Other examples of proprietary malware
For decades, the Free Software movement has been denouncing the
abusive surveillance machine of
companies such as
In the recent years, this tendency to watch people has spread across
industries, not only in the software business, but also in the
hardware. Moreover, it also spread dramatically away from the
keyboard, in the mobile computing industry, in the office, at home, in
transportation systems, and in the classroom.
This document attempts to
track clearly established cases of proprietary software that
spies on or track users.
Latest additions are found on top under each category.
There's a lot more
There's a lot more iThing spyware, and
Tesla cars allow the company to extract data remotely and
determine the car's location at any time. (See
Section 2, paragraphs b and c.). The company says it doesn't
store this information, but if the state orders it to get the data
and hand it over, the state can store it.
Emo Phillips made a joke: The other day a woman came up to me and
said, “Didn't I see you on television?” I said, “I
don't know. You can't see out the other way.” Evidently that was
before Amazon “smart” TVs.
In addition, many web sites spy on their visitors. Web sites are not
programs, so it
makes no sense to call them “free” or “proprietary”,
but the surveillance is an abuse all the same.
is another method of “fingerprinting” devices.