advanced help
phrase:
attribute:
attribute:
attribute:
order:
per page:
clip:
action:
Results of 1 - 1 of about 747 for Android 12 (1.974 sec.)
android (2819), 12 (27881)
malware-appliances.de.po
#score: 5139
@digest: 8f44720cb9534bfa802ade47c44469d1
@id: 313383
@mdate: 2023-07-15T12:12:06Z
@size: 111245
@type: text/html
content-type: text/html; charset=utf-8
#keywords: techdirt (78501), arstechnica (31030), smart (28747), blogspot (27937), vizio (24349), hospital (23700), gerate (20125), ldquo (18607), theguardian (17873), tvs (17592), rdquo (17150), watching (16693), samsung (16595), cameras (15942), https (15719), href (13610), unter (12673), backdoor (12551), vulnerable (12544), tethered (12348), technology (11017), vulnerability (10564), crackers (10531), security (9073), internet (8257), customers (7939), com (7398), malware (7203), viewing (6868), surveillance (6826), amazon (6735), tv (6694)
malware-appliances.de.po Mismatched links: 190. Mismatched ids: 4. # text 8 | {+</a>&nbsp;/+} <a [-href="/proprietary/proprietary.html">Other examples | of proprietary malware</a>-] | {+href="/proprietary/proprietary.html">Malware</a>&nbsp;/ By | product&nbsp;/+} </a>&nbsp;/ <a href=" /proprietary/proprietary.html ">Malware</a>&nbsp;/ By product&nbsp;/ <a href=" /proprietary/ ">Weitere Beispiele proprietärer Schadsoftware</a> 10 | Nonfree (proprietary) software is very often malware (designed to mistreat | the user). Nonfree software is controlled by its developers, which puts | them in a position of power over the users; <a | href="/philosophy/free-software-even-more-important.html">that is the | basic injustice</a>. The developers {+and manufacturers+} often exercise | that power to the detriment of the users they ought to serve. Nonfree (proprietary) software is very often malware (designed to mistreat the user). Nonfree software is controlled by its developers, which puts them in a position of power over the users; <a href=" /philosophy/free-software-even-more-important.html ">that is the basic injustice</a>. The developers and manufacturers often exercise that power to the detriment of the users they ought to serve. Unfreie (proprietäre) Software entspricht sehr häufig einem Schadprogramm (entworfen, um <ins>unerwünschte und gegebenenfalls schädliche Funktionen auszuführen,</ins> den Benutzer also schlecht behandeln). Unfreie Software wird von den Entwicklern kontrolliert, welches sie in eine Position der Macht gegenüber den Nutzern versetzt. <a href=" /philosophy/free-software-even-more-important ">Das ist die grundlegende Ungerechtigkeit!</a> Häufig üben Entwickler diese Macht zum Schaden der Benutzer aus, denen sie eigentlich dienen sollte. 15 The appliances we are dealing with contain software, almost always nonfree software. It is reasonable to treat this software as <a href=" /philosophy/free-hardware-designs.html#boundary ">equivalent to a bunch of circuits</a>, provided it is <em>never</em> changed (not even if the change is called an &ldquo;upgrade&rdquo;). 23 <a href=" https://www.theguardian.com/technology/2023/jul/04/smile-youre-on-camera-self-driving-cars-are-here-and-theyre-watching-you "> Driverless cars in San Francisco collect videos constantly</a>, using cameras inside and outside, and governments have already collected those videos secretly. 24 As the Surveillance Technology Oversight Project says, they are &ldquo;driving us straight into authoritarianism.&rdquo; We must <a href=" /philosophy/surveillance-vs-democracy.html ">regulate <em>all</em> cameras that collect images that can be used to track people</a>, to make sure they are not used for that. 25 HP delivers printers with a universal back door, and recently used it to <a href=" https://www.theguardian.com/money/2023/may/10/how-can-hp-block-me-from-using-a-cheaper-printer-cartridge "> sabotage them by remotely installing malware</a>. The malware makes the printer refuse to function with non-HP ink cartrides, and even with old HP cartridges which HP now declares to have &ldquo;expired.&rdquo; HP calls the back door &ldquo;dynamic security,&rdquo; and has the gall to claim that this &ldquo;security&rdquo; protects users from malware. 28 Controlling Honeywell internet thermostats with the dedicated app has proven unreliable, due to <a href=" https://piunikaweb.com/2022/03/15/honeywell-total-connect-comfort-app-website-not-working-issue/ "> recurrent connection issues with the server these thermostats are tethered to</a>. 29 <a hreflang="ja" href=" https://ja.wikipedia.org/wiki/B-CAS ">B-CAS</a> <a href=" #m1 ">[1]</a> is the digital restrictions management (DRM) system used by Japanese TV broadcasters, including NHK (public-service TV). It is sold by the B-CAS company, which has a de-facto monopoly on it. Initially intended for pay-TV, its use was extended to digital free-to-air broadcasting as a means to enforce restrictions on copyrighted works. The system encrypts works that permit free redistribution just like other works, thus denying users their nominal rights. 39 Some Epson printers are programmed to <a href=" https://hardware.slashdot.org/story/22/08/07/0350244/epson-programs-some-printers-to-stop-operating-claiming-danger-of-ink-spills "> stop working after they have printed a predetermined number of pages</a>, on the pretext that ink pads become saturated with ink. This constitutes an unacceptable infringement on users' freedom to use their printers as they wish, and on their <a href=" https://fighttorepair.substack.com/p/citing-danger-of-ink-spills-epson "> right to repair them</a>. 40 Today's &ldquo;smart&rdquo; TVs <a href=" https://www.techdirt.com/2022/04/14/its-still-stupidly-ridiculously-difficult-to-buy-a-dumb-tv/ "> push people to surrender to tracking via internet</a>. Some won't work unless they have a chance to download nonfree software. And they are designed for programmed obsolescence. 41 Hewlett-Packard is <a href=" https://www.theguardian.com/money/2022/feb/19/how-cheap-ink-cartridges-can-cost-you-dear "> implementing DRM in its printers</a> so they refuse to print with ink cartridges from another supplier. 42 <a href=" https://www.eff.org/deeplinks/2022/02/worst-timeline-printer-company-putting-drm-paper-now "> Dymo is now embedding DRM in the paper rolls for its label printers</a> to make those printers reject equivalent paper rolls made by other companies. This is implemented by an RFID tag, which keeps track of how many labels remain on the roll, and blocks further printing when the roll is empty&mdash;an efficient way to prevent reusing the same RFID with a third-party roll. 43 &ldquo;Smart&rdquo; TV manufacturers <a href=" https://www.theguardian.com/technology/2022/jan/29/what-your-smart-tv-knows-about-you-and-how-to-stop-it-harvesting-data "> spy on people using various methods</a>, and harvest their data. They are collecting audio, video, and TV usage data to profile people. 44 NordicTrack, a company that sells exercise machines with ability to show videos <a href=" https://arstechnica.com/information-technology/2021/11/locked-out-of-god-mode-runners-are-hacking-their-treadmills/ ">limits what people can watch, and recently disabled a feature</a> that was originally functional. This happened through automatic update and probably involved a universal back door. 45 Recent Samsung TVs have a back door with which Samsung can <a href=" https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide "> brick them remotely</a>. 46 Most Internet connected devices in Mozilla's <a href=" https://web.archive.org/web/20220129065321/https://foundation.mozilla.org/en/privacynotincluded/ ">&ldquo;Privacy Not Included&rdquo;</a> list <a href=" https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell ">are designed to snoop on users</a> even if they meet Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure design of the program running on some of these devices <a href=" https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster ">makes the user susceptible to be snooped on and exploited by crackers as well</a>. 47 Some Wavelink and JetStream wifi routers have universal back doors that enable unauthenticated users to remotely control not only the routers, but also any devices connected to the network. There is evidence that <a href=" https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/ "> this vulnerability is actively exploited</a>. 48 If you consider buying a router, we encourage you to get one that <a href=" https://ryf.fsf.org/categories/routers ">runs on free software</a>. Any attempts at introducing malicious functionalities in it (e.g., through a firmware update) will be detected by the community, and soon corrected. 49 If unfortunately you own a router that runs on proprietary software, don't panic! You may be able to replace its firmware with a free operating system such as <a href=" https://librecmc.org ">libreCMC</a>. If you don't know how, you can get help from a nearby GNU/Linux user group. 50 The Focals eyeglass display, with snooping microphone, has been eliminated. Google eliminated it by buying the manufacturer and shutting it down. It also <a href=" https://www.ctvnews.ca/sci-tech/canadian-smart-glasses-going-offline-weeks-after-company-bought-by-google-1.5042010 ">shut down the server these devices depend on</a>, which caused the ones already sold to cease to function. 52 The Mellow sous-vide cooker is tethered to a server. The company suddenly <a href=" https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/ "> turned this tethering into a subscription</a>, forbidding users from taking advantage of the &ldquo;advanced features&rdquo; of the cooker unless they pay a monthly fee. 53 TV manufacturers are able to <a href=" https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/ ">snoop every second of what the user is watching</a>. This is illegal due to the Video Privacy Protection Act of 1988, but they're circumventing it through EULAs. 54 <a href=" https://www.wired.com/story/ripple20-iot-vulnerabilities/ "> A disasterous security bug</a> touches millions of products in the Internet of Stings. 56 Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In May 2020, it ordered the purchasers to start <a href=" https://www.techhive.com/article/578539/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html "> paying a monthly fee for the use of that server</a>. Because of the tethering, the hub is useless without that. 57 | The Amazon [-&ldquo;smart&rdquo; TV is-] {+Ring app does+} <a | [-href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"> | snooping all the time</a>.-] | {+href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"> | surveillance for other companies as well as for Amazon</a>.+} The Amazon Ring app does <a href=" https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report "> surveillance for other companies as well as for Amazon</a>. Amazon „Smart“-TV-Geräte <a href=" //www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance " title="Amazon's Echo and the smart TVs that are listening to and watching everything you do, unter: theguardian.com 2014.">schnüffeln die ganze Zeit mit</a>. 58 Internet-tethered Amazon Ring had a security vulnerability that enabled attackers to <a href=" https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password "> access the user's wifi password</a>, and snoop on the household through connected surveillance devices. 60 Best Buy made controllable appliances and <a href=" https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6 "> shut down the service to control them through</a>. 62 The Jibo robot toys were tethered to the manufacturer's server, and <a href=" https://apnews.com/article/san-francisco-north-america-technology-business-ap-top-news-99c9ec8ebad242ca88178e22c7642648 "> the company made them all cease to work</a> by shutting down that server. 64 The British supermarket Tesco sold tablets which were tethered to Tesco's server for reinstalling default settings. Tesco <a href=" https://www.theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix "> turned off the server for old models</a>, so now if you try to reinstall the default settings, it bricks them instead. 65 The Medtronics Conexus Telemetry Protocol has <a href=" https://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/ "> two vulnerabilities that affect several models of implantable defibrillators</a> and the devices they connect to. 67 The Ring doorbell camera is designed so that the manufacturer (now Amazon) can watch all the time. Now it turns out that <a href=" https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/ "> anyone else can also watch, and fake videos too</a>. 68 The third party vulnerability is presumably unintentional and Amazon will probably fix it. However, we do not expect Amazon to change the design that <a href=" /proprietary/proprietary-surveillance.html#M201901100 ">allows Amazon to watch</a>. 69 The HP <a href=" https://boingboing.net/2019/02/08/inkjet-dystopias.html "> &ldquo;ink subscription&rdquo; cartridges have DRM that constantly communicates with HP servers</a> to make sure the user is still paying for the subscription, and hasn't printed more pages than were paid for. 71 Amazon Ring &ldquo;security&rdquo; devices <a href=" https://www.engadget.com/2019-01-10-ring-gave-employees-access-customer-video-feeds.html "> send the video they capture to Amazon servers</a>, which save it long-term. 74 Vizio TVs <a href=" https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019 "> collect &ldquo;whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and this data is sold to third parties. This is in return for &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly lower retail prices. 77 Nearly all &ldquo;home security cameras&rdquo; <a href=" https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds-a8814384448/ "> give the manufacturer an unencrypted copy of everything they see</a>. &ldquo;Home insecurity camera&rdquo; would be a better name! 79 Printer manufacturers are very innovative&mdash;at blocking the use of independent replacement ink cartridges. Their &ldquo;security upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href=" https://www.vice.com/en/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates "> HP and Epson have done this</a>. 80 Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the company's server. They have all the nasty characteristics of such devices: <a href=" https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9 "> surveillance, and danger of sabotage</a> (of a specific user, or of all users at once), as well as the risk of an outage (which is what just happened). 82 Researchers have discovered how to <a href=" https://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co "> hide voice commands in other audio</a>, so that people cannot hear them, but Alexa and Siri can. 85 | A medical insurance company <a | href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next{+/+}"> | offers a gratis electronic toothbrush that snoops on its user by sending | usage data back over the Internet</a>. A medical insurance company <a href=" https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next/ "> offers a gratis electronic toothbrush that snoops on its user by sending usage data back over the Internet</a>. Krankenkasse <a href=" https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next " title="Our Dental Insurance Sent us “Free” Internet-Connected Toothbrushes. And this is What Happened Next, Wolf Street 2018">bietet kostenlose elektronische Zahnbürste an, die durch Senden von Nutzungsdaten über das Internet ausspäht</a>. 86 | Some &ldquo;Smart&rdquo; TVs automatically <a | [-href="https://news.ycombinator.com/item?id=16727319">load-] | {+href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"> | load+} downgrades that install a surveillance app</a>. Some &ldquo;Smart&rdquo; TVs automatically <a href=" https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928 "> load downgrades that install a surveillance app</a>. Einige „Kluge“ TVs <a href=" https://news.ycombinator.com/item?id=16727319 " title="Unter: Guidelines 2018.">laden automatisch Downgrades herunter, die eine Überwachungs-App installieren</a>. 91 | Amazon recently invited consumers to be suckers and <a | [-href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">-] | {+href="https://www.techdirt.com/2017/11/22/vulnerability-found-amazon-key-again-showing-how-dumber-tech-is-often-smarter-option/">+} | allow delivery staff to open their front doors</a>. Wouldn't you know it, | the system has a grave security flaw. Amazon recently invited consumers to be suckers and <a href=" https://www.techdirt.com/2017/11/22/vulnerability-found-amazon-key-again-showing-how-dumber-tech-is-often-smarter-option/ "> allow delivery staff to open their front doors</a>. Wouldn't you know it, the system has a grave security flaw. Amazon […] <a href=" https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo " title="Vulnerability Found In Amazon Key, Again Showing How Dumber Tech Is Often The Smarter Option, unter: https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo Techdirt 2017.">öffnet Paketboten und anderen Dienstleistern die Haustür zum privaten „Smart“-Heim</a>. Würde man es nicht (besser) wissen, hat das System eine gravierende Sicherheitslücke!? 92 | A remote-control sex toy was found to make <a | [-href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio-] | {+href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-surveillance">audio+} | recordings of the conversation between two users</a>. A remote-control sex toy was found to make <a href=" https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-surveillance ">audio recordings of the conversation between two users</a>. Eine App für funkferngesteuerte Vibratoren <a href=" https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei " title="Sex toy company admits to recording users' remote sex sessions, calls it a 'minor bug', unter: https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-surveillance, The Verge 2017.">zeichnet Audioaufnahmen von Partnern auf</a>.<a href="#tn-iot02" id="tn-iot02-ref" class="tnote">[2]</a> 95 | Sony has brought back its robotic pet Aibo, this time <a | [-href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">-] | {+href="https://www.vice.com/en/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">+} | with a universal back door, and tethered to a server that requires a | subscription</a>. Sony has brought back its robotic pet Aibo, this time <a href=" https://www.vice.com/en/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet "> with a universal back door, and tethered to a server that requires a subscription</a>. Sony bringt Roboterhund <b>Aibo</b> zurück: <a href=" https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet "> mit universeller Hintertür und an einen Server angebunden, der ein Abonnement erforderlich macht</a>. 101 <a href=" /proprietary/proprietary-tethers.html ">More about proprietary tethering</a>. <a href=" /proprietary/proprietary-tethers ">Weitere Beispiele proprietärer (Internet-)Anbindungen</a> 103 | A &ldquo;smart&rdquo; intravenous pump designed for hospitals is connected | to the internet. Naturally <a | [-href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">-] | {+href="https://www.techdirt.com/2017/09/22/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack/">+} | its security has been cracked</a>. A &ldquo;smart&rdquo; intravenous pump designed for hospitals is connected to the internet. Naturally <a href=" https://www.techdirt.com/2017/09/22/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack/ "> its security has been cracked</a>. Eine „kluge“ für Krankenhäuser entworfene intravenöse Pumpe ist mit dem Internet verbunden. Selbstredend ist deren <a href=" https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml " title="'Smart' Hospital IV Pump Vulnerable To Remote Hack Attack, unter: https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml 2017.">Sicherheit geknackt</a> worden. 104 | [-Note-]{+<small>(Note+} that this article misuses the term <a | href="/philosophy/words-to-avoid.html#Hacker">&ldquo;hackers&rdquo;</a> | referring to [-crackers.-] {+crackers.)</small>+} <small>(Note that this article misuses the term <a href=" /philosophy/words-to-avoid.html#Hacker ">&ldquo;hackers&rdquo;</a> referring to crackers.)</small> Beachten Sie, dass dieser Artikel den Begriff <em><a href=" /philosophy/words-to-avoid#Hacker ">„Hacker“</a></em> mit Bezug auf <em>Cracker</em> missbraucht. 105 | The bad security in many Internet of Stings devices allows <a | [-href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs-] | {+href="https://www.techdirt.com/2017/08/28/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you/">ISPs+} | to snoop on the people that use them</a>. The bad security in many Internet of Stings devices allows <a href=" https://www.techdirt.com/2017/08/28/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you/ ">ISPs to snoop on the people that use them</a>. Die schlechte Sicherheit vieler Internet-der-Dinge-Geräte ermöglicht <a href=" https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml " title="IOT Devices Provide Comcast A Wonderful New Opportunity To Spy On You. unter: https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml 2017.">Internetdienstanbietern (IDA) diejenigen auszuschnüffeln, die diese benutzen</a>. 107 | [-It-]{+<small>(It+} is unfortunate that the article uses the term <a | [-href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.-] | {+href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;< | /a>.)</small>+} <small>(It is unfortunate that the article uses the term <a href=" /philosophy/words-to-avoid.html#Monetize ">&ldquo;monetize&rdquo;</a>.)</small> Es ist bedauerlich, dass der Artikel den Begriff <a href=" /philosophy/words-to-avoid#Monetize ">„monetarisieren“</a> verwendet. 108 | Sonos <a | href="http{+s+}://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/"> | told all its customers, &ldquo;Agree&rdquo; to snooping or the product | will stop working</a>. <a | [-href="https://consumerist.com/2017/08/23/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/#more-10287321">Another-] | {+href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/"> | Another+} article</a> says they won't forcibly change the software, but | people won't be able to get any upgrades and eventually it will stop | working. Sonos <a href=" https://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/ "> told all its customers, &ldquo;Agree&rdquo; to snooping or the product will stop working</a>. <a href=" https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/ "> Another article</a> says they won't forcibly change the software, but people won't be able to get any upgrades and eventually it will stop working. Sonos <a href=" //www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/ " title="Sonos says users must accept new privacy policy or devices may ”cease to function“, unter: http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/ 2017.">erzählt all seinen Kunden, dem Schnüffeln „zuzustimmen“ oder das Produkt würde aufhören zu funktionieren</a>. <a href=" https://consumerist.com/2017/08/23/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/#more-10287321 " title="Sonos Holds Software Updates Hostage If You Don't Sign New Privacy Agreement, unter: https://consumerist.com/2017/08/23/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/#more-10287321 2017.">Ein weiterer Artikel</a> besagt die Software würde nicht zwingend geändert werden, aber Nutzer nicht in der Lage sein irgendwelche Verbesserungen zu erhalten, und schließlich aufhören zu funktionieren. 110 | Many models of Internet-connected cameras are tremendously insecure. They | have login accounts with hard-coded passwords, which can't be changed, and | <a | [-href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there-] | {+href="https://arstechnica.com/information-technology/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there+} | is no way to delete these accounts either</a>. Many models of Internet-connected cameras are tremendously insecure. They have login accounts with hard-coded passwords, which can't be changed, and <a href=" https://arstechnica.com/information-technology/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/ ">there is no way to delete these accounts either</a>. Viele Modelle internetfähiger Kameras sind enorm unsicher. Sie haben Login-Konten mit hartcodierten Passwörtern, die nicht geändert werden können, und es gibt <a href=" https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/ " title="Internet cameras have hard-coded password that can't be changed, unter: arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/ 2017.">keine Möglichkeit, diese Konten zu löschen</a>. 111 | The proprietary code that runs pacemakers, insulin pumps, and other | medical devices is <a | [-href="http://www.bbc.co.uk/news/technology-40042584">-] | {+href="https://www.bbc.com/news/technology-40042584">+} full of gross | security faults</a>. The proprietary code that runs pacemakers, insulin pumps, and other medical devices is <a href=" https://www.bbc.com/news/technology-40042584 "> full of gross security faults</a>. Proprietäre Code, der Herzschrittmacher, Insulinpumpen und andere medizinische Geräte betreibt, ist <a href=" //www.bbc.co.uk/news/technology-40042584 " title="'Thousands' of known bugs found in pacemaker code, unter: bbc.com/news/technology-40042584 2017.">voller grober Sicherheitsmängel</a>. 112 https://waypoint.vice.com/en_us/article/d7aj9j/thousands-of-second-life-bunnies-are-going-to-starve-to-death-this-saturday | Bird and rabbit pets were implemented for Second Life by a company that | tethered their food to a server. <a | [-href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying">-] | {+href="https://www.rockpapershotgun.com/second-life-ozimals-pet-rabbits-dying">+} | It shut down the server and the pets more or less died</a>. Bird and rabbit pets were implemented for Second Life by a company that tethered their food to a server. <a href=" https://www.rockpapershotgun.com/second-life-ozimals-pet-rabbits-dying "> It shut down the server and the pets more or less died</a>. Haustiere wie Vögel und Kaninchen wurden für Second Life von einer Firma realisiert, die ihr Futter an einen Server banden. <a href=" https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying " title="Many pet rabbits will die in Second Life on Saturday, unter: www.rockpapershotgun.com 2017">Sie schalteten den Server ab und die Haustiere starben daraufhin mehr oder weniger</a>. 113 https://www.spiegel.de/netzwelt/gadgets/bose-soll-mit-bose-connect-hoerverhalten-der-kunden-ausspaehen-a-1144134.html | Users are suing Bose for <a | [-href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">-] | {+href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">+} | distributing a spyware app for its headphones</a>. Specifically, the app | would record the names of the audio files users listen to along with the | headphone's unique serial number. Users are suing Bose for <a href=" https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/ "> distributing a spyware app for its headphones</a>. Specifically, the app would record the names of the audio files users listen to along with the headphone's unique serial number. US-Nutzer verklagt Bose: <a href=" https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/ " title="Bose headphones have been spying on customers, lawsuit claims, unter: washingtonpost.com 2017.">App späht offenbar über Kopfhörer aus</a>, welche Musik gerade läuft, welche Hörbücher und Radiosender der Nutzer sich anhört u. a., und leitet die Informationen an Drittanbieter weiter. 115 | Anova sabotaged users' cooking devices with a downgrade that tethered them | to a remote server. <a | [-href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless-] | {+href="https://web.archive.org/web/20170415145520/https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/">Unless+} | users create an account on Anova's servers, their cookers won't | [-function.</a>-] {+function</a>.+} Anova sabotaged users' cooking devices with a downgrade that tethered them to a remote server. <a href=" https://web.archive.org/web/20170415145520/https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/ ">Unless users create an account on Anova's servers, their cookers won't function</a>. Anova sabotierte Kochgeräte mit einem Downgrade, welches sie mit einen Remote-Server verbunden hat. <a href=" https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062 ">Solange kein Kundenkonto erstellt wurde, funktionierten die Geräte nicht.</a> 116 (dishwasher) -> machine to disinfect medical products and laboratory equipment (in German) Internet of (Crackable) Things: Miele's machine to disinfect medical products and laboratory equipment <has security vulnerability>. Source:: https://www.miele.de/en/m/miele-admits-communication-glitch-4072.htm [en] https://www.miele.de/de/m/miele-raeumt-kommunikationspanne-ein-4072.htm [de] https://www.miele.co.uk/professional/large-capacity-washer-disinfectors-560.htm?mat=10339600&name=PG_8528 | When Miele's Internet of Stings hospital disinfectant dishwasher is <a | [-href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">-] | {+href="https://www.vice.com/en/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">+} | connected to the Internet, its security is crap</a>. When Miele's Internet of Stings hospital disinfectant dishwasher is <a href=" https://www.vice.com/en/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit "> connected to the Internet, its security is crap</a>. Mieles „Internet der [knackbaren] Dinge“-Gerät zur Desinfektion medizinischer Geräte und Laborbedarf <a href=" https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit " title="A Hackable Dishwasher [sic] Is Connecting Hospitals to the Internet of Shit, unter: motherboard.vice.com 2017.">enthält Sicherheitslücke</a>.<a href="#tn-iot01" id="tn-iot01-ref" class="tnote">[1]</a> 124 The CIA exploited existing vulnerabilities in &ldquo;smart&rdquo; TVs and phones to design a malware that <a href=" https://www.independent.co.uk/tech/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html "> spies through their microphones and cameras while making them appear to be turned off</a>. Since the spyware sniffs signals, it bypasses encryption. 125 | &ldquo;CloudPets&rdquo; toys with microphones <a | href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"> | leak childrens' conversations to the manufacturer</a>. Guess what? <a | [-href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">-] | {+href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">+} | Crackers found a way to access the data</a> collected by the | manufacturer's snooping. &ldquo;CloudPets&rdquo; toys with microphones <a href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"> leak childrens' conversations to the manufacturer</a>. Guess what? <a href=" https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings "> Crackers found a way to access the data</a> collected by the manufacturer's snooping. CloudPets-Spielzeuge mit Mikrofonen <a href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults" title="CloudPets stuffed toys leak details of half a million users, unter: theguardian.com 2017.">lassen Plauderei von Kindern an Hersteller durchsickern</a>. Und, man ahnt es: <a href=" https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings " title="Internet of Things Teddy Bear Leaked 2 Million Parent and Kids Message Recordings, unter: motherboard.vice.com 2017.">Cracker fanden einen Weg um auf die Daten zuzugreifen</a>, die durch das Ausschnüffeln des Herstellers gesammelt wurden. 128 | Vizio &ldquo;smart&rdquo; <a | [-href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs-] | {+href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs+} | report everything that is viewed on them, and not just broadcasts and | cable</a>. Even if the image is coming from the user's own computer, the | TV reports what it is. The existence of a way to disable the surveillance, | even if it were not hidden as it was in these TVs, does not legitimize the | surveillance. Vizio &ldquo;smart&rdquo; <a href=" https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen ">TVs report everything that is viewed on them, and not just broadcasts and cable</a>. Even if the image is coming from the user's own computer, the TV reports what it is. The existence of a way to disable the surveillance, even if it were not hidden as it was in these TVs, does not legitimize the surveillance. Vizios „pfiffige“ <a href=" https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen " title="What Vizio was doing behind the TV screen, unter: ftc.gov 2017.">Fernseher erstatten Bericht über <em>alles</em> (nicht nur via Breitband- und Kabel-Dienstanbieter) was angeguckt wird</a>. Selbst wenn das Bild aus dem eigenen Rechner des Nutzers kommt, wird dies berichtet. Die Existenz der Möglichkeit, die Überwachung zu deaktivieren, selbst wenn es nicht verborgen war, wie es bei diesen Fernsehen war, legitimiert dies nicht Überwachung. 129 A cracker would be able to <a href=" https://uploadvr.com/hackable-webcam-oculus-sensor-be-aware/ "> turn the Oculus Rift sensors into spy cameras</a> after breaking into the computer they are connected to. 130 | [-It is unfortunate that-]{+<small>(Unfortunately,+} the article [-uses | the term-] <a | [-href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.-] | {+href="/philosophy/words-to-avoid.html#Hacker">improperly refers to | crackers as &ldquo;hackers&rdquo;</a>.)</small>+} <small>(Unfortunately, the article <a href=" /philosophy/words-to-avoid.html#Hacker ">improperly refers to crackers as &ldquo;hackers&rdquo;</a>.)</small> Es ist bedauerlich, dass der Artikel den Begriff <a href=" /philosophy/words-to-avoid#Monetize ">„monetarisieren“</a> verwendet. 133 | The developer of Ham Radio Deluxe <a | [-href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml">sabotaged-] | {+href="https://www.techdirt.com/2016/12/22/software-company-shows-how-not-to-handle-negative-review/">sabotaged+} | a customer's installation as punishment for posting a negative review</a>. The developer of Ham Radio Deluxe <a href=" https://www.techdirt.com/2016/12/22/software-company-shows-how-not-to-handle-negative-review/ ">sabotaged a customer's installation as punishment for posting a negative review</a>. Die Entwickler von <b>Ham Radio Deluxe</b> <a href=" https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml " title="Software Company Shows How Not To Handle Negative Review, unter: techdirt.com 2016.">sabotierten Kundeninstallation als Strafe für negative Rezension</a>. 135 | The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que can be <a | href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws{+/+}">remotely | controlled with a mobile phone</a>; physical access is not necessary. This | would enable crackers to listen in on a child's conversations, and even | speak into the toys themselves. The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que can be <a href=" https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws/ ">remotely controlled with a mobile phone</a>; physical access is not necessary. This would enable crackers to listen in on a child's conversations, and even speak into the toys themselves. Die „smarten“ Spielzeuge <b>My Friend Cayla</b> und <b>i-Que</b> können <a href=" https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws " title="Connected toys violate European consumer law, unter: forbrukerradet.no 2016.">mit einem Mobiltelefon aus der Ferne kontrolliert werden</a>. Physischer Zugang ist nicht erforderlich. Cracker können das Spielzeug mit dem Handy fernsteuern. Dadurch könnten Cracker alles hören was gesagt wird und sogar durch das Spielzeug selbst sprechen. 139 | Samsung's &ldquo;Smart Home&rdquo; has a big security hole; <a | [-href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">-] | {+href="https://arstechnica.com/information-technology/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">+} | unauthorized people can remotely control it</a>. Samsung's &ldquo;Smart Home&rdquo; has a big security hole; <a href=" https://arstechnica.com/information-technology/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/ "> unauthorized people can remotely control it</a>. Erhebliche Sicherheitslücke in Samsung <em>„Smart Home“</em>: <a href=" //arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/ " title="Dan Goodin, Samsung Smart Home flaws let hackers make keys to front door, unter: Ars Technica, arstechnica.com 2016">Unautorisierte können aus der Ferne Steuerung übernehmen</a>. 142 | Malware {+was+} found on <a | href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"> | security cameras available through Amazon</a>. Malware was found on <a href=" http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html "> security cameras available through Amazon</a>. <a href=" //www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html " title="Jacob Brogan, Malware Found on Security Cameras Available Through Amazon, unter: The Slate, slate.com 2016.">Schadsoftware auf über Amazon<ins>-Marktplatz</ins> erhältliche Überwachungskameras gefunden</a>. 144 | Revolv is [-an IoT-] {+a+} device [-which-] {+that+} managed &ldquo;smart | home&rdquo; operations: switching [-the-] lights, operate motion sensors, | regulating temperature, etc. {+Its proprietary software depends on a | remote server to do these tasks.+} On May 15th, 2016, [-Google said-] | {+Google/Alphabet <a | href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">intentionally | broke+} it [-would shut-] {+by shutting+} down the [-service linked to the | device, making it unusable.-] {+server</a>.+} Revolv is a device that managed &ldquo;smart home&rdquo; operations: switching lights, operate motion sensors, regulating temperature, etc. Its proprietary software depends on a remote server to do these tasks. On May 15th, 2016, Google/Alphabet <a href=" https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be ">intentionally broke it by shutting down the server</a>. <b>Revolv</b> ist ein <i>Internet der Dinge</i> (IdD)-Gerät, das „intelligente Heimautomatisierung“ steuerte: Beleuchtungen, Bewegungssensoren, Temperaturen usw. Am 15. Mai 2016 teilte Google mit, dass es den Dienst, der mit dem Gerät verbunden ist, deaktiviere würde, und damit unbenutzbar macht. 146 Over 70 brands of network-connected surveillance cameras have <a href=" http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html "> security bugs that allow anyone to watch through them</a>. Überwachungskameras mit Verbindung ins Internet von mehr als <a href=" //www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html " title="Remote Code Execution in CCTV-DVR affecting over 70 different vendors, unter: Kerneron Security, kerneronsec.com 2016.">70 Markenartikel haben Sicherheitslücken, die jedermann zugucken lassen</a>. 147 | The <a | href="http{+s+}://michaelweinberg.org/post/137045828005/free-the-cube"> | &ldquo;Cube&rdquo; 3D printer was designed with DRM</a>: it won't accept | third-party printing materials. It is the Keurig of printers. Now it is | being discontinued, which means that eventually authorized materials won't | be available and the printers may become unusable. The <a href=" https://michaelweinberg.org/post/137045828005/free-the-cube "> &ldquo;Cube&rdquo; 3D printer was designed with DRM</a>: it won't accept third-party printing materials. It is the Keurig of printers. Now it is being discontinued, which means that eventually authorized materials won't be available and the printers may become unusable. Der <a href=" https://web.archive.org/web/20160116115255/http://michaelweinberg.org/post/137045828005/free-the-cube " title="Free the Cube, unter: michaelweinberg.org 2016 (Internet Archive).">„Cube“ 3D-Drucker wurde mit DRM entworfen</a>: es werden keine Druckmaterialien von Drittanbietern akzeptiert. Es ist das Keurig (ein US-amerikanischer Kaffeekonzern, A. d. Ü.) unter den Druckern. Nun wird die Produktion eingestellt, sodass autorisierte Materialien letztlich nicht mehr verfügbar und der Drucker unbrauchbar werden könnte. 148 | With a <a | href="http{+s+}://www.fsf.org/resources/hw/endorsement/aleph-objects"> | printer that gets the Respects Your Freedom</a>, this problem would not | even be a remote possibility. With a <a href="https://www.fsf.org/resources/hw/endorsement/aleph-objects"> printer that gets the Respects Your Freedom</a>, this problem would not even be a remote possibility. Mit einem <a href=" https://www.fsf.org/resources/hw/endorsement/respects-your-freedom ">Respects Your Freedom</a> zertifizierten <a href="https://www.fsf.org/resources/hw/endorsement/aleph-objects">3D-Drucker</a> wäre dieses Problem nicht einmal eine entfernte Möglichkeit. 150 | Phil[-l-]ips &ldquo;smart&rdquo; lightbulbs had initially been designed to | interact with other companies' smart light bulbs, but {+<a | href="https://www.techdirt.com/2015/12/14/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update/">+} | later the [-<a | href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml">-] | company updated the firmware to disallow interoperability</a>. Philips &ldquo;smart&rdquo; lightbulbs had initially been designed to interact with other companies' smart light bulbs, but <a href=" https://www.techdirt.com/2015/12/14/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update/ "> later the company updated the firmware to disallow interoperability</a>. „Smarte“ Philips LED-Glühbirnen wurden ursprünglich für die Interaktion mit „smarten“ Glühbirnen anderer Hersteller konzipiert, jedoch später die <a href=" https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml " title="Tim Cushing, Light Bulb DRM: Philips Locks Purchasers Out Of Third-Party Bulbs With Firmware Update, Techdirt 2015.">Firmware aktualisiert, um diese Interoperabilität wieder zu unterbinden</a>. 152 | <a | [-href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">-] | {+href="https://www.computerworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html">+} | Some D-Link routers</a> have a back door for changing settings in a dlink | of an eye. <a href=" https://www.computerworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html "> Some D-Link routers</a> have a back door for changing settings in a dlink of an eye. Einige <a href=" //www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html " title="Backdoor found in D-Link router firmware code, unter: itworld.com 2013.">D-Link Router haben Hintertür</a> zum Ändern von Einstellungen.<a href=" #tn03 " id=" tn03-ref " class="transnote">[3]</a> 153 | <a href="http{+s+}://sekurak.pl/tp-link-httptftp-backdoor/"> The TP-Link | router has a back{+ +}door</a>. <a href=" https://sekurak.pl/tp-link-httptftp-backdoor/ "> The TP-Link router has a back door</a>. <a href=" //sekurak.pl/tp-link-httptftp-backdoor/ " title="TP-Link HTTP/TFTP backdoor, unter: sekurak.pl 2013.">TP-Link-Router hat eine Hintertür</a>. <a href=" //sekurak.pl/more-information-about-tp-link-backdoor/ " title="More information about TP-Link backdoor, unter: sekurak.pl 2013."><small>[mehr]</small></a> 155 | The [-<a href="http://www.bbc.com/news/technology-34922712">Nest-] | {+Nest+} Cam &ldquo;smart&rdquo; camera is [-always-] {+<a | href="https://www.bbc.com/news/technology-34922712">always+} | watching</a>, even when the &ldquo;owner&rdquo; switches it | &ldquo;off.&rdquo; The Nest Cam &ldquo;smart&rdquo; camera is <a href=" https://www.bbc.com/news/technology-34922712 ">always watching</a>, even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo; Die „aufgeweckte“ Kamera <b>Nest Cam</b> (vormals Dropcam) <a href=" //www.bbc.com/news/technology-34922712 " title="Nest Cam smart camera is 'always on' even when 'off', BBC News 2015." >guckt immer zu</a>, selbst wenn der besitzende „Eigentümer“ sie ausgeschaltet hat. 157 | ARRIS cable modem has a <a | href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"> | back{+ +}door in the back{+ +}door</a>. ARRIS cable modem has a <a href=" https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1 "> back door in the back door</a>. Kabelmodems von Arris haben <a href=" https://web.archive.org/web/20160603141911/https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1 " title="Bernardo Rodrigues, ARRIS Cable Modem has a Backdoor in the Backdoor, w00tsec 2015 (Internet Archive).">Hintertür in der Hintertür</a>. 158 | Some web and TV advertisements play inaudible sounds to be picked up by | proprietary malware running on other devices in range so as to determine | that they are nearby. Once your Internet devices are paired with your TV, | advertisers can correlate ads with Web activity, and other <a | href="http{+s+}://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"> | cross-device tracking</a>. Some web and TV advertisements play inaudible sounds to be picked up by proprietary malware running on other devices in range so as to determine that they are nearby. Once your Internet devices are paired with your TV, advertisers can correlate ads with Web activity, and other <a href=" https://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/ "> cross-device tracking</a>. Einige Internet- und TV-Spots spielen von auf in Reichweite befindlichen anderen Geräten laufender proprietärer Schadsoftware aufgreifbare unhörbare Töne ab, um bestimmen zu können, dass sie sich in der Nähe befinden. Sobald Ihre internetfähigen Geräte mit Ihrem Fernsehgerät] verbunden sind, können Werbetreibende Anzeigen mit Netzaktivität und anderen <a href=" //arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/ " title="Dan Goodin, Beware of ads that use inaudible sound to link your phone, TV, tablet, and PC, Ars Technica 2015.">geräteübergreifenden Verfolgen korrelieren</a>. 159 | Vizio goes a step further than other TV manufacturers in spying on their | users: their <a | href="http{+s+}://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"> | &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and link | them your IP address</a> so that advertisers can track you across devices. Vizio goes a step further than other TV manufacturers in spying on their users: their <a href=" https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you "> &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and link them your IP address</a> so that advertisers can track you across devices. Vizio geht in puncto Spionage seiner Benutzer sogar noch einen Schritt weiter als andere Fernsehhersteller: ihre <a href=" //www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you ">„smart“ TVs analysieren detailliert Sehgewohnheiten und verknüpfen diese mit der IP-Adresse</a>, damit Werbetreibende einen über die Geräte verfolgen können. 161 | Tivo's alliance with Viacom adds 2.3 million households to the 600 | millions social media profiles the company already monitors. Tivo | customers are unaware they're being watched by advertisers. By combining | TV viewing information with online social media participation, Tivo can | now <a | href="http{+s+}://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"> | correlate TV advertisement with online purchases</a>, exposing all users | to new combined surveillance by default. Tivo's alliance with Viacom adds 2.3 million households to the 600 millions social media profiles the company already monitors. Tivo customers are unaware they're being watched by advertisers. By combining TV viewing information with online social media participation, Tivo can now <a href=" https://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102 "> correlate TV advertisement with online purchases</a>, exposing all users to new combined surveillance by default. Das Bündnis des <ins>US-Herstellers von digitalen Videorekordern</ins> Tivo mit dem US-Medienkonzern Viacom führt 2,3 Millionen Haushalte zu den 600 Millionen sozialen Medien-Profilen, die das Unternehmen bereits überwacht, hinzu. TiVo-Kunden sind sich dessen nicht bewusst, dass sie von Werbetreibenden beobachtet werden. Durch Verbinden von Informationen über das Fernsehverhalten mit Online-Social-Media-Beteiligung kann Tivo jetzt <a href=" //www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102 " title="Lisa Richwine, Viacom, TiVo partner to give TV advertisers more data, Thomson Reuters 2015.">TV-Werbung mit Online-Käufen korrelieren</a> und standardmäßig alle Nutzer neuer gemeinsamer Überwachung aussetzen. 162 | [-<a | href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">-]FitBit | fitness trackers have a {+<a | href="https://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">+} | Bluetooth vulnerability</a> that allows attackers to send malware to the | devices, which can subsequently spread to computers and other FitBit | trackers that interact with them. FitBit fitness trackers have a <a href=" https://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/ "> Bluetooth vulnerability</a> that allows attackers to send malware to the devices, which can subsequently spread to computers and other FitBit trackers that interact with them. FitBit Fitness-Überwacher haben <a href=" //www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/ " title="Hack Delivers First Ever Malware to Fitness Trackers, unter: tripwire.com 2015.">Bluetooth-Sicherheitslücke</a>, die Angreifern erlaubt Schadsoftware auf Geräte zu übertragen, die sich anschließend mit damit interagierenden Rechnern und anderen FitBit-Überwachungsgeräten austauscht. 163 | &ldquo;Self-encrypting&rdquo; disk drives do the encryption with | proprietary firmware so you can't trust it. Western Digital's [-<a | href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">-] | &ldquo;My Passport&rdquo; drives {+<a | href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">+} | have a back door</a>. &ldquo;Self-encrypting&rdquo; disk drives do the encryption with proprietary firmware so you can't trust it. Western Digital's &ldquo;My Passport&rdquo; drives <a href=" https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption "> have a back door</a>. „Selbstverschlüsselnde“ Plattenlaufwerke führen die Verschlüsselung mittels proprietärer Firmware durch, der man daher nicht uneingeschränkt vertrauen kann. Western Digitals „My Passport“-Festplatten <a href=" https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption " title="Some Popular 'Self Encrypting' Hard Drives Have Really Bad Encryption, unter: motherboard.vice.com 2015.">haben eine Hintertür</a>. 164 | Vizio &ldquo;smart&rdquo; TVs recognize and <a | [-href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track-] | {+href="https://www.engadget.com/2015-07-24-vizio-ipo-inscape-acr.html">track+} | what people are watching</a>, even if it isn't a TV channel. Vizio &ldquo;smart&rdquo; TVs recognize and <a href=" https://www.engadget.com/2015-07-24-vizio-ipo-inscape-acr.html ">track what people are watching</a>, even if it isn't a TV channel. Vizio<ins>, ein amerikanisches, nicht börsennotiertes Unternehmen im Bereich Unterhaltungselektronik,</ins> „smarte“ Fernsehgeräte identifizieren und <a href=" //www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/ " title="Richard Lawler, Vizio IPO plan shows how its TVs track what you're watching, unter: engadget.com 2015.">zeichnen alles auf was man anguckt</a>, selbst wenn es sich nicht um ein Fernsehprogramm handelt. 165 | Due to bad security in a drug pump, crackers could use it to <a | href="http{+s+}://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"> | kill patients</a>. Due to bad security in a drug pump, crackers could use it to <a href=" https://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/ "> kill patients</a>. Aufgrund der schlechten Sicherheit in einer Medikamentenpumpe könnten Cracker <a href=" //www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/ " title="Hacker Can Send Fatal Dose to Hospital Drug Pumps, unter: wired.com 2015.">Patienten töten</a>. 166 | [-<a | href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">-]Verizon | cable TV {+<a | href="https://arstechnica.com/information-technology/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">+} | snoops on what programs people [-watch</a>,-] {+watch,+} and even what | they wanted to [-record.-] {+record</a>.+} Verizon cable TV <a href=" https://arstechnica.com/information-technology/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/ "> snoops on what programs people watch, and even what they wanted to record</a>. Das Glasfaser-Web-TV-Angebot von <a href=" //arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/ " title="Verizon FiOS reps know what TV channels you watch, unter: arstechnica.com 2015.">Verizon FiOS TV schnüffelt aus, welche Programme man guckt, sogar was man plant aufzunehmen</a>. 169 | Vizio <a | href="http{+s+}://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"> | used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what users | watch</a>. The TVs did not do that when first sold. Vizio <a href=" https://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html "> used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what users watch</a>. The TVs did not do that when first sold. Vizio<ins>, ein nicht börsennotiertes US-Unternehmen im Bereich Unterhaltungselektronik,</ins> <a href=" //boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html " title="Telescreen watch: Vizio adds spyware to its TVs, unter: boingboing.net 2015.">verwendete eine Firmware-„Verbesserung“, um ihre Fernsehgeräte u. a. zu veranlassen, herumzuschnüffeln, was Zuschauer sich angucken</a>. Die Fernseher taten dies zuvor nicht. 170 | [-<a | href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">-]Barbie | [-is-] {+<a | href="https://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is+} | going to [-spy</a>-] {+spy+} on children and [-adults.-] {+adults</a>.+} Barbie <a href=" https://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673 ">is going to spy on children and adults</a>. Barbie <a href=" //www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673 " title="Wi-fi “spy” Barbie records children's conversations - and could be a target for hackers, say experts, unter: mirror.co.uk 2015.">wird Kinder und Erwachsene ausspionieren</a>. 171 | The Samsung &ldquo;[-s-]{+S+}mart&rdquo; TV <a | href="http{+s+}://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"> | transmits users' voice on the internet to another company, Nuance</a>. | Nuance can save it and would then have to give it to the US or some other | government. The Samsung &ldquo;Smart&rdquo; TV <a href=" https://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm "> transmits users' voice on the internet to another company, Nuance</a>. Nuance can save it and would then have to give it to the US or some other government. Samsung und LG „Smart“-TV-Geräte <a href=" //www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm " title="Samsung and LG smart TVs share your voice data with a third party, unter: consumerreports.org 2015.">übertragen die Stimme der Benutzer über das Internet an eine dritte Firma, Nuance</a>. Nuance kann es sichern und würde es dann der US-Regierung oder einer anderen aushändigen müssen. 174 | The Amazon &ldquo;[-s-]{+S+}mart&rdquo; TV is <a | href="http{+s+}://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"> | snooping all the time</a>. The Amazon &ldquo;Smart&rdquo; TV is <a href=" https://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance "> snooping all the time</a>. Amazon „Smart“-TV-Geräte <a href=" //www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance " title="Amazon's Echo and the smart TVs that are listening to and watching everything you do, unter: theguardian.com 2014.">schnüffeln die ganze Zeit mit</a>. 175 | More or less all &ldquo;smart&rdquo; TVs <a | [-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy-] | {+href="https://myce.wiki/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy+} | on their users</a>. More or less all &ldquo;smart&rdquo; TVs <a href=" https://myce.wiki/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/ ">spy on their users</a>. Mehr oder weniger alle <a href=" //www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/ " title="Willem Aldershoff, Researchers: All Smart TVs spy on you, unter: myce.com 2014.">„Smart“-TVs spionieren</a> Nutzer aus. 179 | Nest thermometers send <a | [-href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a-] | {+href="https://bgr.com/general/google-nest-jailbreak-hack/">a+} lot of | data about the user</a>. Nest thermometers send <a href=" https://bgr.com/general/google-nest-jailbreak-hack/ ">a lot of data about the user</a>. Nest-Thermostate senden<a href=" https://bgr.com/2014/07/17/google-nest-jailbreak-hack/ " title="Hackers target Nest as a warning to Google about data-sharing, unter: bgr.com 2014."> eine Menge Daten über den Nutzer</a>. 180 | LG <a | [-href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">-] | {+href="https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/">+} | disabled network features</a> on <em>previously purchased</em> | &ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG begin to | snoop on them and distribute their personal data. LG <a href=" https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/ "> disabled network features</a> on <em>previously purchased</em> &ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG begin to snoop on them and distribute their personal data. LG <a href=" //www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml " title="LG Will Take The 'Smart' Out Of Your Smart TV If You Don't Agree To Share Your Viewing And Search Data With Third Parties, unter: techdirt.com 2014.">deaktiviert Netzwerkfunktionen</a> auf <em>zuvor gekauften</em> „Smart“-Fernsehgeräten, sofern Käufer nicht zustimmen LG herumschnüffeln und persönlichen Daten verteilen zu lassen. 181 | [-<a | href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">-]Spyware | in LG &ldquo;smart&rdquo; [-TVs</a>-] {+TVs <a | href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">+} | reports what the user watches, and the switch to turn this off has no | [-effect.-] {+effect</a>.+} (The fact that the transmission reports a 404 | error really means nothing; the server could save that data anyway.) Spyware in LG &ldquo;smart&rdquo; TVs <a href=" http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html "> reports what the user watches, and the switch to turn this off has no effect</a>. (The fact that the transmission reports a 404 error really means nothing; the server could save that data anyway.) <a href=" //doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html " title="LG Smart TVs logging USB filenames and viewing info to LG servers, unter: doctorbeet.blogspot.co.uk 2013.">LG „Smart“-TV</a>-Geräte erfassen und senden das Sehverhalten des Nutzers auch gegen dessen Willen <ins>unverschlüsselt an LG-Server</ins> (die Tatsache, dass der Server auf den Empfang mit einer HTTP-Fehlermeldung <em>‚404 Nicht gefunden‘</em> reagiert, bedeutet eigentlich nichts: der Server konnte die Daten trotzdem erfassen).<a href=" #tn06 " id=" tn06-ref " class="transnote">[6]</a> 182 | Even worse, it <a | [-href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">-] | {+href="https://rrrrambles.wordpress.com/2013/11/21/lg-tv-logging-filenames-from-network-folders/">+} | snoops on other devices on the user's local network</a>. Even worse, it <a href=" https://rrrrambles.wordpress.com/2013/11/21/lg-tv-logging-filenames-from-network-folders/ "> snoops on other devices on the user's local network</a>. Schlimmer noch ist, <a href=" //rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/ " title="LG TV logging filenames from network folders, unter: rambles.renney.me 2013.">LG schnüffelt andere Geräte im lokalen Netzwerk des Nutzers aus</a>. 184 | Meanwhile, LG TVs <a | [-href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">-] | {+href="https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/">+} | do lots of spying anyway</a>. Meanwhile, LG TVs <a href=" https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/ "> do lots of spying anyway</a>. In der Zwischenzeit <a href=" //www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml " title="LG Will Take The 'Smart' Out Of Your Smart TV If You Don't Agree To Share Your Viewing And Search Data With Third Parties, unter: techdirt.com 2014.">spionieren Fernsehgeräte von LG trotzdem aus</a>. 185 | Lots of <a | href="http{+s+}://www.wired.com/2014/04/hospital-equipment-vulnerable/"> | hospital equipment has lousy security</a>, and it can be fatal. Lots of <a href=" https://www.wired.com/2014/04/hospital-equipment-vulnerable/ "> hospital equipment has lousy security</a>, and it can be fatal. Eine Menge <a href=" //www.wired.com/2014/04/hospital-equipment-vulnerable/ " title="It's Insanely Easy to Hack Hospital Equipment, unter: wired.com 2014.">Geräte in Krankenhäusern haben eine lausige Sicherheit</a>, und das kann tödlich sein.<a href=" #tn03 " class="transnote">[3]</a> 186 | <a href="http{+s+}://www.bunniestudios.com/blog/?p=3554"> Some flash | memories have modifiable software</a>, which makes them vulnerable to | viruses. <a href=" https://www.bunniestudios.com/blog/?p=3554 "> Some flash memories have modifiable software</a>, which makes them vulnerable to viruses. <a href=" //www.bunniestudios.com/blog/?p=3554 " title="On Hacking MicroSD Cards, unter: bunniestudios.com 2013.">Einige Flash-Speicher enthalten modifizierbare Software</a>, die sie anfällig für Viren macht. 188 | <a | [-href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">-] | {+href="https://arstechnica.com/information-technology/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">+} | Point-of-sale terminals running Windows were taken over</a> and turned | into a botnet for the purpose of collecting customers' credit card numbers. <a href=" https://arstechnica.com/information-technology/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/ "> Point-of-sale terminals running Windows were taken over</a> and turned into a botnet for the purpose of collecting customers' credit card numbers. <ins>Geräte bzw. Terminals zum bargeldlosen Zahlen an elektronischen Kassen (eigentlich <i>Verkaufsort</i>), sogenannte </ins><a href=" //arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/ " title="Credit card fraud comes of age with advances in point-of-sale botnets, unter: arstechnica.com 2013."><i>Point-of-Sale</i> (POS)-Terminals wurden&#160;&#8209;&#160;unter Windows&#160;&#8209;&#160;übernommen und zu einem Botnetz</a> gemacht, um Kreditkartendaten von Kunden zu sammeln. 189 | [-<a | href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">-]Spyware | in LG &ldquo;smart&rdquo; [-TVs</a>-] {+TVs <a | href="https://doctorbeet.blogspot.com/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">+} | reports what the user watches, and the switch to turn this off has no | [-effect.-] {+effect</a>.+} (The fact that the transmission reports a 404 | error really means nothing; the server could save that data anyway.) Spyware in LG &ldquo;smart&rdquo; TVs <a href=" https://doctorbeet.blogspot.com/2013/11/lg-smart-tvs-logging-usb-filenames-and.html "> reports what the user watches, and the switch to turn this off has no effect</a>. (The fact that the transmission reports a 404 error really means nothing; the server could save that data anyway.) <a href=" //doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html " title="LG Smart TVs logging USB filenames and viewing info to LG servers, unter: doctorbeet.blogspot.co.uk 2013.">LG „Smart“-TV</a>-Geräte erfassen und senden das Sehverhalten des Nutzers auch gegen dessen Willen <ins>unverschlüsselt an LG-Server</ins> (die Tatsache, dass der Server auf den Empfang mit einer HTTP-Fehlermeldung <em>‚404 Nicht gefunden‘</em> reagiert, bedeutet eigentlich nichts: der Server konnte die Daten trotzdem erfassen).<a href=" #tn06 " id=" tn06-ref " class="transnote">[6]</a> 193 | The [-<a | href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">-] | FTC punished a company for making webcams with {+<a | href="https://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">+} | bad [-security</a>-] {+security+} so that it was easy for anyone to watch | [-them.-] {+through them</a>.+} The FTC punished a company for making webcams with <a href=" https://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html "> bad security so that it was easy for anyone to watch through them</a>. Die US-Bundeshandelskommission <a href=" //www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html " title="Eeward Wyatt, F.T.C. Says Webcam's Flaw Put Users' Lives on Display, unter: The New York Times, nytimes.com 2013.">FTC straft Unternehmen wegen Herstellung von Webcams mit schlechten Sicherheitsstandards ab</a>, so dass es für jedermann leicht war zuzugucken.<a href=" #tn02 " id=" tn02-ref " class="transnote">[2]</a> 194 | <a href="http://spritesmods.com/?art=hddhack&amp;page=6"> Replaceable | nonfree software in disk drives can be written by a nonfree | [-program.</a>-] {+program</a>.+} This makes any system vulnerable to | persistent attacks that normal forensics won't detect. <a href=" http://spritesmods.com/?art=hddhack&amp;page=6 "> Replaceable nonfree software in disk drives can be written by a nonfree program</a>. This makes any system vulnerable to persistent attacks that normal forensics won't detect. <a href=" //spritesmods.com/?art=hddhack&amp;page=6 " title="Hard disk hacking, unter: spritesmods.com 2013.">Austauschbare unfreie Software in Festplatten kann von einem unfreien Programm geschrieben werden</a>. Dies macht ein System anfällig für dauerhafte Angriffe, die übliche Forensik nicht erkennt. 195 | It is possible to <a | [-href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">-] | {+href="https://siliconangle.com/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">+} | kill people by taking control of medical implants by radio</a>. More | information in <a | [-href="http://www.bbc.co.uk/news/technology-17631838">BBC-] | {+href="https://www.bbc.com/news/technology-17631838">BBC+} News</a> and | <a | [-href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">-] | {+href="https://ioactive.com/broken-hearts-how-plausible-was-the-homeland-pacemaker-hack/">+} | IOActive Labs Research blog</a>. It is possible to <a href=" https://siliconangle.com/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/ "> kill people by taking control of medical implants by radio</a>. More information in <a href=" https://www.bbc.com/news/technology-17631838 ">BBC News</a> and <a href=" https://ioactive.com/broken-hearts-how-plausible-was-the-homeland-pacemaker-hack/ "> IOActive Labs Research blog</a>. Durch <a href=" //siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/ " title="Famed Hacker Barnaby Jack Dies Days Before Scheduled Black Hat Appearance, unter: siliconangle.com 2013.">Übernahme der Steuerung von medizinischen Implantate per Funk</a> zu töten ist möglich. Mehr Informationen unter <a href=" //www.bbc.co.uk/news/technology-17631838 " xml:lang="en" lang="en" title="Medical device hack attacks may kill, researchers warn">BBC News</a> und im <a href=" //blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html " xml:lang="en" lang="en" title="“Broken Hearts”: How plausible was the Homeland pacemaker hack?, unter: blog.ioactive.com 2013.">IOActive Labs Research</a>-Blog. 196 | <a | href="http{+s+}://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/"> | &ldquo;Smart homes&rdquo;</a> turn out to be stupidly vulnerable to | intrusion. <a href=" https://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/ "> &ldquo;Smart homes&rdquo;</a> turn out to be stupidly vulnerable to intrusion. <a href=" //www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/ " title="When 'Smart Homes' Get Hacked: I Haunted A Complete Stranger's House Via The Internet, unter: forbes.com 2013."><em>„Intelligentes Wohnen“</em> [engl.]</a> entpuppt sich dummerweise anfällig für Angriffe. 199 | [-<a | href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F">-]Samsung | &ldquo;Smart&rdquo; TVs have {+<a | href="https://wiki.samygo.tv/index.php?title=SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F">+} | turned Linux into the base for a tyrant system</a> so as to impose DRM. | What enables Samsung to do this is that Linux is released under GNU GPL | version 2, <a href="/licenses/rms-why-gplv3.html">not version 3</a>, | together with a weak interpretation of GPL version 2. Samsung &ldquo;Smart&rdquo; TVs have <a href=" https://wiki.samygo.tv/index.php?title=SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F "> turned Linux into the base for a tyrant system</a> so as to impose DRM. What enables Samsung to do this is that Linux is released under GNU GPL version 2, <a href=" /licenses/rms-why-gplv3.html ">not version 3</a>, together with a weak interpretation of GPL version 2. <a href=" https://web.archive.org/web/20161104165038/http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F " title="What are Restricted Firmwares?, in: SamyGO for DUMMIES, unter: wiki.SamyGO.tv 2012 (Internet Archive).">Samsung „Smart“-Fernseher haben <b>Linux</b> als Basis für ein Tyrannen-System verwandelt</a> um DRM durchzusetzen. Was dies Samsung ermöglichte, ist, dass Linux unter <b>GNU GPL</b> in der Version 2&#160;&#8209;&#160;<a href=" /licenses/rms-why-gplv3 ">nicht Version 3</a>&#160;&#8209;&#160;zusammen mit einer schwachen Interpretation von Version 2 freigegeben ist. 200 <a href=" http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html "> Crackers found a way to break security on a &ldquo;smart&rdquo; TV</a> and use its camera to watch the people who are watching TV. <a href=" //www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html " title="Is your TV watching you? Security alert over Samsung's Smart TV as hackers claim they can access its hard drive and seize control of built-in cameras, unter: dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html 2017.">Cracker fanden einen Weg die Sicherheit eines „intelligenten“ TVs zu knacken</a>, und nutzen dessen Kamera um Zuschauer zu beobachten. 201 | Some LG TVs <a | [-href="http://openlgtv.org.ru/wiki/index.php/Achievements">are-] | {+href="https://web.archive.org/web/20190917164647/http://openlgtv.org.ru/wiki/index.php/Achievements"> | are+} tyrants</a>. Some LG TVs <a href=" https://web.archive.org/web/20190917164647/http://openlgtv.org.ru/wiki/index.php/Achievements "> are tyrants</a>. Einige <a href=" http://openlgtv.org.ru/wiki/index.php/Achievements " title="Achievements: Tested Matrix, unter: OpenLGTV.org 2012.">LG-Fernsehgeräte sind Tyrannen</a>. 202 Eine Sicherheitslücke stellt einen Fehler in einer Software dar, durch den ein Programm mit Schadwirkung (Malware) oder ein Angreifer in ein Rechnersystem eindringen kann. (IoD) Internet of Dongs // Internet der Dödel TRANSLATORS: Use space (SPC) as msgstr if you don't have notes. *GNUN-SLOT: TRANSLATOR'S NOTES* <!--p><strong>Anmerkungen des Übersetzungsteams:</strong></p> <ol id="transnote"> <li><ol> <li><p><strong>Weiterführende Referenzen:</strong></p> <ol style="list-style-type:none"> <li id="tn-iot01"><a href="#tn-iot01-ref">[1]</a> Heise Autos, <cite><a href=" //www.silicon.de/41643593/iot-bug-bei-miele-zeigt-fallstricke-der-digitalisierung-auf/ ">IoT-Bug bei Miele zeigt Fallstricke der Digitalisierung auf</a></cite>, unter: silicon.de 2017. (abgerufen 2017-04-12) </li> </ol></li> <li id="tn-iot02"><a href="#tn-iot02-ref">[2]</a> Technology Review Magazin, <cite><a href=" https://heise.de/-3910105 ">Wenn das Sexspielzeug spioniert</a></cite>, unter: https://heise.de/-3910105 2017. (abgerufen 2017-12-05) </li> </ol></li></ol></li> </ol--> 204 || No change detected. The change might only be in amounts of spaces. Please see the <a href=" /server/standards/README.translations.html ">Translations README</a> for information on coordinating and contributing translations of this article. Bei der Übersetzung dieses Werkes wurde mit größter Sorgfalt vorgegangen. Trotzdem können Fehler nicht völlig ausgeschlossen werden. Sollten Sie Fehler bemerken oder Vorschläge, Kommentare oder Fragen zu diesem Dokument haben, wenden Sie sich bitte an unser Übersetzungsteam <a href=" mailto:web-translators@gnu.org?cc=www-de-translators@gnu.org ">&lt;web-translators@gnu.org&gt;</a>.</p> <p>Weitere Informationen über die Koordinierung und Einsendung von Übersetzungen unserer Internetpräsenz finden Sie in der <a href=" /server/standards/README.translations ">LIESMICH für Übersetzungen</a>. 206 This page is licensed under a <a rel="license" href=" http://creativecommons.org/licenses/by/4.0/ ">Creative Commons Attribution 4.0 International License</a>. Dieses Werk ist lizenziert unter einer <a rel="license" href=" //creativecommons.org/licenses/by/4.0/deed.de ">Creative Commons Namensnennung 4.0 International</a>-Lizenz. ...
http://www.gnu.org/savannah-checkouts/gnu/gnun/reports/de/proprietary/malware-appliances.html - [detail] - [similar]
PREV NEXT
Powered by Hyper Estraier 1.4.13, with 213369 documents and 1081681 words.