advanced help
phrase:
attribute:
attribute:
attribute:
order:
per page:
clip:
action:
Results of 1 - 1 of about 725 for Android 12 (1.898 sec.)
android (2801), 12 (27798)
proprietary-surveillance.it.po
#score: 5143
@digest: fac93f447f1fbcab4b3c3b4912d4ebc1
@id: 412045
@mdate: 2024-04-13T11:10:15Z
@size: 256558
@type: text/html
content-type: text/html; charset=utf-8
#keywords: theguardian (48667), arstechnica (41391), theregister (35814), spyware (30400), applicazioni (29129), ldquo (28314), https (27138), rdquo (26094), href (24526), privacy (20675), smart (18391), surveillance (18369), facebook (18200), apps (16563), utenti (16306), snooping (15277), apple (15205), samsung (13955), spying (13704), windows (13620), android (13473), phones (13090), snoop (13089), technology (12823), iphone (12223), microsoft (11585), personal (11552), mobile (11358), com (11291), tracking (10618), malware (9898), phone (9015)
proprietary-surveillance.it.po Mismatched links: 473. Mismatched ids: 1. # text 15 A common malicious functionality is to snoop on the user. This page records <strong>clearly established cases of proprietary software that spies on or tracks users</strong>. Manufacturers even refuse to <a href=" https://techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/ ">say whether they snoop on users for the state</a>. 16 All appliances and applications that are tethered to a specific server are snoopers by nature. We do not list them here because they have their own page: <a href=" /proprietary/proprietary-tethers.html#about-page ">Proprietary Tethers</a>. 17 There is a similar site named <a href=" https://spyware.neocities.org ">Spyware Watchdog</a> that classifies spyware programs, so that users can be more aware that they are installing spyware. 30 | <a [-href="#SpywareInMobileApps">Spyware-] | {+href="#SpywareInApplications">Spyware+} in [-Mobile-] Applications</a> <a href=" #SpywareInApplications ">Spyware in Applications</a> <a href=" #SpywareInMobileApps ">Spyware in applicazioni mobili</a> 31 | <a [-href="#SpywareInMobileApps">Spyware in Mobile Applications</a>-] | {+href="#SpywareInDesktopApps">Desktop Apps</a>+} <a href=" #SpywareInDesktopApps ">Desktop Apps</a> <a href=" #SpywareInMobileApps ">Spyware in applicazioni mobili</a> 35 | <a [-href="#SpywareInChrome">Spyware-] | {+href="#SpywareInEquipment">Spyware+} in [-Chrome</a>-] {+Connected | Equipment</a>+} <a href=" #SpywareInEquipment ">Spyware in Connected Equipment</a> <a href=" #SpywareInChrome ">Spyware in Chrome</a> 38 | <a [-href="#SpywareInToys">Spyware in Toys</a>-] | {+href="#SpywareInToys">Toys</a>+} <a href=" #SpywareInToys ">Toys</a> <a href=" #SpywareInTVSets ">Spyware nei giocattoli</a> 39 | <a [-href="#SpywareInChrome">Spyware in Chrome</a>-] | {+href="#SpywareInDrones">Drones</a>+} <a href=" #SpywareInDrones ">Drones</a> <a href=" #SpywareInChrome ">Spyware in Chrome</a> 41 | <a [-href="#SpywareOnMobiles">Spyware on Mobiles</a>-] | {+href="#SpywareOnWearables">Wearables</a>+} <a href=" #SpywareOnWearables ">Wearables</a> <a href=" #SpywareOnMobiles ">Spyware nei dispositivi mobili</a> 42 | <a [-href="#SpywareOnTheWeb">Spyware on the Web</a>-] | {+href="#SpywareOnSmartWatches">&ldquo;Smart&rdquo; Watches</a>+} <a href=" #SpywareOnSmartWatches ">&ldquo;Smart&rdquo; Watches</a> <a href=" #SpywareOnTheWeb ">Spyware sul web</a> 47 | <a [-href="#SpywareInFlash">Spyware in Flash</a>-] | {+href="#SpywareInJavaScript">JavaScript</a>+} <a href=" #SpywareInJavaScript ">JavaScript</a> <a href=" #SpywareInFlash ">Spyware in Flash</a> 49 | <a [-href="#SpywareInToys">Spyware-] | {+href="#SpywareInNetworks">Spyware+} in [-Toys</a>-] {+Networks</a>+} <a href=" #SpywareInNetworks ">Spyware in Networks</a> <a href=" #SpywareInTVSets ">Spyware nei giocattoli</a> 51 | For decades, the Free Software movement has been denouncing the abusive | surveillance machine of <a | href="/proprietary/proprietary.html">proprietary software</a> companies | such as <a href="/proprietary/malware-microsoft.html">Microsoft</a> and | <a href="/proprietary/malware-apple.html">Apple</a>. In the recent | years, this tendency to watch people has spread across industries, not | only in the software business, but also in the hardware. Moreover, it | also spread dramatically away from the keyboard, in the mobile computing | industry, in the office, at [-home,-] {+<a | href="https://www.theguardian.com/world/2023/sep/07/uk-owners-of-smart-home-devices-being-asked-for-swathes-of-personal-data"> | home</a>,+} in transportation systems, and in the classroom. For decades, the Free Software movement has been denouncing the abusive surveillance machine of <a href=" /proprietary/proprietary.html ">proprietary software</a> companies such as <a href="/proprietary/malware-microsoft.html">Microsoft</a> and <a href="/proprietary/malware-apple.html">Apple</a>. In the recent years, this tendency to watch people has spread across industries, not only in the software business, but also in the hardware. Moreover, it also spread dramatically away from the keyboard, in the mobile computing industry, in the office, at <a href=" https://www.theguardian.com/world/2023/sep/07/uk-owners-of-smart-home-devices-being-asked-for-swathes-of-personal-data "> home</a>, in transportation systems, and in the classroom. Da decenni il movimento del software libero denuncia il sistema di sorveglianza abusiva creato da società sviluppatrici di software proprietario come <a href="/proprietary/malware-microsoft.html">Microsoft</a> ed <a href="/proprietary/malware-apple.html">Apple</a>. Negli ultimi anni, questa tendenza ad osservare la gente si è diffusa in varie industrie, non solo nel software, ma anche nell'hardware. Come se non bastasse, si è diffusa ben oltre le tastiere, nell'industria dei dispositivi mobili, negli uffici, nelle case, nei sistemi di trasporti, nelle scuole. 60 Entries in each category are in reverse chronological order, based on the dates of publication of linked articles. The latest additions are listed on the <a href=" /proprietary/proprietary.html#latest ">main page</a> of the Malware section. 65 As soon as it boots, and without asking any permission, <a href=" https://www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html ">Windows 11 starts to send data to online servers</a>. The user's personal details, location or hardware information are reported to Microsoft and other companies to be used as telemetry data. All of this is done is the background, and users have no easy way to prevent it&mdash;unless they switch the computer offline. 66 Microsoft <a href=" https://betanews.com/2023/01/19/microsoft-is-using-the-kb5021751-update-to-see-if-you-have-an-unsupported-version-of-office-installed/ "> released an &ldquo;update&rdquo; that installs a surveillance program</a> on users' computers to gather data on some installed programs for Microsoft's benefit. The update is rolling out automatically, and the program runs &ldquo;one time silently.&rdquo; 67 Windows 11 Home and Pro now <a href=" https://www.microsoft.com/windows/windows-11-specifications "> require internet connection and a Microsoft account</a> to complete the installation. Windows 11 Pro had an option to create a local account instead, but the option has been removed. This account can (and most certainly will) be used for surveillance and privacy violations. Thankfully, a free software tool named <a href=" https://gothub.frontendfriendly.xyz/pbatard/rufus/blob/master/README.md ">Rufus</a> can bypass those requirements, or help users install a <a href=" /distros/distros.html "> free operating system</a> instead. 68 Microsoft is <a href=" https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/ ">tricking users to create an account on their network</a> to be able to install and use the Windows operating system, which is malware. The account can be used for surveillance and/or violating people's rights in many ways, such as turning their purchased software to a subscription product. 69 HP's proprietary operating system <a href=" https://www.bbc.com/news/technology-42309371 ">includes a proprietary keyboard driver with a key logger in it</a>. 71 | Furthermore, for users who installed the fourth stable build of Windows | 10, called the &ldquo;Creators Update,&rdquo; Windows maximized the | surveillance <a | href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law{+/+}"> | by force setting the telemetry mode to &ldquo;Full&rdquo;</a>. Furthermore, for users who installed the fourth stable build of Windows 10, called the &ldquo;Creators Update,&rdquo; Windows maximized the surveillance <a href=" https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law/ "> by force setting the telemetry mode to &ldquo;Full&rdquo;</a>. Inoltre, gli utenti che hanno installato la quarta versione di Windows 10, nota come &ldquo;Creators Update&rdquo;, sono esposti a una sorveglianza estesa a causa dell'impostazione forzata <a href=" https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law "> della Telemetria in modalità "Completa"</a>. 72 | The <a | [-href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level">-] | {+href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level">+} | &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers | to access, among other things, registry keys <a | [-href="https://technet.microsoft.com/en-us/library/cc939702.aspx">which-] | {+href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)"> | which+} can contain sensitive information like administrator's login | password</a>. The <a href=" https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level "> &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, among other things, registry keys <a href=" https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10) "> which can contain sensitive information like administrator's login password</a>. La <a href=" https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level "> modalità &ldquo;Completa&rdquo; della telemetria</a> permette allo staff di Microsoft di accedere, tra l'altro, a chiavi di registro che <a href=" https://technet.microsoft.com/en-us/library/cc939702.aspx ">possono contenere password amministrative e altre informazioni sensibili</a>. 74 | By default, Windows 10 <a | [-href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties">sends-] | {+href="https://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties/">sends+} | debugging information to Microsoft, including core dumps</a>. Microsoft | now distributes them to another company. By default, Windows 10 <a href=" https://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties/ ">sends debugging information to Microsoft, including core dumps</a>. Microsoft now distributes them to another company. Per impostazione predefinita, Windows 10 <a href=" http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties ">invia informazioni di debug a Microsoft</a>, incluse relazioni dettagliate sulle attività di sistema al momento dell'errore. Microsoft a sua volta le invia ad altre aziende. 76 | <a | [-href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security">-] | {+href="https://duo.com/decipher/bring-your-own-dilemma-oem-laptops-and-windows-10-security">+} | Windows 10 comes with 13 screens of snooping options</a>, all enabled by | default, and turning them off would be daunting to most users. <a href=" https://duo.com/decipher/bring-your-own-dilemma-oem-laptops-and-windows-10-security "> Windows 10 comes with 13 screens of snooping options</a>, all enabled by default, and turning them off would be daunting to most users. <a href=" https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security ">Windows 10 ha 13 schermate di opzioni sulla sorveglianza</a>, tutte attive come impostazione predefinita, e disattivarle tutte è difficoltoso per gran parte degli utenti. 77 | It appears <a | href="http{+s+}://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/"> | Windows 10 sends data to Microsoft about what applications are running</a>. It appears <a href=" https://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/ "> Windows 10 sends data to Microsoft about what applications are running</a>. Sembra che Windows 10 <a href=" http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/ "> invii dati a Microsoft su quali applicazioni sono in esecuzione</a>. 79 | A downgrade to Windows 10 deleted surveillance-detection applications. | Then another downgrade inserted a general spying program. Users noticed | this and complained, so Microsoft renamed it <a | [-href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/">-] | {+href="https://www.theregister.com/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/">+} | to give users the impression it was gone</a>. A downgrade to Windows 10 deleted surveillance-detection applications. Then another downgrade inserted a general spying program. Users noticed this and complained, so Microsoft renamed it <a href=" https://www.theregister.com/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/ "> to give users the impression it was gone</a>. Un "peggioramento" (mascherato da aggiornamento) di Windows 10 ha cancellato applicazioni che rilevavano la sorveglianza. Un ulteriore "aggiornamento" ha inserito un programma di spionaggio. Gli utenti lo hanno notato e si sono lamentati, quindi Microsoft ne ha <a href=" https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/ ">cambiato il nome</a> affinché gli utenti credessero che era stato eliminato. 81 | <a | [-href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">-] | {+href="https://web.archive.org/web/20150905163414/http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">+} | Intel devices will be able to listen for speech all the time, even when | &ldquo;off.&rdquo;</a> <a href=" https://web.archive.org/web/20150905163414/http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping "> Intel devices will be able to listen for speech all the time, even when &ldquo;off.&rdquo;</a> <a href=" http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping "> I dispositivi Intel potranno ascoltare i discorsi sempre, anche quando saranno apparentemente spenti</a>. 82 | <a | href="http{+s+}://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"> | Windows 10 sends identifiable information to Microsoft</a>, even if a user | turns off its Bing search and Cortana features, and activates the | privacy-protection settings. <a href=" https://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/ "> Windows 10 sends identifiable information to Microsoft</a>, even if a user turns off its Bing search and Cortana features, and activates the privacy-protection settings. <a href=" http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/ "> Windows 10 invia informazioni a Microsoft</a> che consentono di identificare l'utente anche se si disattivano le funzioni di ricerca di Bing e Cortana e si attiva la protezione della privacy. 83 | Windows 10 <a | [-href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">-] | {+href="https://web.archive.org/web/20180923125732/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">+} | ships with default settings that show no regard for the privacy of its | users</a>, giving Microsoft the &ldquo;right&rdquo; to snoop on the users' | files, text input, voice input, location info, contacts, calendar records | and web browsing history, as well as automatically connecting the machines | to open hotspots and showing targeted ads. Windows 10 <a href=" https://web.archive.org/web/20180923125732/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/ "> ships with default settings that show no regard for the privacy of its users</a>, giving Microsoft the &ldquo;right&rdquo; to snoop on the users' files, text input, voice input, location info, contacts, calendar records and web browsing history, as well as automatically connecting the machines to open hotspots and showing targeted ads. Windows 10 <a href=" https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/ "> ha impostazioni predefinite che non rispettano la privacy degli utenti</a> e che danno a Microsoft il &ldquo;diritto&rdquo; di spiare i file degli utenti, il testo inserito, le parole dettate, le informazioni sulla posizione, i contatti, le voci di calendario e le pagine web visitate, e persino di connettere automaticamente il computer a reti wireless sprotette e di mostrare pubblicità personalizzata. 85 | Microsoft uses Windows 10's &ldquo;privacy policy&rdquo; to overtly impose | a &ldquo;right&rdquo; to look at users' files at any time. Windows 10 full | disk encryption <a | [-href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/">-] | {+href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/">+} | gives Microsoft a key</a>. Microsoft uses Windows 10's &ldquo;privacy policy&rdquo; to overtly impose a &ldquo;right&rdquo; to look at users' files at any time. Windows 10 full disk encryption <a href=" https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/ "> gives Microsoft a key</a>. Microsoft usa le &ldquo;condizioni sulla privacy&rdquo; di Windows 10 per arrogarsi il &ldquo;diritto&rdquo; di spiare i file degli utenti in qualsiasi momento. La cifratura del disco con Windows 10 <a href=" https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/ "> dà una chiave anche a Microsoft</a>. 89 | It only gets worse with time. <a | href="http{+s+}://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html"> | Windows 10 requires users to give permission for total snooping</a>, | including their files, their commands, their text input, and their voice | input. It only gets worse with time. <a href=" https://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html "> Windows 10 requires users to give permission for total snooping</a>, including their files, their commands, their text input, and their voice input. Col tempo, questo problema non può che peggiorare. <a href=" http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html ">Windows 10 richiede agli utenti di dare il permesso per lo spionaggio totale</a>, che include i loro file, i loro comandi, il testo da loro immesso e quello da loro pronunciato. 90 | <a | [-href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">-] | {+href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">+} | Microsoft SkyDrive allows the NSA to directly examine users' data</a>. <a href=" https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/ "> Microsoft SkyDrive allows the NSA to directly examine users' data</a>. <a href=" http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/ ">Microsoft SkyDrive permette all'NSA di esaminare direttamente i dati degli utenti</a>. 91 | <a | [-href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">-] | {+href="https://web.archive.org/web/20140219183154/http://www.techrepublic.com/blog/asian-technology/japanese-government-warns-baidu-ime-is-spying-on-users/">+} | Baidu's Japanese-input and Chinese-input apps spy on [-users.</a>-] | {+users</a>.+} <a href=" https://web.archive.org/web/20140219183154/http://www.techrepublic.com/blog/asian-technology/japanese-government-warns-baidu-ime-is-spying-on-users/ "> Baidu's Japanese-input and Chinese-input apps spy on users</a>. <a href=" http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/ ">Le applicazioni per immissione di testo Giapponese e Cinese di Baidu spiano i propri utenti</a>. 92 | Spyware in [-Windows 8:-] {+older versions of Windows:+} <a | [-href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">-] | {+href="https://www.theregister.com/2003/02/28/windows_update_keeps_tabs/">+} | Windows Update snoops on the [-user.</a>-] {+user</a>.+} <a | [-href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">-] | {+href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">+} | Windows 8.1 snoops on local [-searches.</a>-] {+searches</a>.+} And | there's a <a href="http://www.marketoracle.co.uk/Article40836.html"> | secret NSA key in Windows</a>, whose functions we don't know. Spyware in older versions of Windows: <a href=" https://www.theregister.com/2003/02/28/windows_update_keeps_tabs/ "> Windows Update snoops on the user</a>. <a href=" https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html "> Windows 8.1 snoops on local searches</a>. And there's a <a href="http://www.marketoracle.co.uk/Article40836.html"> secret NSA key in Windows</a>, whose functions we don't know. Spyware in Windows 8: <a href=" https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/ ">Windows Update spia l'utente</a>. <a href=" http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175 ">Windows 8.1 curiosa nelle ricerche locali</a>. E c'è una <a href="http://www.marketoracle.co.uk/Article40836.html">chiave segreta dell'NSA in Windows</a>, le cui funzioni sono a noi ignote. 96 Apple has <a href=" https://sneak.berlin/20201112/your-computer-isnt-yours/ ">implemented a malware in its computers that imposes surveillance</a> on users and reports users' computing to Apple. 98 Adware Doctor, an ad blocker for MacOS, <a href=" https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history ">reports the user's browsing history</a>. 99 | Apple has made various <a | href="http{+s+}://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"> | MacOS programs send files to Apple servers without asking permission</a>. | This exposes the files to Big Brother and perhaps to other snoops. Apple has made various <a href=" https://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud "> MacOS programs send files to Apple servers without asking permission</a>. This exposes the files to Big Brother and perhaps to other snoops. Apple ha fatto sì che diversi <a href=" http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud ">programmi di MacOS inviino file ai server di Apple senza chiedere alcun permesso</a>. Questo espone i file al Grande Fratello e forse ad altri ficcanaso. 101 | [-<a | href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">-]MacOS | automatically {+<a | href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">+} | sends to Apple servers unsaved documents being edited</a>. The [-<a | href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/">-] | things you have not decided to save are {+<a | href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/">+} | even more [-sensitive-] {+sensitive</a>+} than the things you have stored | in [-files</a>.-] {+files.+} MacOS automatically <a href=" https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/ "> sends to Apple servers unsaved documents being edited</a>. The things you have not decided to save are <a href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/"> even more sensitive</a> than the things you have stored in files. <a href=" http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/ ">MacOS invia in automatico ai server di Apple i documenti non salvati che si stanno editando</a>. Le <a href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/">cose che non vengono salvate sono ancora più sensibili di quelle che si salvano</a>. 102 | Apple admits the <a | href="http{+s+}://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/"> | spying in a search facility</a>, but there's a lot <a | [-href="https://github.com/fix-macosx/yosemite-phone-home">-] | {+href="https://gothub.frontendfriendly.xyz/fix-macosx/yosemite-phone-home/blob/master/README.md">+} | more snooping that Apple has not talked about</a>. Apple admits the <a href=" https://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/ "> spying in a search facility</a>, but there's a lot <a href=" https://gothub.frontendfriendly.xyz/fix-macosx/yosemite-phone-home/blob/master/README.md "> more snooping that Apple has not talked about</a>. Apple ammette di <a href=" http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/ ">spiare in un servizio di ricerca</a>, ma c'è molto altro <a href=" https://github.com/fix-macosx/yosemite-phone-home ">spionaggio di cui Apple non ha mai parlato</a>. 103 | Various operations in <a | href="http{+s+}://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"> | the latest MacOS send reports to Apple</a> servers. Various operations in <a href=" https://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540 "> the latest MacOS send reports to Apple</a> servers. Varie operazioni nell'<a href=" http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540 ">ultima versione di MacOS inviano dei resoconti ai server di Apple</a>. 104 | <a | href="http{+s+}://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"> | Spotlight search</a> sends users' search terms to Apple. <a href=" https://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html "> Spotlight search</a> sends users' search terms to Apple. <a href=" http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html ">Spotlight</a> invia i termini di ricerca degli utenti ad Apple. 106 | [-<a href="#SpywareAtLowLevel">Spyware at Low Level</a>-]{+<span | id="SpywareAtLowLevel"></span>+} <span id=" SpywareAtLowLevel "></span> <a href=" #SpywareAtLowLevel ">Spyware a basso livello</a> 109 | <a | [-href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">-] | {+href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">+} | Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows | installs. Note that the specific sabotage method Lenovo used did not | affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not | really clean since <a | href="/proprietary/malware-microsoft.html">Microsoft puts in its own | malware</a>. <a href=" https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html "> Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows installs. Note that the specific sabotage method Lenovo used did not affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean since <a href="/proprietary/malware-microsoft.html">Microsoft puts in its own malware</a>. <a href=" http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html "> Lenovo ha installato di nascosto software indesiderato tramite il BIOS</a> sui suoi dispositivi Windows. Lo specifico metodo usato da Lenovo non aveva conseguenze per chi eseguiva GNU/Linux; tra l'altro, un'installazione &ldquo;pulita&rdquo; di Windows non è mai davvero pulita a causa del <a href="/proprietary/malware-microsoft.html">malware preinstallato da Microsoft</a>. 114 <a href=" https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/ ">El Salvador Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that breaks users' freedom and spies on people; demands personal data such as the national ID number and does face recognition, and it is bad security for its data. It also asks for almost every malware permission in people's smartphones. 115 The article criticizes it for faults in &ldquo;data protection&rdquo;, though <a href=" /philosophy/surveillance-vs-democracy.html ">&ldquo;data protection&rdquo; is the wrong approach to privacy anyway</a>. 116 <a href=" https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-health-apps-harvest-user-data-global-study-shows ">Almost all proprietary health apps harvest users' data</a>, including sensitive health information, tracking identifiers, and cookies to track user activities. Some of these applications are tracking users across different platforms. 117 The proprietary program Clubhouse is malware and a privacy disaster. Clubhouse <a href=" https://www.theguardian.com/commentisfree/2021/feb/20/why-hot-new-social-app-clubhouse-spells-nothing-but-trouble ">collects people's personal data such as recordings of people's conversations</a>, and, as a secondary problem, does not encrypt them, which shows a bad security part of the issue. 120 As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=" https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/ ">forcing its users to hand over sensitive personal data</a> to its parent company. This increases Facebook's power over users, and further jeopardizes people's privacy and security. 121 Instead of WhatsApp you can use <a href=" https://directory.fsf.org/wiki/Jami ">GNU Jami</a>, which is free software and will not collect your data. 122 Most apps are malware, but Trump's campaign app, like Modi's campaign app, is <a href=" https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "> especially nasty malware, helping companies snoop on users as well as snooping on them itself</a>. 124 Tiny Lab Productions, along with online ad businesses run by Google, Twitter and three other companies are facing a lawsuit <a href=" https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html ">for violating people's privacy by collecting their data from mobile games and handing over these data to other companies/advertisers</a>. 125 | The natural extension of monitoring people through &ldquo;their&rdquo; | phones is <a | [-href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">-] | {+href="https://news.northwestern.edu/stories/2016/01/fool-activity-tracker">+} | proprietary software to make sure they can't &ldquo;fool&rdquo; the | monitoring</a>. The natural extension of monitoring people through &ldquo;their&rdquo; phones is <a href=" https://news.northwestern.edu/stories/2016/01/fool-activity-tracker "> proprietary software to make sure they can't &ldquo;fool&rdquo; the monitoring</a>. L'estensione ovvia del monitoraggio degli utenti tramite i &ldquo;loro&rdquo; telefoni è <a href=" http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html "> il software proprietario per assicurarsi che non sia possibile ingannare il monitoraggio</a>. 126 | According to Edward Snowden, <a | href="http{+s+}://www.bbc.com/news/uk-34444233">agencies can take over | smartphones</a> by sending hidden text messages which enable them to turn | the phones on and off, listen to the microphone, retrieve geo-location | data from the GPS, take photographs, read text messages, read call, | location and web browsing history, and read the contact list. This malware | is designed to disguise itself from investigation. According to Edward Snowden, <a href=" https://www.bbc.com/news/uk-34444233 ">agencies can take over smartphones</a> by sending hidden text messages which enable them to turn the phones on and off, listen to the microphone, retrieve geo-location data from the GPS, take photographs, read text messages, read call, location and web browsing history, and read the contact list. This malware is designed to disguise itself from investigation. Secondo Edward Snowden, <a href=" http://www.bbc.com/news/uk-34444233 ">le agenzie possono prendere il controllo degli smartphone</a> inviando SMS nascosti che permettono loro di accendere e spegnere il dispositivo, ascoltare il microfono, recuperare informazioni di geolocalizzazione dal GPS, fare foto, leggere i messaggi, leggere lo storico delle chiamate, della posizione geografica e della navigazione web, leggere la rubrica. Questo malware è progettato per mascherarsi dai tentativi di investigazione. 127 | <a | [-href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">-] | {+href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">+} | The NSA can tap data in smart phones, including iPhones, Android, and | BlackBerry</a>. While there is not much detail here, it seems that this | does not operate via the universal back door that we know nearly all | portable phones have. It may involve exploiting various bugs. There are | <a | [-href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">-] | {+href="https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/">+} | lots of bugs in the phones' radio software</a>. <a href=" https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html "> The NSA can tap data in smart phones, including iPhones, Android, and BlackBerry</a>. While there is not much detail here, it seems that this does not operate via the universal back door that we know nearly all portable phones have. It may involve exploiting various bugs. There are <a href=" https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/ "> lots of bugs in the phones' radio software</a>. <a href=" http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html ">La NSA può intercettare dati in vari smartphone, tra cui iPhone, Android e BlackBerry</a>. Sebbene l'articolo non sia dettagliato a sufficienza, pare che questo non sia compiuto tramite la ben nota backdoor universale presente in tutti i telefoni cellulari. Potrebbe comportare lo sfruttamento di vari bug. Ci sono <a href=" http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone ">molti bug nei programmi di radiocomunicazione dei telefoni</a>. 128 | Portable phones with GPS {+<a | href="https://www.aclu.org/issues/privacy-technology/location-tracking/you-are-being-tracked">+} | will send their GPS location on remote command{+,+} and users cannot stop | [-them: <a | href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"> | http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.-] | {+them</a>.+} (The US says it will eventually require all new portable | phones to have GPS.) Portable phones with GPS <a href=" https://www.aclu.org/issues/privacy-technology/location-tracking/you-are-being-tracked "> will send their GPS location on remote command, and users cannot stop them</a>. (The US says it will eventually require all new portable phones to have GPS.) I cellulari con GPS invieranno la loro posizione geografica sotto comando remoto e gli utenti non possono fermarli: <a href=" http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers "> http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>. (Gli Stati Uniti affermano che in futuro tutti i cellulari dovranno essere muniti di GPS.) 131 <a href=" https://web.archive.org/web/20230101185726/https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558 "> The iMonster app store client programs collect many kinds of data</a> about the user's actions and private communications. &ldquo;Do not track&rdquo; options are available, but tracking doesn't stop if the user activates them: Apple keeps on collecting data for itself, although it claims not to send it to third parties. 132 <a href=" https://www.theregister.com/2022/11/14/apple_data_collection_lawsuit/ "> Apple is being sued</a> for that. 133 <a href=" https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/ ">Apple is moving its Chinese customers' iCloud data to a datacenter controlled by the Chinese government</a>. Apple is already storing the encryption keys on these servers, obeying Chinese authority, making all Chinese user data available to the government. 134 Facebook <a href=" https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html ">snoops on Instagram</a> users by surreptitously turning on the device's camera. 135 Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of surreptitiously activating the Siri software to <a href=" https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf "> record users' conversations when they had not activated Siri</a>. This was not just occasional, it was systematic practice. 138 Safari occasionally <a href=" https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/ "> sends browsing data from Apple devices in China to the Tencent Safe Browsing service</a>, to check URLs that possibly correspond to &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese government, its Safe Browsing black list most certainly contains the websites of political opponents. By linking the requests originating from single IP addresses, the government can identify dissenters in China and Hong Kong, thus endangering their lives. 139 In spite of Apple's supposed commitment to privacy, iPhone apps contain trackers that are busy at night <a href=" https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html "> sending users' personal information to third parties</a>. 142 In the latest iThings system, &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way <a href=" https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off "> doesn't really turn them off</a>. A more advanced way really does turn them off&mdash;only until 5am. That's Apple for you&mdash;&ldquo;We know you want to be spied on&rdquo;. 144 | iPhones <a | href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says{+/+}">send | lots of personal data to Apple's servers</a>. Big Brother can get them | from there. iPhones <a href=" https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/ ">send lots of personal data to Apple's servers</a>. Big Brother can get them from there. Gli iPhone <a href=" https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says ">inviano ai server di Apple molti dati personali</a>. Là sono a disposizione del Grande Fratello. 148 | (From <a [-href="https://www.apple.com/icloud/photos/">Apple's-] | {+href="https://web.archive.org/web/20150921152044/https://www.apple.com/icloud/photos/">Apple's+} | iCloud information</a> as accessed on 24 Sep 2015.) The iCloud feature is | <a href="https://support.apple.com/en-us/HT202033">activated by the | startup of iOS</a>. The term &ldquo;cloud&rdquo; means &ldquo;please don't | ask where.&rdquo; (From <a href=" https://web.archive.org/web/20150921152044/https://www.apple.com/icloud/photos/ ">Apple's iCloud information</a> as accessed on 24 Sep 2015.) The iCloud feature is <a href="https://support.apple.com/en-us/HT202033">activated by the startup of iOS</a>. The term &ldquo;cloud&rdquo; means &ldquo;please don't ask where.&rdquo; (Dalla pagina con <a href=" https://www.apple.com/icloud/photos/ ">informazioni su iCloud</a> come presente sul sito di Apple il 24 settembre 2015.) La funzione iCloud è <a href="https://support.apple.com/en-us/HT202033">attivata all'avvio del sistema</a>. Il termine &ldquo;cloud&rdquo; significa per noi &ldquo;non chiedeteci dove&rdquo;. 151 | Apple can, and regularly does, <a | [-href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">-] | {+href="https://arstechnica.com/gadgets/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">+} | remotely extract some data from iPhones for the state</a>. Apple can, and regularly does, <a href=" https://arstechnica.com/gadgets/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/ "> remotely extract some data from iPhones for the state</a>. Apple può (e spesso lo fa) <a href=" http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/ ">estrarre dati dagli iPhone a distanza per il governo</a>. 152 | This may have improved with <a | [-href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">-] | {+href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">+} | iOS 8 security improvements</a>; but <a | [-href="https://firstlook.org/theintercept/2014/09/22/apple-data/">-] | {+href="https://theintercept.com/2014/09/22/apple-data/">+} not as much | as Apple claims</a>. This may have improved with <a href=" https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/ "> iOS 8 security improvements</a>; but <a href=" https://theintercept.com/2014/09/22/apple-data/ "> not as much as Apple claims</a>. Questo potrebbe essere cambiato con <a href=" http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html ">i miglioramenti di sicurezza di iOS8</a>; ma <a href=" https://firstlook.org/theintercept/2014/09/22/apple-data ">meno di quanto affermato da Apple</a>. 153 | <a | href="http{+s+}://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"> | Several &ldquo;features&rdquo; of iOS seem to exist for no possible | purpose other than surveillance</a>. Here is the <a | href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"> | Technical presentation</a>. <a href=" https://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services "> Several &ldquo;features&rdquo; of iOS seem to exist for no possible purpose other than surveillance</a>. Here is the <a href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"> Technical presentation</a>. <a href=" http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services ">Molte &ldquo;funzionalità&rdquo; di iOS sembrano esistere al solo possibile scopo di permettere la sorveglianza</a>. Ecco la <a href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">presentazione tecnica</a>. 154 | The <a class="not-a-duplicate" | href="http{+s+}://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"> | iBeacon</a> lets stores determine exactly where the iThing is, and get | other info too. The <a class="not-a-duplicate" href=" https://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html "> iBeacon</a> lets stores determine exactly where the iThing is, and get other info too. Gli <a class="not-a-duplicate" href=" http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html "> iBeacon</a> permettono ai negozi di determinare esattamente dove i vari iGadget si trovano e di avere altre informazioni. 155 | <a | [-href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">-] | {+href="https://web.archive.org/web/20190924053515/https://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">+} | Either Apple helps the NSA snoop on all the data in an iThing, or it is | totally [-incompetent.</a>-] {+incompetent</a>.+} <a href=" https://web.archive.org/web/20190924053515/https://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep "> Either Apple helps the NSA snoop on all the data in an iThing, or it is totally incompetent</a>. <a href=" http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep ">O Apple aiuta l'NSA a curiosare tra tutti i dati in un iGadget, o è davvero del tutto incompetente</a>. 156 | The iThing also <a | [-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">-] | {+href="https://www.theregister.com/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">+} | tells Apple its geolocation</a> by default, though that can be turned off. The iThing also <a href=" https://www.theregister.com/2013/08/08/ios7_tracking_now_its_a_favourite_feature/ "> tells Apple its geolocation</a> by default, though that can be turned off. Ciascuno dei vari iGadget, come impostazione predefinita, <a href=" https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/ ">comunica ad Apple anche la sua posizione geografica</a>, anche se questo può essere disabilitato. 157 | There is also a feature for web sites to track users, which is <a | href="http{+s+}://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"> | enabled by default</a>. (That article talks about iOS 6, but it is still | true in iOS 7.) There is also a feature for web sites to track users, which is <a href=" https://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/ "> enabled by default</a>. (That article talks about iOS 6, but it is still true in iOS 7.) Esiste anche una funzionalità che permette ai siti web di tracciare gli utenti, che è <a href=" http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/ ">abilitata di default</a>. (Quell'articolo parla di iOS 6 ma vale anche per iOS 7.) 158 | Users cannot make an Apple ID [-<a | href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary-] | {+(<a | href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary+} | to install even gratis [-apps)</a>-] {+apps</a>)+} without giving a valid | email address and receiving the {+verification+} code Apple sends to it. Users cannot make an Apple ID (<a href=" https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id ">necessary to install even gratis apps</a>) without giving a valid email address and receiving the verification code Apple sends to it. Gli utenti non possono creare una ID di Apple (che serve <a href=" http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool ">anche se si usano solo applicazioni gratuite</a>) senza dare un indirizzo e-mail valido e convalidarlo tramite un codice che Apple invia a tale indirizzo. 161 Baidu apps were <a href=" https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/ "> caught collecting sensitive personal data</a> that can be used for lifetime tracking of users, and putting them in danger. More than 1.4 billion people worldwide are affected by these proprietary apps, and users' privacy is jeopardized by this surveillance tool. Data collected by Baidu may be handed over to the Chinese government, possibly putting Chinese people in danger. 162 Samsung is forcing its smartphone users in Hong Kong (and Macau) <a href=" https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-dns-service-upon-hong-kong-wifi-users/ ">to use a public DNS in Mainland China</a>, using software update released in September 2020, which causes many unease and privacy concerns. 163 Xiaomi phones <a href=" https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/ ">report many actions the user takes</a>: starting an app, looking at a folder, visiting a website, listening to a song. They send device identifying information too. 164 Other nonfree programs snoop too. For instance, Spotify and other streaming dis-services make a dossier about each user, and <a href=" /malware/proprietary-surveillance.html#M201508210 "> they make users identify themselves to pay</a>. Out, out, damned Spotify! 166 Facebook's app got &ldquo;consent&rdquo; to <a href=" https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent "> upload call logs automatically from Android phones</a> while disguising what the &ldquo;consent&rdquo; was for. 167 An Android phone was observed to track location even while in airplane mode. It didn't send the location data while in airplane mode. Instead, <a href=" https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/ "> it saved up the data, and sent them all later</a>. 168 Android tracks location for Google <a href=" https://www.techdirt.com/2017/11/21/investigation-finds-google-collected-location-data-even-with-location-services-turned-off/ "> even when &ldquo;location services&rdquo; are turned off, even when the phone has no SIM card</a>. 169 | Some portable phones <a | href="http{+s+}://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are | sold with spyware sending lots of data to China</a>. Some portable phones <a href=" https://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html ">are sold with spyware sending lots of data to China</a>. Alcuni telefoni cellulari sono venduti con <a href=" http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html ">spyware che manda molti dati in Cina</a>. 172 | Samsung phones come with <a | href="http{+s+}://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps | that users can't delete</a>, and they send so much data that their | transmission is a substantial expense for users. Said transmission, not | wanted or requested by the user, clearly must constitute spying of some | kind. Samsung phones come with <a href=" https://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/ ">apps that users can't delete</a>, and they send so much data that their transmission is a substantial expense for users. Said transmission, not wanted or requested by the user, clearly must constitute spying of some kind. Alcuni telefoni Samsung sono venduti con applicazioni preinstallate che <a href=" http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/ ">gli utenti non possono cancellare</a>, e queste applicazioni inviano così tanti dati da provocare spese significative per gli utenti. Questo invio di dati, non autorizzato dall'utente, va chiaramente considerato come spionaggio di qualche tipo. 174 | Spyware in Android phones (and Windows? laptops): The Wall Street Journal | (in an article blocked from us by a paywall) reports that <a | href="http{+s+}://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"> | the FBI can remotely activate the GPS and microphone in Android phones and | [-laptops</a>. (I suspect this means-] {+laptops</a> (presumably+} | Windows [-laptops.)-] {+laptops).+} Here is <a | href="http{+s+}://cryptome.org/2013/08/fbi-hackers.htm">more info</a>. Spyware in Android phones (and Windows? laptops): The Wall Street Journal (in an article blocked from us by a paywall) reports that <a href=" https://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj "> the FBI can remotely activate the GPS and microphone in Android phones and laptops</a> (presumably Windows laptops). Here is <a href=" https://cryptome.org/2013/08/fbi-hackers.htm ">more info</a>. Spyware nei telefoni Android (e computer portatili, forse Windows): il Wall Street Journal (in un articolo che può essere letto solo previo pagamento) afferma che <a href=" http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj ">l'FBI può attivare remotamente il GPS ed il microfono di telefoni Android e computer portatili</a>. (Sospettiamo si tratti di computer portatili Windows.) <a href=" http://cryptome.org/2013/08/fbi-hackers.htm ">Ulteriori informazioni</a>. 176 | A Motorola phone <a | [-href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">-] | {+href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">+} | listens for voice all the time</a>. A Motorola phone <a href=" https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/ "> listens for voice all the time</a>. Un telefono Motorola <a href=" http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android ">è continuamente in ascolto</a>. 177 | Google Play intentionally sends app developers <a | [-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">-] | {+href="https://gadgets360.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">+} | the personal details of users that install the app</a>. Google Play intentionally sends app developers <a href=" https://gadgets360.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116 "> the personal details of users that install the app</a>. Google Play intenzionalmente invia a chi sviluppa un'applicazione <a href=" http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116 "> i dettagli personali degli utenti che la installano</a>. 180 | Some manufacturers add a <a | href="http{+s+}://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"> | hidden general surveillance package such as Carrier [-IQ.</a>-] {+IQ</a>.+} Some manufacturers add a <a href=" https://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/ "> hidden general surveillance package such as Carrier IQ</a>. Alcuni produttori aggiungono un <a href=" http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/ ">pacchetto di sorveglianza generale nascosto come Carrier IQ</a>. 183 | E-books can contain Java[-s-]{+S+}cript code, and <a | [-href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes-] | {+href="https://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"> | sometimes+} this code snoops on readers</a>. E-books can contain JavaScript code, and <a href=" https://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds "> sometimes this code snoops on readers</a>. Gli e-book possono contenere codice Javascript che talvolta <a href=" http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds ">spia i lettori</a>. 184 | Adobe made &ldquo;Digital Editions,&rdquo; the e-reader used by most US | libraries, <a | [-href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">-] | {+href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">+} | send lots of data to Adobe</a>. Adobe's &ldquo;excuse&rdquo;: it's needed | to check DRM! Adobe made &ldquo;Digital Editions,&rdquo; the e-reader used by most US libraries, <a href=" https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/ "> send lots of data to Adobe</a>. Adobe's &ldquo;excuse&rdquo;: it's needed to check DRM! Adobe ha fatto in modo che &ldquo;Digital Editions&rdquo;, il lettore e-book usato dalla maggior parte delle biblioteche americane, <a href=" http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/ ">le inviasse molti dati</a>. La &ldquo;scusa&rdquo; di Adobe: serve per verificare il DRM! 187 | <span class="anchor-reference-id">(<a | [-href="#SpywareIniThings">#SpywareIniThings</a>)</span>-] | {+href="#SpywareInApplications">#SpywareInApplications</a>)</span>+} <span class="anchor-reference-id">(<a href=" #SpywareInApplications ">#SpywareInApplications</a>)</span> <span class="anchor-reference-id">(<a href=" #SpywareIniThings ">#SpywareIniThings</a>)</span> 188 Edge <a href=" https://www.neowin.net/news/edge-sends-images-you-view-online-to-microsoft-here-is-how-to-disable-that/ ">sends the URLs of images the user views to Microsoft's servers</a> by default, supposedly to &ldquo;enhance&rdquo; them. And these images <a href=" /proprietary/proprietary-surveillance.html#M201405140 ">may end up on the NSA's servers</a>. 189 Microsoft claims its nonfree browser sends the URLs without identifying you, which cannot be true, since at least your IP address is known to the server if you don't take extra measures. Either way, such enhancer service is unjust because any image editing <a href=" /philosophy/who-does-that-server-really-serve.html ">should be done on your own computer using installed free software</a>. 190 The article describes how to disable sending the URLs. That makes a change for the better, but we suggest that you instead switch to a freedom-respecting browser with additional privacy features such as <a href=" /software/gnuzilla/ ">IceCat</a>. 191 Some employers are <a href=" https://www.theguardian.com/money/2023/may/30/i-feel-constantly-watched-employees-working-under-surveillance-monitorig-software-productivity "> forcing employees to run &ldquo;monitoring software&rdquo;</a> on their computers. These extremely intrusive proprietary programs can take screenshots at regular intervals, log keystrokes, record audio and video, etc. Such practices have been shown to <a href=" https://www.eurofound.europa.eu/publications/report/2020/employee-monitoring-and-surveillance-the-challenges-of-digitalisation "> deteriorate employees' well-being</a>, and trade unions in the European union have voiced their concerns about them. The requirement for employee's consent, which exists in some countries, is a sham because most often the employee is not free to refuse. In short, these practices should be abolished. 192 A worldwide investigation found that most of the applications that school districts recommended for remote education during the COVID-19 pandemic <a href=" https://web.archive.org/web/20220525011540/https://www.washingtonpost.com/technology/2022/05/24/remote-school-app-tracking-privacy/ ">track and collect personal data from children as young as below the age of five</a>. These applications, and their websites, send the collected information to ad giants such as Facebook and Google, and they are still being used in the classrooms even after some of the schools reopened. 193 The Verify browser extension by Storyful <a href=" https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch ">spies on the reporters that use it</a>. 195 | <span class="anchor-reference-id">(<a | [-href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>-] | {+href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span>+} <span class="anchor-reference-id">(<a href=" #SpywareInDesktopApps ">#SpywareInDesktopApps</a>)</span> <span class="anchor-reference-id">(<a href=" #SpywareInMobileApps ">#SpywareInMobileApps</a>)</span> 196 Microsoft's Office 365 suite enables employers <a href=" https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance ">to snoop on each employee</a>. After a public outburst, Microsoft stated that <a href=" https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance ">it would remove this capability</a>. Let's hope so. 197 Some Avast and AVG extensions for Firefox and Chrome were found to <a href=" https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome "> snoop on users' detailed browsing habits</a>. Mozilla and Google removed the problematic extensions from their stores, but this shows once more how unsafe nonfree software can be. Tools that are supposed to protect a proprietary system are, instead, infecting it with additional malware (the system itself being the original malware). 198 As of April 2019, it is <a href=" https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/ ">no longer possible to disable an unscrupulous tracking anti-feature</a> that <a href=" https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing ">reports users when they follow ping links</a> in Apple Safari, Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge that is going to be based on Chromium. 199 Foundry's graphics software <a href=" https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/ "> reports information to identify who is running it</a>. The result is often a legal threat demanding a lot of money. 204 The Yandex company has started to <a href=" https://meduza.io/en/feature/2023/08/08/user-x-with-driver-y-traveled-from-point-a-to-point-b "> give away Yango taxi ride data to Russia's Federal Security Service (FSB)</a>. The Russian government (and whoever else receives the the data) thus has access to a wealth of personal information, including who traveled where, when, and with which driver. Yandex <a href=" https://yandex.ru/legal/confidential/?lang=en "> claims that it complies with European regulations</a> for data collected in the European Economic Area, Switzerland or Israel. But what about the rest of the world? 205 The Pinduoduo app <a href=" https://edition.cnn.com/2023/04/02/tech/china-pinduoduo-malware-cybersecurity-analysis-intl-hnk/index.html "> snoops on other apps, and takes control of them</a>. It also installs additional malware that is hard to remove. 206 Canada has fined the company Tim Hortons for making <a href=" https://arstechnica.com/tech-policy/2022/06/tim-hortons-coffee-app-broke-law-by-constantly-recording-users-movements/ "> an app that tracks people's movements</a> to learn things such as where they live, where they work, and when they visit competitors' stores. 207 New Amazon worker chat app <a href=" https://theintercept.com/2022/04/04/amazon-union-living-wage-restrooms-chat-app/ ">would ban specific words Amazon doesn't like</a>, such as &ldquo;union&rdquo;, &ldquo;restrooms&rdquo;, and &ldquo;pay raise&rdquo;. If the app was free, workers could modify the program so it acts as they wish, not how Amazon wants it. 208 The nonfree app &ldquo;Along,&rdquo; developed by a company controlled by Zuckerberg, <a href=" https://kappanonline.org/dont-go-along-with-corporate-schemes-to-gather-up-student-data/ "> leads students to reveal to their teacher personal information</a> about themselves and their families. Conversations are recorded and the collected data sent to the company, which grants itself the right to sell it. See also <a href=" /education/educational-malware-app-along.html#content ">Educational Malware App &ldquo;Along&rdquo;</a>. 209 The data broker X-Mode <a href=" https://themarkup.org/privacy/2022/01/27/gay-bi-dating-app-muslim-prayer-apps-sold-data-on-peoples-location-to-a-controversial-data-broker ">bought location data about 20,000 people collected by around 100 different malicious apps</a>. 210 A building in LA, with a supermarket in it, <a href=" https://www.latimes.com/business/story/2021-11-09/column-trader-joes-parking-app ">demands customers load a particular app to pay for parking in the parking lot</a>, and accept pervasive surveillance. They also have the option of entering their license plate numbers in a kiosk. That is an injustice, too. 211 <a href=" https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/ ">TikTok apps collect biometric identifiers and biometric information from users' smartphones</a>. The company behind it does whatever it wants and collects whatever data it can. 212 The <a href=" https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/ ">WeddingWire app saves people's wedding photos forever and hands over data to others</a>, giving users no control over their personal information/data. The app also sometimes shows old photos and memories to users, without giving them any control over this either. 213 Many cr&hellip;apps, developed by various companies for various organizations, do <a href=" https://www.expressvpn.com/digital-security-lab/investigation-xoth "> location tracking unknown to those companies and those organizations</a>. It's actually some widely used libraries that do the tracking. 215 The Apple iOS version of Zoom <a href=" https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account ">is sending users' data to Facebook</a> even if the user doesn't have a Facebook account. According to the article, Zoom and Facebook don't even mention this surveillance on their privacy policy page, making this an obvious violation of people's privacy even in their own terms. 216 The Alipay Health Code app estimates whether the user has Covid-19 and <a href=" https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html "> tells the cops directly</a>. 217 | The Amazon [-&ldquo;Smart&rdquo; TV-] {+Ring app does+} <a | [-href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is | watching and listening all the time</a>.-] | {+href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"> | surveillance for other companies as well as for Amazon</a>.+} The Amazon Ring app does <a href=" https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report "> surveillance for other companies as well as for Amazon</a>. La &ldquo;Smart&rdquo; TV di Amazon <a href=" http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance ">è sempre in osservazione ed in ascolto</a>. 218 The ToToc messaging app seems to be a <a href=" https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html "> spying tool for the government of the United Arab Emirates</a>. Any nonfree program could be doing this, and that is a good reason to use free software instead. 220 iMonsters and Android phones, when used for work, give employers powerful <a href=" https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy "> snooping and sabotage capabilities</a> if they install their own software on the device. Many employers demand to do this. For the employee, this is simply nonfree software, as fundamentally unjust and as dangerous as any other nonfree software. 221 The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app requires users to grant it <a href=" https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962 "> access to the phone's microphone, photos, text messages, contacts, and internet history</a>, and the Android version was found to contain a back-door allowing developers to run any code they wish in the users' phone, as &ldquo;superusers.&rdquo; Downloading and using this app is mandatory at some workplaces. 222 Note: The <a href=" http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html "> Washington Post version of the article</a> (partly obfuscated, but readable after copy-pasting in a text editor) includes a clarification saying that the tests were only performed on the Android version of the app, and that, according to Apple, &ldquo;this kind of &lsquo;superuser&rsquo; surveillance could not be conducted on Apple's operating system.&rdquo; 223 The Facebook app <a href=" https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/ "> tracks users even when it is turned off</a>, after tricking them into giving the app broad permissions in order to use one of its functionalities. 224 Some nonfree period-tracking apps including MIA Fem and Maya <a href=" https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem "> send intimate details of users' lives to Facebook</a>. 225 Keeping track of who downloads a proprietary program is a form of surveillance. There is a proprietary program for adjusting a certain telescopic rifle sight. <a href=" https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/ "> A US prosecutor has demanded the list of all the 10,000 or more people who have installed it</a>. 227 Many unscrupulous mobile-app developers keep finding ways to <a href=" https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/ "> bypass user's settings</a>, regulations, and privacy-enhancing features of the operating system, in order to gather as much private data as they possibly can. 229 Many Android apps can track users' movements even when the user says <a href=" https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location "> not to allow them access to locations</a>. 231 The Femm &ldquo;fertility&rdquo; app is secretly a <a href=" https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners "> tool for propaganda</a> by natalist Christians. It spreads distrust for contraception. 233 BlizzCon 2019 imposed a <a href=" https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/ "> requirement to run a proprietary phone app</a> to be allowed into the event. 234 This app is a spyware that can snoop on a lot of sensitive data, including user's location and contact list, and has <a href=" https://web.archive.org/web/20220321042716/https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/ "> near-complete control</a> over the phone. 235 Data collected by menstrual and pregnancy monitoring apps is often <a href=" https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance "> available to employers and insurance companies</a>. Even though the data is &ldquo;anonymized and aggregated,&rdquo; it can easily be traced back to the woman who uses the app. 236 This has harmful implications for women's rights to equal employment and freedom to make their own pregnancy choices. Don't use these apps, even if someone offers you a reward to do so. A free-software app that does more or less the same thing without spying on you is available from <a href=" https://search.f-droid.org/?q=menstr ">F-Droid</a>, and <a href=" https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f "> a new one is being developed</a>. 237 Google tracks the movements of Android phones and iPhones running Google apps, and sometimes <a href=" https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html "> saves the data for years</a>. 239 Many Android phones come with a huge number of <a href=" https://web.archive.org/web/20190326145122/https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html "> preinstalled nonfree apps that have access to sensitive data without users' knowledge</a>. These hidden apps may either call home with the data, or pass it on to user-installed apps that have access to the network but no direct access to the data. This results in massive surveillance on which the user has absolutely no control. 240 The MoviePass dis-service <a href=" https://www.cnet.com/culture/entertainment/moviepass-founder-wants-to-use-facial-recognition-to-score-you-free-movies/ "> is planning to use face recognition to track people's eyes</a> to make sure they won't put their phones down or look away during ads&mdash;and trackers. 241 A study of 24 &ldquo;health&rdquo; apps found that 19 of them <a href=" https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows "> send sensitive personal data to third parties</a>, which can use it for invasive advertising or discriminating against people in poor medical condition. 243 Facebook offered a convenient proprietary library for building mobile apps, which also <a href=" https://boingboing.net/2019/02/23/surveillance-zucksterism.html "> sent personal data to Facebook</a>. Lots of companies built apps that way and released them, apparently not realizing that all the personal data they collected would go to Facebook as well. 245 The AppCensus database gives information on <a href=" https://www.appcensus.io/ "> how Android apps use and misuse users' personal data</a>. As of March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit the <a href=" /proprietary/proprietary-surveillance.html#M201812290 "> Advertising ID</a> to other companies, and <a href=" https://blog.appcensus.io/2019/02/14/ad-ids-behaving-badly/ "> 18,000 (23% of the total) link this ID to hardware identifiers</a>, so that users cannot escape tracking by resetting it. 247 Many nonfree apps have a surveillance feature for <a href=" https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/ "> recording all the users' actions</a> in interacting with the app. 248 Twenty nine &ldquo;beauty camera&rdquo; apps that used to be on Google Play had one or more malicious functionalities, such as <a href=" https://www.androidpolice.com/2019/02/03/google-bans-29-beauty-camera-apps-from-the-play-store-that-steal-your-photos/ "> stealing users' photos instead of &ldquo;beautifying&rdquo; them</a>, pushing unwanted and often malicious ads on users, and redirecting them to phishing sites that stole their credentials. Furthermore, the user interface of most of them was designed to make uninstallation difficult. 250 An investigation of the 150 most popular gratis VPN apps in Google Play found that <a href=" https://www.top10vpn.com/research/free-vpn-investigations/risk-index/ "> 25% fail to protect their users' privacy</a> due to DNS leaks. In addition, 85% feature intrusive permissions or functions in their source code&mdash;often used for invasive advertising&mdash;that could potentially also be used to spy on users. Other technical flaws were found as well. 251 Moreover, a previous investigation had found that <a href=" https://www.top10vpn.com/research/free-vpn-investigations/ownership/ ">half of the top 10 gratis VPN apps have lousy privacy policies</a>. 252 <small>(It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; These apps are gratis, but they are <em>not</em> <a href=" /philosophy/free-sw.html ">free software</a>.)</small> 253 The Weather Channel app <a href=" https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling "> stored users' locations to the company's server</a>. The company is being sued, demanding that it notify the users of what it will do with the data. 255 <a href=" https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps "> Other weather apps</a>, including Accuweather and WeatherBug, are tracking people's locations. 256 Around 40% of gratis Android apps <a href=" https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report "> report on the user's actions to Facebook</a>. 259 Some Android apps <a href=" https://web.archive.org/web/20210418052600/https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/ "> track the phones of users that have deleted them</a>. 260 Some Google apps on Android <a href=" https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile "> record the user's location even when users disable &ldquo;location tracking&rdquo;</a>. 262 The Spanish football streaming app <a href=" https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html ">tracks the user's movements and listens through the microphone</a>. 266 More than <a href=" https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy ">50% of the 5,855 Android apps studied by researchers were found to snoop and collect information about its users</a>. 40% of the apps were found to insecurely snitch on its users. Furthermore, they could detect only some methods of snooping, in these proprietary apps whose source code they cannot look at. The other apps might be snooping in other ways. 267 This is evidence that proprietary apps generally work against their users. To protect their privacy and freedom, Android users need to get rid of the proprietary software&mdash;both proprietary Android by <a href=" https://replicant.us ">switching to Replicant</a>, and the proprietary apps by getting apps from the free software only <a href=" https://f-droid.org/ ">F-Droid store</a> that <a href=" https://f-droid.org/docs/Anti-Features/ "> prominently warns the user if an app contains anti-features</a>. 268 Grindr collects information about <a href=" https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status "> which users are HIV-positive, then provides the information to companies</a>. 270 The moviepass app and dis-service spy on users even more than users expected. It <a href=" https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/ ">records where they travel before and after going to a movie</a>. 272 Spotify app <a href=" https://www.sec.gov/Archives/edgar/data/1639920/000119312518063434/d494294df1.htm ">harvests users' data to personally identify and know people</a> through music, their mood, mindset, activities, and tastes. There are over 150 billion events logged daily on the program which contains users' data and personal information. 273 Tracking software in popular Android apps is pervasive and sometimes very clever. Some trackers can <a href=" https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/ "> follow a user's movements around a physical store by noticing WiFi networks</a>. 274 <a href=" https://web.archive.org/web/20230607090524/https://old.reddit.com/r/Instagram/comments/6xkhi8/ig_suddenly_asking_for_phone_number_not_visible/ ">Instagram is forcing users to give away their phone numbers</a> and won't let people continue using the app if they refuse. 275 | The Sarahah app <a | href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"> | uploads all phone numbers and email addresses</a> in user's address book | to developer's server. [-Note that this article misuses the words | &ldquo;<a href="/philosophy/free-sw.html">free software</a>&rdquo; | referring to zero price.-] The Sarahah app <a href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"> uploads all phone numbers and email addresses</a> in user's address book to developer's server. L'applicazione Sarahah <a href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"> invia tutti i numeri di telefono e gli indirizzi e-mail</a> della rubrica dell'utente al server dello sviluppatore. Notate che questo articolo fa confusione e usa &ldquo;<a href=" /philosophy/free-sw.html ">free software</a>&rdquo; nel senso, errato, di gratuito. 276 <small>(Note that this article misuses the words &ldquo;<a href=" /philosophy/free-sw.html ">free software</a>&rdquo; referring to zero price.)</small> 277 20 dishonest Android apps recorded <a href=" https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts/ ">phone calls and sent them and text messages and emails to snoopers</a>. 279 On the other hand, Google redistributes nonfree Android apps, and therefore shares in the responsibility for the injustice of their being nonfree. It also distributes its own nonfree apps, such as Google Play, <a href=" /philosophy/free-software-even-more-important.html ">which are malicious</a>. 283 | Apps for BART <a | [-href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop-] | {+href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"> | snoop+} on users</a>. Apps for BART <a href=" https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/ "> snoop on users</a>. Le applicazioni per BART <a href=" https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/ ">spiano gli utenti</a>. 287 | Faceapp appears to do lots of surveillance, judging by <a | [-href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">-] | {+href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">+} | how much access it demands to personal data in the device</a>. Faceapp appears to do lots of surveillance, judging by <a href=" https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/ "> how much access it demands to personal data in the device</a>. Sembra che Faceapp faccia molta sorveglianza, a giudicare dalla frequenza con cui <a href=" https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/ "> accede ai dati personali immagazzinati nel dispositivo</a>. 288 | Users are suing Bose for <a | [-href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">-] | {+href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">+} | distributing a spyware app for its headphones</a>. Specifically, the app | would record the names of the audio files users listen to along with the | headphone's unique serial number. Users are suing Bose for <a href=" https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/ "> distributing a spyware app for its headphones</a>. Specifically, the app would record the names of the audio files users listen to along with the headphone's unique serial number. Gli utenti stanno facendo causa a Bose perché <a href=" https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/ "> distribuirebeb un'applicazione spyware</a> per le sue cuffie. Per la precisione, l'applicazione registrerebbe i nomi dei file audio ascoltati dagli utenti insieme al numero di serie delle cuffie. 296 | A <a | [-href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">-] | {+href="https://research.csiro.au/isp/wp-content/uploads/sites/106/2016/08/paper-1.pdf">+} | research paper</a> that investigated the privacy and security of 283 | Android VPN apps concluded that &ldquo;in spite of the promises for | privacy, security, and anonymity given by the majority of VPN | apps&mdash;millions of users may be unawarely subject to poor security | guarantees and abusive practices inflicted by VPN apps.&rdquo; A <a href=" https://research.csiro.au/isp/wp-content/uploads/sites/106/2016/08/paper-1.pdf "> research paper</a> that investigated the privacy and security of 283 Android VPN apps concluded that &ldquo;in spite of the promises for privacy, security, and anonymity given by the majority of VPN apps&mdash;millions of users may be unawarely subject to poor security guarantees and abusive practices inflicted by VPN apps.&rdquo; Un <a href=" https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf "> articolo</a> sulla privacy e sicurezza di 283 applicazioni VPN per Android ha concluso che nonostante le promesse di privacy e sicurezza fatte da molte di loro, milioni di utenti potrebbero essere alla mercé di pratiche di sicurezza deboli usate da tali applicazioni. 310 | Google's new voice messaging app <a | href="http{+s+}://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs | all conversations</a>. Google's new voice messaging app <a href=" https://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google ">logs all conversations</a>. La nuova applicazione per conversazioni vocali di Google <a href=" http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google ">tiene traccia di tutte le conversazioni</a>. 311 | Facebook's new Magic Photo app <a | [-href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">-] | {+href="https://www.theregister.com/2015/11/10/facebook_scans_camera_for_your_friends/">+} | scans your mobile phone's photo collections for known faces</a>, and | suggests you [-to share-] {+circulate+} the picture you take according to | who is in the frame. Facebook's new Magic Photo app <a href=" https://www.theregister.com/2015/11/10/facebook_scans_camera_for_your_friends/ "> scans your mobile phone's photo collections for known faces</a>, and suggests you circulate the picture you take according to who is in the frame. La nuova applicazione di Facebook, Magic Photo, <a href=" https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/ ">cerca volti ad essa noti nelle raccolte di foto del vostro telefono</a>, e vi suggerisce di condividere la foto secondo la persona che trova nell'inquadratura. 314 | Facebook's app listens all the time, <a | [-href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to-] | {+href="https://www.independent.co.uk/tech/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to+} | snoop on what people are listening to or watching</a>. In addition, it may | be analyzing people's conversations to serve them with targeted | advertisements. Facebook's app listens all the time, <a href=" https://www.independent.co.uk/tech/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html ">to snoop on what people are listening to or watching</a>. In addition, it may be analyzing people's conversations to serve them with targeted advertisements. L'applicazione di Facebook è sempre in ascolto, <a href=" http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html ">spia quello che gli utenti sentono o guardano</a>. Inoltre potrebbe teoricamente analizzare le conversazioni a fini pubblicitari. 315 | A pregnancy test controller application not only can <a | [-href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy-] | {+href="https://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"> | spy+} on many sorts of data in the phone, and in server accounts, it can | alter them too</a>. A pregnancy test controller application not only can <a href=" https://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security "> spy on many sorts of data in the phone, and in server accounts, it can alter them too</a>. Un'applicazione per il test di gravidanza non solo può spiare vari dati nel telefono, ma <a href=" http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security ">li può anche modificare</a>. 316 | Apps that include <a | [-href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">-] | {+href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">+} | Symphony surveillance software snoop on what radio and TV programs are | playing nearby</a>. Also on what users post on various sites such as | Facebook, Google+ and Twitter. Apps that include <a href=" https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/ "> Symphony surveillance software snoop on what radio and TV programs are playing nearby</a>. Also on what users post on various sites such as Facebook, Google+ and Twitter. Le applicazioni che includono <a href=" http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/ "> il sistema di sorveglianza Symphony spiano le trasmissioni TV e radio nell'ambiente circostante</a> e spiano anche quello che gli utenti scrivono su siti come Facebook, Google+ e Twitter. 317 | &ldquo;Cryptic communication,&rdquo; unrelated to the app's functionality, | was <a | href="http{+s+}://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"> | found in the 500 most popular gratis Android apps</a>. &ldquo;Cryptic communication,&rdquo; unrelated to the app's functionality, was <a href=" https://news.mit.edu/2015/data-transferred-android-apps-hiding-1119 "> found in the 500 most popular gratis Android apps</a>. Sono state trovate attività di &ldquo;comunicazione non chiara&rdquo;, non collegata all'attività dell'applicazione, <a href=" http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119 "> nelle 500 applicazioni gratuite per Android più diffuse</a>. 320 | More than 73% {+and 47%+} of [-the most popular-] {+mobile applications, | for+} Android [-apps-] {+and iOS respectively+} <a | [-href="http://jots.pub/a/2015103001/index.php">share-] | {+href="https://techscience.org/a/2015103001/">hand over+} personal, | behavioral and location information</a> of their users [-with-] {+to+} | third parties. More than 73% and 47% of mobile applications, for Android and iOS respectively <a href=" https://techscience.org/a/2015103001/ ">hand over personal, behavioral and location information</a> of their users to third parties. Oltre il 73% delle applicazioni Android più comuni <a href=" http://jots.pub/a/2015103001/index.php ">condivide con terze parti informazioni personali, di comportamento e di posizione</a> riguardo gli utenti. 321 | Like most &ldquo;music screaming&rdquo; disservices, Spotify is based on | proprietary malware (DRM and snooping). In August 2015 it <a | href="http{+s+}://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"> | demanded users submit to increased snooping</a>, and some are starting to | realize that it is nasty. Like most &ldquo;music screaming&rdquo; disservices, Spotify is based on proprietary malware (DRM and snooping). In August 2015 it <a href=" https://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy "> demanded users submit to increased snooping</a>, and some are starting to realize that it is nasty. Come molti servizi di streaming (che noi preferiamo chiamare "disservizi di screaming", urlare) Spotify è basato su malware proprietario (DRM e spionaggio). In agosto 2015 ha chiesto agli utenti di <a href=" http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy "> accettare uno spionaggio ancora maggiore</a>, e alcuni cominciano a capire che questo non va bene. 322 | This article shows the <a | [-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">-] | {+href="https://www.theregister.com/2015/08/21/spotify_worse_than_the_nsa/">+} | twisted ways that they present snooping as a way to &ldquo;serve&rdquo; | users better</a>&mdash;never mind whether they want that. This is a | typical example of the attitude of the proprietary software industry | towards those they have subjugated. This article shows the <a href=" https://www.theregister.com/2015/08/21/spotify_worse_than_the_nsa/ "> twisted ways that they present snooping as a way to &ldquo;serve&rdquo; users better</a>&mdash;never mind whether they want that. This is a typical example of the attitude of the proprietary software industry towards those they have subjugated. Questo articolo mostra come lo spionaggio sia presentato come <a href=" https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/ "> un "miglioramento" dell'esperienza degli utenti</a>, anche se gli utenti non l'hanno mai chiesto. Questo è un tipico esempio dell'atteggiamento che l'industria del software proprietario ha nei confronti delle persone che ha soggiogato. 324 Many retail businesses publish cr&hellip;apps that ask to <a href=" https://www.delish.com/kitchen-tools/a43252/how-food-apps-use-data/ "> spy on the user's own data</a>&mdash;often many kinds. 326 | <a | [-href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A-] | {+href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf"> | A+} study in 2015</a> found that 90% of the top-ranked gratis proprietary | Android apps contained recognizable tracking libraries. For the paid | proprietary apps, it was only 60%. <a href=" https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf "> A study in 2015</a> found that 90% of the top-ranked gratis proprietary Android apps contained recognizable tracking libraries. For the paid proprietary apps, it was only 60%. <a href=" http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf ">Uno studio del 2015</a> ha trovato che il 90% delle più diffuse applicazioni Android proprietarie gratuite contenevano librerie per il tracciamento degli utenti, mentre nel caso delle applicazioni a pagamento la percentuale scendeva al 60%. 328 | Gratis Android apps (but not <a href="/philosophy/free-sw.html">free | software</a>) connect to 100 <a | href="http{+s+}://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking | and advertising</a> URLs, on the average. Gratis Android apps (but not <a href="/philosophy/free-sw.html">free software</a>) connect to 100 <a href=" https://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites ">tracking and advertising</a> URLs, on the average. Le applicazioni gratuite per Android (gratuite, ma non <a href="/philosophy/free-sw.html">libere</a>) si collegano in media a 100 indirizzi di <a href=" http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites ">profilazione e pubblicità</a>. 329 | Widely used <a | [-href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary-] | {+href="https://freedom-to-tinker.com/2015/04/06/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary+} | QR-code scanner apps snoop on the user</a>. This is in addition to the | snooping done by the phone company, and perhaps by the OS in the phone. Widely used <a href=" https://freedom-to-tinker.com/2015/04/06/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/ ">proprietary QR-code scanner apps snoop on the user</a>. This is in addition to the snooping done by the phone company, and perhaps by the OS in the phone. Alcune diffuse <a href=" https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/ ">applicazioni proprietarie per leggere codici QR</a> spiano l'utente. Questo si aggiunge alle attività di possibile spionaggio da parte della compagnia telefonica e del sistema operativo. 331 | Many proprietary apps for mobile devices report which other apps the user | has installed. <a | href="http{+s+}://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter | is doing this in a way that at least is visible and optional</a>. Not as | bad as what the others do. Many proprietary apps for mobile devices report which other apps the user has installed. <a href=" https://techcrunch.com/2014/11/26/twitter-app-graph/ ">Twitter is doing this in a way that at least is visible and optional</a>. Not as bad as what the others do. Molte applicazioni proprietarie per dispositivi mobili comunicano agli autori la lista delle altre applicazioni installate dall'utente. <a href=" http://techcrunch.com/2014/11/26/twitter-app-graph/ ">Twitter lo sta facendo in maniera perlomeno visibile ed opzionale</a>. Altri programmi fanno di peggio. 332 The Simeji keyboard is a smartphone version of Baidu's <a href=" /proprietary/proprietary-surveillance.html#baidu-ime ">spying <abbr title="Input Method Editor">IME</abbr></a>. 333 | The nonfree Snapchat app's principal purpose is to restrict the use of | data on the user's computer, but it does surveillance too: <a | href="http{+s+}://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"> | it tries to get the user's list of other people's phone [-numbers.</a>-] | {+numbers</a>.+} The nonfree Snapchat app's principal purpose is to restrict the use of data on the user's computer, but it does surveillance too: <a href=" https://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers "> it tries to get the user's list of other people's phone numbers</a>. Lo scopo principale dell'applicazione non libera Snapchat è limitare l'uso di dati sul computer dell'utente, ma si occupa anche di sorveglianza: <a href=" http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers ">prova ad ottenere i numeri telefonici dei contatti dell'utente</a>. 334 | The Brightest Flashlight app <a | href="http{+s+}://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"> | sends user data, including geolocation, for use by [-companies.</a>-] | {+companies</a>.+} The Brightest Flashlight app <a href=" https://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers "> sends user data, including geolocation, for use by companies</a>. L'applicazione Brightest Flashlight (torcia più luminosa) <a href=" http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers ">invia i dati dell'utente, inclusa la posizione geografica, perché siano usati dalle società</a>. 336 | FTC says most mobile apps for children don't respect privacy: <a | [-href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"> | http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.-] | {+href="https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"> | https://arstechnica.com/information-technology/2012/12/ftc-disclosures-seve | rely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.+} FTC says most mobile apps for children don't respect privacy: <a href=" https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/ "> https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>. La FTC (l'agenzia di stato americana che si occupa della tutela dei consumatori) afferma che la maggior parte delle applicazioni mobili mirate ai bambini non rispettano la privacy: <a href=" http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/ "> http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>. 339 Skype refuses to say whether it can <a href=" http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html ">eavesdrop on calls</a>. 341 | [-Spyware in Skype:-]{+Skype contains+} <a | [-href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"> | http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.-] | {+href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.+} | Microsoft changed Skype <a | [-href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">-] | {+href="https://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data">+} | specifically for spying</a>. Skype contains <a href=" https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/ ">spyware</a>. Microsoft changed Skype <a href=" https://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data "> specifically for spying</a>. Spyware in Skype: <a href=" http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/ "> http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>. Microsoft ha modificato Skype <a href=" http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data ">specificamente per spiare</a>. 344 Microsoft is imposing its surveillance on the game of Minecraft by <a href=" https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java ">requiring every player to open an account on Microsoft's network</a>. Microsoft has bought the game and will merge all accounts into its network, which will give them access to people's data. 345 Minecraft players <a href=" https://directory.fsf.org/wiki/Minetest ">can play Minetest</a> instead. The essential advantage of Minetest is that it is free software, meaning it respects the user's computer freedom. As a bonus, it offers more options. 346 Microsoft recorded users of Xboxes and had <a href=" https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana "> human workers listen to the recordings</a>. 348 Red Shell is a spyware that is found in many proprietary games. It <a href=" https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/ "> tracks data on users' computers and sends it to third parties</a>. 349 ArenaNet surreptitiously installed a spyware program along with an update to the massive multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a href=" https://techraptor.net/gaming/news/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave "> to snoop on all open processes running on its user's computer</a>. 350 The driver for a certain gaming keyboard <a href=" https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html ">sends information to China</a>. 351 | Many <a | [-href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">-] | {+href="https://www.thestar.com/news/canada/video-game-companies-are-collecting-massive-amounts-of-data-about-you/article_31fba9a3-2760-57ae-9ae0-4083904bcb87.html">+} | video game consoles snoop on their users and report to the | internet</a>&mdash;[- -]even what their users weigh. Many <a href=" https://www.thestar.com/news/canada/video-game-companies-are-collecting-massive-amounts-of-data-about-you/article_31fba9a3-2760-57ae-9ae0-4083904bcb87.html "> video game consoles snoop on their users and report to the internet</a>&mdash;even what their users weigh. Molte console per videogiochi <a href=" http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/ "> spiano l'utente e inviano dati via Internet</a>, persino il peso degli utenti. 353 | Modern gratis game cr&hellip;apps <a | href="http{+s+}://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"> | collect a wide range of data about their users and their users' friends | and associates</a>. Modern gratis game cr&hellip;apps <a href=" https://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/ "> collect a wide range of data about their users and their users' friends and associates</a>. Le applicazioni moderne per giocare <a href=" http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/ "> raccolgono molti dati sui loro utenti e sugli amici dei loro utenti</a>. 357 | Angry Birds <a | href="http{+s+}://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"> | spies for companies, and the NSA takes advantage to spy through it | too</a>. Here's information on <a | href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"> | more spyware apps</a>. Angry Birds <a href=" https://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html "> spies for companies, and the NSA takes advantage to spy through it too</a>. Here's information on <a href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"> more spyware apps</a>. Angry Birds <a href=" http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html ">spia per varie società, e la NSA ne approfitta per spiare a sua volta</a>. <a href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">Informazioni su altre applicazioni spyware</a>. 358 | <a | href="http{+s+}://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"> | More about NSA app spying</a>. <a href=" https://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data "> More about NSA app spying</a>. <a href=" http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data ">Ulteriori informazioni sullo spionaggio di applicazioni da parte dell'NSA</a>. 359 Blizzard Warden is a hidden &ldquo;cheating-prevention&rdquo; program that <a href=" https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware "> spies on every process running on a gamer's computer and sniffs a good deal of personal data</a>, including lots of activities which have nothing to do with cheating. 361 | <span class="anchor-reference-id">(<a | [-href="#SpywareInSkype">#SpywareInSkype</a>)</span>-] | {+href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>+} <span class="anchor-reference-id">(<a href=" #SpywareInEquipment ">#SpywareInEquipment</a>)</span> <span class="anchor-reference-id">(<a href=" #SpywareInSkype ">#SpywareInSkype</a>)</span> 362 Most Internet connected devices in Mozilla's <a href=" https://web.archive.org/web/20220129065321/https://foundation.mozilla.org/en/privacynotincluded/ ">&ldquo;Privacy Not Included&rdquo;</a> list <a href=" https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell ">are designed to snoop on users</a> even if they meet Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure design of the program running on some of these devices <a href=" https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster ">makes the user susceptible to be snooped on and exploited by crackers as well</a>. 363 As tech companies add microphones to a wide range of products, including refrigerators and motor vehicles, they also set up transcription farms where human employees <a href=" https://getpocket.com/explore/item/silicon-valley-got-millions-to-let-siri-and-alexa-listen-in "> listen to what people say</a> and tweak the recognition algorithms. 364 The bad security in many Internet of Stings devices allows <a href=" https://www.techdirt.com/2017/08/28/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you/ ">ISPs to snoop on the people that use them</a>. 366 <small>(It is unfortunate that the article uses the term <a href=" /philosophy/words-to-avoid.html#Monetize ">&ldquo;monetize&rdquo;</a>.)</small> 370 Today's &ldquo;smart&rdquo; TVs <a href=" https://www.techdirt.com/2022/04/14/its-still-stupidly-ridiculously-difficult-to-buy-a-dumb-tv/ "> push people to surrender to tracking via internet</a>. Some won't work unless they have a chance to download nonfree software. And they are designed for programmed obsolescence. 371 &ldquo;Smart&rdquo; TV manufacturers <a href=" https://www.theguardian.com/technology/2022/jan/29/what-your-smart-tv-knows-about-you-and-how-to-stop-it-harvesting-data "> spy on people using various methods</a>, and harvest their data. They are collecting audio, video, and TV usage data to profile people. 372 TV manufacturers are turning to produce only &ldquo;Smart&rdquo; TV sets (which include spyware) that <a href=" https://frame.work/blog/in-defense-of-dumb-tvs ">it's now very hard to find a TV that doesn't spy on you</a>. 374 TV manufacturers are able to <a href=" https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/ ">snoop every second of what the user is watching</a>. This is illegal due to the Video Privacy Protection Act of 1988, but they're circumventing it through EULAs. 375 Vizio TVs <a href=" https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019 "> collect &ldquo;whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and this data is sold to third parties. This is in return for &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly lower retail prices. 378 Some &ldquo;Smart&rdquo; TVs automatically <a href=" https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928 "> load downgrades that install a surveillance app</a>. 379 We link to the article for the facts it presents. It is too bad that the article finishes by advocating the moral weakness of surrendering to Netflix. The Netflix app <a href=" /proprietary/malware-google.html#netflix-app-geolocation-drm ">is malware too</a>. 380 | Vizio &ldquo;smart&rdquo; <a | [-href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs-] | {+href="https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs+} | report everything that is viewed on them, and not just broadcasts and | cable</a>. Even if the image is coming from the user's own computer, the | TV reports what it is. The existence of a way to disable the surveillance, | even if it were not hidden as it was in these TVs, does not legitimize the | surveillance. Vizio &ldquo;smart&rdquo; <a href=" https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen ">TVs report everything that is viewed on them, and not just broadcasts and cable</a>. Even if the image is coming from the user's own computer, the TV reports what it is. The existence of a way to disable the surveillance, even if it were not hidden as it was in these TVs, does not legitimize the surveillance. Le TV di Vizio &ldquo;smart&rdquo; <a href=" https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen ">segnalano tutto quello che l'utente vede, non solo le trasmissioni televisive</a>, e quindi anche immagini provenienti dal computer personale dell'utente. Anche se esiste un modo -difficile- di disattivare questa funzione, la sorveglianza non è legittima. 381 | Some web and TV advertisements play inaudible sounds to be picked up by | proprietary malware running on other devices in range so as to determine | that they are nearby. Once your Internet devices are paired with your TV, | advertisers can correlate ads with Web activity, and other <a | [-href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device-] | {+href="https://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"> | cross-device+} tracking</a>. Some web and TV advertisements play inaudible sounds to be picked up by proprietary malware running on other devices in range so as to determine that they are nearby. Once your Internet devices are paired with your TV, advertisers can correlate ads with Web activity, and other <a href=" https://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/ "> cross-device tracking</a>. Alcune pubblicità trasmesse via web e TV contengono suoni che non sono udibili dall'orecchio umano ma sono catturati da malware proprietario che è in esecuzione su altri dispositivi che si trovano nelle vicinanze. Una volta che i vostri dispositivi Internet sono stati associati alla vostra TV con questa tecnica, le aziende possono studiare correlazioni tra le pubblicità e l'attività web e svolgere altre attività di <a href=" http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/ ">tracciamento su dispositivi multipli</a>. 382 | Vizio goes a step further than other TV manufacturers in spying on their | users: their <a | href="http{+s+}://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"> | &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and link | them your IP address</a> so that advertisers can track you across devices. Vizio goes a step further than other TV manufacturers in spying on their users: their <a href=" https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you "> &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and link them your IP address</a> so that advertisers can track you across devices. Vizio fa un ulteriore passo avanti nello spionaggio rispetto agli altri produttori di TV: le loro <a href=" http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you "> &ldquo;smart&rdquo; TV analizzano quello che guardate e lo collegano al vostro indirizzo IP</a> per consentire agli inserzionisti pubblicitari di controllarvi su più dispositivi. 384 | Tivo's alliance with Viacom adds 2.3 million households to the 600 | millions social media profiles the company already monitors. Tivo | customers are unaware they're being watched by advertisers. By combining | TV viewing information with online social media participation, Tivo can | now <a | [-href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate-] | {+href="https://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102/"> | correlate+} TV advertisement with online purchases</a>, exposing all users | to new combined surveillance by default. Tivo's alliance with Viacom adds 2.3 million households to the 600 millions social media profiles the company already monitors. Tivo customers are unaware they're being watched by advertisers. By combining TV viewing information with online social media participation, Tivo can now <a href=" https://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102/ "> correlate TV advertisement with online purchases</a>, exposing all users to new combined surveillance by default. L'alleanza di Tivo con Viacom aggiunge 2.3 milioni di famiglie ai 600 milioni di profili social che l'azienda già controlla. I clienti di Tivo non sanno che gli inserzionisti li stanno guardando. Combinando le informazioni sulla fruizione televisiva con la partecipazione nei social, Tivo ora può <a href=" http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102 ">correlare la pubblicità in TV con gli acquisti</a>, esponendo tutti gli utenti a una nuova forma di sorveglianza combinata. 385 | Vizio &ldquo;smart&rdquo; TVs recognize and <a | [-href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track-] | {+href="https://www.engadget.com/2015-07-24-vizio-ipo-inscape-acr.html">track+} | what people are watching</a>, even if it isn't a TV channel. Vizio &ldquo;smart&rdquo; TVs recognize and <a href=" https://www.engadget.com/2015-07-24-vizio-ipo-inscape-acr.html ">track what people are watching</a>, even if it isn't a TV channel. I televisori &ldquo;intelligenti&rdquo; di Vizio riconoscono e <a href=" http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/ ">spiano quello che gli utenti guardano</a>, persino se non si tratta di un canale televisivo. 386 | [-<a | href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon-]{+Verizon+} | cable TV {+<a | href="https://arstechnica.com/information-technology/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">+} | snoops on what programs people watch, and even what they wanted to | [-record.</a>-] {+record</a>.+} Verizon cable TV <a href=" https://arstechnica.com/information-technology/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/ "> snoops on what programs people watch, and even what they wanted to record</a>. <a href=" http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/ ">La TV via cavo di Verizon spia quali programmi gli utenti guardano e quali vogliono registrare.</a> 387 | Vizio <a | href="http{+s+}://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"> | used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what users | watch</a>. The TVs did not do that when first sold. Vizio <a href=" https://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html "> used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what users watch</a>. The TVs did not do that when first sold. Vizio <a href=" http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html "> ha utilizzato un aggiornamento del firmware</a> per far sì che i suoi televisori spiassero quello che gli utenti guardavano. Al momento della vendita questa funzione non era presente. 388 | The Samsung &ldquo;Smart&rdquo; TV <a | [-href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits-] | {+href="https://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"> | transmits+} users' voice on the internet to another company, Nuance</a>. | Nuance can save it and would then have to give it to the US or some other | government. The Samsung &ldquo;Smart&rdquo; TV <a href=" https://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm "> transmits users' voice on the internet to another company, Nuance</a>. Nuance can save it and would then have to give it to the US or some other government. Le &ldquo;Smart&rdquo; TV di Samsung <a href=" http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm ">inviano la voce dell'utente via Internet</a> ad un'altra azienda, Nuance, che si riserva di conservare questi dati e che potrebbe in teoria essere obbligata a darli al governo statunitense o di un'altra nazione. 390 | In its privacy policy, Samsung explicitly confirms that <a | href="http{+s+}://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice | data containing sensitive information will be transmitted to third | parties</a>. In its privacy policy, Samsung explicitly confirms that <a href=" https://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs ">voice data containing sensitive information will be transmitted to third parties</a>. Nelle sue linee guida sulla privacy, Samsung conferma esplicitamente che <a href=" http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs ">dati vocali con informazioni sensibili sono trasmessi a terze parti</a>. 391 | The Amazon &ldquo;Smart&rdquo; TV {+is+} <a | [-href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is | watching and listening-] | {+href="https://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"> | snooping+} all the time</a>. The Amazon &ldquo;Smart&rdquo; TV is <a href=" https://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance "> snooping all the time</a>. La &ldquo;Smart&rdquo; TV di Amazon <a href=" http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance ">è sempre in osservazione ed in ascolto</a>. 392 | More or less all &ldquo;smart&rdquo; TVs <a | [-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy-] | {+href="https://myce.wiki/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy+} | on their users</a>. More or less all &ldquo;smart&rdquo; TVs <a href=" https://myce.wiki/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/ ">spy on their users</a>. Quasi tutte le TV &ldquo;smart&rdquo; <a href=" http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/ ">spiano i loro utenti</a>. 396 | [-Meanwhile,-]LG [-TVs-] <a | [-href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"> | do lots of spying anyway</a>.-] | {+href="https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/"> | disabled network features</a> on <em>previously purchased</em> | &ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG begin to | snoop on them and distribute their personal data.+} LG <a href=" https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/ "> disabled network features</a> on <em>previously purchased</em> &ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG begin to snoop on them and distribute their personal data. Nel frattempo, le televisioni di LG <a href=" http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml ">continuano a spiare parecchie cose</a>. 398 | Even worse, it <a | [-href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">-] | {+href="https://rrrrambles.wordpress.com/2013/11/21/lg-tv-logging-filenames-from-network-folders/">+} | snoops on other devices on the user's local [-network.</a>-] | {+network</a>.+} Even worse, it <a href=" https://rrrrambles.wordpress.com/2013/11/21/lg-tv-logging-filenames-from-network-folders/ "> snoops on other devices on the user's local network</a>. Ancora peggio, la TV <a href=" http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/ ">curiosa tra gli altri dispositivi connessi alla rete locale dell'utente</a>. 400 | Meanwhile, LG TVs <a | [-href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">-] | {+href="https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/">+} | do lots of spying anyway</a>. Meanwhile, LG TVs <a href=" https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/ "> do lots of spying anyway</a>. Nel frattempo, le televisioni di LG <a href=" http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml ">continuano a spiare parecchie cose</a>. 401 | Spyware in [-<a | href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">-] | LG &ldquo;smart&rdquo; [-TVs</a>-] {+TVs <a | href="https://doctorbeet.blogspot.com/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">+} | reports what the user watches, and the switch to turn this off has no | [-effect.-] {+effect</a>.+} (The fact that the transmission reports a 404 | error really means nothing; the server could save that data anyway.) Spyware in LG &ldquo;smart&rdquo; TVs <a href=" https://doctorbeet.blogspot.com/2013/11/lg-smart-tvs-logging-usb-filenames-and.html "> reports what the user watches, and the switch to turn this off has no effect</a>. (The fact that the transmission reports a 404 error really means nothing; the server could save that data anyway.) Lo spyware nelle <a href=" http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html ">&ldquo;smart&rdquo; TV di LG</a> comunica cosa guarda l'utente, e disattivare questa funzione non serve a nulla. (Il codice 404 da essa mostrato non significa nulla; il server potrebbe benissimo salvare i dati.) 405 Surveillance cameras put in by government A to surveil for it may be surveilling for government B as well. That's because A put in a product <a href=" https://www.rferl.org/a/ukraine-cctv-moscow-spying-schemes-investigation/32747767.html "> made by B with nonfree software</a>. 406 <small>(Please note that this article misuses the word &ldquo;<a href=" /philosophy/words-to-avoid.html#Hacker ">hack</a>&rdquo; to mean &ldquo;break security.&rdquo;)</small> 407 <a href=" https://www.theguardian.com/technology/2023/jul/04/smile-youre-on-camera-self-driving-cars-are-here-and-theyre-watching-you "> Driverless cars in San Francisco collect videos constantly</a>, using cameras inside and outside, and governments have already collected those videos secretly. 408 As the Surveillance Technology Oversight Project says, they are &ldquo;driving us straight into authoritarianism.&rdquo; We must <a href=" /philosophy/surveillance-vs-democracy.html ">regulate <em>all</em> cameras that collect images that can be used to track people</a>, to make sure they are not used for that. 409 The Ring doorbell camera is designed so that the manufacturer (now Amazon) can watch all the time. Now it turns out that <a href=" https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/ "> anyone else can also watch, and fake videos too</a>. 410 The third party vulnerability is presumably unintentional and Amazon will probably fix it. However, we do not expect Amazon to change the design that <a href=" /proprietary/proprietary-surveillance.html#M201901100 ">allows Amazon to ...
http://www.gnu.org/savannah-checkouts/gnu/gnun/reports/it/proprietary/proprietary-surveillance.html - [detail] - [similar]
PREV NEXT
Powered by Hyper Estraier 1.4.13, with 213331 documents and 1081083 words.