advanced help
phrase:
attribute:
attribute:
attribute:
order:
per page:
clip:
action:
Results of 1 - 1 of about 725 for Android 12 (1.917 sec.)
android (2801), 12 (27798)
proprietary-surveillance.ja.po
#score: 5143
@digest: 27afe8de0ab8dfd519a9a87601a0e01f
@id: 412047
@mdate: 2024-04-13T11:10:15Z
@size: 193749
@type: text/html
content-type: text/html; charset=utf-8
#keywords: す</ (86313), スパ (47248), theguardian (39728), ユー (29198), arstechnica (28456), パイ (26543), https (26211), ldquo (24515), rdquo (22593), ーザ (22445), アプ (21494), プリ (19354), href (19302), privacy (19215), surveillance (18369), facebook (16800), spyware (15200), ンド (13967), apps (13250), ソフ (12760), technology (12598), google (12502), smart (12038), フト (10862), android (10207), ウェ (10141), personal (9794), apple (9313), tracking (9291), phones (9290), com (9052), phone (7888)
proprietary-surveillance.ja.po Mismatched links: 410. Mismatched ids: 0. # text 15 A common malicious functionality is to snoop on the user. This page records <strong>clearly established cases of proprietary software that spies on or tracks users</strong>. Manufacturers even refuse to <a href=" https://techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/ ">say whether they snoop on users for the state</a>. 16 All appliances and applications that are tethered to a specific server are snoopers by nature. We do not list them here because they have their own page: <a href=" /proprietary/proprietary-tethers.html#about-page ">Proprietary Tethers</a>. 17 There is a similar site named <a href=" https://spyware.neocities.org ">Spyware Watchdog</a> that classifies spyware programs, so that users can be more aware that they are installing spyware. 21 <a href=" #OSSpyware ">Spyware in Laptops and Desktops</a> 26 <a href=" #SpywareInTelephones ">All &ldquo;Smart&rdquo; Phones</a> 31 <a href=" #SpywareInDesktopApps ">Desktop Apps</a> 35 <a href=" #SpywareInEquipment ">Spyware in Connected Equipment</a> 39 <a href=" #SpywareInDrones ">Drones</a> 40 <a href=" #SpywareAtHome ">Other Appliances</a> 41 <a href=" #SpywareOnWearables ">Wearables</a> 42 <a href=" #SpywareOnSmartWatches ">&ldquo;Smart&rdquo; Watches</a> 49 <a href=" #SpywareInNetworks ">Spyware in Networks</a> 51 For decades, the Free Software movement has been denouncing the abusive surveillance machine of <a href="/proprietary/proprietary.html">proprietary software</a> companies such as <a href="/proprietary/malware-microsoft.html">Microsoft</a> and <a href="/proprietary/malware-apple.html">Apple</a>. In the recent years, this tendency to watch people has spread across industries, not only in the software business, but also in the hardware. Moreover, it also spread dramatically away from the keyboard, in the mobile computing industry, in the office, at <a href=" https://www.theguardian.com/world/2023/sep/07/uk-owners-of-smart-home-devices-being-asked-for-swathes-of-personal-data "> home</a>, in transportation systems, and in the classroom. 数十年にわたって、自由ソフトウェア運動は、<a href="/proprietary/proprietary.html">プロプライエタリなソフトウェア</a>の企業による乱用の監視機械を非難してきました。<a href="/proprietary/malware-microsoft.html">マイクロソフト</a>や<a href="/proprietary/malware-apple.html">Apple</a>といった企業です。近年では、この人々を監視する傾向は産業に蔓延し、ソフトウェアのビジネスだけでなく、ハードウェアのビジネスにも広がって来ました。さらに、キーボードからドラマチックに広がって、モバイル・コンピューティングの産業、オフィス、家庭、交通システム、そして教室へと広がってきています。 60 Entries in each category are in reverse chronological order, based on the dates of publication of linked articles. The latest additions are listed on the <a href=" /proprietary/proprietary.html#latest ">main page</a> of the Malware section. 65 As soon as it boots, and without asking any permission, <a href=" https://www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html ">Windows 11 starts to send data to online servers</a>. The user's personal details, location or hardware information are reported to Microsoft and other companies to be used as telemetry data. All of this is done is the background, and users have no easy way to prevent it&mdash;unless they switch the computer offline. 66 Microsoft <a href=" https://betanews.com/2023/01/19/microsoft-is-using-the-kb5021751-update-to-see-if-you-have-an-unsupported-version-of-office-installed/ "> released an &ldquo;update&rdquo; that installs a surveillance program</a> on users' computers to gather data on some installed programs for Microsoft's benefit. The update is rolling out automatically, and the program runs &ldquo;one time silently.&rdquo; 67 Windows 11 Home and Pro now <a href=" https://www.microsoft.com/windows/windows-11-specifications "> require internet connection and a Microsoft account</a> to complete the installation. Windows 11 Pro had an option to create a local account instead, but the option has been removed. This account can (and most certainly will) be used for surveillance and privacy violations. Thankfully, a free software tool named <a href=" https://gothub.frontendfriendly.xyz/pbatard/rufus/blob/master/README.md ">Rufus</a> can bypass those requirements, or help users install a <a href=" /distros/distros.html "> free operating system</a> instead. 68 Microsoft is <a href=" https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/ ">tricking users to create an account on their network</a> to be able to install and use the Windows operating system, which is malware. The account can be used for surveillance and/or violating people's rights in many ways, such as turning their purchased software to a subscription product. 69 HP's proprietary operating system <a href=" https://www.bbc.com/news/technology-42309371 ">includes a proprietary keyboard driver with a key logger in it</a>. 71 Furthermore, for users who installed the fourth stable build of Windows 10, called the &ldquo;Creators Update,&rdquo; Windows maximized the surveillance <a href=" https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law/ "> by force setting the telemetry mode to &ldquo;Full&rdquo;</a>. 72 The <a href=" https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level "> &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, among other things, registry keys <a href=" https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10) "> which can contain sensitive information like administrator's login password</a>. 73 DRM-restricted files can be used to <a href=" https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users "> identify people browsing through Tor</a>. The vulnerability exists only if you use Windows. 74 By default, Windows 10 <a href=" https://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties/ ">sends debugging information to Microsoft, including core dumps</a>. Microsoft now distributes them to another company. デフォルトでは、ウィンドウズ10は<a href=" http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties ">デバッグ情報をマイクロソフトに送信します。コア・ダンプも含みます</a>。マイクロソフトは、今、それを別の会社にも配ります。 76 <a href=" https://duo.com/decipher/bring-your-own-dilemma-oem-laptops-and-windows-10-security "> Windows 10 comes with 13 screens of snooping options</a>, all enabled by default, and turning them off would be daunting to most users. <a href=" https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security ">ウィンドウズ10は覗き見のオプションの13の画面とともにやってきます</a>が、すべてがデフォルトでは有効となっており、ほとんどのユーザにとってそれを無効とするのはひるんでしまうことでしょう。 77 It appears <a href=" https://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/ "> Windows 10 sends data to Microsoft about what applications are running</a>. <a href=" http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/ ">ウィンドウズ10は、どんなアプリケーションが実行されているかについてマイクロソフトにデータを送る</a>ことがわかりました。 79 A downgrade to Windows 10 deleted surveillance-detection applications. Then another downgrade inserted a general spying program. Users noticed this and complained, so Microsoft renamed it <a href=" https://www.theregister.com/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/ "> to give users the impression it was gone</a>. ウィンドウズ10へのダウングレードは監視検知アプリケーションを削除します。そして、もうひとつのダウングレードが一般スパイプログラムを挿入します。ユーザはこれを知り文句を言いましたから、マイクロソフトはこれを改名し、<a href=" https://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/ ">それがなくなったような印象をユーザに与えました</a>。 82 <a href=" https://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/ "> Windows 10 sends identifiable information to Microsoft</a>, even if a user turns off its Bing search and Cortana features, and activates the privacy-protection settings. <a href=" http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/ ">ウィンドウズ10は同定できる情報をマイクロソフトに送信します</a>、ユーザがBing検索とCortana機能を停止させ、プライバシ保護設定を有効にしたとしてもです。 85 Microsoft uses Windows 10's &ldquo;privacy policy&rdquo; to overtly impose a &ldquo;right&rdquo; to look at users' files at any time. Windows 10 full disk encryption <a href=" https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/ "> gives Microsoft a key</a>. マイクロソフトはウィンドウズ10の「プライバシー・ポリシー」を使い、ユーザのファイルをいつでも見れるように明白に「権利」を押し付けます。ウィンドウズ10のフル・ディスク暗号化は<a href=" https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/ ">マイクロソフトに鍵を渡します</a>。 89 It only gets worse with time. <a href=" https://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html "> Windows 10 requires users to give permission for total snooping</a>, including their files, their commands, their text input, and their voice input. これは時とともに悪くなります。<a href=" http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html ">ウィンドウズ10は全体を覗き観ることを認めることをユーザに必須とし</a>、ファイル、コマンド、テキスト入力、音声入力もすべて監視の対象です。 91 <a href=" https://web.archive.org/web/20140219183154/http://www.techrepublic.com/blog/asian-technology/japanese-government-warns-baidu-ime-is-spying-on-users/ "> Baidu's Japanese-input and Chinese-input apps spy on users</a>. <a href=" https://www.techrepublic.com/blog/asian-technology/japanese-government-warns-baidu-ime-is-spying-on-users/ "> バイドゥの日本語入力、中国語入力アプリはユーザをスパイします</a>。 92 Spyware in older versions of Windows: <a href=" https://www.theregister.com/2003/02/28/windows_update_keeps_tabs/ "> Windows Update snoops on the user</a>. <a href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"> Windows 8.1 snoops on local searches</a>. And there's a <a href="http://www.marketoracle.co.uk/Article40836.html"> secret NSA key in Windows</a>, whose functions we don't know. ウィンドウズ8のスパイウェア: <a href=" https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/ ">ウィンドウズ・アップデートはユーザを覗き見ます</a>。 <a href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">ウィンドウズ8.1はローカルの検索を覗き見します</a>。 そして<a href="http://www.marketoracle.co.uk/Article40836.html"> 秘密のNSA鍵がウィンドウズにはあり</a>、その機能はわたしたちにはわかりません。 96 Apple has <a href=" https://sneak.berlin/20201112/your-computer-isnt-yours/ ">implemented a malware in its computers that imposes surveillance</a> on users and reports users' computing to Apple. 98 Adware Doctor, an ad blocker for MacOS, <a href=" https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history ">reports the user's browsing history</a>. 99 Apple has made various <a href=" https://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud "> MacOS programs send files to Apple servers without asking permission</a>. This exposes the files to Big Brother and perhaps to other snoops. Appleはさまざまな<a href=" http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud ">MacOSプログラムでAppleのサーバに許可を求めることなくファイルを送信するようにしました</a>。ファイルはビッグブラザーとおそらくそのほかの覗き見にさらされるでしょう。 101 MacOS automatically <a href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"> sends to Apple servers unsaved documents being edited</a>. The things you have not decided to save are <a href=" https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/ "> even more sensitive</a> than the things you have stored in files. MacOSは自動的に<a href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">Appleのサーバに保存されていない編集中の文書を送信します</a>。保存するか決めていないものはファイルに保管したものよりも<a href=" https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter ">よりデリケート</a>です。 102 Apple admits the <a href=" https://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/ "> spying in a search facility</a>, but there's a lot <a href=" https://gothub.frontendfriendly.xyz/fix-macosx/yosemite-phone-home/blob/master/README.md "> more snooping that Apple has not talked about</a>. Appleは<a href=" http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/ ">検索機能でスパイする</a>ことを認めますが、たくさんの<a href=" https://github.com/fix-macosx/yosemite-phone-home ">Appleが話していないもっと多くの覗き見が</a>あるのです。 103 Various operations in <a href=" https://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540 "> the latest MacOS send reports to Apple</a> servers. さまざまな操作において、<a href=" http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540 ">最新のMacOSでは報告を送信します。Apple</a>のサーバへと。 104 <a href=" https://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html "> Spotlight search</a> sends users' search terms to Apple. <a href=" http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html ">Spotlight検索</a>はユーザの検索の語をAppleに送信します。 114 <a href=" https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/ ">El Salvador Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that breaks users' freedom and spies on people; demands personal data such as the national ID number and does face recognition, and it is bad security for its data. It also asks for almost every malware permission in people's smartphones. 115 The article criticizes it for faults in &ldquo;data protection&rdquo;, though <a href=" /philosophy/surveillance-vs-democracy.html ">&ldquo;data protection&rdquo; is the wrong approach to privacy anyway</a>. 116 <a href=" https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-health-apps-harvest-user-data-global-study-shows ">Almost all proprietary health apps harvest users' data</a>, including sensitive health information, tracking identifiers, and cookies to track user activities. Some of these applications are tracking users across different platforms. 117 The proprietary program Clubhouse is malware and a privacy disaster. Clubhouse <a href=" https://www.theguardian.com/commentisfree/2021/feb/20/why-hot-new-social-app-clubhouse-spells-nothing-but-trouble ">collects people's personal data such as recordings of people's conversations</a>, and, as a secondary problem, does not encrypt them, which shows a bad security part of the issue. 120 As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href=" https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/ ">forcing its users to hand over sensitive personal data</a> to its parent company. This increases Facebook's power over users, and further jeopardizes people's privacy and security. 121 Instead of WhatsApp you can use <a href=" https://directory.fsf.org/wiki/Jami ">GNU Jami</a>, which is free software and will not collect your data. 122 Most apps are malware, but Trump's campaign app, like Modi's campaign app, is <a href=" https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/ "> especially nasty malware, helping companies snoop on users as well as snooping on them itself</a>. 124 Tiny Lab Productions, along with online ad businesses run by Google, Twitter and three other companies are facing a lawsuit <a href=" https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html ">for violating people's privacy by collecting their data from mobile games and handing over these data to other companies/advertisers</a>. 125 The natural extension of monitoring people through &ldquo;their&rdquo; phones is <a href=" https://news.northwestern.edu/stories/2016/01/fool-activity-tracker "> proprietary software to make sure they can't &ldquo;fool&rdquo; the monitoring</a>. 「かれらの」電話を通じて人々をモニタすることの自然な拡張は、<a href=" http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html ">かれらがモニタリングを「だます」ことが決してできないようなプロプライエタリなソフトウェアです</a>。 126 According to Edward Snowden, <a href=" https://www.bbc.com/news/uk-34444233 ">agencies can take over smartphones</a> by sending hidden text messages which enable them to turn the phones on and off, listen to the microphone, retrieve geo-location data from the GPS, take photographs, read text messages, read call, location and web browsing history, and read the contact list. This malware is designed to disguise itself from investigation. エドワード・スノーデンによれば、電話をオン/オフすることができる秘密のテクストメッセージを送信することで<a href=" http://www.bbc.com/news/uk-34444233 ">諜報機関はスマートフォンを乗っとることができ</a>、マイクロフォンで聴き、GPSから地理データを取得し、写真を取り、テクストメッセージを読み、呼び出し、位置とウェブブラウズの履歴といった情報を取得し、連絡先リストを取得する、といったことができるそうです。このマルウェアは調査から逃れるのに自身を偽装するように設計されています。 127 <a href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"> The NSA can tap data in smart phones, including iPhones, Android, and BlackBerry</a>. While there is not much detail here, it seems that this does not operate via the universal back door that we know nearly all portable phones have. It may involve exploiting various bugs. There are <a href=" https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/ "> lots of bugs in the phones' radio software</a>. <a href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">NSAはiPhone, アンドロイド、BlackBerryのを含むスマートフォンのデータを盗み見ることができます</a>。詳細はわかりませんが、ほとんどの携帯電話にあることがわかっている万能バックドアを通じて行われるのではないようです。それは、さまざまなバグの利活用に関係するかもしれません。<a href=" http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone ">携帯電話の電波ソフトウェアにはたくさんのバグがある</a>のです。 128 Portable phones with GPS <a href=" https://www.aclu.org/issues/privacy-technology/location-tracking/you-are-being-tracked "> will send their GPS location on remote command, and users cannot stop them</a>. (The US says it will eventually require all new portable phones to have GPS.) GPSのついた携帯電話は<a href=" http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers ">そのGPSの位置を遠隔コマンドで送り、ユーザはをれを停止できません</a>。(合衆国は最終的にはすべての新しい携帯電話にGPSが必須となると言っています。) 131 <a href=" https://web.archive.org/web/20230101185726/https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558 "> The iMonster app store client programs collect many kinds of data</a> about the user's actions and private communications. &ldquo;Do not track&rdquo; options are available, but tracking doesn't stop if the user activates them: Apple keeps on collecting data for itself, although it claims not to send it to third parties. 132 <a href=" https://www.theregister.com/2022/11/14/apple_data_collection_lawsuit/ "> Apple is being sued</a> for that. 133 <a href=" https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/ ">Apple is moving its Chinese customers' iCloud data to a datacenter controlled by the Chinese government</a>. Apple is already storing the encryption keys on these servers, obeying Chinese authority, making all Chinese user data available to the government. 134 Facebook <a href=" https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html ">snoops on Instagram</a> users by surreptitously turning on the device's camera. 135 Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of surreptitiously activating the Siri software to <a href=" https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf "> record users' conversations when they had not activated Siri</a>. This was not just occasional, it was systematic practice. 138 Safari occasionally <a href=" https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/ "> sends browsing data from Apple devices in China to the Tencent Safe Browsing service</a>, to check URLs that possibly correspond to &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese government, its Safe Browsing black list most certainly contains the websites of political opponents. By linking the requests originating from single IP addresses, the government can identify dissenters in China and Hong Kong, thus endangering their lives. 139 In spite of Apple's supposed commitment to privacy, iPhone apps contain trackers that are busy at night <a href=" https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html "> sending users' personal information to third parties</a>. 141 The DMCA and the EU Copyright Directive make it <a href=" https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html "> illegal to study how iOS cr&hellip;apps spy on users</a>, because this would require circumventing the iOS DRM. 142 In the latest iThings system, &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way <a href=" https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off "> doesn't really turn them off</a>. A more advanced way really does turn them off&mdash;only until 5am. That's Apple for you&mdash;&ldquo;We know you want to be spied on&rdquo;. 143 Apple proposes <a href=" https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen ">a fingerprint-scanning touch screen</a>&mdash;which would mean no way to use it without having your fingerprints taken. Users would have no way to tell whether the phone is snooping on them. 148 (From <a href=" https://web.archive.org/web/20150921152044/https://www.apple.com/icloud/photos/ ">Apple's iCloud information</a> as accessed on 24 Sep 2015.) The iCloud feature is <a href="https://support.apple.com/en-us/HT202033">activated by the startup of iOS</a>. The term &ldquo;cloud&rdquo; means &ldquo;please don't ask where.&rdquo; (2015年9月24日にアクセスした<a href=" https://www.apple.com/icloud/photos/ ">AppleのiCloudの情報</a>より。) iCloudの機能は<a href="https://support.apple.com/en-us/HT202033">iOSの起動から有効とされます</a>。「クラウド」の用語は「どこかは問わないでください」を意味します。 151 Apple can, and regularly does, <a href=" https://arstechnica.com/gadgets/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/ "> remotely extract some data from iPhones for the state</a>. Appleは<a href=" http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/ ">遠隔操作でiPhonesから国家のためにあるデータを抽出する</a>ことが可能で、日常的に行っています。 152 This may have improved with <a href=" https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/ "> iOS 8 security improvements</a>; but <a href=" https://theintercept.com/2014/09/22/apple-data/ "> not as much as Apple claims</a>. これは<a href=" http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html ">iOS 8のセキュリティ改善</a>で改善されましたが、<a href=" https://firstlook.org/theintercept/2014/09/22/apple-data/ ">Appleが主張するのと同じくらいの量ではありません</a>。 153 <a href=" https://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services "> Several &ldquo;features&rdquo; of iOS seem to exist for no possible purpose other than surveillance</a>. Here is the <a href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"> Technical presentation</a>. <a href=" http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services ">iOSのいくつかの「機能」が存在し、それは監視以外のありうる目的がないようなものです</a>。こちらが<a href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">技術的な解説です</a>。 154 The <a class="not-a-duplicate" href=" https://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html "> iBeacon</a> lets stores determine exactly where the iThing is, and get other info too. <a class="not-a-duplicate" href=" http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html ">iBeacon</a>はiThingが正確にどこにあるか、そしてほかの情報も店に知らせます。 155 <a href=" https://web.archive.org/web/20190924053515/https://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep "> Either Apple helps the NSA snoop on all the data in an iThing, or it is totally incompetent</a>. <a href=" http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep ">AppleはNSAがiThingのすべてのデータを覗き見することに手を貸しているか、まったくの無能です</a>。 156 The iThing also <a href=" https://www.theregister.com/2013/08/08/ios7_tracking_now_its_a_favourite_feature/ "> tells Apple its geolocation</a> by default, though that can be turned off. iThingは、また、<a href=" https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/ ">Appleに地理的な位置を知らせます</a>。これはデフォルトです。無効とすることはできますけれども。 157 There is also a feature for web sites to track users, which is <a href=" https://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/ "> enabled by default</a>. (That article talks about iOS 6, but it is still true in iOS 7.) ウェブサイトがユーザをトラックする機能もあり、これは<a href=" http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/ ">デフォルトで有効</a>となってます。(この記事はiOS 6について述べてますが、iOS 7でもなお当てはまります。) 161 Baidu apps were <a href=" https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/ "> caught collecting sensitive personal data</a> that can be used for lifetime tracking of users, and putting them in danger. More than 1.4 billion people worldwide are affected by these proprietary apps, and users' privacy is jeopardized by this surveillance tool. Data collected by Baidu may be handed over to the Chinese government, possibly putting Chinese people in danger. 162 Samsung is forcing its smartphone users in Hong Kong (and Macau) <a href=" https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-dns-service-upon-hong-kong-wifi-users/ ">to use a public DNS in Mainland China</a>, using software update released in September 2020, which causes many unease and privacy concerns. 163 Xiaomi phones <a href=" https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/ ">report many actions the user takes</a>: starting an app, looking at a folder, visiting a website, listening to a song. They send device identifying information too. 164 Other nonfree programs snoop too. For instance, Spotify and other streaming dis-services make a dossier about each user, and <a href=" /malware/proprietary-surveillance.html#M201508210 "> they make users identify themselves to pay</a>. Out, out, damned Spotify! 166 Facebook's app got &ldquo;consent&rdquo; to <a href=" https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent "> upload call logs automatically from Android phones</a> while disguising what the &ldquo;consent&rdquo; was for. 167 An Android phone was observed to track location even while in airplane mode. It didn't send the location data while in airplane mode. Instead, <a href=" https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/ "> it saved up the data, and sent them all later</a>. 168 Android tracks location for Google <a href=" https://www.techdirt.com/2017/11/21/investigation-finds-google-collected-location-data-even-with-location-services-turned-off/ "> even when &ldquo;location services&rdquo; are turned off, even when the phone has no SIM card</a>. 169 Some portable phones <a href=" https://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html ">are sold with spyware sending lots of data to China</a>. ある携帯電話は<a href=" http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html ">たくさんのデータを中国に送信するスパイウェアとともに販売されています</a>。 170 Google Play (a component of Android) <a href=" https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg "> tracks the users' movements without their permission</a>. 172 Samsung phones come with <a href=" https://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/ ">apps that users can't delete</a>, and they send so much data that their transmission is a substantial expense for users. Said transmission, not wanted or requested by the user, clearly must constitute spying of some kind. サムソンの携帯電話は<a href=" http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/ ">ユーザが削除できないアプリ</a>が付いてきて、そのアプリはあまりにも多くのデータを送るので、ユーザに大変な送信費用がかかります。ユーザが望まないもしくは要求していない、この送信は、明らかにある種のスパイ行為を構成するに違いありません。 174 Spyware in Android phones (and Windows? laptops): The Wall Street Journal (in an article blocked from us by a paywall) reports that <a href=" https://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj "> the FBI can remotely activate the GPS and microphone in Android phones and laptops</a> (presumably Windows laptops). Here is <a href=" https://cryptome.org/2013/08/fbi-hackers.htm ">more info</a>. (ペイ・ウォールでブロックされる記事です)は<a href=" http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj ">FBIが遠隔操作でアンドロイドとラップトップのGPSとマイクロフォンを有効にできる</a>、と報告しています。 (ウィドウズのラップトップだろうと思われます。) こちらに<a href=" http://cryptome.org/2013/08/fbi-hackers.htm ">もっと多くの情報(英語)</a>があります。 177 Google Play intentionally sends app developers <a href=" https://gadgets360.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116 "> the personal details of users that install the app</a>. 180 Some manufacturers add a <a href=" https://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/ "> hidden general surveillance package such as Carrier IQ</a>. ある製造業者は<a href=" http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/ ">Carrier IQのような隠された一般監視パッケージ</a>を加えました。 183 E-books can contain JavaScript code, and <a href=" https://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds "> sometimes this code snoops on readers</a>. 電子書籍はJavaScriptのコードを含むことが出来、<a href=" http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds ">時々このコードは読者を覗き見します</a>。 184 Adobe made &ldquo;Digital Editions,&rdquo; the e-reader used by most US libraries, <a href=" https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/ "> send lots of data to Adobe</a>. Adobe's &ldquo;excuse&rdquo;: it's needed to check DRM! Adobeは電子書籍ビューワ、&ldquo;Digital Editions&rdquo;を、合衆国のほとんどの図書館で使われていますが、<a href=" http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/ ">Adobeにたくさんのデータを送るようにしました</a>。Adobeの「弁明」: DRMをチェックするのに必要なのです! 188 Edge <a href=" https://www.neowin.net/news/edge-sends-images-you-view-online-to-microsoft-here-is-how-to-disable-that/ ">sends the URLs of images the user views to Microsoft's servers</a> by default, supposedly to &ldquo;enhance&rdquo; them. And these images <a href=" /proprietary/proprietary-surveillance.html#M201405140 ">may end up on the NSA's servers</a>. 189 Microsoft claims its nonfree browser sends the URLs without identifying you, which cannot be true, since at least your IP address is known to the server if you don't take extra measures. Either way, such enhancer service is unjust because any image editing <a href=" /philosophy/who-does-that-server-really-serve.html ">should be done on your own computer using installed free software</a>. 190 The article describes how to disable sending the URLs. That makes a change for the better, but we suggest that you instead switch to a freedom-respecting browser with additional privacy features such as <a href=" /software/gnuzilla/ ">IceCat</a>. 191 Some employers are <a href=" https://www.theguardian.com/money/2023/may/30/i-feel-constantly-watched-employees-working-under-surveillance-monitorig-software-productivity "> forcing employees to run &ldquo;monitoring software&rdquo;</a> on their computers. These extremely intrusive proprietary programs can take screenshots at regular intervals, log keystrokes, record audio and video, etc. Such practices have been shown to <a href=" https://www.eurofound.europa.eu/publications/report/2020/employee-monitoring-and-surveillance-the-challenges-of-digitalisation "> deteriorate employees' well-being</a>, and trade unions in the European union have voiced their concerns about them. The requirement for employee's consent, which exists in some countries, is a sham because most often the employee is not free to refuse. In short, these practices should be abolished. 192 A worldwide investigation found that most of the applications that school districts recommended for remote education during the COVID-19 pandemic <a href=" https://web.archive.org/web/20220525011540/https://www.washingtonpost.com/technology/2022/05/24/remote-school-app-tracking-privacy/ ">track and collect personal data from children as young as below the age of five</a>. These applications, and their websites, send the collected information to ad giants such as Facebook and Google, and they are still being used in the classrooms even after some of the schools reopened. 193 The Verify browser extension by Storyful <a href=" https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch ">spies on the reporters that use it</a>. 196 Microsoft's Office 365 suite enables employers <a href=" https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance ">to snoop on each employee</a>. After a public outburst, Microsoft stated that <a href=" https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance ">it would remove this capability</a>. Let's hope so. 197 Some Avast and AVG extensions for Firefox and Chrome were found to <a href=" https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome "> snoop on users' detailed browsing habits</a>. Mozilla and Google removed the problematic extensions from their stores, but this shows once more how unsafe nonfree software can be. Tools that are supposed to protect a proprietary system are, instead, infecting it with additional malware (the system itself being the original malware). 198 As of April 2019, it is <a href=" https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/ ">no longer possible to disable an unscrupulous tracking anti-feature</a> that <a href=" https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing ">reports users when they follow ping links</a> in Apple Safari, Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge that is going to be based on Chromium. 199 Foundry's graphics software <a href=" https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/ "> reports information to identify who is running it</a>. The result is often a legal threat demanding a lot of money. 204 The Yandex company has started to <a href=" https://meduza.io/en/feature/2023/08/08/user-x-with-driver-y-traveled-from-point-a-to-point-b "> give away Yango taxi ride data to Russia's Federal Security Service (FSB)</a>. The Russian government (and whoever else receives the the data) thus has access to a wealth of personal information, including who traveled where, when, and with which driver. Yandex <a href=" https://yandex.ru/legal/confidential/?lang=en "> claims that it complies with European regulations</a> for data collected in the European Economic Area, Switzerland or Israel. But what about the rest of the world? 205 The Pinduoduo app <a href=" https://edition.cnn.com/2023/04/02/tech/china-pinduoduo-malware-cybersecurity-analysis-intl-hnk/index.html "> snoops on other apps, and takes control of them</a>. It also installs additional malware that is hard to remove. 206 Canada has fined the company Tim Hortons for making <a href=" https://arstechnica.com/tech-policy/2022/06/tim-hortons-coffee-app-broke-law-by-constantly-recording-users-movements/ "> an app that tracks people's movements</a> to learn things such as where they live, where they work, and when they visit competitors' stores. 207 New Amazon worker chat app <a href=" https://theintercept.com/2022/04/04/amazon-union-living-wage-restrooms-chat-app/ ">would ban specific words Amazon doesn't like</a>, such as &ldquo;union&rdquo;, &ldquo;restrooms&rdquo;, and &ldquo;pay raise&rdquo;. If the app was free, workers could modify the program so it acts as they wish, not how Amazon wants it. 208 The nonfree app &ldquo;Along,&rdquo; developed by a company controlled by Zuckerberg, <a href=" https://kappanonline.org/dont-go-along-with-corporate-schemes-to-gather-up-student-data/ "> leads students to reveal to their teacher personal information</a> about themselves and their families. Conversations are recorded and the collected data sent to the company, which grants itself the right to sell it. See also <a href=" /education/educational-malware-app-along.html#content ">Educational Malware App &ldquo;Along&rdquo;</a>. 209 The data broker X-Mode <a href=" https://themarkup.org/privacy/2022/01/27/gay-bi-dating-app-muslim-prayer-apps-sold-data-on-peoples-location-to-a-controversial-data-broker ">bought location data about 20,000 people collected by around 100 different malicious apps</a>. 210 A building in LA, with a supermarket in it, <a href=" https://www.latimes.com/business/story/2021-11-09/column-trader-joes-parking-app ">demands customers load a particular app to pay for parking in the parking lot</a>, and accept pervasive surveillance. They also have the option of entering their license plate numbers in a kiosk. That is an injustice, too. 211 <a href=" https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/ ">TikTok apps collect biometric identifiers and biometric information from users' smartphones</a>. The company behind it does whatever it wants and collects whatever data it can. 212 The <a href=" https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/ ">WeddingWire app saves people's wedding photos forever and hands over data to others</a>, giving users no control over their personal information/data. The app also sometimes shows old photos and memories to users, without giving them any control over this either. 213 Many cr&hellip;apps, developed by various companies for various organizations, do <a href=" https://www.expressvpn.com/digital-security-lab/investigation-xoth "> location tracking unknown to those companies and those organizations</a>. It's actually some widely used libraries that do the tracking. 215 The Apple iOS version of Zoom <a href=" https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account ">is sending users' data to Facebook</a> even if the user doesn't have a Facebook account. According to the article, Zoom and Facebook don't even mention this surveillance on their privacy policy page, making this an obvious violation of people's privacy even in their own terms. 216 The Alipay Health Code app estimates whether the user has Covid-19 and <a href=" https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html "> tells the cops directly</a>. 217 The Amazon Ring app does <a href=" https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report "> surveillance for other companies as well as for Amazon</a>. アマゾンの「スマート」TV<a href=" http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance ">は常時、監視して盗聴しているのです</a>。 218 The ToToc messaging app seems to be a <a href=" https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html "> spying tool for the government of the United Arab Emirates</a>. Any nonfree program could be doing this, and that is a good reason to use free software instead. 220 iMonsters and Android phones, when used for work, give employers powerful <a href=" https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy "> snooping and sabotage capabilities</a> if they install their own software on the device. Many employers demand to do this. For the employee, this is simply nonfree software, as fundamentally unjust and as dangerous as any other nonfree software. 221 The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app requires users to grant it <a href=" https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962 "> access to the phone's microphone, photos, text messages, contacts, and internet history</a>, and the Android version was found to contain a back-door allowing developers to run any code they wish in the users' phone, as &ldquo;superusers.&rdquo; Downloading and using this app is mandatory at some workplaces. 222 Note: The <a href=" http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html "> Washington Post version of the article</a> (partly obfuscated, but readable after copy-pasting in a text editor) includes a clarification saying that the tests were only performed on the Android version of the app, and that, according to Apple, &ldquo;this kind of &lsquo;superuser&rsquo; surveillance could not be conducted on Apple's operating system.&rdquo; 223 The Facebook app <a href=" https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/ "> tracks users even when it is turned off</a>, after tricking them into giving the app broad permissions in order to use one of its functionalities. 224 Some nonfree period-tracking apps including MIA Fem and Maya <a href=" https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem "> send intimate details of users' lives to Facebook</a>. 225 Keeping track of who downloads a proprietary program is a form of surveillance. There is a proprietary program for adjusting a certain telescopic rifle sight. <a href=" https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/ "> A US prosecutor has demanded the list of all the 10,000 or more people who have installed it</a>. 227 Many unscrupulous mobile-app developers keep finding ways to <a href=" https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/ "> bypass user's settings</a>, regulations, and privacy-enhancing features of the operating system, in order to gather as much private data as they possibly can. 229 Many Android apps can track users' movements even when the user says <a href=" https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location "> not to allow them access to locations</a>. 231 The Femm &ldquo;fertility&rdquo; app is secretly a <a href=" https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners "> tool for propaganda</a> by natalist Christians. It spreads distrust for contraception. 233 BlizzCon 2019 imposed a <a href=" https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/ "> requirement to run a proprietary phone app</a> to be allowed into the event. 234 This app is a spyware that can snoop on a lot of sensitive data, including user's location and contact list, and has <a href=" https://web.archive.org/web/20220321042716/https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/ "> near-complete control</a> over the phone. 235 Data collected by menstrual and pregnancy monitoring apps is often <a href=" https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance "> available to employers and insurance companies</a>. Even though the data is &ldquo;anonymized and aggregated,&rdquo; it can easily be traced back to the woman who uses the app. 236 This has harmful implications for women's rights to equal employment and freedom to make their own pregnancy choices. Don't use these apps, even if someone offers you a reward to do so. A free-software app that does more or less the same thing without spying on you is available from <a href=" https://search.f-droid.org/?q=menstr ">F-Droid</a>, and <a href=" https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f "> a new one is being developed</a>. 237 Google tracks the movements of Android phones and iPhones running Google apps, and sometimes <a href=" https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html "> saves the data for years</a>. 239 Many Android phones come with a huge number of <a href=" https://web.archive.org/web/20190326145122/https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html "> preinstalled nonfree apps that have access to sensitive data without users' knowledge</a>. These hidden apps may either call home with the data, or pass it on to user-installed apps that have access to the network but no direct access to the data. This results in massive surveillance on which the user has absolutely no control. 240 The MoviePass dis-service <a href=" https://www.cnet.com/culture/entertainment/moviepass-founder-wants-to-use-facial-recognition-to-score-you-free-movies/ "> is planning to use face recognition to track people's eyes</a> to make sure they won't put their phones down or look away during ads&mdash;and trackers. 241 A study of 24 &ldquo;health&rdquo; apps found that 19 of them <a href=" https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows "> send sensitive personal data to third parties</a>, which can use it for invasive advertising or discriminating against people in poor medical condition. 243 Facebook offered a convenient proprietary library for building mobile apps, which also <a href=" https://boingboing.net/2019/02/23/surveillance-zucksterism.html "> sent personal data to Facebook</a>. Lots of companies built apps that way and released them, apparently not realizing that all the personal data they collected would go to Facebook as well. 245 The AppCensus database gives information on <a href=" https://www.appcensus.io/ "> how Android apps use and misuse users' personal data</a>. As of March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit the <a href=" /proprietary/proprietary-surveillance.html#M201812290 "> Advertising ID</a> to other companies, and <a href=" https://blog.appcensus.io/2019/02/14/ad-ids-behaving-badly/ "> 18,000 (23% of the total) link this ID to hardware identifiers</a>, so that users cannot escape tracking by resetting it. 247 Many nonfree apps have a surveillance feature for <a href=" https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/ "> recording all the users' actions</a> in interacting with the app. 248 Twenty nine &ldquo;beauty camera&rdquo; apps that used to be on Google Play had one or more malicious functionalities, such as <a href=" https://www.androidpolice.com/2019/02/03/google-bans-29-beauty-camera-apps-from-the-play-store-that-steal-your-photos/ "> stealing users' photos instead of &ldquo;beautifying&rdquo; them</a>, pushing unwanted and often malicious ads on users, and redirecting them to phishing sites that stole their credentials. Furthermore, the user interface of most of them was designed to make uninstallation difficult. 250 An investigation of the 150 most popular gratis VPN apps in Google Play found that <a href=" https://www.top10vpn.com/research/free-vpn-investigations/risk-index/ "> 25% fail to protect their users' privacy</a> due to DNS leaks. In addition, 85% feature intrusive permissions or functions in their source code&mdash;often used for invasive advertising&mdash;that could potentially also be used to spy on users. Other technical flaws were found as well. 251 Moreover, a previous investigation had found that <a href=" https://www.top10vpn.com/research/free-vpn-investigations/ownership/ ">half of the top 10 gratis VPN apps have lousy privacy policies</a>. 252 <small>(It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; These apps are gratis, but they are <em>not</em> <a href=" /philosophy/free-sw.html ">free software</a>.)</small> 253 The Weather Channel app <a href=" https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling "> stored users' locations to the company's server</a>. The company is being sued, demanding that it notify the users of what it will do with the data. 255 <a href=" https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps "> Other weather apps</a>, including Accuweather and WeatherBug, are tracking people's locations. 256 Around 40% of gratis Android apps <a href=" https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report "> report on the user's actions to Facebook</a>. 259 Some Android apps <a href=" https://web.archive.org/web/20210418052600/https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/ "> track the phones of users that have deleted them</a>. 260 Some Google apps on Android <a href=" https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile "> record the user's location even when users disable &ldquo;location tracking&rdquo;</a>. 262 The Spanish football streaming app <a href=" https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html ">tracks the user's movements and listens through the microphone</a>. 266 More than <a href=" https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy ">50% of the 5,855 Android apps studied by researchers were found to snoop and collect information about its users</a>. 40% of the apps were found to insecurely snitch on its users. Furthermore, they could detect only some methods of snooping, in these proprietary apps whose source code they cannot look at. The other apps might be snooping in other ways. 267 This is evidence that proprietary apps generally work against their users. To protect their privacy and freedom, Android users need to get rid of the proprietary software&mdash;both proprietary Android by <a href=" https://replicant.us ">switching to Replicant</a>, and the proprietary apps by getting apps from the free software only <a href=" https://f-droid.org/ ">F-Droid store</a> that <a href=" https://f-droid.org/docs/Anti-Features/ "> prominently warns the user if an app contains anti-features</a>. 268 Grindr collects information about <a href=" https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status "> which users are HIV-positive, then provides the information to companies</a>. 270 The moviepass app and dis-service spy on users even more than users expected. It <a href=" https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/ ">records where they travel before and after going to a movie</a>. 272 Spotify app <a href=" https://www.sec.gov/Archives/edgar/data/1639920/000119312518063434/d494294df1.htm ">harvests users' data to personally identify and know people</a> through music, their mood, mindset, activities, and tastes. There are over 150 billion events logged daily on the program which contains users' data and personal information. 273 Tracking software in popular Android apps is pervasive and sometimes very clever. Some trackers can <a href=" https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/ "> follow a user's movements around a physical store by noticing WiFi networks</a>. 274 <a href=" https://web.archive.org/web/20230607090524/https://old.reddit.com/r/Instagram/comments/6xkhi8/ig_suddenly_asking_for_phone_number_not_visible/ ">Instagram is forcing users to give away their phone numbers</a> and won't let people continue using the app if they refuse. 275 The Sarahah app <a href=" https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/ "> uploads all phone numbers and email addresses</a> in user's address book to developer's server. 276 <small>(Note that this article misuses the words &ldquo;<a href=" /philosophy/free-sw.html ">free software</a>&rdquo; referring to zero price.)</small> 277 20 dishonest Android apps recorded <a href=" https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts/ ">phone calls and sent them and text messages and emails to snoopers</a>. 279 On the other hand, Google redistributes nonfree Android apps, and therefore shares in the responsibility for the injustice of their being nonfree. It also distributes its own nonfree apps, such as Google Play, <a href=" /philosophy/free-software-even-more-important.html ">which are malicious</a>. 283 Apps for BART <a href=" https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/ "> snoop on users</a>. 286 A study found 234 Android apps that track users by <a href=" https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/ ">listening to ultrasound from beacons placed in stores or played by TV programs</a>. 287 Faceapp appears to do lots of surveillance, judging by <a href=" https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/ "> how much access it demands to personal data in the device</a>. 288 Users are suing Bose for <a href=" https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/ "> distributing a spyware app for its headphones</a>. Specifically, the app would record the names of the audio files users listen to along with the headphone's unique serial number. 289 The suit accuses that this was done without the users' consent. If the fine print of the app said that users gave consent for this, would that make it acceptable? No way! It should be flat out <a href=" /philosophy/surveillance-vs-democracy.html "> illegal to design the app to snoop at all</a>. 290 Pairs of Android apps can collude to transmit users' personal data to servers. <a href=" https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/ ">A study found tens of thousands of pairs that collude</a>. 291 Verizon <a href=" https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones "> announced an opt-in proprietary search app that it will</a> pre-install on some of its phones. The app will give Verizon the same information about the users' searches that Google normally gets when they use its search engine. 292 Currently, the app is <a href=" https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware "> being pre-installed on only one phone</a>, and the user must explicitly opt-in before the app takes effect. However, the app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is still spyware. 293 The Meitu photo-editing app <a href=" https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/ ">sends user data to a Chinese company</a>. 296 A <a href=" https://research.csiro.au/isp/wp-content/uploads/sites/106/2016/08/paper-1.pdf "> research paper</a> that investigated the privacy and security of 283 Android VPN apps concluded that &ldquo;in spite of the promises for privacy, security, and anonymity given by the majority of VPN apps&mdash;millions of users may be unawarely subject to poor security guarantees and abusive practices inflicted by VPN apps.&rdquo; 310 Google's new voice messaging app <a href=" https://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google ">logs all conversations</a>. Googleの新しい音声メッセージアプリは<a href=" http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google ">すべての会話を記録します</a>。 311 Facebook's new Magic Photo app <a href=" https://www.theregister.com/2015/11/10/facebook_scans_camera_for_your_friends/ "> scans your mobile phone's photo collections for known faces</a>, and suggests you circulate the picture you take according to who is in the frame. Facebookの新しいMagic Photoアプリは<a href=" https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/ ">人々がモバイルフォンで撮った写真のコレクションの知っている顔をスキャンし</a>、そのフレームに誰が写っているかに応じてあなたの撮った写真を共有する提案をします。 314 Facebook's app listens all the time, <a href=" https://www.independent.co.uk/tech/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html ">to snoop on what people are listening to or watching</a>. In addition, it may be analyzing people's conversations to serve them with targeted advertisements. 315 A pregnancy test controller application not only can <a href=" https://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security "> spy on many sorts of data in the phone, and in server accounts, it can alter them too</a>. 317 &ldquo;Cryptic communication,&rdquo; unrelated to the app's functionality, was <a href=" https://news.mit.edu/2015/data-transferred-android-apps-hiding-1119 "> found in the 500 most popular gratis Android apps</a>. 「暗号のような通信」は、アプリの機能と関係なく、<a href=" http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119 ">500のもっとも人気のある無償のアンドロイド・アプリに発見されました</a>。 321 Like most &ldquo;music screaming&rdquo; disservices, Spotify is based on proprietary malware (DRM and snooping). In August 2015 it <a href=" https://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy "> demanded users submit to increased snooping</a>, and some are starting to realize that it is nasty. ほとんどの「音楽背信」サービスもどきと同じく、Spotifyはプロプライエタリなマルウェア(DRMと詮索)をもとにしてます。2015年8月、それは、<a href=" http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy ">ユーザにより詮索に同意するよう要求し</a>、一部の人々はそれが嫌なものだと理解し始めました。 322 This article shows the <a href=" https://www.theregister.com/2015/08/21/spotify_worse_than_the_nsa/ "> twisted ways that they present snooping as a way to &ldquo;serve&rdquo; users better</a>&mdash;never mind whether they want that. This is a typical example of the attitude of the proprietary software industry towards those they have subjugated. この記事では、<a href=" https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/ ">ユーザによりよく「サービス」する方法として詮索を行うとかれらが説明するひねくれたやり方</a>を見せます。ユーザがそれを欲するかどうかは気に留めないのです。これは、ユーザが隷属させられるプロプライエタリのソフトウェア産業の姿勢として、典型的な例です。 324 Many retail businesses publish cr&hellip;apps that ask to <a href=" https://www.delish.com/kitchen-tools/a43252/how-food-apps-use-data/ "> spy on the user's own data</a>&mdash;often many kinds. 326 <a href=" https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf "> A study in 2015</a> found that 90% of the top-ranked gratis proprietary Android apps contained recognizable tracking libraries. For the paid proprietary apps, it was only 60%. 327 The article confusingly describes gratis apps as &ldquo;free&rdquo;, but most of them are not in fact <a href=" /philosophy/free-sw.html ">free software</a>. It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement for that word is &ldquo;exploit&rdquo;; nearly always that will fit perfectly. 328 Gratis Android apps (but not <a href="/philosophy/free-sw.html">free software</a>) connect to 100 <a href=" https://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites ">tracking and advertising</a> URLs, on the average. 無料のアンドロイド・アプリ(だけど<a href="/philosophy/free-sw.html">自由ソフトウェア</a>ではないもの)は、平均で100の<a href=" http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites ">追跡し宣伝する</a>URLにつなぎます。 329 Widely used <a href=" https://freedom-to-tinker.com/2015/04/06/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/ ">proprietary QR-code scanner apps snoop on the user</a>. This is in addition to the snooping done by the phone company, and perhaps by the OS in the phone. 広く使われている<a href=" https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/ ">プロプライエタリなQRコード・スキャナのアプリはユーザを覗き見ます</a>。これは、電話会社による覗き見、おそらく電話のOSの覗き見に加えて、行われるのです。 331 Many proprietary apps for mobile devices report which other apps the user has installed. <a href=" https://techcrunch.com/2014/11/26/twitter-app-graph/ ">Twitter is doing this in a way that at least is visible and optional</a>. Not as bad as what the others do. 多くのモバイル・デバイスのためのプロプライエタリなアプリがどんなほかのアプリをユーザがインストールしたかを報告します。<a href=" http://techcrunch.com/2014/11/26/twitter-app-graph/ ">Twitterはすくなくとも見えてオプショナルのやり方でこれを実行します</a>。ほかの人たちが実行するのと同じように悪くない、と。 332 The Simeji keyboard is a smartphone version of Baidu's <a href=" /proprietary/proprietary-surveillance.html#baidu-ime ">spying <abbr title="Input Method Editor">IME</abbr></a>. 333 The nonfree Snapchat app's principal purpose is to restrict the use of data on the user's computer, but it does surveillance too: <a href=" https://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers "> it tries to get the user's list of other people's phone numbers</a>. 不自由なSnapchatのアプリの主な目的はユーザのコンピュータのデータの使用を制限することでしたが、監視も行います: <a href=" http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers ">それはユーザの、ほかの人の電話番号のリストの取得を試みます</a>。 334 The Brightest Flashlight app <a href=" https://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers "> sends user data, including geolocation, for use by companies</a>. Brightest Flashlight(懐中電灯アプリ)は<a href=" http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers ">企業のために位置を含むユーザのデータを送信します</a>。 336 FTC says most mobile apps for children don't respect privacy: <a href=" https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/ "> https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>. FTCはほとんどの子供のためのモバイル・アプリはプライバシを尊重しないと言ってます: <a href=" http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/ "> http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>. 339 Skype refuses to say whether it can <a href=" http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html ">eavesdrop on calls</a>. 341 Skype contains <a href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>. Microsoft changed Skype <a href=" https://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data "> specifically for spying</a>. スカイプのスパイウェア: <a href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"> http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>. マイクロソフトはスカイプを<a href=" http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data ">特にスパイのために</a>変更しました。 344 Microsoft is imposing its surveillance on the game of Minecraft by <a href=" https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java ">requiring every player to open an account on Microsoft's network</a>. Microsoft has bought the game and will merge all accounts into its network, which will give them access to people's data. 345 Minecraft players <a href=" https://directory.fsf.org/wiki/Minetest ">can play Minetest</a> instead. The essential advantage of Minetest is that it is free software, meaning it respects the user's computer freedom. As a bonus, it offers more options. 346 Microsoft recorded users of Xboxes and had <a href=" https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana "> human workers listen to the recordings</a>. 348 Red Shell is a spyware that is found in many proprietary games. It <a href=" https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/ "> tracks data on users' computers and sends it to third parties</a>. 349 ArenaNet surreptitiously installed a spyware program along with an update to the massive multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a href=" https://techraptor.net/gaming/news/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave "> to snoop on all open processes running on its user's computer</a>. 350 The driver for a certain gaming keyboard <a href=" https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html ">sends information to China</a>. 351 Many <a href=" https://www.thestar.com/news/canada/video-game-companies-are-collecting-massive-amounts-of-data-about-you/article_31fba9a3-2760-57ae-9ae0-4083904bcb87.html "> video game consoles snoop on their users and report to the internet</a>&mdash;even what their users weigh. 多くの<a href=" http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/ ">ビデオゲーム・コンソールはユーザを覗き見し、インターネットに報告します</a>。ユーザの体重までもです。 353 Modern gratis game cr&hellip;apps <a href=" https://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/ "> collect a wide range of data about their users and their users' friends and associates</a>. 最近の無償のゲームのイカレアプリは<a href=" http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/ ">ユーザとユーザの知り合い、仲間について広範囲のデータを収集します</a>。 357 Angry Birds <a href=" https://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html "> spies for companies, and the NSA takes advantage to spy through it too</a>. Here's information on <a href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"> more spyware apps</a>. アングリー・バードは<a href=" http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html ">企業のためにスパイし、NSAもそれを通じて活用します</a>。こちらが<a href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">スパイウェアのアプリについて多くの</a>情報です。 358 <a href=" https://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data "> More about NSA app spying</a>. <a href=" http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data ">NSAアプリがスパイすることについて、もっと</a>。 359 Blizzard Warden is a hidden &ldquo;cheating-prevention&rdquo; program that <a href=" https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware "> spies on every process running on a gamer's computer and sniffs a good deal of personal data</a>, including lots of activities which have nothing to do with cheating. 362 Most Internet connected devices in Mozilla's <a href=" https://web.archive.org/web/20220129065321/https://foundation.mozilla.org/en/privacynotincluded/ ">&ldquo;Privacy Not Included&rdquo;</a> list <a href=" https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell ">are designed to snoop on users</a> even if they meet Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure design of the program running on some of these devices <a href=" https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster ">makes the user susceptible to be snooped on and exploited by crackers as well</a>. 363 As tech companies add microphones to a wide range of products, including refrigerators and motor vehicles, they also set up transcription farms where human employees <a href=" https://getpocket.com/explore/item/silicon-valley-got-millions-to-let-siri-and-alexa-listen-in "> listen to what people say</a> and tweak the recognition algorithms. 364 The bad security in many Internet of Stings devices allows <a href=" https://www.techdirt.com/2017/08/28/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you/ ">ISPs to snoop on the people that use them</a>. 366 <small>(It is unfortunate that the article uses the term <a href=" /philosophy/words-to-avoid.html#Monetize ">&ldquo;monetize&rdquo;</a>.)</small> 370 Today's &ldquo;smart&rdquo; TVs <a href=" https://www.techdirt.com/2022/04/14/its-still-stupidly-ridiculously-difficult-to-buy-a-dumb-tv/ "> push people to surrender to tracking via internet</a>. Some won't work unless they have a chance to download nonfree software. And they are designed for programmed obsolescence. 371 &ldquo;Smart&rdquo; TV manufacturers <a href=" https://www.theguardian.com/technology/2022/jan/29/what-your-smart-tv-knows-about-you-and-how-to-stop-it-harvesting-data "> spy on people using various methods</a>, and harvest their data. They are collecting audio, video, and TV usage data to profile people. 372 TV manufacturers are turning to produce only &ldquo;Smart&rdquo; TV sets (which include spyware) that <a href=" https://frame.work/blog/in-defense-of-dumb-tvs ">it's now very hard to find a TV that doesn't spy on you</a>. 374 TV manufacturers are able to <a href=" https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/ ">snoop every second of what the user is watching</a>. This is illegal due to the Video Privacy Protection Act of 1988, but they're circumventing it through EULAs. 375 Vizio TVs <a href=" https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019 "> collect &ldquo;whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and this data is sold to third parties. This is in return for &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly lower retail prices. 378 Some &ldquo;Smart&rdquo; TVs automatically <a href=" https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928 "> load downgrades that install a surveillance app</a>. 379 We link to the article for the facts it presents. It is too bad that the article finishes by advocating the moral weakness of surrendering to Netflix. The Netflix app <a href=" /proprietary/malware-google.html#netflix-app-geolocation-drm ">is malware too</a>. 380 Vizio &ldquo;smart&rdquo; <a href=" https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen ">TVs report everything that is viewed on them, and not just broadcasts and cable</a>. Even if the image is coming from the user's own computer, the TV reports what it is. The existence of a way to disable the surveillance, even if it were not hidden as it was in these TVs, does not legitimize the surveillance. 381 Some web and TV advertisements play inaudible sounds to be picked up by proprietary malware running on other devices in range so as to determine that they are nearby. Once your Internet devices are paired with your TV, advertisers can correlate ads with Web activity, and other <a href=" https://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/ "> cross-device tracking</a>. あるウェブとテレビの広告は非可聴の音を鳴らし、近くの範囲のほかのデバイスで稼働するプロプライエタリのマルウェアに検出されるようにし、近くにいることを知らせます。一度、あなたのインターネット・デバイスがテレビと組み合わせられれば、広告主は広告をウェブの活動やほかの<a href=" http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/ ">デバイス間の追跡機能</a>と関連させることができるのです。 382 Vizio goes a step further than other TV manufacturers in spying on their users: their <a href=" https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you "> &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and link them your IP address</a> so that advertisers can track you across devices. Vizioは、ユーザをスパイすることについてほかのTV製造業者よりも一歩先を行きました: Vizioの<a href=" http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you ">「スマート」TVはあなたの視聴の慣習を詳しく解析し、あなたのIPアドレスをそれとリンクさせ</a>、広告主があなたを複数のデバイスで追跡できるようにします。you across devices. 384 Tivo's alliance with Viacom adds 2.3 million households to the 600 millions social media profiles the company already monitors. Tivo customers are unaware they're being watched by advertisers. By combining TV viewing information with online social media participation, Tivo can now <a href=" https://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102/ "> correlate TV advertisement with online purchases</a>, exposing all users to new combined surveillance by default. TivoのViacomとの提携は二百三十万の家庭を、すでにその会社が監視していた六百万のソーシャル・メディア・プロファイルに加えました。Tivoの顧客は広告主に監視されつづけることを知りませんでした。テレビの視聴とオンラインのソーシャル・メディアの参加の情報を組み合わせることで、Tivoは今、<a href=" http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102 ">テレビ広告とオンラインの購買の相関を調べ</a>、デフォルトですべてのユーザを新しい組み合わされた監視にさらすのです。 385 Vizio &ldquo;smart&rdquo; TVs recognize and <a href=" https://www.engadget.com/2015-07-24-vizio-ipo-inscape-acr.html ">track what people are watching</a>, even if it isn't a TV channel. Vizio「スマート」TVは<a href=" http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/ ">人々が何を視ているか追跡し</a>を識別します。それがTVチャンネルでなくてもです。 386 Verizon cable TV <a href=" https://arstechnica.com/information-technology/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/ "> snoops on what programs people watch, and even what they wanted to record</a>. Verizonケーブルテレビは<a href=" http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/ ">どの番組を人々が視聴しているかを覗き見します。そして、どれを録画したいかまで調べるのです</a>。 387 Vizio <a href=" https://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html "> used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what users watch</a>. The TVs did not do that when first sold. Vizioは、<a href=" http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html ">ファームウェアの「アップグレード」を使ってそのTVでユーザが何を視聴しているか覗き見する</a>ようにしました。最初に販売されたとき、そのTVはそういうことをしませんでした。 388 The Samsung &ldquo;Smart&rdquo; TV <a href=" https://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm "> transmits users' voice on the internet to another company, Nuance</a>. Nuance can save it and would then have to give it to the US or some other government. サムソンの「スマート」TVは<a href=" http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm ">ユーザの音声を別の会社Nuanceに送信します</a>。Nuanceはそれを保存し、合衆国やほかの政府に渡さなければいけないかも知れません。 390 In its privacy policy, Samsung explicitly confirms that <a href=" https://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs ">voice data containing sensitive information will be transmitted to third parties</a>. 391 The Amazon &ldquo;Smart&rdquo; TV is <a href=" https://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance "> snooping all the time</a>. アマゾンの「スマート」TV<a href=" http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance ">は常時、監視して盗聴しているのです</a>。 392 More or less all &ldquo;smart&rdquo; TVs <a href=" https://myce.wiki/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/ ">spy on their users</a>. おおかれすくなかれ「スマート」TVは、<a href=" http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/ ">そのユーザをスパイします</a>。 396 LG <a href=" https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/ "> disabled network features</a> on <em>previously purchased</em> &ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG begin to snoop on them and distribute their personal data. そうこうしている間、LGのTVは<a href=" http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml ">たくさんのスパイ行為をどちらにせよ行っているのです</a>。 398 Even worse, it <a href=" https://rrrrambles.wordpress.com/2013/11/21/lg-tv-logging-filenames-from-network-folders/ "> snoops on other devices on the user's local network</a>. さらに悪いことには、それは<a href=" http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/ ">ユーザのローカルネットワークのほかのデバイスも覗き見するのです</a>。 400 Meanwhile, LG TVs <a href=" https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/ "> do lots of spying anyway</a>. そうこうしている間、LGのTVは<a href=" http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml ">たくさんのスパイ行為をどちらにせよ行っているのです</a>。 401 Spyware in LG &ldquo;smart&rdquo; TVs <a href=" https://doctorbeet.blogspot.com/2013/11/lg-smart-tvs-logging-usb-filenames-and.html "> reports what the user watches, and the switch to turn this off has no effect</a>. (The fact that the transmission reports a 404 error really means nothing; the server could save that data anyway.) LGの「スマート」TVのスパイウェアは<a href=" http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html ">ユーザがなにを視たかを報告します。この機能を切るスイッチは何の効果もありません</a>。(送信が404エラーを返すという事実は、実際はなんの意味もありません。サーバはそのデータをどちらにしろ保存できるのです。) 402 <a href=" http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html "> Crackers found a way to break security on a &ldquo;smart&rdquo; TV</a> and use its camera to watch the people who are watching TV. 405 Surveillance cameras put in by government A to surveil for it may be surveilling for government B as well. That's because A put in a product <a href=" https://www.rferl.org/a/ukraine-cctv-moscow-spying-schemes-investigation/32747767.html "> made by B with nonfree software</a>. 406 <small>(Please note that this article misuses the word &ldquo;<a href=" /philosophy/words-to-avoid.html#Hacker ">hack</a>&rdquo; to mean &ldquo;break security.&rdquo;)</small> 407 <a href=" https://www.theguardian.com/technology/2023/jul/04/smile-youre-on-camera-self-driving-cars-are-here-and-theyre-watching-you "> Driverless cars in San Francisco collect videos constantly</a>, using cameras inside and outside, and governments have already collected those videos secretly. 408 As the Surveillance Technology Oversight Project says, they are &ldquo;driving us straight into authoritarianism.&rdquo; We must <a href=" /philosophy/surveillance-vs-democracy.html ">regulate <em>all</em> cameras that collect images that can be used to track people</a>, to make sure they are not used for that. 409 The Ring doorbell camera is designed so that the manufacturer (now Amazon) can watch all the time. Now it turns out that <a href=" https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/ "> anyone else can also watch, and fake videos too</a>. 410 The third party vulnerability is presumably unintentional and Amazon will probably fix it. However, we do not expect Amazon to change the design that <a href=" /proprietary/proprietary-surveillance.html#M201901100 ">allows Amazon to watch</a>. 411 Amazon Ring &ldquo;security&rdquo; devices <a href=" https://www.engadget.com/2019-01-10-ring-gave-employees-access-customer-video-feeds.html "> send the video they capture to Amazon servers</a>, which save it long-term. 414 Nearly all &ldquo;home security cameras&rdquo; <a href=" https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds-a8814384448/ "> give the manufacturer an unencrypted copy of everything they see</a>. &ldquo;Home insecurity camera&rdquo; would be a better name! 416 Every &ldquo;home security&rdquo; camera, if its manufacturer can communicate with it, is a surveillance device. <a href=" https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change "> Canary camera is an example</a>. 418 <a href=" /proprietary/proprietary-tethers.html ">More about proprietary tethering</a>. <a href=" /proprietary/proprietary.html ">ほかのプロプライエタリ・マルウェアの例</a> 421 The Nest Cam &ldquo;smart&rdquo; camera is <a href=" https://www.bbc.com/news/technology-34922712 ">always watching</a>, even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo; Nest Cam &ldquo;smart&rdquo; カメラは<a href=" http://www.bbc.com/news/technology-34922712 ">常時監視します</a>、「所有者」がそのスイッチを「切って」いるときでもです。 425 The Furby Connect has a <a href=" https://web.archive.org/web/20220604212722/https://www.contextis.com/en/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect "> universal back door</a>. If the product as shipped doesn't act as a listening device, remote changes to the code could surely convert it into one. 426 A remote-control sex toy was found to make <a href=" https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-surveillance ">audio recordings of the conversation between two users</a>. 432 Following this lawsuit, <a href=" https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits "> the company has been ordered to pay a total of C$4m</a> to its customers. 433 &ldquo;CloudPets&rdquo; toys with microphones <a href=" https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults "> leak childrens' conversations to the manufacturer</a>. Guess what? <a href=" https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings "> Crackers found a way to access the data</a> collected by the manufacturer's snooping. 435 The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que can be <a href=" https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws/ ">remotely controlled with a mobile phone</a>; physical access is not necessary. This would enable crackers to listen in on a child's conversations, and even speak into the toys themselves. 437 The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit <a href=" https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws/ ">children's conversations to Nuance Communications</a>, a speech recognition company based in the U.S. 439 Barbie <a href=" https://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673 ">is going to spy on children and adults</a>. バービー人形は<a href=" http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673 ">子供と大人をスパイしようとしています</a>。 442 While you're using a DJI drone to snoop on other people, DJI is in many cases <a href=" https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity ">snooping on you</a>. 445 Philips Hue, the most ubiquitous home automation product in the US, is planning to soon <a href=" https://boingboing.net/2023/09/27/philips-hue-to-make-you-create-an-account-and-log-in-to-adjust-your-lightbulbs.html "> force users to log in to the app server</a> in order to be able to adjust a lightbulb, or use other functionalities, in what amounts to a massive user-tracking data grab. 446 Many employers are using nonfree software, including videoconference software, to <a href=" https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance "> surveil and monitor staff working at home</a>. If the program reports whether you are &ldquo;active,&rdquo; that is in effect a malicious surveillance feature. 447 Google Nest <a href=" https://blog.google/products/google-nest/partnership-adt-smarter-home-security/ "> is taking over ADT</a>. Google sent out a software update to its speaker devices using their back door <a href=" https://web.archive.org/web/20240123114737/https://www.protocol.com/google-smart-speaker-alarm-adt "> that listens for things like smoke alarms</a> and then notifies your phone that an alarm is happening. This means the devices now listen for more than just their wake words. Google says the software update was sent out prematurely and on accident and Google was planning on disclosing this new feature and offering it to customers who pay for it. 448 &ldquo;Bossware&rdquo; is malware that bosses <a href=" https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers "> coerce workers into installing in their own computers</a>, so the bosses can spy on them. 450 Google &ldquo;Assistant&rdquo; records users' conversations <a href=" https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/ ">even when it is not supposed to listen</a>. Thus, when one of Google's subcontractors discloses a thousand confidential voice recordings, users were easily identified from these recordings. 453 Amazon Alexa collects a lot more information from users than is necessary for correct functioning (time, location, recordings made without a legitimate prompt), and sends it to Amazon's servers, which store it indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, even if users request deletion of their data from Amazon's servers, <a href=" https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php "> the data remain on other servers</a>, where they can be accessed by advertising companies and government agencies. In other words, deleting the collected information doesn't cancel the wrong of collecting it. 455 Some of users' commands to the Alexa service are <a href=" https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html "> recorded for Amazon employees to listen to</a>. The Google and Apple voice assistants do similar things. 456 A fraction of the Alexa service staff even has access to <a href=" https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788 "> location and other personal data</a>. 457 Since the client program is nonfree, and data processing is done &ldquo;<a href=" /philosophy/words-to-avoid.html#CloudComputing ">in the cloud</a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where it's done&rdquo;), users have no way to know what happens to the recordings unless human eavesdroppers <a href=" https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033 "> break their non-disclosure agreements</a>. 458 The HP <a href=" https://boingboing.net/2019/02/08/inkjet-dystopias.html "> &ldquo;ink subscription&rdquo; cartridges have DRM that constantly communicates with HP servers</a> to make sure the user is still paying for the subscription, and hasn't printed more pages than were paid for. 460 Crackers found a way to break the security of an Amazon device, and <a href=" https://boingboing.net/2018/08/12/alexa-bob-carol.html "> turn it into a listening device</a> for them. 462 <small>(These crackers are probably hackers too, but please <a href=" https://stallman.org/articles/on-hacking.html "> don't use &ldquo;hacking&rdquo; to mean &ldquo;breaking security&rdquo;</a>.)</small> 463 A medical insurance company <a href=" https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next/ "> offers a gratis electronic toothbrush that snoops on its user by sending usage data back over the Internet</a>. 464 Sonos <a href=" https://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/ "> told all its customers, &ldquo;Agree&rdquo; to snooping or the product will stop working</a>. <a href=" https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/ "> Another article</a> says they won't forcibly change the software, but people won't be able to get any upgrades and eventually it will stop working. 465 Lots of &ldquo;smart&rdquo; products are designed <a href=" http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022 ">to listen to everyone in the house, all the time</a>. 467 Nest thermometers send <a href=" https://bgr.com/general/google-nest-jailbreak-hack/ ">a lot of data about the user</a>. 468 <a href=" https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm "> Rent-to-own computers were programmed to spy on their renters</a>. <a href=" http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm ">購入選択権付リースのコンピュータがユーザをスパイするようにプログラムされてました</a>。 471 Tommy Hilfiger clothing <a href=" https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers ">will monitor how often people wear it</a>. 474 Internet-enabled watches with proprietary software are malware, violating people (specially children's) privacy. In addition, they have a lot of security flaws. They <a href=" https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/ "> permit security breakers (and unauthorized people) to access</a> the watch. 476 <small>(Note that this article misuses the word &ldquo;<a href=" /philosophy/words-to-avoid.html#Hacker ">hackers</a>&rdquo; to mean &ldquo;crackers.&rdquo;)</small> 477 A very cheap &ldquo;smart watch&rdquo; comes with an Android app <a href=" https://www.theregister.com/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/ "> that connects to an unidentified site in China</a>. 479 An LG &ldquo;smart&rdquo; watch is designed <a href=" https://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html "> to report its location to someone else and to transmit conversations too</a>. 482 <a href=" https://web.archive.org/web/20240311120515/https://www.nytimes.com/2024/03/11/technology/carmakers-driver-tracking-insurance.html "> GM is spying on drivers</a> who own or rent their cars, and give away detailed driving data to insurance companies through data brokers. These companies then analyze the data, and hike up insurance prices if they think the data denotes &ldquo;risky driving.&rdquo; For the car to make this data available to anyone but the owner or renter of the car should be a crime. If the car is owned by a rental company, that company should not have access to it either. 483 Recent autos offer a feature by which the drivers can connect their snoop-phones to the car. That feature <a href=" https://therecord.media/class-action-lawsuit-cars-text-messages-privacy "> snoops on the calls and texts</a> and gives the data to the car manufacturer, and to the state. 485 In an article from Mozilla, every car brand they researched <a href=" https://foundation.mozilla.org/en/privacynotincluded/articles/its-official-cars-are-the-worst-product-category-we-have-ever-reviewed-for-privacy/ "> has failed their privacy tests</a>. Some car manufacturers explicitly mention that they collect data which includes &ldquo;sexual activities&rdquo; and &ldquo;genetic information&rdquo;. Not only collecting any of such data is a huge privacy violation in the first place, some companies assume drivers and passengers' consent before they get in the car. Notably, Tesla threatens that the car may be &ldquo;inoperable&rdquo; if the user opts out of data collection. 486 Tesla cars record videos of activity inside the car, and <a href=" https://arstechnica.com/tech-policy/2023/04/tesla-workers-shared-images-from-car-cameras-including-scenes-of-intimacy/ "> company staff can watch those recordings and copy them</a>. Or at least they were able to do so until last year. 488 GM is switching to a new audio/video system in its cars in order to <a href=" https://edition.cnn.com/2023/04/01/business/gm-apple-play-evs/index.html "> collect complete information about what people in the car watch or listen to, and also how they drive</a>. 490 Volkswagen <a href=" https://pluralistic.net/2023/02/28/kinderwagen/ "> tracks the location of every driver, and sells that data to third-parties</a>. However, it refuses to use the data to implement a feature for the benefit of its customers unless they pay extra money for it. 492 <a href=" https://gizmodo.com/get-ready-for-in-car-ads-1846888390 ">Ford is planning to force ads on drivers in cars</a>, with the ability for the owner to pay extra to turn them off. The system probably imposes surveillance on drivers too. 493 New Toyotas will <a href=" https://www.theregister.com/2020/08/18/aws_toyota_alliance/ "> upload data to AWS to help create custom insurance premiums</a> based on driver behaviour. 495 Most modern cars now <a href=" https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html "> record and send various kinds of data to the manufacturer</a>. For the user, access to the data is nearly impossible, as it involves cracking the car's computer, which is always hidden and running with proprietary software. 496 Tesla cars collect lots of personal data, and <a href=" https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html "> when they go to a junkyard the driver's personal data goes with them</a>. 497 The FordPass Connect feature of some Ford vehicles has <a href=" https://web.archive.org/web/20200530023040/https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html "> near-complete access to the internal car network</a>. It is constantly connected to the cellular phone network and sends Ford a lot of data, including car location. This feature operates even when the ignition key is removed, and users report that they can't disable it. 499 In China, it is mandatory for electric cars to be equipped with a terminal that <a href=" https://apnews.com/article/north-america-ap-top-news-international-news-shanghai-china-4a749a4211904784826b45e812cff4ca "> transfers technical data, including car location, to a government-run platform</a>. In practice, <a href=" /proprietary/proprietary-surveillance.html#car-spying "> manufacturers collect this data</a> as part of their own spying, then forward it to the government-run platform. 500 GM <a href=" https://boingboing.net/2018/10/23/dont-touch-that-dial.html "> tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; cars, minute by minute. 504 AI-powered driving apps can <a href=" https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move "> track your every move</a>. 509 Tesla cars allow the company to extract data remotely and determine the car's location at any time. (See Section 2, paragraphs b and c of the <a href=" https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf "> privacy statement</a>.) The company says it doesn't store this information, but if the state orders it to get the data and hand it over, the state can store it. Tesla社の車はTesla社が遠隔でデータを抽出し、車の位置を常時知ることができます。(<a href=" http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf "> セクション2、パラグラフbとc</a>をご覧ください)。Tesla社はこの情報を保管しないと言いますが、国がそのデータを取得して引き渡すように命令すれば、国は保管できます。 510 Proprietary software in cars <a href=" https://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/ "> records information about drivers' movements</a>, which is made available to car manufacturers, insurance companies, and others. 自動車のプロプライエタリなソフトウェアは<a href=" http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/ ">運転手の動きについて情報を記録し</a>、自動車製造メーカ、保険会社、そのほかに利用できるようにします。 514 Oculus headsets <a href=" https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october ">require users to identify themselves to Facebook</a>. This will give Facebook free rein to pervasively snoop on Oculus users. 520 The Markup investigated 80,000 popular web sites and <a href=" https://themarkup.org/blacklight/2020/09/22/blacklight-tracking-advertisers-digital-privacy-sensitive-websites "> reports on how much they snoop on users</a>. Almost 70,000 had third-party trackers. 5,000 fingerprinted the browser to identify users. 12,000 recorded the user's mouse clicks and movements. 521 Until 2015, any tweet that listed a geographical tag <a href=" http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/ "> sent the precise GPS location to Twitter's server</a>. It still contains these GPS locations. 522 When a page uses Disqus for comments, the proprietary Disqus software <a href=" https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook/ ">loads a Facebook software package into the browser of every anonymous visitor to the page, and makes the page's URL available to Facebook</a>. 525 Many web sites report all their visitors to Google by using the Google Analytics service, which <a href=" https://www.pcworld.com/article/460787/google_analytics_breaks_norwegian_privacy_laws_local_agency_said.html "> tells Google the IP address and the page that was visited</a>. 多くのウェブサイトはすべての訪問者を、Google Analyticsサービスを通じて、グーグルに報告しますが、それは。<a href=" http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/ ">IPアドレスと訪問されたページをグーグルに通報します</a>。 530 The US government <a href=" https://themarkup.org/pixel-hunt/2022/04/28/applied-for-student-aid-online-facebook-saw-you ">sent personal data to Facebook</a> for every college student that applied for US government student aid. It justified this as being for a &ldquo;campaign.&rdquo; 532 Many web sites use JavaScript code <a href=" https://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081 "> to snoop on information that users have typed into a form but not sent</a>, in order to learn their identity. Some are <a href=" https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege "> getting sued</a> for this. 533 The chat facilities of some customer services use the same sort of malware to <a href=" https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119 "> read what the user is typing before it is posted</a>. 534 British Airways used <a href=" https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security ">nonfree JavaScript on its web site to give other companies personal data on its customers</a>. 535 Some JavaScript malware <a href=" https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research "> swipes usernames from browser-based password managers</a>. 536 Some websites send JavaScript code to collect all the user's input, <a href=" https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/ ">which can then be used to reproduce the whole session</a>. 540 Flash and JavaScript are used for <a href=" https://arstechnica.com/information-technology/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/ "> &ldquo;fingerprinting&rdquo; devices</a> to identify users. フラッシュは<a href=" http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/ ">デバイスの「指紋」</a>を使ってユーザを同定するのにも使われます。 541 Flash Player's <a href=" https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/ "> cookie feature helps web sites track visitors</a>. フラッシュ・プレイヤーの<a href=" http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/ ">クッキーの機能は訪問者をウェブサイトが追跡するのを手助けします</a>。 544 Google's proprietary Chrome web browser <a href=" https://www.techrepublic.com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/ "> added a surveillance API (idle detection API)</a> which lets websites ask Chrome to report when a user with a web page open is idle. 545 Google Chrome is an <a href=" https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/ "> instrument of surveillance</a>. It lets thousands of trackers invade users' computers and report the sites they visit to advertising and data companies, first of all to Google. Moreover, if users have a Gmail account, Chrome automatically logs them in to the browser for more convenient profiling. On Android, Chrome also reports their location to Google. 546 The best way to escape surveillance is to switch to <a href=" /software/icecat/ ">IceCat</a>, a modified version of Firefox with several changes to protect users' privacy. 547 Low-priced Chromebooks for schools are <a href=" https://www.eff.org/wp/school-issued-devices-and-student-privacy "> collecting far more data on students than is necessary, and store it indefinitely</a>. Parents and students complain about the lack of transparency on the part of both the educational services and the schools, the difficulty of opting out of these services, and the lack of proper privacy policies, among other things. 548 But complaining is not sufficient. Parents, students and teachers should realize that the software Google uses to spy on students is nonfree, so they can't verify what it really does. The only remedy is to persuade school officials to <a href=" /education/edu-schools.html "> exclusively use free software</a> for both education and school administration. If the school is run locally, parents and teachers can mandate their representatives at the School Board to refuse the budget unless the school initiates a switch to free software. If education is run nation-wide, they need to persuade legislators (e.g., through free software organizations, political parties, etc.) to migrate the public schools to free software. 549 Google Chrome makes it easy for an extension to do <a href=" https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/ ">total snooping on the user's browsing</a>, and many of them do so. GoogleのChromeは拡張機能が<a href=" http://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/ ">ユーザのブラウズ行為を完全に覗き見する</a>ことを容易にし、多くの拡張機能がそうしています。 550 Google Chrome includes a module that <a href=" https://www.privateinternetaccess.com/blog/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/ "> activates microphones and transmits audio to its servers</a>. 551 Google Chrome <a href=" https://web.archive.org/web/20151018132125/http://www.brad-x.com/2013/08/04/google-chrome-is-spyware/ "> spies on browser history, affiliations</a>, and other installed software. 552 Google Chrome contains a key logger that <a href=" https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/ "> sends Google every URL typed in</a>, one key at a time. 555 Honorlock set a network of fake test answer honeypot sites, tempting people to get exam answers, but <a href=" https://themarkup.org/machine-learning/2022/02/15/a-network-of-fake-test-answer-sites-is-trying-to-incriminate-students ">that is a way to entrap students, so as to identify them and punish them</a>, using nonfree JS code to identify them. 556 EdTech companies use their surveillance power to manipulate students, and direct them into tracks towards various levels of knowledge, power and prestige. The article argues that <a href=" https://blogs.lse.ac.uk/medialse/2021/10/25/algorithmic-injustice-in-education-why-tech-companies-should-require-a-license-to-operate-in-childrens-education/ ">these companies should obtain licenses to operate</a>. That wouldn't hurt, but it doesn't address the root of the problem. All data acquired in a school about any student, teacher, or employee must not leave the school, and must be kept in computers that belong to the school and run free (as in freedom) software. That way, the school district and/or parents can control what is done with those data. 557 <a href=" https://me2ba.org/me2ba-product-testing-spotlight-report-published-data-sharing-in-primary-secondary-school-mobile-apps-2/ ">60% of school apps are sending student data to potentially high-risk third parties</a>, putting students and possibly all other school workers under surveillance. This is made possible by using unsafe and proprietary programs made by data-hungry corporations. 559 The United States' government is reportedly considering <a href=" https://www.infosecurity-magazine.com/news/private-companies-may-spy-on/ ">teaming up with private companies to monitor American citizens' private online activity and digital communications</a>. 561 Google <a href=" https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16 ">handed over personal data of Indian protesters and activists to Indian police</a> which led to their arrest. The cops requested the IP address and the location where a document was created and with that information, they identified protesters and activists. 562 The HonorLock online exam proctoring program is a surveillance tool that <a href=" https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps ">tracks students and collects data</a> such as face, driving license, and network information, among others, in blatant violation of students' privacy. 564 While the world is still struggling with COVID-19 coronavirus, many <a href=" https://mashable.com/article/privacy-in-the-age-of-coronavirus ">people are in danger of surveillance</a> and their computers are infected with malware as a result of installing proprietary software. 565 Proprietary programs Google Meet, Microsoft Teams, and WebEx <a href=" https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex-a7383469308/ ">are collecting user's personal and identifiable data</a> including how long a call lasts, who's participating in the call, and the IP addresses of everyone taking part. From experience, this can even harm users physically if those companies hand over data to governments. 566 Microsoft <a href=" https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08 ">forces people to give their phone number</a> in order to be able to create an account on the company's network. On top of mistreating their users by providing nonfree software, Microsoft is tracking their lives outside the computer and violates their privacy. 567 Google invites people to <a href=" https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss "> let Google monitor their phone use, and all internet use in their homes, for an extravagant payment of $20</a>. 569 <a href=" https://www.theverge.com/2018/8/13/17684660/google-turn-off-location-history-data ">Google will track people even if people turn off location history</a>, using Google Maps, weather updates, and browser searches. Google basically uses any app activity to track people. 570 Since the beginning of 2017, <a href=" https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled ">Android phones have been collecting the addresses of nearby cellular towers</a>, even when location services are disabled, and sending that data back to Google. 571 Investigation Shows <a href=" https://www.techdirt.com/2016/06/03/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions/ ">GCHQ Using US Companies, NSA To Route Around Domestic Surveillance Restrictions</a>. 調査で<a href=" https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml ">GCHQは合衆国の会社とNSAを使って国内の監視の制限を回避している</a>ことがわかりました。 573 The Cisco TNP IP phones are <a href=" https://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html "> spying devices</a>. Cisco TNP IP電話のスパイウェア: <a href=" http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html ">http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a>。 576 TODO: submitting -> contributing. Please see the <a href="/server/standards/README.translations.html">Translations README</a> for information on coordinating and contributing translations of this article. 正確で良い品質の翻訳を提供するよう努力していますが、不完全な場合もあるかと思います。翻訳に関するコメントと提案は、<a href=" mailto:web-translators@gnu.org ">&lt;web-translators@gnu.org&gt;</a>におねがいします。</p><p>わたしたちのウェブページの翻訳の調整と提出については、<a href="/server/standards/README.translations.html">翻訳 README</a>をご覧ください。 ...
http://www.gnu.org/savannah-checkouts/gnu/gnun/reports/ja/proprietary/proprietary-surveillance.html - [detail] - [similar]
PREV NEXT
Powered by Hyper Estraier 1.4.13, with 213331 documents and 1081083 words.