[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
all.html malware-adobe.html malware-amazon.html malware-apple.htm...
From: |
Diff Report |
Subject: |
all.html malware-adobe.html malware-amazon.html malware-apple.htm... |
Date: |
Thu, 14 Apr 2022 00:04:15 -0400 |
Modified:
all.html
malware-adobe.html
malware-amazon.html
malware-apple.html
malware-appliances.html
malware-cars.html
malware-edtech.html
malware-games.html
malware-google.html
malware-in-online-conferencing.html
malware-microsoft.html
malware-mobiles.html
malware-webpages.html
potential-malware.html
proprietary-addictions.html
proprietary-back-doors.html
proprietary-censorship.html
proprietary-coverups.html
proprietary-deception.html
proprietary-drm.html
proprietary-fraud.html
proprietary-insecurity.html
proprietary-interference.html
proprietary-jails.html
proprietary-manipulation.html
proprietary-obsolescence.html
proprietary-sabotage.html
proprietary-surveillance.html
proprietary-tethers.html
proprietary-tyrants.html
diff -rNU2 all.html all.html
--- all.html 2022-04-13 04:04:23.073444545 +0000
+++ all.html 2022-04-14 04:04:14.879112403 +0000
@@ -153,5 +153,5 @@
removed the ability to install other operating
systems</a>. Then users broke that restriction too, but <a
-
href="https://www.engadget.com/2011/01/12/sony-follows-up-officially-sues-geohot-and-fail0verflow-over-ps/">got
+
href="https://www.engadget.com/2011-01-12-sony-follows-up-officially-sues-geohot-and-fail0verflow-over-ps.html">got
sued by Sony</a>.</p>
</li>
@@ -649,5 +649,5 @@
<!--#set var='ADD' value='2021-03-09' --><!--#set var='PUB' value='2020-04-30'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p>Proprietary programs Google Meet, Microsoft Teams, and WebEx <a
-
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/">are
+
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex-a7383469308/">are
collecting user's personal and identifiable data</a> including how long
a call lasts, who's participating in the call, and the IP addresses
@@ -803,5 +803,5 @@
<!--#set var='ADD' value='2021-01-05' --><!--#set var='PUB' value='2021-01-05'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p>Most Internet connected devices in Mozilla's <a
- href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
+ href="https://foundation.mozilla.org/en/privacynotincluded/">“Privacy
Not Included”</a> list <a
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
@@ -856,5 +856,5 @@
<p>While the world is still
struggling with COVID-19 coronavirus, many <a
-
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/">people
+
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus">people
are in danger of surveillance</a> and their computers are infected
with malware as a result of installing proprietary software.</p>
@@ -944,5 +944,5 @@
<!--#set var='ADD' value='2020-11-25' --><!--#set var='PUB' value='2020-11-12'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p>Apple has <a
- href="https://sneak.berlin/20201112/your-computer-isnt-yours">implemented
+ href="https://sneak.berlin/20201112/your-computer-isnt-yours/">implemented
a malware in its computers that imposes surveillance</a> on users
and reports users' computing to Apple.</p>
@@ -1267,5 +1267,5 @@
<p>Wink sells a “smart” home hub that is tethered
to a server. In May 2020, it ordered the purchasers to start <a
-
href="https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html">
+
href="https://www.techhive.com/article/578539/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html">
paying a monthly fee for the use of that server</a>. Because of the
tethering, the hub is useless without that.</p>
@@ -1302,5 +1302,5 @@
<!--#set var='ADD' value='2020-04-14' --><!--#set var='PUB' value='2020-04-13'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
- <p>The <a href="https://www.google.com/mobile/android/market-tos.html">
+ <p>The <a href="https://play.google.com/about/play-terms/">
Google Play Terms of Service</a> insist that the user of Android accept
the presence of universal back doors in apps released by Google.</p>
@@ -1532,5 +1532,5 @@
<!--#set var='ADD' value='2019-10-03' --><!--#set var='PUB' value='2017-08-31'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p>The recent versions of Microsoft Office require the user to <a
-
href="https://products.office.com/en-us/microsoft-office-for-home-and-school-faq?legRedir=true&CorrelationId=c9c5b549-11ad-4f71-bf81-b7e069fdb372">
+
href="https://www.microsoft.com/en-us/microsoft-365/microsoft-365-for-home-and-school-faq?legRedir=true&CorrelationId=c9c5b549-11ad-4f71-bf81-b7e069fdb372">
connect to Microsoft servers at least every thirty-one
days</a>. Otherwise, the software will refuse to edit any documents
@@ -1558,5 +1558,5 @@
<p>ChromeBooks are programmed for obsolescence:
ChromeOS has a universal back door that is used for updates and <a
-
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/">
+
href="https://www.theregister.com/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/">
ceases to operate at a predefined date</a>. From then on, there
appears to be no support whatsoever for the computer.</p>
@@ -1602,5 +1602,5 @@
<!--#set var='ADD' value='2019-08-31' --><!--#set var='PUB' value='2019-08-16'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p>A game published on Facebook <a
-
href="https://www.revealnews.org/article/so-your-child-racked-up-unwanted-credit-card-charges-playing-video-games-now-what/">aimed
+
href="https://revealnews.org/article/so-your-child-racked-up-unwanted-credit-card-charges-playing-video-games-now-what/">aimed
at leading children to spend</a> large amounts of their parents'
money without explaining it to them.</p>
@@ -1684,5 +1684,5 @@
competitors further qualifies it as <em>predatory</em>.
Note that Belgium <a
-
href="https://www.rockpapershotgun.com/2019/01/29/fifa-ultimate-team-packs-blocked-in-belgium/">
+
href="https://www.rockpapershotgun.com/fifa-ultimate-team-packs-blocked-in-belgium">
made these loot boxes illegal</a> in 2018.</p>
@@ -1813,5 +1813,5 @@
<!--#set var='ADD' value='2019-05-08' --><!--#set var='PUB' value='2019-04-26'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p>The Jibo robot toys were tethered to the manufacturer's server,
- and <a href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648">
+ and <a
href="https://apnews.com/article/san-francisco-north-america-technology-business-ap-top-news-99c9ec8ebad242ca88178e22c7642648">
the company made them all cease to work</a> by shutting down that
server.</p>
@@ -1824,5 +1824,5 @@
<!--#set var='ADD' value='2019-05-08' --><!--#set var='PUB' value='2019-02-01'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p>The FordPass Connect feature of some Ford vehicles has <a
-
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+
href="https://web.archive.org/web/20200530023040/https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
near-complete access to the internal car network</a>. It is constantly
connected to the cellular phone network and sends Ford a lot of data,
@@ -1888,5 +1888,5 @@
program</a> on computers running certain
versions of Windows 10. Remediation, in Microsoft's view, means <a
-
href="https://support.microsoft.com/en-us/topic/kb4023057-update-for-windows-10-update-service-components-fccad0ca-dc10-2e46-9ed1-7e392450fb3a">
+
href="https://support.microsoft.com/en-us/topic/kb4023057-update-for-windows-update-service-components-fccad0ca-dc10-2e46-9ed1-7e392450fb3a">
tampering with users' settings and files</a>, notably to
“repair” any components of the updating system that users
@@ -1910,5 +1910,5 @@
<!--#set var='ADD' value='2019-04-20' --><!--#set var='PUB' value='2019-04-15'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p id="M201509210">Volkswagen programmed its car engine computers to <a
-
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
+ href="https://petri.com/volkswagen-used-software-to-cheat-on-emissions/">
detect the Environmental Protection Agency's emission tests</a>, and
run dirty the rest of the time. In real driving, the cars exceeded
@@ -1966,5 +1966,5 @@
<!--#set var='ADD' value='2019-04-11' --><!--#set var='PUB' value='2019-03-21'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p>The Medtronics Conexus Telemetry Protocol has <a
-
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
+
href="https://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
two vulnerabilities that affect several models of implantable
defibrillators</a> and the devices they connect to.</p>
@@ -2076,5 +2076,5 @@
<p>In China, it is mandatory for electric
cars to be equipped with a terminal that <a
- href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+
href="https://apnews.com/article/north-america-ap-top-news-international-news-shanghai-china-4a749a4211904784826b45e812cff4ca">
transfers technical data, including car location,
to a government-run platform</a>. In practice, <a
@@ -2125,10 +2125,10 @@
<!--#set var='ADD' value='2019-03-04' --><!--#set var='PUB' value='2019-02-14'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p>The AppCensus database gives information on <a
- href="https://www.appcensus.mobi"> how Android apps use and
+ href="https://www.appcensus.io/"> how Android apps use and
misuse users' personal data</a>. As of March 2019, nearly
78,000 have been analyzed, of which 24,000 (31%) transmit the <a
href="/proprietary/proprietary-surveillance.html#M201812290">
Advertising ID</a> to other companies, and <a
- href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ href="https://blog.appcensus.io/2019/02/14/ad-ids-behaving-badly/">
18,000 (23% of the total) link this ID to hardware identifiers</a>,
so that users cannot escape tracking by resetting it.</p>
@@ -2225,5 +2225,5 @@
<p>An investigation of the 150 most popular
gratis VPN apps in Google Play found that <a
- href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+
href="https://www.top10vpn.com/research/free-vpn-investigations/risk-index/">
25% fail to protect their users' privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
@@ -2233,5 +2233,5 @@
<p>Moreover, a previous investigation had found that <a
- href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
+
href="https://www.top10vpn.com/research/free-vpn-investigations/ownership/">half
of
the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
@@ -2339,5 +2339,5 @@
<!--#set var='ADD' value='2019-01-13' --><!--#set var='PUB' value='2019-01-10'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p>Amazon Ring “security” devices <a
-
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+
href="https://www.engadget.com/2019-01-10-ring-gave-employees-access-customer-video-feeds.html">
send the video they capture to Amazon servers</a>, which save it
long-term.</p>
@@ -2388,5 +2388,5 @@
<!--#set var='ADD' value='2018-12-04' --><!--#set var='PUB' value='2018-11-27'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p>Many web sites use JavaScript code <a
-
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
+
href="https://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
to snoop on information that users have typed into a
form but not sent</a>, in order to learn their identity. Some are <a
@@ -2440,5 +2440,5 @@
<!--#set var='ADD' value='2018-11-04' --><!--#set var='PUB' value='2018-10-30'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p>Nearly all “home security cameras” <a
-
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds-a8814384448/">
give the manufacturer an unencrypted copy of everything they
see</a>. “Home insecurity camera” would be a better
@@ -2453,5 +2453,5 @@
<!--#set var='ADD' value='2018-10-30' --><!--#set var='PUB' value='2018-10-24'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p>Some Android apps <a
-
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+
href="https://web.archive.org/web/20210418052600/https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
track the phones of users that have deleted them</a>.</p>
</li>
@@ -2493,5 +2493,5 @@
<!--#set var='ADD' value='2018-10-11' --><!--#set var='PUB' value='2018-07-31'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p>A nonfree video game, available through the nonfree Steam client, <a
-
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-">
+
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-cryptocurrency-miners">
included a “miner”</a>, i.e. an executable that hijacks
the CPU in users' computers to mine a cryptocurrency.</p>
@@ -2500,5 +2500,5 @@
<!--#set var='ADD' value='2018-10-11' --><!--#set var='PUB' value='2018-05-08'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p>A cracker used an exploit in outdated software to <a
-
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
+
href="https://www.pcmag.com/news/400-websites-secretly-served-cryptocurrency-miners-to-visitors">
inject a “miner” in web pages</a> served to visitors. This
type of malware hijacks the computer's processor to mine a
@@ -2534,5 +2534,5 @@
<!--#set var='ADD' value='2018-09-25' --><!--#set var='PUB' value='2018-09-24'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p>Researchers have discovered how to <a
-
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
+
href="https://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
hide voice commands in other audio</a>, so that people cannot hear
them, but Alexa and Siri can.</p>
@@ -2541,5 +2541,5 @@
<!--#set var='ADD' value='2018-09-22' --><!--#set var='PUB' value='2018-09-14'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p>Android has a <a
-
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
+
href="https://www.theverge.com/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
back door for remotely changing “user” settings</a>.</p>
@@ -2584,5 +2584,5 @@
<p>The game Metal Gear Rising for
MacOS was tethered to a server. The company <a
-
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">
+
href="https://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">
shut down the server, and all copies stopped working</a>.</p>
</li>
@@ -2655,5 +2655,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/12 12:48:58 $
+$Date: 2022/04/13 12:46:51 $
<!-- timestamp end -->
</p>
diff -rNU2 malware-adobe.html malware-adobe.html
--- malware-adobe.html 2022-04-13 04:04:23.077444546 +0000
+++ malware-adobe.html 2022-04-14 04:04:14.879112403 +0000
@@ -83,5 +83,5 @@
<p>Adobe nonfree software may halt
all other work and freeze a computer <a
- href="http://shallowsky.com/blog/gimp/non-free-software-surprises.html">
+ href="https://shallowsky.com/blog/gimp/non-free-software-surprises.html">
to perform a license check</a>, at a random time every 30 days.</p>
</li>
@@ -127,5 +127,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Adobe applications have time bombs: they <a
-
href="http://techcrunch.com/2013/05/06/adobe-goes-all-in-with-subscription-based-creative-cloud-will-stop-selling-regular-cs-licenses-shrink-wrapped-boxes/">
+
href="https://techcrunch.com/2013/05/06/adobe-goes-all-in-with-subscription-based-creative-cloud-will-stop-selling-regular-cs-licenses-shrink-wrapped-boxes/">
stop working after a certain time</a>, after which the user
must pay to extend the time.</p>
@@ -187,5 +187,5 @@
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2016, 2018-2021 Free Software Foundation, Inc.</p>
+<p>Copyright © 2016, 2018-2022 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
@@ -197,5 +197,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/01 09:21:50 $
+$Date: 2022/04/13 07:56:41 $
<!-- timestamp end -->
</p>
diff -rNU2 malware-amazon.html malware-amazon.html
--- malware-amazon.html 2022-04-13 04:04:23.077444546 +0000
+++ malware-amazon.html 2022-04-14 04:04:14.883112407 +0000
@@ -83,5 +83,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Amazon <a
-
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml">
+
href="https://www.techdirt.com/2015/03/24/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices/">
downgraded the software in users' Swindles</a> so that those already
rooted would cease to function at all.</p>
@@ -92,5 +92,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Amazon Kindle-Swindle has a back door that has been used to <a
-
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
+
href="https://web.archive.org/web/20220319193415/https://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
remotely erase books</a>. One of the books erased was
<cite>1984</cite>, by George Orwell.</p>
@@ -99,5 +99,5 @@
would delete books only following orders from the
state. However, that policy didn't last. In 2012 it <a
-
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">
+
href="https://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">
wiped a user's Kindle-Swindle and deleted her account</a>, then
offered her kafkaesque “explanations.”</p>
@@ -294,5 +294,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Amazon Ring “security” devices <a
-
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+
href="https://www.engadget.com/2019-01-10-ring-gave-employees-access-customer-video-feeds.html">
send the video they capture to Amazon servers</a>, which save it
long-term.</p>
@@ -311,5 +311,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Amazon recently invited consumers to be suckers and <a
-
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
+
href="https://www.techdirt.com/2017/11/22/vulnerability-found-amazon-key-again-showing-how-dumber-tech-is-often-smarter-option/">
allow delivery staff to open their front doors</a>. Wouldn't you know
it, the system has a grave security flaw.</p>
@@ -320,5 +320,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Amazon “Smart” TV is <a
-
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+
href="https://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
snooping all the time</a>.</p>
</li>
@@ -384,5 +384,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/05 18:50:46 $
+$Date: 2022/04/13 09:28:11 $
<!-- timestamp end -->
</p>
diff -rNU2 malware-apple.html malware-apple.html
--- malware-apple.html 2022-04-13 04:04:23.081444546 +0000
+++ malware-apple.html 2022-04-14 04:04:14.887112410 +0000
@@ -115,5 +115,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The iPhone has a back door for <a
-
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+
href="https://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
remote wipe</a>. It's not always enabled, but users are led into
enabling it without understanding.</p>
@@ -124,5 +124,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The iPhone has a back door <a
-
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
+
href="https://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
that allows Apple to remotely delete apps</a> which Apple considers
“inappropriate”. Jobs said it's OK for Apple to have
@@ -202,5 +202,5 @@
<!--#set var="DATE" value='<small class="date-tag">2007-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
+ <p><a href="https://arstechnica.com/gadgets/2007/08/aacs-tentacles/">
DRM that caters to Bluray disks</a>. (The article focused on Windows
and said that MacOS would do the same thing subsequently.)</p>
@@ -330,5 +330,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Apple has <a
- href="https://sneak.berlin/20201112/your-computer-isnt-yours">implemented
+ href="https://sneak.berlin/20201112/your-computer-isnt-yours/">implemented
a malware in its computers that imposes surveillance</a> on users
and reports users' computing to Apple.</p>
@@ -470,5 +470,5 @@
<p>Here is an article about the <a
- href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
+ href="https://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
code signing</a> that the iThings use to lock up the user.</p>
@@ -577,5 +577,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Apple used its censorship system to enforce Russian surveillance <a
-
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
+
href="https://web.archive.org/web/20220402210254/https://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html">
by blocking distribution of the LinkedIn app in Russia</a>.</p>
@@ -601,5 +601,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Apple censors games, <a
-
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">
+
href="https://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game/">
banning some games from the cr…app store</a> because of which
political points they suggest. Some political points are apparently
@@ -610,5 +610,5 @@
<!--#set var="DATE" value='<small class="date-tag">2015-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
+ <p>Apple <a href="https://www.ifixit.com/News/7401/ifixit-app-pulled">
banned a program from the App Store</a> because its developers
committed the enormity of disassembling some iThings.</p>
@@ -619,10 +619,10 @@
--><!--#echo encoding="none" var="DATE" -->
<p>As of 2015, Apple <a
-
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">
+
href="https://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">
systematically bans apps that endorse abortion rights or would help
women find abortions</a>.</p>
<p>This particular political slant <a
-
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
+
href="https://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
affects other Apple services</a>.</p>
</li>
@@ -633,5 +633,5 @@
<p>Apple has banned iThing
applications that show the confederate flag. <a
-
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html">
+ href="https://www.huffpost.com/entry/apple-confederate-flag_n_7663754">
Not only those that use it as a symbol of racism</a>, but even
strategic games that use it to represent confederate army units
@@ -650,5 +650,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
+
href="https://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
More examples of Apple's arbitrary and inconsistent censorship</a>.</p>
</li>
@@ -658,7 +658,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Apple used this censorship power in 2014 to <a
-
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
+
href="https://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
ban all bitcoin apps</a> for the iThings for a time. It also <a
-
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
+
href="https://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
banned a game about growing marijuana</a>, while permitting games
about other crimes such as killing people. Perhaps Apple considers
@@ -673,5 +673,5 @@
time the developers fixed one “problem”, Apple
complained about another. After the fifth rejection, Apple <a
- href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
+ href="https://mashable.com/archive/apple-app-tracks-drone-strikes">
admitted it was censoring the app based on the subject matter</a>.</p>
</li>
@@ -686,5 +686,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>“Dark patterns” are <a
-
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
+
href="https://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
interfaces designed to mislead users, or make option settings hard
to find</a>.</p>
@@ -706,5 +706,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Apple Siri <a
-
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
+
href="https://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
to give you information</a> about music charts if you're not an Apple
Music subscriber.</p>
@@ -758,5 +758,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
-
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
+
href="https://www.macworld.com/article/230582/apple-file-system-apfs-faq.html">
changes the file system from HFS+ to APFS</a>, which cannot be
accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
@@ -793,5 +793,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Apple <a
-
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
+
href="https://www.theregister.com/2016/04/14/uninstall_quicktime_for_windows/">
stops users from fixing the security bugs in Quicktime for Windows</a>,
while refusing to fix them itself.</p>
@@ -832,5 +832,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Apple <a
-
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
+
href="https://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
deleted from iPods the music that users had got from internet music
stores that competed with iTunes</a>.</p>
@@ -1037,5 +1037,5 @@
make are automatically updated everywhere. […] </p></blockquote>
- <p>(From <a href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ <p>(From <a
href="https://web.archive.org/web/20150921152044/https://www.apple.com/icloud/photos/">Apple's
iCloud
information</a> as accessed on 24 Sep 2015.) The iCloud feature is
<a href="https://support.apple.com/en-us/HT202033">activated by the
@@ -1059,5 +1059,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Apple has made various <a
-
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">
+
href="https://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">
MacOS programs send files to Apple servers without asking
permission</a>. This exposes the files to Big Brother and perhaps
@@ -1086,5 +1086,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Apple admits the <a
-
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">
+
href="https://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">
spying in a search facility</a>, but there's a lot <a
href="https://github.com/fix-macosx/yosemite-phone-home"> more snooping
@@ -1096,5 +1096,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Various operations in <a
-
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540">
+
href="https://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540">
the latest MacOS send reports to Apple</a> servers.</p>
</li>
@@ -1104,5 +1104,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Apple can, and regularly does, <a
-
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+
href="https://arstechnica.com/gadgets/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
remotely extract some data from iPhones for the state</a>.</p>
@@ -1110,5 +1110,5 @@
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">
iOS 8 security improvements</a>; but <a
- href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ href="https://theintercept.com/2014/09/22/apple-data/">
not as much as Apple claims</a>.</p>
</li>
@@ -1118,5 +1118,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+
href="https://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
Several “features” of iOS seem to exist
for no possible purpose other than surveillance</a>. Here is the <a
@@ -1129,5 +1129,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+
href="https://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
Spotlight search</a> sends users' search terms to Apple.</p>
</li>
@@ -1137,5 +1137,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The <a class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+
href="https://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
iBeacon</a> lets stores determine exactly where the iThing is, and
get other info too.</p>
@@ -1146,5 +1146,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+
href="https://web.archive.org/web/20190924053515/https://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
Either Apple helps the NSA snoop on all the data in an iThing, or it
is totally incompetent</a>.</p>
@@ -1155,5 +1155,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The iThing also <a
-
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+
href="https://www.theregister.com/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
tells Apple its geolocation</a> by default, though that can be
turned off.</p>
@@ -1164,5 +1164,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>There is also a feature for web sites to track users, which is <a
-
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+
href="https://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it is
still true in iOS 7.)</p>
@@ -1191,5 +1191,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Apple arbitrarily <a
- href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">blocks
+ href="https://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">blocks
users from installing old versions of iOS</a>.</p>
</li>
@@ -1265,5 +1265,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/12 12:48:57 $
+$Date: 2022/04/13 07:49:50 $
<!-- timestamp end -->
</p>
diff -rNU2 malware-appliances.html malware-appliances.html
--- malware-appliances.html 2022-04-13 04:04:23.085444545 +0000
+++ malware-appliances.html 2022-04-14 04:04:14.887112410 +0000
@@ -125,5 +125,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Most Internet connected devices in Mozilla's <a
- href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
+ href="https://foundation.mozilla.org/en/privacynotincluded/">“Privacy
Not Included”</a> list <a
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
@@ -213,5 +213,5 @@
<p>Wink sells a “smart” home hub that is tethered
to a server. In May 2020, it ordered the purchasers to start <a
-
href="https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html">
+
href="https://www.techhive.com/article/578539/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html">
paying a monthly fee for the use of that server</a>. Because of the
tethering, the hub is useless without that.</p>
@@ -262,5 +262,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Jibo robot toys were tethered to the manufacturer's server,
- and <a href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648">
+ and <a
href="https://apnews.com/article/san-francisco-north-america-technology-business-ap-top-news-99c9ec8ebad242ca88178e22c7642648">
the company made them all cease to work</a> by shutting down that
server.</p>
@@ -275,5 +275,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Medtronics Conexus Telemetry Protocol has <a
-
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
+
href="https://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
two vulnerabilities that affect several models of implantable
defibrillators</a> and the devices they connect to.</p>
@@ -322,5 +322,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Amazon Ring “security” devices <a
-
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+
href="https://www.engadget.com/2019-01-10-ring-gave-employees-access-customer-video-feeds.html">
send the video they capture to Amazon servers</a>, which save it
long-term.</p>
@@ -365,5 +365,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Nearly all “home security cameras” <a
-
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds-a8814384448/">
give the manufacturer an unencrypted copy of everything they
see</a>. “Home insecurity camera” would be a better
@@ -406,5 +406,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Researchers have discovered how to <a
-
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
+
href="https://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
hide voice commands in other audio</a>, so that people cannot hear
them, but Alexa and Siri can.</p>
@@ -430,5 +430,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A medical insurance company <a
-
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
+
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next/">
offers a gratis electronic toothbrush that snoops on its user by
sending usage data back over the Internet</a>.</p>
@@ -474,5 +474,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Amazon recently invited consumers to be suckers and <a
-
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
+
href="https://www.techdirt.com/2017/11/22/vulnerability-found-amazon-key-again-showing-how-dumber-tech-is-often-smarter-option/">
allow delivery staff to open their front doors</a>. Wouldn't you know
it, the system has a grave security flaw.</p>
@@ -483,5 +483,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A remote-control sex toy was found to make <a
-
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-surveillance">audio
recordings of the conversation between two users</a>.</p>
</li>
@@ -524,5 +524,5 @@
<p>A “smart” intravenous pump
designed for hospitals is connected to the internet. Naturally <a
-
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
+
href="https://www.techdirt.com/2017/09/22/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack/">
its security has been cracked</a>.</p>
@@ -536,5 +536,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The bad security in many Internet of Stings devices allows <a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+
href="https://www.techdirt.com/2017/08/28/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you/">ISPs
to snoop on the people that use them</a>.</p>
@@ -549,5 +549,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Sonos <a
-
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
+
href="https://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
told all its customers, “Agree”
to snooping or the product will stop working</a>. <a
@@ -573,5 +573,5 @@
are tremendously insecure. They have login
accounts with hard-coded passwords, which can't be changed, and <a
-
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
+
href="https://arstechnica.com/information-technology/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
is no way to delete these accounts either</a>.</p>
</li>
@@ -582,5 +582,5 @@
<p>The proprietary code that runs pacemakers,
insulin pumps, and other medical devices is <a
- href="http://www.bbc.co.uk/news/technology-40042584"> full of gross
+ href="https://www.bbc.com/news/technology-40042584"> full of gross
security faults</a>.</p>
</li>
@@ -591,5 +591,5 @@
<p>Bird and rabbit pets were implemented for Second
Life by a company that tethered their food to a server. <a
-
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying">
+
href="https://www.rockpapershotgun.com/second-life-ozimals-pet-rabbits-dying">
It shut down the server and the pets more or less died</a>.</p>
</li>
@@ -698,5 +698,5 @@
<p>If you buy a used “smart”
car, house, TV, refrigerator, etc., usually <a
-
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
+
href="https://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
previous owners can still remotely control it</a>.</p>
</li>
@@ -706,5 +706,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio “smart” <a
-
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+
href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
report everything that is viewed on them, and not just broadcasts and
cable</a>. Even if the image is coming from the user's own computer,
@@ -746,5 +746,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The developer of Ham Radio Deluxe <a
-
href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml">sabotaged
+
href="https://www.techdirt.com/2016/12/22/software-company-shows-how-not-to-handle-negative-review/">sabotaged
a customer's installation as punishment for posting a negative
review</a>.</p>
@@ -759,5 +759,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The “smart” toys My Friend Cayla and i-Que can be <a
-
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">remotely
+
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws/">remotely
controlled with a mobile phone</a>; physical access is not
necessary. This would enable crackers to listen in on a child's
@@ -790,5 +790,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Samsung's “Smart Home” has a big security hole; <a
-
href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
+
href="https://arstechnica.com/information-technology/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
unauthorized people can remotely control it</a>.</p>
@@ -843,5 +843,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The <a
- href="http://michaelweinberg.org/post/137045828005/free-the-cube">
+ href="https://michaelweinberg.org/post/137045828005/free-the-cube">
“Cube” 3D printer was designed with DRM</a>: it
won't accept third-party printing materials. It is the Keurig of
@@ -851,5 +851,5 @@
<p>With a <a
- href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
+ href="https://www.fsf.org/resources/hw/endorsement/aleph-objects">
printer that gets the Respects Your Freedom</a>, this problem would
not even be a remote possibility.</p>
@@ -869,5 +869,5 @@
<p>Philips “smart” lightbulbs had initially been
designed to interact with other companies' smart light bulbs, but <a
-
href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml">
+
href="https://www.techdirt.com/2015/12/14/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update/">
later the company updated the firmware to disallow
interoperability</a>.</p>
@@ -881,9 +881,9 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html">
+
href="https://www.computerworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html">
Some D-Link routers</a> have a back door for changing settings in a
dlink of an eye.</p>
- <p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/"> The TP-Link
+ <p><a href="https://sekurak.pl/tp-link-httptftp-backdoor/"> The TP-Link
router has a back door</a>.</p>
@@ -896,5 +896,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Nest Cam “smart” camera is <a
- href="http://www.bbc.com/news/technology-34922712">always watching</a>,
+ href="https://www.bbc.com/news/technology-34922712">always watching</a>,
even when the “owner” switches it “off.”</p>
@@ -919,5 +919,5 @@
are nearby. Once your Internet devices are paired with
your TV, advertisers can correlate ads with Web activity, and other <a
-
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
+
href="https://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
cross-device tracking</a>.</p>
</li>
@@ -945,5 +945,5 @@
being watched by advertisers. By combining TV viewing
information with online social media participation, Tivo can now <a
- href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ href="https://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing all
users to new combined surveillance by default.</p>
@@ -954,5 +954,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>FitBit fitness trackers have a <a
-
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
+
href="https://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
Bluetooth vulnerability</a> that allows attackers to send malware
to the devices, which can subsequently spread to computers and other
@@ -974,5 +974,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio “smart” TVs recognize and <a
- href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
+ href="https://www.engadget.com/2015-07-24-vizio-ipo-inscape-acr.html">track
what people are watching</a>, even if it isn't a TV channel.</p>
</li>
@@ -982,5 +982,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Due to bad security in a drug pump, crackers could use it to <a
-
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
+
href="https://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
kill patients</a>.</p>
</li>
@@ -990,5 +990,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Verizon cable TV <a
-
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+
href="https://arstechnica.com/information-technology/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
snoops on what programs people watch, and even what they wanted to
record</a>.</p>
@@ -1012,5 +1012,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio <a
- href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+
href="https://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
used a firmware “upgrade” to make its TVs snoop on what
users watch</a>. The TVs did not do that when first sold.</p>
@@ -1021,5 +1021,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Barbie <a
-
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+
href="https://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
</li>
@@ -1038,5 +1038,5 @@
<p>In its privacy policy, Samsung explicitly confirms that <a
-
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+
href="https://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
data containing sensitive information will be transmitted to third
parties</a>.</p>
@@ -1047,5 +1047,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Amazon “Smart” TV is <a
-
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+
href="https://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
snooping all the time</a>.</p>
</li>
@@ -1055,5 +1055,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>More or less all “smart” TVs <a
-
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+
href="https://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
@@ -1075,5 +1075,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p id="nest-thermometers">Nest thermometers send <a
- href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
+ href="https://bgr.com/general/google-nest-jailbreak-hack/">a lot of
data about the user</a>.</p>
</li>
@@ -1083,5 +1083,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>LG <a
-
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+
href="https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/">
disabled network features</a> on <em>previously purchased</em>
“smart” TVs, unless the purchasers agreed to let LG begin
@@ -1093,5 +1093,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Lots of <a
- href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
+ href="https://www.wired.com/2014/04/hospital-equipment-vulnerable/">
hospital equipment has lousy security</a>, and it can be fatal.</p>
</li>
@@ -1100,5 +1100,5 @@
<!--#set var="DATE" value='<small class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p><a href="http://www.bunniestudios.com/blog/?p=3554"> Some flash
+ <p><a href="https://www.bunniestudios.com/blog/?p=3554"> Some flash
memories have modifiable software</a>, which makes them vulnerable
to viruses.</p>
@@ -1114,5 +1114,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
+
href="https://arstechnica.com/information-technology/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
Point-of-sale terminals running Windows were taken over</a> and
turned into a botnet for the purpose of collecting customers' credit
@@ -1124,5 +1124,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Spyware in LG “smart” TVs <a
-
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+
href="https://doctorbeet.blogspot.com/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
reports what the user watches, and the switch to turn this off has
no effect</a>. (The fact that the transmission reports a 404 error
@@ -1130,5 +1130,5 @@
<p>Even worse, it <a
-
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+
href="https://rrrrambles.wordpress.com/2013/11/21/lg-tv-logging-filenames-from-network-folders/">
snoops on other devices on the user's local network</a>.</p>
@@ -1141,5 +1141,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p id="bluray"><a
-
href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up">
+
href="https://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up">
DVDs and Bluray disks have DRM</a>.</p>
@@ -1160,5 +1160,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The FTC punished a company for making webcams with <a
-
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
+
href="https://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
bad security so that it was easy for anyone to watch through
them</a>.</p>
@@ -1178,8 +1178,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p> It is possible to <a
-
href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
+
href="https://siliconangle.com/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
kill people by taking control of medical
implants by radio</a>. More information in <a
- href="http://www.bbc.co.uk/news/technology-17631838">BBC
+ href="https://www.bbc.com/news/technology-17631838">BBC
News</a> and <a
href="https://ioactive.com/broken-hearts-how-plausible-was-the-homeland-pacemaker-hack/">
@@ -1191,5 +1191,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
+
href="https://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
“Smart homes”</a> turn out to be stupidly vulnerable to
intrusion.</p>
@@ -1213,5 +1213,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Cisco TNP IP phones are <a
- href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
href="https://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
spying devices</a>.</p>
</li>
@@ -1306,5 +1306,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/06 07:41:52 $
+$Date: 2022/04/13 16:08:50 $
<!-- timestamp end -->
</p>
diff -rNU2 malware-cars.html malware-cars.html
--- malware-cars.html 2022-04-13 04:04:23.085444545 +0000
+++ malware-cars.html 2022-04-14 04:04:14.891112414 +0000
@@ -111,5 +111,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p id="M201509210">Volkswagen programmed its car engine computers to <a
-
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
+ href="https://petri.com/volkswagen-used-software-to-cheat-on-emissions/">
detect the Environmental Protection Agency's emission tests</a>, and
run dirty the rest of the time. In real driving, the cars exceeded
@@ -138,5 +138,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The FordPass Connect feature of some Ford vehicles has <a
-
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+
href="https://web.archive.org/web/20200530023040/https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
near-complete access to the internal car network</a>. It is constantly
connected to the cellular phone network and sends Ford a lot of data,
@@ -166,5 +166,5 @@
<p>In China, it is mandatory for electric
cars to be equipped with a terminal that <a
- href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+
href="https://apnews.com/article/north-america-ap-top-news-international-news-shanghai-china-4a749a4211904784826b45e812cff4ca">
transfers technical data, including car location,
to a government-run platform</a>. In practice, <a
@@ -244,5 +244,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969">
+
href="https://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969">
Audi's proprietary software used a simple method to cheat on emissions
tests</a>: to activate a special low-emission gearshifting mode until
@@ -254,5 +254,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Due to weak security, <a
-
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it
+
href="https://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it
is easy to open the doors of 100 million cars built by
Volkswagen</a>.</p>
@@ -292,5 +292,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Caterpillar vehicles come with <a
-
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">
+
href="https://web.archive.org/web/20201108113943/https://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">
a back door to shutoff the engine</a> remotely.</p>
</li>
@@ -300,5 +300,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Security researchers discovered a <a
-
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text">
+
href="https://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text">
vulnerability in diagnostic dongles used for vehicle tracking and
insurance</a> that let them take remote control of a car or lorry
@@ -310,5 +310,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Crackers were able to <a
-
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">
+
href="https://arstechnica.com/information-technology/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">
take remote control of the Jeep</a> “connected car”. They
could track the car, start or stop the engine, and activate or
@@ -345,5 +345,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p id="records-drivers">Proprietary software in cars <a
-
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
+
href="https://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
records information about drivers' movements</a>, which is made
available to car manufacturers, insurance companies, and others.</p>
@@ -360,8 +360,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p>It is possible to <a
-
href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/">
+
href="https://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/">
take control of some car computers through malware in music files</a>.
Also <a
- href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0">
+ href="https://www.nytimes.com/2011/03/10/business/10hack.html">
by radio</a>. More information in <a
href="http://www.autosec.org/faq.html"> Automotive Security And
@@ -419,5 +419,5 @@
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2017-2021 Free Software Foundation, Inc.</p>
+<p>Copyright © 2017-2022 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
@@ -429,5 +429,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/01 09:21:51 $
+$Date: 2022/04/13 07:56:41 $
<!-- timestamp end -->
</p>
diff -rNU2 malware-edtech.html malware-edtech.html
--- malware-edtech.html 2022-04-13 04:04:23.089444546 +0000
+++ malware-edtech.html 2022-04-14 04:04:14.895112417 +0000
@@ -171,5 +171,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Proprietary programs Google Meet, Microsoft Teams, and WebEx <a
-
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/">are
+
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex-a7383469308/">are
collecting user's personal and identifiable data</a> including how long
a call lasts, who's participating in the call, and the IP addresses
@@ -250,5 +250,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/12 08:55:55 $
+$Date: 2022/04/13 07:49:50 $
<!-- timestamp end -->
</p>
diff -rNU2 malware-games.html malware-games.html
--- malware-games.html 2022-04-13 04:04:23.093444546 +0000
+++ malware-games.html 2022-04-14 04:04:14.899112421 +0000
@@ -152,5 +152,5 @@
competitors further qualifies it as <em>predatory</em>.
Note that Belgium <a
-
href="https://www.rockpapershotgun.com/2019/01/29/fifa-ultimate-team-packs-blocked-in-belgium/">
+
href="https://www.rockpapershotgun.com/fifa-ultimate-team-packs-blocked-in-belgium">
made these loot boxes illegal</a> in 2018.</p>
@@ -178,5 +178,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A nonfree video game, available through the nonfree Steam client, <a
-
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-">
+
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-cryptocurrency-miners">
included a “miner”</a>, i.e. an executable that hijacks
the CPU in users' computers to mine a cryptocurrency.</p>
@@ -188,5 +188,5 @@
<p>The game Metal Gear Rising for
MacOS was tethered to a server. The company <a
-
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">
+
href="https://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">
shut down the server, and all copies stopped working</a>.</p>
</li>
@@ -207,5 +207,5 @@
program along with an update to the massive
multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
-
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
+
href="https://techraptor.net/gaming/news/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
to snoop on all open processes running on its user's computer</a>.</p>
</li>
@@ -254,5 +254,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>nVidia's proprietary GeForce Experience <a
-
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+
href="https://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
users identify themselves and then sends personal data about them to
nVidia servers</a>.</p>
@@ -263,8 +263,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A Capcom's Street Fighter V update <a
- href="https://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/">
+ href="https://www.theregister.com/2016/09/23/capcom_street_fighter_v/">
installed a driver that could be used as a back door by
any application installed on a Windows computer</a>, but was <a
-
href="https://www.rockpapershotgun.com/2016/09/24/street-fighter-v-removes-new-anti-crack">
+
href="https://www.rockpapershotgun.com/street-fighter-v-removes-new-anti-crack">
immediately rolled back</a> in response to public outcry.</p>
</li>
@@ -294,5 +294,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Many <a
-
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+
href="https://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html">
video game consoles snoop on their users and report to the
internet</a>—even what their users weigh.</p>
@@ -306,5 +306,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Modern gratis game cr…apps <a
-
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+
href="https://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
collect a wide range of data about their users and their users'
friends and associates</a>.</p>
@@ -370,5 +370,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Angry Birds <a
-
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+
href="https://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
spies for companies, and the NSA takes advantage
to spy through it too</a>. Here's information on <a
@@ -385,5 +385,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Some proprietary <a
-
href="http://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases">
+
href="https://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases">
games lure children to spend their parents' money</a>.</p>
</li>
@@ -409,5 +409,5 @@
<p>In a court settlement Sony is <a
-
href="http://arstechnica.com/tech-policy/2016/06/if-you-used-to-run-linux-on-your-ps3-you-could-get-55-from-sony/">
+
href="https://arstechnica.com/tech-policy/2016/06/if-you-used-to-run-linux-on-your-ps3-you-could-get-55-from-sony/">
now paying for the sabotage</a>.</p>
</li>
@@ -474,5 +474,5 @@
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2016-2021 Free Software Foundation, Inc.</p>
+<p>Copyright © 2016-2022 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
@@ -484,5 +484,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/10/30 10:06:56 $
+$Date: 2022/04/13 07:56:41 $
<!-- timestamp end -->
</p>
diff -rNU2 malware-google.html malware-google.html
--- malware-google.html 2022-04-13 04:04:23.333444556 +0000
+++ malware-google.html 2022-04-14 04:04:14.899112421 +0000
@@ -79,5 +79,5 @@
<!--#set var="DATE" value='<small class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The <a href="https://www.google.com/mobile/android/market-tos.html">
+ <p>The <a href="https://play.google.com/about/play-terms/">
Google Play Terms of Service</a> insist that the user of Android accept
the presence of universal back doors in apps released by Google.</p>
@@ -95,5 +95,5 @@
<p>ChromeBooks are programmed for obsolescence:
ChromeOS has a universal back door that is used for updates and <a
-
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/">
+
href="https://www.theregister.com/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/">
ceases to operate at a predefined date</a>. From then on, there
appears to be no support whatsoever for the computer.</p>
@@ -107,5 +107,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Android has a <a
-
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
+
href="https://www.theverge.com/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
back door for remotely changing “user” settings</a>.</p>
@@ -156,5 +156,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Google <a
-
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts">
+
href="https://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts">
offers censorship software</a>, ostensibly for parents to put into
their children's computers.</p>
@@ -179,5 +179,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones">
+
href="https://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones">
Google censored installation of Samsung's ad-blocker</a> on Android
phones, saying that blocking ads is “interference” with
@@ -208,5 +208,5 @@
<p>Google now allows Android
apps to detect whether a device has been rooted, <a
-
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/">and
+
href="https://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/">and
refuse to install if so</a>. The Netflix app uses this ability to
enforce DRM by refusing to install on rooted Android devices.</p>
@@ -223,5 +223,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Chrome <a
-
href="http://boingboing.net/2017/01/30/google-quietly-makes-optiona.html">implements
+
href="https://boingboing.net/2017/01/30/google-quietly-makes-optiona.html">implements
DRM</a>. So does Chromium, through nonfree software that is effectively
part of it.</p>
@@ -378,5 +378,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Google has long had <a
-
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a
+
href="https://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a
back door to remotely unlock an Android device</a>, unless its disk
is encrypted (possible since Android 5.0 Lollipop, but still not
@@ -429,5 +429,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Proprietary programs Google Meet, Microsoft Teams, and WebEx <a
-
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/">are
+
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex-a7383469308/">are
collecting user's personal and identifiable data</a> including how long
a call lasts, who's participating in the call, and the IP addresses
@@ -564,5 +564,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Android tracks location for Google <a
-
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+
href="https://www.techdirt.com/2017/11/21/investigation-finds-google-collected-location-data-even-with-location-services-turned-off/">
even when “location services” are turned off, even when
the phone has no SIM card</a>.</p>
@@ -597,5 +597,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Google's new voice messaging app <a
-
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+
href="https://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
all conversations</a>.</p>
</li>
@@ -635,5 +635,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p id="nest-thermometers">Nest thermometers send <a
- href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
+ href="https://bgr.com/general/google-nest-jailbreak-hack/">a lot of
data about the user</a>.</p>
</li>
@@ -653,8 +653,8 @@
<p>Spyware in Android phones (and Windows? laptops): The Wall Street
Journal (in an article blocked from us by a paywall) reports that <a
-
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+
href="https://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
the FBI can remotely activate the GPS and microphone in Android phones
and laptops</a> (presumably Windows laptops). Here is <a
- href="http://cryptome.org/2013/08/fbi-hackers.htm">more info</a>.</p>
+ href="https://cryptome.org/2013/08/fbi-hackers.htm">more info</a>.</p>
</li>
@@ -681,5 +681,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Google Play intentionally sends app developers <a
-
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+
href="https://gadgets360.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
the personal details of users that install the app</a>.</p>
@@ -701,5 +701,5 @@
<p>Many web sites report all their visitors
to Google by using the Google Analytics service, which <a
-
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
+
href="https://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
tells Google the IP address and the page that was visited</a>.</p>
</li>
@@ -790,5 +790,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/01/01 17:25:41 $
+$Date: 2022/04/13 07:49:51 $
<!-- timestamp end -->
</p>
diff -rNU2 malware-in-online-conferencing.html
malware-in-online-conferencing.html
--- malware-in-online-conferencing.html 2022-04-13 04:04:23.333444556 +0000
+++ malware-in-online-conferencing.html 2022-04-14 04:04:14.903112424 +0000
@@ -132,5 +132,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Proprietary programs Google Meet, Microsoft Teams, and WebEx <a
-
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/">are
+
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex-a7383469308/">are
collecting user's personal and identifiable data</a> including how long
a call lasts, who's participating in the call, and the IP addresses
@@ -201,5 +201,5 @@
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2020, 2021 Free Software Foundation, Inc.</p>
+<p>Copyright © 2020, 2021, 2022 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
@@ -211,5 +211,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/12/03 06:24:37 $
+$Date: 2022/04/13 07:56:41 $
<!-- timestamp end -->
</p>
diff -rNU2 malware-microsoft.html malware-microsoft.html
--- malware-microsoft.html 2022-04-13 04:04:23.337444555 +0000
+++ malware-microsoft.html 2022-04-14 04:04:14.903112424 +0000
@@ -108,5 +108,5 @@
<p>In Windows 10, the universal back door
is no longer hidden; all “upgrades” will be <a
-
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">
+
href="https://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">
forcibly and immediately imposed</a>.</p>
</li>
@@ -124,5 +124,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The German government <a
-
href="https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/">veers
+ href="https://www.theregister.com/2013/08/23/nsa_germany_windows_8/">veers
away from Windows 8 computers with TPM 2.0</a> (<a
href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa">original
@@ -183,5 +183,5 @@
<!--#set var="DATE" value='<small class="date-tag">2007-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">DRM
+ <p><a href="https://arstechnica.com/gadgets/2007/08/aacs-tentacles/">DRM
in Windows</a>, introduced to cater to <a
href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks.
@@ -275,5 +275,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A <a
-
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
+
href="https://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in Internet Explorer and Edge</a> allows an attacker to retrieve
Microsoft account credentials, if the user is tricked into visiting
@@ -285,5 +285,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
+
href="https://arstechnica.com/information-technology/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
Point-of-sale terminals running Windows were taken over</a> and
turned into a botnet for the purpose of collecting customers' credit
@@ -353,5 +353,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Windows displays <a
-
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer">
+
href="https://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer">
intrusive ads for Microsoft products and its partners'
products</a>.</p>
@@ -381,5 +381,5 @@
it off, in the hope that some day they would fail to say no.
To do this, Microsoft used <a
-
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
+
href="https://www.theregister.com/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
malware techniques</a>.</p>
@@ -395,5 +395,5 @@
<p>Microsoft has made companies'
Windows machines managed by the company's sysadmins <a
-
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
+
href="https://www.computerworld.com/article/3042397/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
users to complain to the sysadmins about not “upgrading”
to Windows 10</a>.</p>
@@ -404,8 +404,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Microsoft has <a
-
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake">desupported
+
href="https://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake">desupported
all future Intel CPUs for Windows 7 and 8</a>. Those
machines will be stuck with the nastier Windows 10. <a
-
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825">
+
href="https://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825">
AMD and Qualcomm CPUs, too</a>.</p>
@@ -439,5 +439,5 @@
program</a> on computers running certain
versions of Windows 10. Remediation, in Microsoft's view, means <a
-
href="https://support.microsoft.com/en-us/topic/kb4023057-update-for-windows-10-update-service-components-fccad0ca-dc10-2e46-9ed1-7e392450fb3a">
+
href="https://support.microsoft.com/en-us/topic/kb4023057-update-for-windows-update-service-components-fccad0ca-dc10-2e46-9ed1-7e392450fb3a">
tampering with users' settings and files</a>, notably to
“repair” any components of the updating system that users
@@ -464,5 +464,5 @@
<p>Microsoft has made Windows 7
and 8 cease to function on certain new computers, <a
-
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that">effectively
+
href="https://docs.microsoft.com/en-US/troubleshoot/windows-client/deployment/processor-not-supported-together-with-windows-version">effectively
forcing their owners to switch to Windows 10</a>.</p>
</li>
@@ -492,9 +492,9 @@
href="/proprietary/proprietary-back-doors.html#windows-update">
universal back door</a>. Not only did the unwanted downloads <a
-
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/">
+
href="https://www.theregister.com/2016/06/03/windows_10_upgrade_satellite_link/">
jeopardize important operations in regions of the world with poor
connectivity</a>, but many of the people who let installation proceed
found out that this “upgrade” was in fact a <a
-
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
+
href="https://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
downgrade</a>.</p>
</li>
@@ -505,5 +505,5 @@
<p>Once Microsoft has tricked a user
into accepting installation of Windows 10, <a
-
href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
+
href="https://www.theregister.com/2016/06/01/windows_10_nagware_no_way_out/">they
find that they are denied the option to cancel or even postpone the
imposed date of installation</a>.</p>
@@ -519,8 +519,8 @@
<p>FTDI's proprietary driver
for its USB-to-serial chips has been designed to <a
-
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/">sabotage
+
href="https://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/">sabotage
alternative compatible chips</a>
so that they no longer work. Microsoft is <a
-
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again">installing
+
href="https://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again">installing
this automatically</a> as an “upgrade”.</p>
</li>
@@ -628,5 +628,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Proprietary programs Google Meet, Microsoft Teams, and WebEx <a
-
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/">are
+
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex-a7383469308/">are
collecting user's personal and identifiable data</a> including how long
a call lasts, who's participating in the call, and the IP addresses
@@ -699,5 +699,5 @@
fourth stable build of Windows 10, called the
“Creators Update,” Windows maximized the surveillance <a
-
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law">
+
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law/">
by force setting the telemetry mode to “Full”</a>.</p>
@@ -724,5 +724,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>By default, Windows 10 <a
-
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties">sends
+
href="https://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties/">sends
debugging information to Microsoft, including core dumps</a>. Microsoft
now distributes them to another company.</p>
@@ -761,5 +761,5 @@
applications. Then another downgrade inserted a general spying
program. Users noticed this and complained, so Microsoft renamed it <a
-
href="https://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/">
+
href="https://www.theregister.com/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/">
to give users the impression it was gone</a>.</p>
@@ -771,5 +771,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/">
+
href="https://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/">
Windows 10 sends identifiable information to Microsoft</a>, even if
a user turns off its Bing search and Cortana features, and activates
@@ -818,5 +818,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>It only gets worse with time. <a
-
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
+
href="https://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
Windows 10 requires users to give permission for total snooping</a>,
including their files, their commands, their text input, and their
@@ -839,5 +839,5 @@
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
Microsoft changed Skype <a
-
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+
href="https://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
specifically for spying</a>.</p>
</li>
@@ -847,5 +847,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Spyware in older versions of Windows: <a
- href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
+ href="https://www.theregister.com/2003/02/28/windows_update_keeps_tabs/">
Windows Update snoops on the user</a>. <a
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
@@ -867,5 +867,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The recent versions of Microsoft Office require the user to <a
-
href="https://products.office.com/en-us/microsoft-office-for-home-and-school-faq?legRedir=true&CorrelationId=c9c5b549-11ad-4f71-bf81-b7e069fdb372">
+
href="https://www.microsoft.com/en-us/microsoft-365/microsoft-365-for-home-and-school-faq?legRedir=true&CorrelationId=c9c5b549-11ad-4f71-bf81-b7e069fdb372">
connect to Microsoft servers at least every thirty-one
days</a>. Otherwise, the software will refuse to edit any documents
@@ -916,5 +916,5 @@
<p>Microsoft accidentally left a way for users
to install GNU/Linux on Windows RT tablets, but now it has <a
-
href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/">
+
href="https://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/">
“fixed” the “error”</a>. They have the gall
to call this “protecting” the users. The article talks
@@ -926,5 +926,5 @@
<!--#set var="DATE" value='<small class="date-tag">2011-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p><a href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
+ <p><a href="https://www.fsf.org/campaigns/secure-boot-vs-restricted-boot/">
Mobile devices that come with Windows 8 are tyrants</a>.</p>
</li>
@@ -994,5 +994,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/05 18:50:47 $
+$Date: 2022/04/13 08:51:18 $
<!-- timestamp end -->
</p>
diff -rNU2 malware-mobiles.html malware-mobiles.html
--- malware-mobiles.html 2022-04-13 04:04:23.341444556 +0000
+++ malware-mobiles.html 2022-04-14 04:04:14.907112428 +0000
@@ -102,5 +102,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The phone network <a
- href="https://ssd.eff.org/en/module/problem-mobile-phones">
+ href="https://ssd.eff.org/en/playlist/privacy-breakdown-mobile-phones">
tracks the movements of each phone</a>.</p>
@@ -243,5 +243,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
+
href="https://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
A Chinese version of Android has a universal back door</a>. Nearly
all models of mobile phones have a <a
href="#universal-back-door-phone-modem">
@@ -292,5 +292,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p id="netflix-app-geolocation-drm">The Netflix Android app <a
-
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
+
href="https://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
forces the use of Google DNS</a>. This is one of the methods that
Netflix uses to enforce the geolocation restrictions dictated by the
@@ -327,5 +327,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Siri, Alexa, and all the other voice-control systems can be <a
-
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
+
href="https://www.fastcompany.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
hijacked by programs that play commands in ultrasound that humans
can't hear</a>.</p>
@@ -344,5 +344,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Many Android devices <a
-
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
+
href="https://arstechnica.com/information-technology/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
can be hijacked through their Wi-Fi chips</a> because of a bug in
Broadcom's nonfree firmware.</p>
@@ -409,5 +409,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A half-blind security critique of a tracking app: it found that <a
-
href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/">
+
href="https://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats-a1100919965/">
blatant flaws allowed anyone to snoop on a user's personal data</a>.
The critique fails entirely to express concern that the app sends the
@@ -424,5 +424,5 @@
<p>A bug in a proprietary ASN.1 library, used
in cell phone towers as well as cell phones and routers, <a
-
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
+
href="https://arstechnica.com/information-technology/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover/">allows
taking control of those systems</a>.</p>
</li>
@@ -432,5 +432,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Many proprietary payment apps <a
-
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">transmit
+
href="https://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">transmit
personal data in an insecure way</a>. However,
the worse aspect of these apps is that <a
@@ -443,5 +443,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html">
+
href="https://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html">
Many smartphone apps use insecure authentication methods when storing
your personal data on remote servers</a>. This leaves personal
@@ -456,5 +456,5 @@
<p>An app to prevent “identity theft”
(access to personal data) by storing users' data on a special server <a
-
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/">was
+
href="https://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/">was
deactivated by its developer</a> which had discovered a security
flaw.</p>
@@ -471,5 +471,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The <a
-
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/">insecurity
+
href="https://arstechnica.com/information-technology/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/">insecurity
of WhatsApp</a> makes eavesdropping a snap.</p>
</li>
@@ -903,10 +903,10 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The AppCensus database gives information on <a
- href="https://www.appcensus.mobi"> how Android apps use and
+ href="https://www.appcensus.io/"> how Android apps use and
misuse users' personal data</a>. As of March 2019, nearly
78,000 have been analyzed, of which 24,000 (31%) transmit the <a
href="/proprietary/proprietary-surveillance.html#M201812290">
Advertising ID</a> to other companies, and <a
- href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ href="https://blog.appcensus.io/2019/02/14/ad-ids-behaving-badly/">
18,000 (23% of the total) link this ID to hardware identifiers</a>,
so that users cannot escape tracking by resetting it.</p>
@@ -933,5 +933,5 @@
<p>An investigation of the 150 most popular
gratis VPN apps in Google Play found that <a
- href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+
href="https://www.top10vpn.com/research/free-vpn-investigations/risk-index/">
25% fail to protect their users' privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
@@ -941,5 +941,5 @@
<p>Moreover, a previous investigation had found that <a
- href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
+
href="https://www.top10vpn.com/research/free-vpn-investigations/ownership/">half
of
the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
@@ -998,5 +998,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Some Android apps <a
-
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+
href="https://web.archive.org/web/20210418052600/https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
track the phones of users that have deleted them</a>.</p>
</li>
@@ -1099,5 +1099,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>20 dishonest Android apps recorded <a
-
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts/">phone
calls and sent them and text messages and emails to snoopers</a>.</p>
@@ -1225,5 +1225,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A <a
-
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+
href="https://research.csiro.au/isp/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated the privacy and security of
283 Android VPN apps concluded that “in spite of the promises
@@ -1281,5 +1281,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Facebook's new Magic Photo app <a
-
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+
href="https://www.theregister.com/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections for known faces</a>,
and suggests you circulate the picture you take according to who is
@@ -1309,5 +1309,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A pregnancy test controller application not only can <a
-
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+
href="https://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
spy on many sorts of data in the phone, and in server accounts,
it can alter them too</a>.</p>
@@ -1329,5 +1329,5 @@
<p>The natural extension of monitoring
people through “their” phones is <a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ href="https://news.northwestern.edu/stories/2016/01/fool-activity-tracker">
proprietary software to make sure they can't “fool”
the monitoring</a>.</p>
@@ -1339,5 +1339,5 @@
<p>“Cryptic communication,”
unrelated to the app's functionality, was <a
- href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ href="https://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
found in the 500 most popular gratis Android apps</a>.</p>
@@ -1365,5 +1365,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>According to Edward Snowden, <a
- href="http://www.bbc.com/news/uk-34444233">agencies can take over
+ href="https://www.bbc.com/news/uk-34444233">agencies can take over
smartphones</a> by sending hidden text messages which enable
them to turn the phones on and off, listen to the microphone,
@@ -1379,10 +1379,10 @@
<p>Like most “music screaming” disservices, Spotify is
based on proprietary malware (DRM and snooping). In August 2015 it <a
-
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+
href="https://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
demanded users submit to increased snooping</a>, and some are starting
to realize that it is nasty.</p>
<p>This article shows the <a
-
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ href="https://www.theregister.com/2015/08/21/spotify_worse_than_the_nsa/">
twisted ways that they present snooping as a way to “serve”
users better</a>—never mind whether they want that. This is a
@@ -1397,5 +1397,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Samsung phones come with <a
-
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
+
href="https://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>, and they send so much data that their
transmission is a substantial expense for users. Said transmission,
@@ -1425,5 +1425,5 @@
<p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>) connect to 100 <a
-
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
+
href="https://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs, on the average.</p>
</li>
@@ -1433,5 +1433,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Widely used <a
-
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+
href="https://freedom-to-tinker.com/2015/04/06/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
QR-code scanner apps snoop on the user</a>. This is in addition to
the snooping done by the phone company, and perhaps by the OS in
@@ -1448,5 +1448,5 @@
<p>Many proprietary apps for mobile devices
report which other apps the user has installed. <a
- href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ href="https://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
is doing this in a way that at least is visible and optional</a>. Not
as bad as what the others do.</p>
@@ -1473,5 +1473,5 @@
<p>The nonfree Snapchat app's principal purpose is to restrict the
use of data on the user's computer, but it does surveillance too: <a
-
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+
href="https://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
it tries to get the user's list of other people's phone
numbers</a>.</p>
@@ -1482,5 +1482,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Brightest Flashlight app <a
-
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+
href="https://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
sends user data, including geolocation, for use by companies</a>.</p>
@@ -1497,5 +1497,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Portable phones with GPS <a
-
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
href="https://www.aclu.org/issues/privacy-technology/location-tracking/you-are-being-tracked">
will send their GPS location on remote command, and users cannot stop
them</a>. (The US says it will eventually require all new portable phones
@@ -1507,6 +1507,6 @@
--><!--#echo encoding="none" var="DATE" -->
<p>FTC says most mobile apps for children don't respect privacy: <a
-
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+
href="https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
@@ -1515,5 +1515,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Some manufacturers add a <a
-
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+
href="https://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
hidden general surveillance package such as Carrier IQ</a>.</p>
</li>
@@ -1546,5 +1546,5 @@
<!--#set var="DATE" value='<small class="date-tag">2011-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p><a href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
+ <p><a href="https://www.fsf.org/campaigns/secure-boot-vs-restricted-boot/">
Mobile devices that come with Windows 8 are tyrants</a>.</p>
</li>
@@ -1610,5 +1610,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/05 18:50:47 $
+$Date: 2022/04/13 12:46:51 $
<!-- timestamp end -->
</p>
diff -rNU2 malware-webpages.html malware-webpages.html
--- malware-webpages.html 2022-04-13 04:04:23.341444556 +0000
+++ malware-webpages.html 2022-04-14 04:04:14.911112432 +0000
@@ -70,5 +70,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Many web sites use JavaScript code <a
-
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
+
href="https://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
to snoop on information that users have typed into a
form but not sent</a>, in order to learn their identity. Some are <a
@@ -103,5 +103,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A cracker used an exploit in outdated software to <a
-
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
+
href="https://www.pcmag.com/news/400-websites-secretly-served-cryptocurrency-miners-to-visitors">
inject a “miner” in web pages</a> served to visitors. This
type of malware hijacks the computer's processor to mine a
@@ -146,5 +146,5 @@
<p>When a page uses Disqus
for comments, the proprietary Disqus software <a
-
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">loads
+
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook/">loads
a Facebook software package into the browser of every anonymous visitor
to the page, and makes the page's URL available to Facebook</a>.</p>
@@ -165,5 +165,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A <a
-
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+
href="https://research.csiro.au/isp/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated the privacy and security of
283 Android VPN apps concluded that “in spite of the promises
@@ -195,5 +195,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>E-books can contain JavaScript code, and <a
-
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+
href="https://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
sometimes this code snoops on readers</a>.</p>
</li>
@@ -203,5 +203,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Flash and JavaScript are used for <a
-
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+
href="https://arstechnica.com/information-technology/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
“fingerprinting” devices</a> to identify users.</p>
</li>
@@ -222,5 +222,5 @@
<p>Many web sites report all their visitors
to Google by using the Google Analytics service, which <a
-
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
+
href="https://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
tells Google the IP address and the page that was visited</a>.</p>
</li>
@@ -301,5 +301,5 @@
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2017-2021 Free Software Foundation, Inc.</p>
+<p>Copyright © 2017-2022 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
@@ -311,5 +311,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/25 05:52:32 $
+$Date: 2022/04/13 07:56:41 $
<!-- timestamp end -->
</p>
diff -rNU2 potential-malware.html potential-malware.html
--- potential-malware.html 2022-04-13 04:04:23.345444556 +0000
+++ potential-malware.html 2022-04-14 04:04:14.911112432 +0000
@@ -123,5 +123,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Patent applications show that Google and Amazon are interested in <a
-
href="http://www.consumerwatchdog.org/privacy-technology/home-assistant-adopter-beware-google-amazon-digital-assistant-patents-reveal">
+
href="https://www.consumerwatchdog.org/privacy-technology/home-assistant-adopter-beware-google-amazon-digital-assistant-patents-reveal">
making “digital assistants” study people's activities to
learn all about them</a>.</p>
@@ -141,5 +141,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Any device that has a microphone and a speaker could be <a
-
href="http://www.washington.edu/news/2017/08/16/computer-scientists-use-music-to-covertly-track-body-movements-activity/">turned
+
href="https://www.washington.edu/news/2017/08/16/computer-scientists-use-music-to-covertly-track-body-movements-activity/">turned
into a sonar system that would track the movements of people in the
same room or other rooms nearby</a>.</p>
@@ -196,5 +196,5 @@
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2017-2021 Free Software Foundation, Inc.</p>
+<p>Copyright © 2017-2022 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
@@ -206,5 +206,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/15 07:13:04 $
+$Date: 2022/04/13 07:56:41 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-addictions.html proprietary-addictions.html
--- proprietary-addictions.html 2022-04-13 04:04:23.349444556 +0000
+++ proprietary-addictions.html 2022-04-14 04:04:14.915112435 +0000
@@ -264,5 +264,5 @@
competitors further qualifies it as <em>predatory</em>.
Note that Belgium <a
-
href="https://www.rockpapershotgun.com/2019/01/29/fifa-ultimate-team-packs-blocked-in-belgium/">
+
href="https://www.rockpapershotgun.com/fifa-ultimate-team-packs-blocked-in-belgium">
made these loot boxes illegal</a> in 2018.</p>
@@ -398,5 +398,5 @@
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2019, 2020, 2021 Free Software Foundation, Inc.</p>
+<p>Copyright © 2019, 2020, 2021, 2022 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
@@ -408,5 +408,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/10/30 10:06:56 $
+$Date: 2022/04/13 07:56:42 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-back-doors.html proprietary-back-doors.html
--- proprietary-back-doors.html 2022-04-13 04:04:23.349444556 +0000
+++ proprietary-back-doors.html 2022-04-14 04:04:14.919112439 +0000
@@ -98,5 +98,5 @@
cameras contain a glaring back door—they have login
accounts with hard-coded passwords, which can't be changed, and <a
-
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">
+
href="https://arstechnica.com/information-technology/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">
there is no way to delete these accounts either</a>.</p>
@@ -133,5 +133,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Apple can, and regularly does, <a
-
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+
href="https://arstechnica.com/gadgets/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
remotely extract some data from iPhones for the state</a>.</p>
@@ -139,5 +139,5 @@
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">
iOS 8 security improvements</a>; but <a
- href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ href="https://theintercept.com/2014/09/22/apple-data/">
not as much as Apple claims</a>.</p>
</li>
@@ -180,5 +180,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Android has a <a
-
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
+
href="https://www.theverge.com/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
back door for remotely changing “user” settings</a>.</p>
@@ -200,5 +200,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A pregnancy test controller application not only can <a
-
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+
href="https://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
spy on many sorts of data in the phone, and in server accounts,
it can alter them too</a>.</p>
@@ -209,9 +209,9 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html">
+
href="https://www.computerworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html">
Some D-Link routers</a> have a back door for changing settings in a
dlink of an eye.</p>
- <p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/"> The TP-Link
+ <p><a href="https://sekurak.pl/tp-link-httptftp-backdoor/"> The TP-Link
router has a back door</a>.</p>
@@ -224,5 +224,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Google has long had <a
-
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a
+
href="https://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a
back door to remotely unlock an Android device</a>, unless its disk
is encrypted (possible since Android 5.0 Lollipop, but still not
@@ -234,5 +234,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Caterpillar vehicles come with <a
-
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">
+
href="https://web.archive.org/web/20201108113943/https://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">
a back door to shutoff the engine</a> remotely.</p>
</li>
@@ -242,5 +242,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Modern gratis game cr…apps <a
-
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+
href="https://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
collect a wide range of data about their users and their users'
friends and associates</a>.</p>
@@ -273,5 +273,5 @@
<p id="swindle-eraser">The Amazon
Kindle-Swindle has a back door that has been used to <a
-
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
+
href="https://web.archive.org/web/20220319193415/https://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
remotely erase books</a>. One of the books erased was
<cite>1984</cite>, by George Orwell.</p>
@@ -280,5 +280,5 @@
would delete books only following orders from the
state. However, that policy didn't last. In 2012 it <a
-
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">
+
href="https://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">
wiped a user's Kindle-Swindle and deleted her account</a>, then
offered her kafkaesque “explanations.”</p>
@@ -293,5 +293,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The iPhone has a back door for <a
-
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+
href="https://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
remote wipe</a>. It's not always enabled, but users are led into
enabling it without understanding.</p>
@@ -500,5 +500,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The iPhone has a back door <a
-
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
+
href="https://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
that allows Apple to remotely delete apps</a> which Apple considers
“inappropriate”. Jobs said it's OK for Apple to have
@@ -609,5 +609,5 @@
<!--#set var="DATE" value='<small class="date-tag">2020-04</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>The <a href="https://www.google.com/mobile/android/market-tos.html">
+ <p>The <a href="https://play.google.com/about/play-terms/">
Google Play Terms of Service</a> insist that the user of Android accept
the presence of universal back doors in apps released by Google.</p>
@@ -664,5 +664,5 @@
<p>ChromeBooks are programmed for obsolescence:
ChromeOS has a universal back door that is used for updates and <a
-
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/">
+
href="https://www.theregister.com/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/">
ceases to operate at a predefined date</a>. From then on, there
appears to be no support whatsoever for the computer.</p>
@@ -676,5 +676,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The FordPass Connect feature of some Ford vehicles has <a
-
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+
href="https://web.archive.org/web/20200530023040/https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
near-complete access to the internal car network</a>. It is constantly
connected to the cellular phone network and sends Ford a lot of data,
@@ -703,5 +703,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Furby Connect has a <a
-
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+
href="https://www.contextis.com/en/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
universal back door</a>. If the product as shipped doesn't act as a
listening device, remote changes to the code could surely convert it
@@ -738,5 +738,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio “smart” TVs <a
-
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">
+
href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen">
have a universal back door</a>.</p>
</li>
@@ -772,5 +772,5 @@
<p>In Windows 10, the universal back door
is no longer hidden; all “upgrades” will be <a
-
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">
+
href="https://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">
forcibly and immediately imposed</a>.</p>
</li>
@@ -792,5 +792,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
+
href="https://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
A Chinese version of Android has a universal back door</a>. Nearly
all models of mobile phones have a <a
href="#universal-back-door-phone-modem">
@@ -846,5 +846,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Intel's intentional “management engine” back door has <a
-
href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/">
+ href="https://www.theregister.com/2017/11/20/intel_flags_firmware_flaws/">
unintended back doors</a> too.</p>
</li>
@@ -854,8 +854,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A Capcom's Street Fighter V update <a
- href="https://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/">
+ href="https://www.theregister.com/2016/09/23/capcom_street_fighter_v/">
installed a driver that could be used as a back door by
any application installed on a Windows computer</a>, but was <a
-
href="https://www.rockpapershotgun.com/2016/09/24/street-fighter-v-removes-new-anti-crack">
+
href="https://www.rockpapershotgun.com/street-fighter-v-removes-new-anti-crack">
immediately rolled back</a> in response to public outcry.</p>
</li>
@@ -866,5 +866,5 @@
<p>Dell computers, shipped with
Windows, had a bogus root certificate that <a
-
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/">
+
href="https://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/">
allowed anyone (not just Dell) to remotely authorize any software to
run</a> on the computer.</p>
@@ -902,5 +902,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Here is a big problem whose details are still secret: <a
- href="http://mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/">
+ href="https://mashable.com/archive/fbi-microsoft-bitlocker-backdoor">
The FBI asks lots of companies to put back doors in proprietary
programs</a>. We don't know of specific cases where this was done,
@@ -912,5 +912,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The German government <a
-
href="https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/">veers
+ href="https://www.theregister.com/2013/08/23/nsa_germany_windows_8/">veers
away from Windows 8 computers with TPM 2.0</a> (<a
href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa">original
@@ -982,5 +982,5 @@
</div>
-<p>Copyright © 2014-2021 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014-2022 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
@@ -992,5 +992,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/12/19 08:18:48 $
+$Date: 2022/04/13 09:28:11 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-censorship.html proprietary-censorship.html
--- proprietary-censorship.html 2022-04-13 04:04:23.353444557 +0000
+++ proprietary-censorship.html 2022-04-14 04:04:14.919112439 +0000
@@ -81,5 +81,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Google <a
-
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts">
+
href="https://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts">
offers censorship software</a>, ostensibly for parents to put into
their children's computers.</p>
@@ -104,5 +104,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones">
+
href="https://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones">
Google censored installation of Samsung's ad-blocker</a> on Android
phones, saying that blocking ads is “interference” with
@@ -222,5 +222,5 @@
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014-2021 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014-2022 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
@@ -232,5 +232,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/12/03 06:24:37 $
+$Date: 2022/04/13 07:56:42 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-coverups.html proprietary-coverups.html
--- proprietary-coverups.html 2022-04-13 04:04:23.533444563 +0000
+++ proprietary-coverups.html 2022-04-14 04:04:14.923112442 +0000
@@ -69,5 +69,5 @@
<p>Price Waterhouse Coopers tried
to suppress knowledge of a security flaw by <a
-
href="http://www.zdnet.com/article/pwc-sends-security-researchers-cease-and-desist-letter-instead-of-fixing-security-flaw/">
+
href="https://www.zdnet.com/article/pwc-sends-security-researchers-cease-and-desist-letter-instead-of-fixing-security-flaw/">
making legal threats against the security company that found
it</a>.</p>
@@ -124,5 +124,5 @@
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2017-2021 Free Software Foundation, Inc.</p>
+<p>Copyright © 2017-2022 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
@@ -134,5 +134,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/01 09:21:51 $
+$Date: 2022/04/13 07:56:42 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-deception.html proprietary-deception.html
--- proprietary-deception.html 2022-04-13 04:04:23.537444563 +0000
+++ proprietary-deception.html 2022-04-14 04:04:14.927112446 +0000
@@ -104,5 +104,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p id="M201509210">Volkswagen programmed its car engine computers to <a
-
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
+ href="https://petri.com/volkswagen-used-software-to-cheat-on-emissions/">
detect the Environmental Protection Agency's emission tests</a>, and
run dirty the rest of the time. In real driving, the cars exceeded
@@ -151,5 +151,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969">
+
href="https://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969">
Audi's proprietary software used a simple method to cheat on emissions
tests</a>: to activate a special low-emission gearshifting mode until
@@ -161,5 +161,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Many proprietary programs secretly <a
-
href="https://www.theregister.co.uk/2016/08/05/payperinstall_study/">install
+ href="https://www.theregister.com/2016/08/05/payperinstall_study/">install
other proprietary programs that the users don't want</a>.</p>
</li>
@@ -179,5 +179,5 @@
<p>A top-ranking proprietary Instagram client promising
to tell users who's been watching their pictures was in reality <a
-
href="http://www.theguardian.com/technology/2015/nov/11/top-ranking-free-app-stole-instagram-passwords">stealing
+
href="https://www.theguardian.com/technology/2015/nov/11/top-ranking-free-app-stole-instagram-passwords">stealing
their credentials</a>, advertising itself on their feed, and posting
images without their consent.</p>
@@ -244,5 +244,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/06 07:57:27 $
+$Date: 2022/04/13 07:49:52 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-drm.html proprietary-drm.html
--- proprietary-drm.html 2022-04-13 04:04:23.541444563 +0000
+++ proprietary-drm.html 2022-04-14 04:04:14.927112446 +0000
@@ -224,5 +224,5 @@
<p>The game Metal Gear Rising for
MacOS was tethered to a server. The company <a
-
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">
+
href="https://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">
shut down the server, and all copies stopped working</a>.</p>
</li>
@@ -242,5 +242,5 @@
<p>Google now allows Android
apps to detect whether a device has been rooted, <a
-
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/">and
+
href="https://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/">and
refuse to install if so</a>. The Netflix app uses this ability to
enforce DRM by refusing to install on rooted Android devices.</p>
@@ -298,5 +298,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Chrome <a
-
href="http://boingboing.net/2017/01/30/google-quietly-makes-optiona.html">implements
+
href="https://boingboing.net/2017/01/30/google-quietly-makes-optiona.html">implements
DRM</a>. So does Chromium, through nonfree software that is effectively
part of it.</p>
@@ -328,5 +328,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The <a
- href="http://michaelweinberg.org/post/137045828005/free-the-cube">
+ href="https://michaelweinberg.org/post/137045828005/free-the-cube">
“Cube” 3D printer was designed with DRM</a>: it
won't accept third-party printing materials. It is the Keurig of
@@ -336,5 +336,5 @@
<p>With a <a
- href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
+ href="https://www.fsf.org/resources/hw/endorsement/aleph-objects">
printer that gets the Respects Your Freedom</a>, this problem would
not even be a remote possibility.</p>
@@ -363,5 +363,5 @@
<p>Philips “smart” lightbulbs had initially been
designed to interact with other companies' smart light bulbs, but <a
-
href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml">
+
href="https://www.techdirt.com/2015/12/14/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update/">
later the company updated the firmware to disallow
interoperability</a>.</p>
@@ -375,5 +375,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p id="netflix-app-geolocation-drm">The Netflix Android app <a
-
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
+
href="https://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
forces the use of Google DNS</a>. This is one of the methods that
Netflix uses to enforce the geolocation restrictions dictated by the
@@ -402,5 +402,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p id="bluray"><a
-
href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up">
+
href="https://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up">
DVDs and Bluray disks have DRM</a>.</p>
@@ -482,5 +482,5 @@
<!--#set var="DATE" value='<small class="date-tag">2007-08</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">DRM
+ <p><a href="https://arstechnica.com/gadgets/2007/08/aacs-tentacles/">DRM
in Windows</a>, introduced to cater to <a
href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks.
@@ -558,5 +558,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/12 12:48:54 $
+$Date: 2022/04/13 07:49:52 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-fraud.html proprietary-fraud.html
--- proprietary-fraud.html 2022-04-13 04:04:23.545444564 +0000
+++ proprietary-fraud.html 2022-04-14 04:04:14.931112449 +0000
@@ -102,5 +102,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A game published on Facebook <a
-
href="https://www.revealnews.org/article/so-your-child-racked-up-unwanted-credit-card-charges-playing-video-games-now-what/">aimed
+
href="https://revealnews.org/article/so-your-child-racked-up-unwanted-credit-card-charges-playing-video-games-now-what/">aimed
at leading children to spend</a> large amounts of their parents'
money without explaining it to them.</p>
@@ -111,5 +111,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Some proprietary <a
-
href="http://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases">
+
href="https://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases">
games lure children to spend their parents' money</a>.</p>
</li>
@@ -165,5 +165,5 @@
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2019, 2020, 2021 Free Software Foundation, Inc.</p>
+<p>Copyright © 2019, 2020, 2021, 2022 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
@@ -175,5 +175,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/10/30 16:45:35 $
+$Date: 2022/04/13 07:56:42 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-insecurity.html proprietary-insecurity.html
--- proprietary-insecurity.html 2022-04-13 04:04:23.553444564 +0000
+++ proprietary-insecurity.html 2022-04-14 04:04:14.939112456 +0000
@@ -344,5 +344,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Apple has <a
- href="https://sneak.berlin/20201112/your-computer-isnt-yours">implemented
+ href="https://sneak.berlin/20201112/your-computer-isnt-yours/">implemented
a malware in its computers that imposes surveillance</a> on users
and reports users' computing to Apple.</p>
@@ -487,5 +487,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Medtronics Conexus Telemetry Protocol has <a
-
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
+
href="https://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
two vulnerabilities that affect several models of implantable
defibrillators</a> and the devices they connect to.</p>
@@ -518,5 +518,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Researchers have discovered how to <a
-
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
+
href="https://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
hide voice commands in other audio</a>, so that people cannot hear
them, but Alexa and Siri can.</p>
@@ -554,5 +554,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Siri, Alexa, and all the other voice-control systems can be <a
-
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
+
href="https://www.fastcompany.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
hijacked by programs that play commands in ultrasound that humans
can't hear</a>.</p>
@@ -583,5 +583,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Intel's intentional “management engine” back door has <a
-
href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/">
+ href="https://www.theregister.com/2017/11/20/intel_flags_firmware_flaws/">
unintended back doors</a> too.</p>
</li>
@@ -591,5 +591,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Amazon recently invited consumers to be suckers and <a
-
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
+
href="https://www.techdirt.com/2017/11/22/vulnerability-found-amazon-key-again-showing-how-dumber-tech-is-often-smarter-option/">
allow delivery staff to open their front doors</a>. Wouldn't you know
it, the system has a grave security flaw.</p>
@@ -609,5 +609,5 @@
<p>A “smart” intravenous pump
designed for hospitals is connected to the internet. Naturally <a
-
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
+
href="https://www.techdirt.com/2017/09/22/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack/">
its security has been cracked</a>.</p>
@@ -621,5 +621,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The bad security in many Internet of Stings devices allows <a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+
href="https://www.techdirt.com/2017/08/28/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you/">ISPs
to snoop on the people that use them</a>.</p>
@@ -639,5 +639,5 @@
<p>That is a malicious functionality, but in addition it
is a gross insecurity since anyone, including malicious crackers, <a
-
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
+
href="https://arstechnica.com/information-technology/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
find those accounts and use them to get into users' cameras</a>.</p>
</li>
@@ -648,10 +648,10 @@
<p id="intel-me-10-year-vulnerability">Intel's
CPU backdoor—the Intel Management Engine—had a <a
-
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/">major
+
href="https://arstechnica.com/information-technology/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/">major
security vulnerability for 10 years</a>.</p>
<p>The vulnerability allowed a cracker to access
the computer's Intel Active Management Technology (AMT) <a
-
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/">
+
href="https://arstechnica.com/information-technology/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/">
web interface with an empty password and gave administrative
access</a> to access the computer's keyboard, mouse, monitor among
@@ -669,5 +669,5 @@
<p>The proprietary code that runs pacemakers,
insulin pumps, and other medical devices is <a
- href="http://www.bbc.co.uk/news/technology-40042584"> full of gross
+ href="https://www.bbc.com/news/technology-40042584"> full of gross
security faults</a>.</p>
</li>
@@ -680,5 +680,5 @@
to a file in the filesystem. Any process with access to the filesystem
or the MapViewOfFile API could gain access to the log. Furthermore, <a
-
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according
+
href="https://www.modzero.com/advisories/MZ-17-01-Conexant-Keylogger.txt">according
to modzero</a> the “information-leak via Covert Storage Channel
enables malware authors to capture keystrokes without taking the risk
@@ -699,5 +699,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Many Android devices <a
-
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
+
href="https://arstechnica.com/information-technology/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
can be hijacked through their Wi-Fi chips</a> because of a bug in
Broadcom's nonfree firmware.</p>
@@ -735,5 +735,5 @@
<p>If you buy a used “smart”
car, house, TV, refrigerator, etc., usually <a
-
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
+
href="https://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
previous owners can still remotely control it</a>.</p>
</li>
@@ -792,5 +792,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The “smart” toys My Friend Cayla and i-Que can be <a
-
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">remotely
+
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws/">remotely
controlled with a mobile phone</a>; physical access is not
necessary. This would enable crackers to listen in on a child's
@@ -805,5 +805,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>4G LTE phone networks are drastically insecure. They can be <a
-
href="https://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/">
+
href="https://www.theregister.com/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/">
taken over by third parties and used for man-in-the-middle
attacks</a>.</p>
@@ -814,5 +814,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Due to weak security, <a
-
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it
+
href="https://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it
is easy to open the doors of 100 million cars built by
Volkswagen</a>.</p>
@@ -832,5 +832,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A <a
-
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
+
href="https://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in Internet Explorer and Edge</a> allows an attacker to retrieve
Microsoft account credentials, if the user is tricked into visiting
@@ -861,5 +861,5 @@
<p>A bug in a proprietary ASN.1 library, used
in cell phone towers as well as cell phones and routers, <a
-
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
+
href="https://arstechnica.com/information-technology/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover/">allows
taking control of those systems</a>.</p>
</li>
@@ -879,5 +879,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Samsung's “Smart Home” has a big security hole; <a
-
href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
+
href="https://arstechnica.com/information-technology/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
unauthorized people can remotely control it</a>.</p>
@@ -924,5 +924,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Many proprietary payment apps <a
-
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">transmit
+
href="https://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">transmit
personal data in an insecure way</a>. However,
the worse aspect of these apps is that <a
@@ -968,5 +968,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>FitBit fitness trackers have a <a
-
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
+
href="https://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
Bluetooth vulnerability</a> that allows attackers to send malware
to the devices, which can subsequently spread to computers and other
@@ -988,5 +988,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Security researchers discovered a <a
-
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text">
+
href="https://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text">
vulnerability in diagnostic dongles used for vehicle tracking and
insurance</a> that let them take remote control of a car or lorry
@@ -998,5 +998,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Crackers were able to <a
-
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">
+
href="https://arstechnica.com/information-technology/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">
take remote control of the Jeep</a> “connected car”. They
could track the car, start or stop the engine, and activate or
@@ -1013,5 +1013,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Due to bad security in a drug pump, crackers could use it to <a
-
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
+
href="https://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
kill patients</a>.</p>
</li>
@@ -1021,5 +1021,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html">
+
href="https://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html">
Many smartphone apps use insecure authentication methods when storing
your personal data on remote servers</a>. This leaves personal
@@ -1056,5 +1056,5 @@
<p>An app to prevent “identity theft”
(access to personal data) by storing users' data on a special server <a
-
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/">was
+
href="https://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/">was
deactivated by its developer</a> which had discovered a security
flaw.</p>
@@ -1071,5 +1071,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Lots of <a
- href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
+ href="https://www.wired.com/2014/04/hospital-equipment-vulnerable/">
hospital equipment has lousy security</a>, and it can be fatal.</p>
</li>
@@ -1079,5 +1079,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The <a
-
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/">insecurity
+
href="https://arstechnica.com/information-technology/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/">insecurity
of WhatsApp</a> makes eavesdropping a snap.</p>
</li>
@@ -1086,5 +1086,5 @@
<!--#set var="DATE" value='<small class="date-tag">2013-12</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p><a href="http://www.bunniestudios.com/blog/?p=3554"> Some flash
+ <p><a href="https://www.bunniestudios.com/blog/?p=3554"> Some flash
memories have modifiable software</a>, which makes them vulnerable
to viruses.</p>
@@ -1100,5 +1100,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
+
href="https://arstechnica.com/information-technology/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
Point-of-sale terminals running Windows were taken over</a> and
turned into a botnet for the purpose of collecting customers' credit
@@ -1124,5 +1124,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">The
+
href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">The
NSA has put back doors into nonfree encryption software</a>. We don't
know which ones they are, but we can be sure they include some widely
@@ -1135,5 +1135,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The FTC punished a company for making webcams with <a
-
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
+
href="https://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
bad security so that it was easy for anyone to watch through
them</a>.</p>
@@ -1153,8 +1153,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p> It is possible to <a
-
href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
+
href="https://siliconangle.com/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
kill people by taking control of medical
implants by radio</a>. More information in <a
- href="http://www.bbc.co.uk/news/technology-17631838">BBC
+ href="https://www.bbc.com/news/technology-17631838">BBC
News</a> and <a
href="https://ioactive.com/broken-hearts-how-plausible-was-the-homeland-pacemaker-hack/">
@@ -1166,5 +1166,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
+
href="https://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
“Smart homes”</a> turn out to be stupidly vulnerable to
intrusion.</p>
@@ -1184,8 +1184,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p>It is possible to <a
-
href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/">
+
href="https://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/">
take control of some car computers through malware in music files</a>.
Also <a
- href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0">
+ href="https://www.nytimes.com/2011/03/10/business/10hack.html">
by radio</a>. More information in <a
href="http://www.autosec.org/faq.html"> Automotive Security And
@@ -1253,5 +1253,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/05 18:50:48 $
+$Date: 2022/04/13 07:49:53 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-interference.html proprietary-interference.html
--- proprietary-interference.html 2022-04-13 04:04:23.653444568 +0000
+++ proprietary-interference.html 2022-04-14 04:04:14.939112456 +0000
@@ -287,5 +287,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A nonfree video game, available through the nonfree Steam client, <a
-
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-">
+
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-cryptocurrency-miners">
included a “miner”</a>, i.e. an executable that hijacks
the CPU in users' computers to mine a cryptocurrency.</p>
@@ -296,5 +296,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A cracker used an exploit in outdated software to <a
-
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
+
href="https://www.pcmag.com/news/400-websites-secretly-served-cryptocurrency-miners-to-visitors">
inject a “miner” in web pages</a> served to visitors. This
type of malware hijacks the computer's processor to mine a
@@ -351,5 +351,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Windows displays <a
-
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer">
+
href="https://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer">
intrusive ads for Microsoft products and its partners'
products</a>.</p>
@@ -387,5 +387,5 @@
it off, in the hope that some day they would fail to say no.
To do this, Microsoft used <a
-
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
+
href="https://www.theregister.com/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
malware techniques</a>.</p>
@@ -401,5 +401,5 @@
<p>Microsoft has made companies'
Windows machines managed by the company's sysadmins <a
-
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
+
href="https://www.computerworld.com/article/3042397/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
users to complain to the sysadmins about not “upgrading”
to Windows 10</a>.</p>
@@ -422,8 +422,8 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Microsoft has <a
-
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake">desupported
+
href="https://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake">desupported
all future Intel CPUs for Windows 7 and 8</a>. Those
machines will be stuck with the nastier Windows 10. <a
-
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825">
+
href="https://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825">
AMD and Qualcomm CPUs, too</a>.</p>
@@ -444,5 +444,5 @@
<p>Adobe nonfree software may halt
all other work and freeze a computer <a
- href="http://shallowsky.com/blog/gimp/non-free-software-surprises.html">
+ href="https://shallowsky.com/blog/gimp/non-free-software-surprises.html">
to perform a license check</a>, at a random time every 30 days.</p>
</li>
@@ -452,5 +452,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Oracle made a deal with Yahoo; Oracle's nonfree Java plug-in will <a
-
href="http://searchengineland.com/yahoo-signs-deal-with-oracle-to-attract-new-users-via-java-installs-224097">
+
href="https://searchengineland.com/yahoo-signs-deal-with-oracle-to-attract-new-users-via-java-installs-224097">
change the user's initial web page, and default search engine, to
Yahoo</a> unless the user intervenes to stop it.</p>
@@ -517,5 +517,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/04 08:04:09 $
+$Date: 2022/04/13 07:49:53 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-jails.html proprietary-jails.html
--- proprietary-jails.html 2022-04-13 04:04:23.653444568 +0000
+++ proprietary-jails.html 2022-04-14 04:04:14.943112461 +0000
@@ -128,5 +128,5 @@
<p>Here is an article about the <a
- href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
+ href="https://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
code signing</a> that the iThings use to lock up the user.</p>
@@ -235,5 +235,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Apple used its censorship system to enforce Russian surveillance <a
-
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
+
href="https://web.archive.org/web/20220402210254/https://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html">
by blocking distribution of the LinkedIn app in Russia</a>.</p>
@@ -259,5 +259,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Apple censors games, <a
-
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">
+
href="https://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game/">
banning some games from the cr…app store</a> because of which
political points they suggest. Some political points are apparently
@@ -268,5 +268,5 @@
<!--#set var="DATE" value='<small class="date-tag">2015-09</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
+ <p>Apple <a href="https://www.ifixit.com/News/7401/ifixit-app-pulled">
banned a program from the App Store</a> because its developers
committed the enormity of disassembling some iThings.</p>
@@ -277,10 +277,10 @@
--><!--#echo encoding="none" var="DATE" -->
<p>As of 2015, Apple <a
-
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">
+
href="https://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">
systematically bans apps that endorse abortion rights or would help
women find abortions</a>.</p>
<p>This particular political slant <a
-
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
+
href="https://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
affects other Apple services</a>.</p>
</li>
@@ -291,5 +291,5 @@
<p>Apple has banned iThing
applications that show the confederate flag. <a
-
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html">
+ href="https://www.huffpost.com/entry/apple-confederate-flag_n_7663754">
Not only those that use it as a symbol of racism</a>, but even
strategic games that use it to represent confederate army units
@@ -308,5 +308,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
+
href="https://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
More examples of Apple's arbitrary and inconsistent censorship</a>.</p>
</li>
@@ -316,7 +316,7 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Apple used this censorship power in 2014 to <a
-
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
+
href="https://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
ban all bitcoin apps</a> for the iThings for a time. It also <a
-
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
+
href="https://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
banned a game about growing marijuana</a>, while permitting games
about other crimes such as killing people. Perhaps Apple considers
@@ -331,5 +331,5 @@
time the developers fixed one “problem”, Apple
complained about another. After the fifth rejection, Apple <a
- href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
+ href="https://mashable.com/archive/apple-app-tracks-drone-strikes">
admitted it was censoring the app based on the subject matter</a>.</p>
</li>
@@ -382,5 +382,5 @@
removed the ability to install other operating
systems</a>. Then users broke that restriction too, but <a
-
href="https://www.engadget.com/2011/01/12/sony-follows-up-officially-sues-geohot-and-fail0verflow-over-ps/">got
+
href="https://www.engadget.com/2011-01-12-sony-follows-up-officially-sues-geohot-and-fail0verflow-over-ps.html">got
sued by Sony</a>.</p>
</li>
@@ -457,5 +457,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/01/11 07:27:02 $
+$Date: 2022/04/13 07:49:53 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-manipulation.html proprietary-manipulation.html
--- proprietary-manipulation.html 2022-04-13 04:04:23.657444568 +0000
+++ proprietary-manipulation.html 2022-04-14 04:04:14.947112464 +0000
@@ -157,5 +157,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Jibo robot toys were tethered to the manufacturer's server,
- and <a href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648">
+ and <a
href="https://apnews.com/article/san-francisco-north-america-technology-business-ap-top-news-99c9ec8ebad242ca88178e22c7642648">
the company made them all cease to work</a> by shutting down that
server.</p>
@@ -190,5 +190,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>“Dark patterns” are <a
-
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
+
href="https://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
interfaces designed to mislead users, or make option settings hard
to find</a>.</p>
@@ -259,5 +259,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/06 07:57:27 $
+$Date: 2022/04/13 07:49:53 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-obsolescence.html proprietary-obsolescence.html
--- proprietary-obsolescence.html 2022-04-13 04:04:23.661444568 +0000
+++ proprietary-obsolescence.html 2022-04-14 04:04:14.967112482 +0000
@@ -87,5 +87,5 @@
<p>ChromeBooks are programmed for obsolescence:
ChromeOS has a universal back door that is used for updates and <a
-
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/">
+
href="https://www.theregister.com/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/">
ceases to operate at a predefined date</a>. From then on, there
appears to be no support whatsoever for the computer.</p>
@@ -146,5 +146,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The <a
- href="http://michaelweinberg.org/post/137045828005/free-the-cube">
+ href="https://michaelweinberg.org/post/137045828005/free-the-cube">
“Cube” 3D printer was designed with DRM</a>: it
won't accept third-party printing materials. It is the Keurig of
@@ -154,5 +154,5 @@
<p>With a <a
- href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
+ href="https://www.fsf.org/resources/hw/endorsement/aleph-objects">
printer that gets the Respects Your Freedom</a>, this problem would
not even be a remote possibility.</p>
@@ -217,5 +217,5 @@
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2019, 2020, 2021 Free Software Foundation, Inc.</p>
+<p>Copyright © 2019, 2020, 2021, 2022 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
@@ -227,5 +227,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/01 09:21:53 $
+$Date: 2022/04/13 07:56:42 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-sabotage.html proprietary-sabotage.html
--- proprietary-sabotage.html 2022-04-13 04:04:23.665444569 +0000
+++ proprietary-sabotage.html 2022-04-14 04:04:14.971112485 +0000
@@ -107,5 +107,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Apple has <a
- href="https://sneak.berlin/20201112/your-computer-isnt-yours">implemented
+ href="https://sneak.berlin/20201112/your-computer-isnt-yours/">implemented
a malware in its computers that imposes surveillance</a> on users
and reports users' computing to Apple.</p>
@@ -211,5 +211,5 @@
program</a> on computers running certain
versions of Windows 10. Remediation, in Microsoft's view, means <a
-
href="https://support.microsoft.com/en-us/topic/kb4023057-update-for-windows-10-update-service-components-fccad0ca-dc10-2e46-9ed1-7e392450fb3a">
+
href="https://support.microsoft.com/en-us/topic/kb4023057-update-for-windows-update-service-components-fccad0ca-dc10-2e46-9ed1-7e392450fb3a">
tampering with users' settings and files</a>, notably to
“repair” any components of the updating system that users
@@ -329,5 +329,5 @@
<p>The game Metal Gear Rising for
MacOS was tethered to a server. The company <a
-
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">
+
href="https://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">
shut down the server, and all copies stopped working</a>.</p>
</li>
@@ -366,5 +366,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
-
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
+
href="https://www.macworld.com/article/230582/apple-file-system-apfs-faq.html">
changes the file system from HFS+ to APFS</a>, which cannot be
accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
@@ -399,5 +399,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Sonos <a
-
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
+
href="https://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
told all its customers, “Agree”
to snooping or the product will stop working</a>. <a
@@ -424,5 +424,5 @@
<p>Bird and rabbit pets were implemented for Second
Life by a company that tethered their food to a server. <a
-
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying">
+
href="https://www.rockpapershotgun.com/second-life-ozimals-pet-rabbits-dying">
It shut down the server and the pets more or less died</a>.</p>
</li>
@@ -433,5 +433,5 @@
<p>Microsoft has made Windows 7
and 8 cease to function on certain new computers, <a
-
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that">effectively
+
href="https://docs.microsoft.com/en-US/troubleshoot/windows-client/deployment/processor-not-supported-together-with-windows-version">effectively
forcing their owners to switch to Windows 10</a>.</p>
</li>
@@ -479,5 +479,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The developer of Ham Radio Deluxe <a
-
href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml">sabotaged
+
href="https://www.techdirt.com/2016/12/22/software-company-shows-how-not-to-handle-negative-review/">sabotaged
a customer's installation as punishment for posting a negative
review</a>.</p>
@@ -508,9 +508,9 @@
href="/proprietary/proprietary-back-doors.html#windows-update">
universal back door</a>. Not only did the unwanted downloads <a
-
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/">
+
href="https://www.theregister.com/2016/06/03/windows_10_upgrade_satellite_link/">
jeopardize important operations in regions of the world with poor
connectivity</a>, but many of the people who let installation proceed
found out that this “upgrade” was in fact a <a
-
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
+
href="https://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
downgrade</a>.</p>
</li>
@@ -520,5 +520,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Apple <a
-
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
+
href="https://www.theregister.com/2016/04/14/uninstall_quicktime_for_windows/">
stops users from fixing the security bugs in Quicktime for Windows</a>,
while refusing to fix them itself.</p>
@@ -530,5 +530,5 @@
<p>Once Microsoft has tricked a user
into accepting installation of Windows 10, <a
-
href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
+
href="https://www.theregister.com/2016/06/01/windows_10_nagware_no_way_out/">they
find that they are denied the option to cancel or even postpone the
imposed date of installation</a>.</p>
@@ -581,8 +581,8 @@
<p>FTDI's proprietary driver
for its USB-to-serial chips has been designed to <a
-
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/">sabotage
+
href="https://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/">sabotage
alternative compatible chips</a>
so that they no longer work. Microsoft is <a
-
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again">installing
+
href="https://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again">installing
this automatically</a> as an “upgrade”.</p>
</li>
@@ -593,5 +593,5 @@
<p>Philips “smart” lightbulbs had initially been
designed to interact with other companies' smart light bulbs, but <a
-
href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml">
+
href="https://www.techdirt.com/2015/12/14/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update/">
later the company updated the firmware to disallow
interoperability</a>.</p>
@@ -605,5 +605,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Google has long had <a
-
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a
+
href="https://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a
back door to remotely unlock an Android device</a>, unless its disk
is encrypted (possible since Android 5.0 Lollipop, but still not
@@ -646,5 +646,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio <a
- href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+
href="https://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
used a firmware “upgrade” to make its TVs snoop on what
users watch</a>. The TVs did not do that when first sold.</p>
@@ -683,5 +683,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Amazon <a
-
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml">
+
href="https://www.techdirt.com/2015/03/24/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices/">
downgraded the software in users' Swindles</a> so that those already
rooted would cease to function at all.</p>
@@ -692,5 +692,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Apple <a
-
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
+
href="https://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
deleted from iPods the music that users had got from internet music
stores that competed with iTunes</a>.</p>
@@ -713,5 +713,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>LG <a
-
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+
href="https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/">
disabled network features</a> on <em>previously purchased</em>
“smart” TVs, unless the purchasers agreed to let LG begin
@@ -723,5 +723,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Some proprietary <a
-
href="http://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases">
+
href="https://www.theguardian.com/technology/2014/jan/19/apple-talking-cats-in-app-purchases">
games lure children to spend their parents' money</a>.</p>
</li>
@@ -731,5 +731,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">The
+
href="https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">The
NSA has put back doors into nonfree encryption software</a>. We don't
know which ones they are, but we can be sure they include some widely
@@ -750,5 +750,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Adobe applications have time bombs: they <a
-
href="http://techcrunch.com/2013/05/06/adobe-goes-all-in-with-subscription-based-creative-cloud-will-stop-selling-regular-cs-licenses-shrink-wrapped-boxes/">
+
href="https://techcrunch.com/2013/05/06/adobe-goes-all-in-with-subscription-based-creative-cloud-will-stop-selling-regular-cs-licenses-shrink-wrapped-boxes/">
stop working after a certain time</a>, after which the user
must pay to extend the time.</p>
@@ -764,5 +764,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Oracle's nonfree Java plug-in for browsers <a
-
href="http://www.zdnet.com/article/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates/">sneakily
+
href="https://www.zdnet.com/article/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates/">sneakily
installs other annoying proprietary software</a>.</p>
@@ -795,5 +795,5 @@
<p>In a court settlement Sony is <a
-
href="http://arstechnica.com/tech-policy/2016/06/if-you-used-to-run-linux-on-your-ps3-you-could-get-55-from-sony/">
+
href="https://arstechnica.com/tech-policy/2016/06/if-you-used-to-run-linux-on-your-ps3-you-could-get-55-from-sony/">
now paying for the sabotage</a>.</p>
</li>
@@ -860,5 +860,5 @@
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2015-2021 Free Software Foundation, Inc.</p>
+<p>Copyright © 2013, 2015-2022 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
@@ -870,5 +870,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/12/19 08:18:48 $
+$Date: 2022/04/13 07:56:42 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-surveillance.html proprietary-surveillance.html
--- proprietary-surveillance.html 2022-04-13 04:04:23.669444569 +0000
+++ proprietary-surveillance.html 2022-04-14 04:04:14.979112492 +0000
@@ -218,5 +218,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>HP's proprietary operating system <a
- href="http://www.bbc.com/news/technology-42309371">includes a
+ href="https://www.bbc.com/news/technology-42309371">includes a
proprietary keyboard driver with a key logger in it</a>.</p>
</li>
@@ -231,5 +231,5 @@
fourth stable build of Windows 10, called the
“Creators Update,” Windows maximized the surveillance <a
-
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law">
+
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law/">
by force setting the telemetry mode to “Full”</a>.</p>
@@ -256,5 +256,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>By default, Windows 10 <a
-
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties">sends
+
href="https://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties/">sends
debugging information to Microsoft, including core dumps</a>. Microsoft
now distributes them to another company.</p>
@@ -301,5 +301,5 @@
applications. Then another downgrade inserted a general spying
program. Users noticed this and complained, so Microsoft renamed it <a
-
href="https://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/">
+
href="https://www.theregister.com/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/">
to give users the impression it was gone</a>.</p>
@@ -320,5 +320,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/">
+
href="https://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/">
Windows 10 sends identifiable information to Microsoft</a>, even if
a user turns off its Bing search and Cortana features, and activates
@@ -367,5 +367,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>It only gets worse with time. <a
-
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
+
href="https://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
Windows 10 requires users to give permission for total snooping</a>,
including their files, their commands, their text input, and their
@@ -385,5 +385,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Spyware in older versions of Windows: <a
- href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
+ href="https://www.theregister.com/2003/02/28/windows_update_keeps_tabs/">
Windows Update snoops on the user</a>. <a
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
@@ -410,5 +410,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Apple has <a
- href="https://sneak.berlin/20201112/your-computer-isnt-yours">implemented
+ href="https://sneak.berlin/20201112/your-computer-isnt-yours/">implemented
a malware in its computers that imposes surveillance</a> on users
and reports users' computing to Apple.</p>
@@ -432,5 +432,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Apple has made various <a
-
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">
+
href="https://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">
MacOS programs send files to Apple servers without asking
permission</a>. This exposes the files to Big Brother and perhaps
@@ -459,5 +459,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Apple admits the <a
-
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">
+
href="https://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">
spying in a search facility</a>, but there's a lot <a
href="https://github.com/fix-macosx/yosemite-phone-home"> more snooping
@@ -469,5 +469,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Various operations in <a
-
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540">
+
href="https://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540">
the latest MacOS send reports to Apple</a> servers.</p>
</li>
@@ -477,5 +477,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+
href="https://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
Spotlight search</a> sends users' search terms to Apple.</p>
</li>
@@ -613,5 +613,5 @@
<p>The natural extension of monitoring
people through “their” phones is <a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ href="https://news.northwestern.edu/stories/2016/01/fool-activity-tracker">
proprietary software to make sure they can't “fool”
the monitoring</a>.</p>
@@ -622,5 +622,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>According to Edward Snowden, <a
- href="http://www.bbc.com/news/uk-34444233">agencies can take over
+ href="https://www.bbc.com/news/uk-34444233">agencies can take over
smartphones</a> by sending hidden text messages which enable
them to turn the phones on and off, listen to the microphone,
@@ -649,5 +649,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Portable phones with GPS <a
-
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
href="https://www.aclu.org/issues/privacy-technology/location-tracking/you-are-being-tracked">
will send their GPS location on remote command, and users cannot stop
them</a>. (The US says it will eventually require all new portable phones
@@ -794,5 +794,5 @@
make are automatically updated everywhere. […] </p></blockquote>
- <p>(From <a href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ <p>(From <a
href="https://web.archive.org/web/20150921152044/https://www.apple.com/icloud/photos/">Apple's
iCloud
information</a> as accessed on 24 Sep 2015.) The iCloud feature is
<a href="https://support.apple.com/en-us/HT202033">activated by the
@@ -816,5 +816,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Apple can, and regularly does, <a
-
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+
href="https://arstechnica.com/gadgets/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
remotely extract some data from iPhones for the state</a>.</p>
@@ -822,5 +822,5 @@
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">
iOS 8 security improvements</a>; but <a
- href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ href="https://theintercept.com/2014/09/22/apple-data/">
not as much as Apple claims</a>.</p>
</li>
@@ -830,5 +830,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+
href="https://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
Several “features” of iOS seem to exist
for no possible purpose other than surveillance</a>. Here is the <a
@@ -841,5 +841,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The <a class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+
href="https://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
iBeacon</a> lets stores determine exactly where the iThing is, and
get other info too.</p>
@@ -850,5 +850,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p><a
-
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+
href="https://web.archive.org/web/20190924053515/https://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
Either Apple helps the NSA snoop on all the data in an iThing, or it
is totally incompetent</a>.</p>
@@ -859,5 +859,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The iThing also <a
-
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+
href="https://www.theregister.com/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
tells Apple its geolocation</a> by default, though that can be
turned off.</p>
@@ -868,5 +868,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>There is also a feature for web sites to track users, which is <a
-
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+
href="https://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it is
still true in iOS 7.)</p>
@@ -954,5 +954,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Android tracks location for Google <a
-
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+
href="https://www.techdirt.com/2017/11/21/investigation-finds-google-collected-location-data-even-with-location-services-turned-off/">
even when “location services” are turned off, even when
the phone has no SIM card</a>.</p>
@@ -985,5 +985,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Samsung phones come with <a
-
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
+
href="https://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>, and they send so much data that their
transmission is a substantial expense for users. Said transmission,
@@ -1004,8 +1004,8 @@
<p>Spyware in Android phones (and Windows? laptops): The Wall Street
Journal (in an article blocked from us by a paywall) reports that <a
-
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+
href="https://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
the FBI can remotely activate the GPS and microphone in Android phones
and laptops</a> (presumably Windows laptops). Here is <a
- href="http://cryptome.org/2013/08/fbi-hackers.htm">more info</a>.</p>
+ href="https://cryptome.org/2013/08/fbi-hackers.htm">more info</a>.</p>
</li>
@@ -1032,5 +1032,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Google Play intentionally sends app developers <a
-
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+
href="https://gadgets360.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
the personal details of users that install the app</a>.</p>
@@ -1051,5 +1051,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Some manufacturers add a <a
-
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+
href="https://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
hidden general surveillance package such as Carrier IQ</a>.</p>
</li>
@@ -1067,5 +1067,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>E-books can contain JavaScript code, and <a
-
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+
href="https://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
sometimes this code snoops on readers</a>.</p>
</li>
@@ -1452,10 +1452,10 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The AppCensus database gives information on <a
- href="https://www.appcensus.mobi"> how Android apps use and
+ href="https://www.appcensus.io/"> how Android apps use and
misuse users' personal data</a>. As of March 2019, nearly
78,000 have been analyzed, of which 24,000 (31%) transmit the <a
href="/proprietary/proprietary-surveillance.html#M201812290">
Advertising ID</a> to other companies, and <a
- href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ href="https://blog.appcensus.io/2019/02/14/ad-ids-behaving-badly/">
18,000 (23% of the total) link this ID to hardware identifiers</a>,
so that users cannot escape tracking by resetting it.</p>
@@ -1500,5 +1500,5 @@
<p>An investigation of the 150 most popular
gratis VPN apps in Google Play found that <a
- href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+
href="https://www.top10vpn.com/research/free-vpn-investigations/risk-index/">
25% fail to protect their users' privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
@@ -1508,5 +1508,5 @@
<p>Moreover, a previous investigation had found that <a
- href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
+
href="https://www.top10vpn.com/research/free-vpn-investigations/ownership/">half
of
the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
@@ -1556,5 +1556,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Some Android apps <a
-
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+
href="https://web.archive.org/web/20210418052600/https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
track the phones of users that have deleted them</a>.</p>
</li>
@@ -1681,5 +1681,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>20 dishonest Android apps recorded <a
-
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts/">phone
calls and sent them and text messages and emails to snoopers</a>.</p>
@@ -1807,5 +1807,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A <a
-
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+
href="https://research.csiro.au/isp/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated the privacy and security of
283 Android VPN apps concluded that “in spite of the promises
@@ -1855,5 +1855,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Google's new voice messaging app <a
-
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+
href="https://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
all conversations</a>.</p>
</li>
@@ -1863,5 +1863,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Facebook's new Magic Photo app <a
-
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+
href="https://www.theregister.com/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections for known faces</a>,
and suggests you circulate the picture you take according to who is
@@ -1891,5 +1891,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A pregnancy test controller application not only can <a
-
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+
href="https://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
spy on many sorts of data in the phone, and in server accounts,
it can alter them too</a>.</p>
@@ -1911,5 +1911,5 @@
<p>“Cryptic communication,”
unrelated to the app's functionality, was <a
- href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ href="https://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
found in the 500 most popular gratis Android apps</a>.</p>
@@ -1938,10 +1938,10 @@
<p>Like most “music screaming” disservices, Spotify is
based on proprietary malware (DRM and snooping). In August 2015 it <a
-
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+
href="https://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
demanded users submit to increased snooping</a>, and some are starting
to realize that it is nasty.</p>
<p>This article shows the <a
-
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ href="https://www.theregister.com/2015/08/21/spotify_worse_than_the_nsa/">
twisted ways that they present snooping as a way to “serve”
users better</a>—never mind whether they want that. This is a
@@ -1973,5 +1973,5 @@
<p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>) connect to 100 <a
-
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
+
href="https://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs, on the average.</p>
</li>
@@ -1981,5 +1981,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Widely used <a
-
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+
href="https://freedom-to-tinker.com/2015/04/06/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
QR-code scanner apps snoop on the user</a>. This is in addition to
the snooping done by the phone company, and perhaps by the OS in
@@ -1996,5 +1996,5 @@
<p>Many proprietary apps for mobile devices
report which other apps the user has installed. <a
- href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ href="https://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
is doing this in a way that at least is visible and optional</a>. Not
as bad as what the others do.</p>
@@ -2014,5 +2014,5 @@
<p>The nonfree Snapchat app's principal purpose is to restrict the
use of data on the user's computer, but it does surveillance too: <a
-
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+
href="https://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
it tries to get the user's list of other people's phone
numbers</a>.</p>
@@ -2023,5 +2023,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Brightest Flashlight app <a
-
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+
href="https://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
sends user data, including geolocation, for use by companies</a>.</p>
@@ -2038,6 +2038,6 @@
--><!--#echo encoding="none" var="DATE" -->
<p>FTC says most mobile apps for children don't respect privacy: <a
-
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+
href="https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
</ul>
@@ -2066,5 +2066,5 @@
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
Microsoft changed Skype <a
-
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+
href="https://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
specifically for spying</a>.</p>
</li>
@@ -2121,5 +2121,5 @@
program along with an update to the massive
multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
-
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
+
href="https://techraptor.net/gaming/news/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
to snoop on all open processes running on its user's computer</a>.</p>
</li>
@@ -2137,5 +2137,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Many <a
-
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+
href="https://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html">
video game consoles snoop on their users and report to the
internet</a>—even what their users weigh.</p>
@@ -2149,5 +2149,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Modern gratis game cr…apps <a
-
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+
href="https://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
collect a wide range of data about their users and their users'
friends and associates</a>.</p>
@@ -2169,5 +2169,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Angry Birds <a
-
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+
href="https://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
spies for companies, and the NSA takes advantage
to spy through it too</a>. Here's information on <a
@@ -2205,5 +2205,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Most Internet connected devices in Mozilla's <a
- href="https://foundation.mozilla.org/en/privacynotincluded">“Privacy
+ href="https://foundation.mozilla.org/en/privacynotincluded/">“Privacy
Not Included”</a> list <a
href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are
@@ -2220,5 +2220,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The bad security in many Internet of Stings devices allows <a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+
href="https://www.techdirt.com/2017/08/28/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you/">ISPs
to snoop on the people that use them</a>.</p>
@@ -2319,5 +2319,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio “smart” <a
-
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+
href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
report everything that is viewed on them, and not just broadcasts and
cable</a>. Even if the image is coming from the user's own computer,
@@ -2335,5 +2335,5 @@
are nearby. Once your Internet devices are paired with
your TV, advertisers can correlate ads with Web activity, and other <a
-
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
+
href="https://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
cross-device tracking</a>.</p>
</li>
@@ -2361,5 +2361,5 @@
being watched by advertisers. By combining TV viewing
information with online social media participation, Tivo can now <a
- href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ href="https://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing all
users to new combined surveillance by default.</p>
@@ -2370,5 +2370,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio “smart” TVs recognize and <a
- href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
+ href="https://www.engadget.com/2015-07-24-vizio-ipo-inscape-acr.html">track
what people are watching</a>, even if it isn't a TV channel.</p>
</li>
@@ -2378,5 +2378,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Verizon cable TV <a
-
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+
href="https://arstechnica.com/information-technology/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
snoops on what programs people watch, and even what they wanted to
record</a>.</p>
@@ -2387,5 +2387,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Vizio <a
- href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+
href="https://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
used a firmware “upgrade” to make its TVs snoop on what
users watch</a>. The TVs did not do that when first sold.</p>
@@ -2405,5 +2405,5 @@
<p>In its privacy policy, Samsung explicitly confirms that <a
-
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+
href="https://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
data containing sensitive information will be transmitted to third
parties</a>.</p>
@@ -2414,5 +2414,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Amazon “Smart” TV is <a
-
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+
href="https://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
snooping all the time</a>.</p>
</li>
@@ -2422,5 +2422,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>More or less all “smart” TVs <a
-
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+
href="https://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
@@ -2448,5 +2448,5 @@
<p>Even worse, it <a
-
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+
href="https://rrrrambles.wordpress.com/2013/11/21/lg-tv-logging-filenames-from-network-folders/">
snoops on other devices on the user's local network</a>.</p>
@@ -2455,5 +2455,5 @@
<p>Meanwhile, LG TVs <a
-
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+
href="https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/">
do lots of spying anyway</a>.</p>
</li>
@@ -2480,5 +2480,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Amazon Ring “security” devices <a
-
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+
href="https://www.engadget.com/2019-01-10-ring-gave-employees-access-customer-video-feeds.html">
send the video they capture to Amazon servers</a>, which save it
long-term.</p>
@@ -2497,5 +2497,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Nearly all “home security cameras” <a
-
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds-a8814384448/">
give the manufacturer an unencrypted copy of everything they
see</a>. “Home insecurity camera” would be a better
@@ -2520,5 +2520,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Nest Cam “smart” camera is <a
- href="http://www.bbc.com/news/technology-34922712">always watching</a>,
+ href="https://www.bbc.com/news/technology-34922712">always watching</a>,
even when the “owner” switches it “off.”</p>
@@ -2539,5 +2539,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Furby Connect has a <a
-
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+
href="https://www.contextis.com/en/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
universal back door</a>. If the product as shipped doesn't act as a
listening device, remote changes to the code could surely convert it
@@ -2549,5 +2549,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A remote-control sex toy was found to make <a
-
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-surveillance">audio
recordings of the conversation between two users</a>.</p>
</li>
@@ -2603,5 +2603,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The “smart” toys My Friend Cayla and i-Que transmit <a
-
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws/">children's
conversations to Nuance Communications</a>, a speech recognition
company based in the U.S.</p>
@@ -2617,5 +2617,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Barbie <a
-
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+
href="https://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
</li>
@@ -2801,5 +2801,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A medical insurance company <a
-
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
+
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next/">
offers a gratis electronic toothbrush that snoops on its user by
sending usage data back over the Internet</a>.</p>
@@ -2823,5 +2823,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p id="nest-thermometers">Nest thermometers send <a
- href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
+ href="https://bgr.com/general/google-nest-jailbreak-hack/">a lot of
data about the user</a>.</p>
</li>
@@ -2879,5 +2879,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A very cheap “smart watch” comes with an Android app <a
-
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+
href="https://www.theregister.com/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
that connects to an unidentified site in China</a>.</p>
@@ -2890,5 +2890,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>An LG “smart” watch is designed <a
-
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+
href="https://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
to report its location to someone else and to transmit conversations
too</a>.</p>
@@ -2951,5 +2951,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The FordPass Connect feature of some Ford vehicles has <a
-
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+
href="https://web.archive.org/web/20200530023040/https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
near-complete access to the internal car network</a>. It is constantly
connected to the cellular phone network and sends Ford a lot of data,
@@ -2967,5 +2967,5 @@
<p>In China, it is mandatory for electric
cars to be equipped with a terminal that <a
- href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+
href="https://apnews.com/article/north-america-ap-top-news-international-news-shanghai-china-4a749a4211904784826b45e812cff4ca">
transfers technical data, including car location,
to a government-run platform</a>. In practice, <a
@@ -3049,5 +3049,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p id="records-drivers">Proprietary software in cars <a
-
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
+
href="https://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
records information about drivers' movements</a>, which is made
available to car manufacturers, insurance companies, and others.</p>
@@ -3143,5 +3143,5 @@
<p>When a page uses Disqus
for comments, the proprietary Disqus software <a
-
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">loads
+
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook/">loads
a Facebook software package into the browser of every anonymous visitor
to the page, and makes the page's URL available to Facebook</a>.</p>
@@ -3182,5 +3182,5 @@
<p>Many web sites report all their visitors
to Google by using the Google Analytics service, which <a
-
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
+
href="https://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
tells Google the IP address and the page that was visited</a>.</p>
</li>
@@ -3215,5 +3215,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Many web sites use JavaScript code <a
-
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
+
href="https://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
to snoop on information that users have typed into a
form but not sent</a>, in order to learn their identity. Some are <a
@@ -3268,5 +3268,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Flash and JavaScript are used for <a
-
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+
href="https://arstechnica.com/information-technology/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
“fingerprinting” devices</a> to identify users.</p>
</li>
@@ -3468,5 +3468,5 @@
<p>While the world is still
struggling with COVID-19 coronavirus, many <a
-
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/">people
+
href="https://mashable.com/article/privacy-in-the-age-of-coronavirus">people
are in danger of surveillance</a> and their computers are infected
with malware as a result of installing proprietary software.</p>
@@ -3477,5 +3477,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Proprietary programs Google Meet, Microsoft Teams, and WebEx <a
-
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/">are
+
href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex-a7383469308/">are
collecting user's personal and identifiable data</a> including how long
a call lasts, who's participating in the call, and the IP addresses
@@ -3533,5 +3533,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Investigation Shows <a
-
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+
href="https://www.techdirt.com/2016/06/03/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions/">GCHQ
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
@@ -3545,5 +3545,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Cisco TNP IP phones are <a
- href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
href="https://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
spying devices</a>.</p>
</li>
@@ -3609,5 +3609,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/06 07:41:52 $
+$Date: 2022/04/13 12:46:51 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-tethers.html proprietary-tethers.html
--- proprietary-tethers.html 2022-04-13 04:04:23.673444568 +0000
+++ proprietary-tethers.html 2022-04-14 04:04:14.979112492 +0000
@@ -134,5 +134,5 @@
<p>Wink sells a “smart” home hub that is tethered
to a server. In May 2020, it ordered the purchasers to start <a
-
href="https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html">
+
href="https://www.techhive.com/article/578539/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html">
paying a monthly fee for the use of that server</a>. Because of the
tethering, the hub is useless without that.</p>
@@ -157,5 +157,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The Jibo robot toys were tethered to the manufacturer's server,
- and <a href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648">
+ and <a
href="https://apnews.com/article/san-francisco-north-america-technology-business-ap-top-news-99c9ec8ebad242ca88178e22c7642648">
the company made them all cease to work</a> by shutting down that
server.</p>
@@ -227,5 +227,5 @@
<p>The game Metal Gear Rising for
MacOS was tethered to a server. The company <a
-
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">
+
href="https://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">
shut down the server, and all copies stopped working</a>.</p>
</li>
@@ -274,5 +274,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>The recent versions of Microsoft Office require the user to <a
-
href="https://products.office.com/en-us/microsoft-office-for-home-and-school-faq?legRedir=true&CorrelationId=c9c5b549-11ad-4f71-bf81-b7e069fdb372">
+
href="https://www.microsoft.com/en-us/microsoft-365/microsoft-365-for-home-and-school-faq?legRedir=true&CorrelationId=c9c5b549-11ad-4f71-bf81-b7e069fdb372">
connect to Microsoft servers at least every thirty-one
days</a>. Otherwise, the software will refuse to edit any documents
@@ -285,5 +285,5 @@
<p>Bird and rabbit pets were implemented for Second
Life by a company that tethered their food to a server. <a
-
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying">
+
href="https://www.rockpapershotgun.com/second-life-ozimals-pet-rabbits-dying">
It shut down the server and the pets more or less died</a>.</p>
</li>
@@ -303,5 +303,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>nVidia's proprietary GeForce Experience <a
-
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+
href="https://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
users identify themselves and then sends personal data about them to
nVidia servers</a>.</p>
@@ -321,5 +321,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>A half-blind security critique of a tracking app: it found that <a
-
href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/">
+
href="https://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats-a1100919965/">
blatant flaws allowed anyone to snoop on a user's personal data</a>.
The critique fails entirely to express concern that the app sends the
@@ -416,5 +416,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2022/04/06 07:37:01 $
+$Date: 2022/04/13 08:51:18 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-tyrants.html proprietary-tyrants.html
--- proprietary-tyrants.html 2022-04-13 04:04:23.673444568 +0000
+++ proprietary-tyrants.html 2022-04-14 04:04:15.003112514 +0000
@@ -71,5 +71,5 @@
<p>Microsoft accidentally left a way for users
to install GNU/Linux on Windows RT tablets, but now it has <a
-
href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/">
+
href="https://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/">
“fixed” the “error”</a>. They have the gall
to call this “protecting” the users. The article talks
@@ -82,5 +82,5 @@
--><!--#echo encoding="none" var="DATE" -->
<p>Apple arbitrarily <a
- href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">blocks
+ href="https://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">blocks
users from installing old versions of iOS</a>.</p>
</li>
@@ -89,5 +89,5 @@
<!--#set var="DATE" value='<small class="date-tag">2014-03</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p><a href="http://soylentnews.org/article.pl?sid=14/03/15/1912255">
+ <p><a href="https://soylentnews.org/article.pl?sid=14/03/15/1912255">
Intel processors will have tyrant software built in</a>.</p>
</li>
@@ -135,5 +135,5 @@
<!--#set var="DATE" value='<small class="date-tag">2011-10</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p><a href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
+ <p><a href="https://www.fsf.org/campaigns/secure-boot-vs-restricted-boot/">
Mobile devices that come with Windows 8 are tyrants</a>.</p>
</li>
@@ -196,5 +196,5 @@
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014-2021 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014-2022 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
@@ -206,5 +206,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/06/01 09:21:53 $
+$Date: 2022/04/13 07:56:42 $
<!-- timestamp end -->
</p>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- all.html malware-adobe.html malware-amazon.html malware-apple.htm...,
Diff Report <=