/http://www.brad-x.com/2013/08/04/google-chrome-is-spyware/";>
3944:    spies on browser history, affiliations</a>, and other installed
3945:    software.</p>
3946:  </li>
3947:
3948:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3949:  <li id="M200809060">
3950:    <small class="date-tag">2008-09</small>
3951:    <p>Google Chrome contains a key logger that <a
3952:    
href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/";>
3953:    sends Google every URL typed in</a>, one key at a time.</p>
3954:  </li>
3955:</ul>
3956:
3957:
3958:
3959:<div class="big-section">
3960:  <h3 id="SpywareInNetworks">Spyware in Networks</h3>
3961:  <span class="anchor-reference-id">(<a 
href="#SpywareInNetworks">#SpywareInNetworks</a>)</span>
3962:</div>
3963:<div style="clear: left;"></div>
3964:
3965:<ul class="blurbs">
3966:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3967:  <li id="M202202151">
3968:    <small class="date-tag">2022-02</small>
3969:    <p>Honorlock set a network of fake test answer
3970:    honeypot sites, tempting people to get exam answers, but <a
3971:    
href="https://themarkup.org/machine-learning/2022/02/15/a-network-of-fake-test-answer-sites-is-trying-to-incriminate-students";>that
3972:    is a way to entrap students, so as to identify them and punish
3973:    them</a>, using nonfree JS code to identify them.</p>
3974:  </li>
3975:
3976:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3977:  <li id="M202110250">
3978:    <small class="date-tag">2021-10</small>
3979:    <p>EdTech companies use their surveillance power to
3980:    manipulate students, and direct them into tracks towards various
3981:    levels of knowledge, power and prestige. The article argues that <a
3982:    
href="https://blogs.lse.ac.uk/medialse/2021/10/25/algorithmic-injustice-in-education-why-tech-companies-should-require-a-license-to-operate-in-childrens-education/";>these
3983:    companies should obtain licenses to operate</a>. That wouldn't hurt,
3984:    but it doesn't address the root of the problem. All data acquired
3985:    in a school about any student, teacher, or employee must not leave
3986:    the school, and must be kept in computers that belong to the school
3987:    and run free (as in freedom) software. That way, the school district
3988:    and/or parents can control what is done with those data.</p>
3989:  </li>
3990:
3991:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
3992:  <li id="M202105060">
3993:    <small class="date-tag">2021-05</small>
3994:    <p><a
3995:    
href="https://internetsafetylabs.org/blog/news-press/me2ba-product-testing-spotlight-report-published-data-sharing-in-primary-secondary-school-mobile-apps-2/";>60%
3996:    of school apps are sending student data to potentially high-risk
3997:    third parties</a>, putting students and possibly all other school
3998:    workers under surveillance. This is made possible by using unsafe
3999:    and proprietary programs made by data-hungry corporations.</p>
4000:
4001:    <p><small>Please note that whether students consent to this or not,
4002:    doesn't justify the surveillance they're imposed to.</small></p>
4003:  </li>
4004:
4005:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
4006:  <li id="M202105030">
4007:    <small class="date-tag">2021-05</small>
4008:    <p>The United States' government is reportedly considering <a
4009:    
href="https://www.infosecurity-magazine.com/news/private-companies-may-spy-on/";>teaming
4010:    up with private companies to monitor American citizens' private online
4011:    activity and digital communications</a>.</p>
4012:
4013:    <p>What creates the opportunity to try this is the fact that these
4014:    companies are already snooping on users' private activities. That
4015:    in turn is due to people's use of nonfree software which snoops,
4016:    and online dis-services which snoop.</p>
4017:  </li>
4018:
4019:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
4020:  <li id="M202102160">
4021:    <small class="date-tag">2021-02</small>
4022:    <p>Google <a
4023:    
href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16";>handed
4024:    over personal data of Indian protesters and activists to Indian
4025:    police</a> which led to their arrest. The cops requested the IP
4026:    address and the location where a document was created and with that
4027:    information, they identified protesters and activists.</p>
4028:  </li>
4029:
4030:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
4031:  <li id="M202012250">
4032:    <small class="date-tag">2020-12</small>
4033:    <p>The HonorLock online exam
4034:    proctoring program is a surveillance tool that <a
4035:    
href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps";>tracks
4036:    students and collects data</a> such as face, driving license, and
4037:    network information, among others, in blatant violation of students'
4038:    privacy.</p>
4039:
4040:    <p>Preventing students from cheating should not be an excuse for
4041:    running malware/spyware on their computers, and it's good that students
4042:    are protesting. But their petitions overlook a crucial issue, namely,
4043:    the injustice of being forced to run nonfree software in order to
4044:    get an education.</p>
4045:  </li>
4046:
4047:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
4048:  <li id="M202009070">
4049:    <small class="date-tag">2020-09</small>
4050:    <p>While the world is still
4051:    struggling with COVID-19 coronavirus, many <a
4052:    
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus";>people
4053:    are in danger of surveillance</a> and their computers are infected
4054:    with malware as a result of installing proprietary software.</p>
4055:  </li>
4056:
4057:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
4058:  <li id="M202004301">
4059:    <small class="date-tag">2020-04</small>
4060:    <p>Proprietary programs Google Meet, Microsoft Teams, and WebEx <a
4061:    
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex-a7383469308/";>are
4062:    collecting user's personal and identifiable data</a> including how long
4063:    a call lasts, who's participating in the call, and the IP addresses
4064:    of everyone taking part. From experience, this can even harm users
4065:    physically if those companies hand over data to governments.</p>
4066:  </li>
4067:
4068:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
4069:  <li id="M201905281">
4070:    <small class="date-tag">2019-05</small>
4071:    <p>Microsoft <a
4072:    
href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08";>forces
4073:    people to give their phone number</a> in order to be able to create an 
account on
4074:    the company's network. On top of mistreating their users by providing
4075:    nonfree software, Microsoft is tracking their lives outside the 
computer and
4076:    violates their privacy.</p>
4077:  </li>
4078:
4079:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
4080:  <li id="M201902040">
4081:    <small class="date-tag">2019-02</small>
4082:    <p>Google invites people to <a
4083:    
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss";>
4084:    let Google monitor their phone use, and all internet use in their
4085:    homes, for an extravagant payment of $20</a>.</p>
4086:
4087:    <p>This is not a malicious functionality of a program with some other
4088:    purpose; this is the software's sole purpose, and Google says so. But
4089:    Google says it in a way that encourages most people to ignore the
4090:    details. That, we believe, makes it fitting to list here.</p>
4091:  </li>
4092:
4093:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
4094:  <li id="M201808131">
4095:    <small class="date-tag">2018-08</small>
4096:    <p><a
4097:    
href="https://www.theverge.com/2018/8/13/17684660/google-turn-off-location-history-data";>Google
4098:    will track people even if people turn off location history</a>, using
4099:    Google Maps, weather updates, and browser searches. Google basically
4100:    uses any app activity to track people.</p>
4101:  </li>
4102:
4103:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
4104:  <li id="M201808130">
4105:    <small class="date-tag">2018-08</small>
4106:    <p>Since the beginning of 2017, <a
4107:    
href="https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled";>Android
4108:    phones have been collecting the addresses of nearby cellular
4109:    towers</a>, even when location services are disabled, and sending
4110:    that data back to Google.</p>
4111:  </li>
4112:
4113:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
4114:  <li id="M201606030">
4115:    <small class="date-tag">2016-06</small>
4116:    <p>Investigation Shows <a
4117:    
href="https://www.techdirt.com/2016/06/03/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions/";>GCHQ
4118:    Using US Companies, NSA To Route Around Domestic Surveillance
4119:    Restrictions</a>.</p>
4120:
4121:    <p>Specifically, it can collect the emails of members of Parliament
4122:    this way, because they pass it through Microsoft.</p>
4123:  </li>
4124:
4125:<!-- Copied from workshop/mal.rec. Do not edit in 
proprietary-surveillance.html. -->
4126:  <li id="M201212290">
4127:    <small class="date-tag">2012-12</small>
4128:    <p>The Cisco TNP IP phones are <a
4129:    
href="https://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html";>
4130:    spying devices</a>.</p>
4131:  </li>
4132:</ul>
4133:</div>
4134:
4135:</div>
4136:<div id="navlinks">
4137: <div class="backtotop">
4138:  <hr class="no-display" />
4139:  <a href="#content"><span>BACK TO TOP </span>&#9650;</a>
4140: </div>
4141:<div class="reduced-width">
4142: <h3>Proprietary malware</h3>
4143: <dl>
4144:  <dt class="nolink">By type</dt>
4145:  <dd>
4146:    <ul class="inline-list">
4147:      <li>
4148:        <a 
href="/proprietary/proprietary-addictions.html#content">Addictions</a></li>     
   
4149:      <li>
4150:        <a href="/proprietary/proprietary-back-doors.html#content">Back 
doors</a></li>       
4151:      <li>
4152:        <a 
href="/proprietary/proprietary-censorship.html#content">Censorship</a></li>     
  
4153:      <li>
4154:        <a 
href="/proprietary/proprietary-coercion.html#content">Coercion</a></li>        
4155:      <li>
4156:        <a 
href="/proprietary/proprietary-coverups.html#content">Coverups</a></li>
4157:      <li>
4158:        <a 
href="/proprietary/proprietary-deception.html#content">Deception</a></li>
4159:      <li>
4160:        <a href="/proprietary/proprietary-drm.html#content">DRM</a></li>
4161:      <li>
4162:        <a 
href="/proprietary/proprietary-fraud.html#content">Fraud</a></li>
4163:      <li>
4164:        <a 
href="/proprietary/proprietary-incompatibility.html#content">Incompatibility</a></li>
4165:      <li>
4166:        <a 
href="/proprietary/proprietary-insecurity.html#content">Insecurity</a></li>
4167:      <li>
4168:        <a 
href="/proprietary/proprietary-interference.html#content">Interference</a></li>
4169:      <li>
4170:        <a 
href="/proprietary/proprietary-jails.html#content">Jails</a></li>
4171:      <li>
4172:        <a 
href="/proprietary/proprietary-manipulation.html#content">Manipulation</a></li>
4173:      <li>
4174:        <a 
href="/proprietary/proprietary-obsolescence.html#content">Obsolescence</a></li>
4175:      <li>
4176:        <a 
href="/proprietary/proprietary-sabotage.html#content">Sabotage</a></li>
4177:      <li>
4178:        <a 
href="/proprietary/proprietary-subscriptions.html#content">Subscriptions</a></li>
4179:      <li class="current">
4180:         <span class='no-display'>=</span> 
4181:        <a 
href="/proprietary/proprietary-surveillance.html#content">Surveillance</a><span 
class="gnun-split"></span>
4182:         <span class='no-display'>=</span> </li>
4183:      <li>
4184:        <a 
href="/proprietary/proprietary-tethers.html#content">Tethers</a></li>
4185:      <li>
4186:        <a 
href="/proprietary/proprietary-tyrants.html#content">Tyrants</a></li>
4187:      <li>
4188:        <a href="/proprietary/potential-malware.html#content">In the 
pipe</a></li>
4189:    </ul>
4190:  </dd>
4191:  <dt class="nolink">By product</dt>
4192:  <dd>
4193:    <ul class="inline-list">
4194:      <li>
4195:        <a 
href="/proprietary/malware-appliances.html#content">Appliances</a></li>
4196:      <li>
4197:        <a href="/proprietary/malware-cars.html#content">Cars</a></li>
4198:     <li>
4199:        <a 
href="/proprietary/malware-in-online-conferencing.html#content">Conferencing</a></li>
4200:     <li>
4201:        <a href="/proprietary/malware-edtech.html#content">EdTech</a></li>
4202:      <li>
4203:        <a href="/proprietary/malware-games.html#content">Games</a></li>
4204:      <li>
4205:        <a 
href="/proprietary/malware-mobiles.html#content">Mobiles</a></li>
4206:      <li>
4207:        <a 
href="/proprietary/malware-webpages.html#content">Webpages</a></li>
4208:
4209:    </ul>
4210:  </dd>
4211:  <dt class="nolink">By company</dt>
4212:  <dd>
4213:    <ul class="inline-list">
4214:      <li>
4215:        <a href="/proprietary/malware-adobe.html#content">Adobe</a></li>
4216:      <li>
4217:        <a href="/proprietary/malware-amazon.html#content">Amazon</a></li>
4218:      <li>
4219:        <a href="/proprietary/malware-apple.html#content">Apple</a></li>
4220:      <li>
4221:        <a href="/proprietary/malware-google.html#content">Google</a></li>
4222:      <li>
4223:        <a 
href="/proprietary/malware-microsoft.html#content">Microsoft</a></li>
4224:    </ul>
4225:  </dd>
4226:  <dt class="nolink">Articles</dt>
4227:  <dd>
4228:    <ul class="inline-list">
4229:      <li>
4230:        <a href="/proprietary/articles/uhd-bluray-denies-your-freedom">UHD 
Blu-ray Denies Your Freedom</a></li>
4231:    </ul>
4232:  </dd>
4233: </dl>
4234:</div>
4235:</div>
4236:
4237:</div><!-- for id="content", starts in the include above -->
4238:
4239:
4240:              <!-- begin server/footer-text.html -->
4241:
4242:
4243:
4244:
4245:
4246:<div style="clear:both"></div>
4247:
4248:
4249:<div id="language-container">
4250: <div class="backtotop">
4251:  <hr class="no-display" />
4252:  <a href="#top"><b>&#9650;</b></a>
4253: </div>
4254: <div id="languages" class="rounded-corners">
4255:  <div class="button">
4256:   <a href="#top" class="close"><span>BACK TO TOP</span></a>
4257:  </div>
4258:  <div id="set-language" class="button">
4259:   <span class="gnun-split"></span>
4260:   <a 
href="/server/select-language.html?callback=/proprietary/proprietary-surveillance.html"
 rel="nofollow">
4261:   Set language
4262:   <span class="gnun-split"></span>
4263:   </a>
4264:  </div>
4265:  <p>Available for this page:</p>
4266:  <div id="translations">
4267:<p>
4268:<span dir="ltr" class="original">[en]&nbsp;<a lang="en" hreflang="en" 
href="/proprietary/proprietary-surveillance.en.html">English</a> &nbsp;</span>
4269:<span dir="ltr">[es]&nbsp;<a lang="es" hreflang="es" 
href="/proprietary/proprietary-surveillance.es.html">español</a> &nbsp;</span>
4270:<span dir="ltr">[fr]&nbsp;<a lang="fr" hreflang="fr" 
href="/proprietary/proprietary-surveillance.fr.html">français</a> &nbsp;</span>
4271:<span dir="ltr">[it]&nbsp;<a lang="it" hreflang="it" 
href="/proprietary/proprietary-surveillance.it.html">italiano</a> &nbsp;</span>
4272:<span dir="ltr">[ja]&nbsp;<a lang="ja" hreflang="ja" 
href="/proprietary/proprietary-surveillance.ja.html">日本語</a> &nbsp;</span>
4273:<span dir="ltr">[pt-br]&nbsp;<a lang="pt-br" hreflang="pt-br" 
href="/proprietary/proprietary-surveillance.pt-br.html">português</a> 
&nbsp;</span>
4274:<span dir="ltr">[ru]&nbsp;<a lang="ru" hreflang="ru" 
href="/proprietary/proprietary-surveillance.ru.html">русский</a> 
&nbsp;</span>
4275:</p>
4276:</div>
4277: </div>
4278:</div>
4279:
4280:<div id="mission-statement" role="complementary">
4281: <div class="backtotop">
4282:  <hr class="no-display" />
4283:  <a href="#header"><span>BACK TO TOP </span>&#9650;</a>
4284: </div>
4285:<div style="clear: both"></div>
4286:<blockquote>
4287:<p style="direction:ltr; text-align:left"><a href="//www.fsf.org"><img 
id="fsfbanner"
4288:src="/graphics/fsf-logo-notext-small.png" alt="&nbsp;[FSF logo]&nbsp;"
4289:width="75" height="25" /></a><strong>
4290:&ldquo;The Free Software Foundation (FSF) is a nonprofit with a worldwide
4291:mission to promote computer user freedom. We defend the rights of all
4292:software users.&rdquo;</strong></p>
4293:</blockquote>
4294:
4295:<div id="support-the-fsf" class="button">
4296: <a class="join" 
href="//www.fsf.org/associate/support_freedom?referrer=4052">JOIN</a>
4297: <a class="donate" href="//donate.fsf.org/">DONATE</a>
4298: <a class="shop" href="//shop.fsf.org/">SHOP</a>
4299:</div>
4300:</div>
4301:<!-- end server/footer-text.html -->
4302:
4303:
4304:<div id="footer" role="contentinfo">
4305:<div class="unprintable">
4306:
4307:<p>Please send general FSF &amp; GNU inquiries to
4308:<a href="mailto:gnu@gnu.org";>&lt;gnu@gnu.org&gt;</a>.
4309:There are also <a href="/contact/">other ways to contact</a>
4310:the FSF.  Broken links and other corrections or suggestions can be sent
4311:to <a href="mailto:webmasters@gnu.org";>&lt;webmasters@gnu.org&gt;</a>.</p>
4312:
4313:<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
4314:        replace it with the translation of these two:
4315:
4316:        We work hard and do our best to provide accurate, good quality
4317:        translations.  However, we are not exempt from imperfection.
4318:        Please send your comments and general suggestions in this regard
4319:        to <a href="mailto:web-translators@gnu.org";>
4320:        &lt;web-translators@gnu.org&gt;</a>.</p>
4321:
4322:        <p>For information on coordinating and contributing translations of
4323:        our web pages, see <a
4324:        href="/server/standards/README.translations.html">Translations
4325:        README</a>. -->
4326:Please see the <a
4327:href="/server/standards/README.translations.html">Translations
4328:README</a> for information on coordinating and contributing translations
4329:of this article.</p>
4330:</div>
4331:
4332:<!-- Regarding copyright, in general, standalone pages (as opposed to
4333:     files generated as part of manuals) on the GNU web server should
4334:     be under CC BY-ND 4.0.  Please do NOT change or remove this
4335:     without talking with the webmasters or licensing team first.
4336:     Please make sure the copyright date is consistent with the
4337:     document.  For web pages, it is ok to list just the latest year the
4338:     document was modified, or published.
4339:
4340:     If you wish to list earlier years, that is ok too.
4341:     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
4342:     years, as long as each year in the range is in fact a copyrightable
4343:     year, i.e., a year in which the document was published (including
4344:     being publicly visible on the web or in a revision control system).
4345:
4346:     There is more detail about copyright years in the GNU Maintainers
4347:     Information document, www.gnu.org/prep/maintain. -->
4348:
4349:<p>Copyright &copy; 2015-2024 Free Software Foundation, Inc.</p>
4350:
4351:<p>This page is licensed under a <a rel="license"
4352:href="http://creativecommons.org/licenses/by/4.0/";>Creative
4353:Commons Attribution 4.0 International License</a>.</p>
4354:
4355:<!-- start of server/bottom-notes.html -->
4356:<div id="bottom-notes" class="unprintable">
4357:<p><a href="//www.fsf.org/about/dmca-notice">Copyright Infringement 
Notification</a></p>
4358:<div id="generic">
4359:
4360:
4361:</div>
4362:</div>
4363:<!-- end of server/bottom-notes.html -->
4364:
4365:
4366:<p class="unprintable">Updated:
4367:<!-- timestamp start -->
4368:$Date: 2024/10/05 12:28:00 $
4369:<!-- timestamp end -->
4370:</p>
4371:</div>
4372:</div><!-- for class="inner", starts in the banner include -->
4373:</body>
4374:</html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]