advanced help
phrase:
attribute:
attribute:
attribute:
order:
per page:
clip:
action:
Results of 1 - 1 of about 725 for Android 12 (1.924 sec.)
android (2801), 12 (27798)
proprietary-surveillance.pt-br.po
#score: 5143
@digest: 019365cfc1d6f7edfc12650d44aeaa93
@id: 412053
@mdate: 2024-04-13T11:14:03Z
@size: 119878
@type: text/html
content-type: text/html; charset=utf-8
#keywords: aplicativos (28883), arstechnica (28456), telefones (27315), theregister (22170), theguardian (20857), https (18324), href (13901), privacy (13621), dados (12914), usuarios (12911), vigilancia (12826), ldquo (12430), rdquo (11455), spyware (10925), surveillance (9184), google (9074), smart (8694), technology (8549), spying (8222), android (7961), facebook (7933), com (7398), apple (7222), usuario (7209), informacoes (7149), windows (6810), privativo (6712), microsoft (6436), phones (6334), pessoas (6266), apps (6073), tracking (5973)
proprietary-surveillance.pt-br.po Mismatched links: 268. Mismatched ids: 0. # text 40 <a href=" #SpywareAtHome ">Other Appliances</a> <a href=" /proprietary/malware-appliances.html ">Outros <i lang="en">appliances</i></a> 41 <a href=" #SpywareOnWearables ">Wearables</a> <a href=" /proprietary/malware-webpages.html ">Tecnologias vestíveis</a> 51 For decades, the Free Software movement has been denouncing the abusive surveillance machine of <a href="/proprietary/proprietary.html">proprietary software</a> companies such as <a href="/proprietary/malware-microsoft.html">Microsoft</a> and <a href="/proprietary/malware-apple.html">Apple</a>. In the recent years, this tendency to watch people has spread across industries, not only in the software business, but also in the hardware. Moreover, it also spread dramatically away from the keyboard, in the mobile computing industry, in the office, at <a href=" https://www.theguardian.com/world/2023/sep/07/uk-owners-of-smart-home-devices-being-asked-for-swathes-of-personal-data "> home</a>, in transportation systems, and in the classroom. Durante décadas, o movimento Software Livre denunciou a máquina de vigilância abusiva de empresas de <a href="/proprietary/proprietary.html">software privativo</a>, como a <a href="/proprietary/malware-microsoft.html">Microsoft</a> e <a href="/proprietary/malware-apple.html">Apple</a>. Nos últimos anos, essa tendência de observar as pessoas se espalhou por todos os setores, não apenas de software, mas também de hardware. Além disso, ele também se espalhou dramaticamente longe do teclado, na indústria de computação móvel, no escritório, em casa, em sistemas de transporte e na sala de aula. 65 As soon as it boots, and without asking any permission, <a href=" https://www.techspot.com/news/97535-windows-11-spyware-machine-out-users-control.html ">Windows 11 starts to send data to online servers</a>. The user's personal details, location or hardware information are reported to Microsoft and other companies to be used as telemetry data. All of this is done is the background, and users have no easy way to prevent it&mdash;unless they switch the computer offline. 66 Microsoft <a href=" https://betanews.com/2023/01/19/microsoft-is-using-the-kb5021751-update-to-see-if-you-have-an-unsupported-version-of-office-installed/ "> released an &ldquo;update&rdquo; that installs a surveillance program</a> on users' computers to gather data on some installed programs for Microsoft's benefit. The update is rolling out automatically, and the program runs &ldquo;one time silently.&rdquo; 67 Windows 11 Home and Pro now <a href=" https://www.microsoft.com/windows/windows-11-specifications "> require internet connection and a Microsoft account</a> to complete the installation. Windows 11 Pro had an option to create a local account instead, but the option has been removed. This account can (and most certainly will) be used for surveillance and privacy violations. Thankfully, a free software tool named <a href=" https://gothub.frontendfriendly.xyz/pbatard/rufus/blob/master/README.md ">Rufus</a> can bypass those requirements, or help users install a <a href=" /distros/distros.html "> free operating system</a> instead. 69 HP's proprietary operating system <a href=" https://www.bbc.com/news/technology-42309371 ">includes a proprietary keyboard driver with a key logger in it</a>. O sistema operacional privativo da HP <a href=" http://www.bbc.com/news/technology-42309371 ">inclui um driver de teclado privativo com um <i lang="en">key logger</i> nele</a>. 71 Furthermore, for users who installed the fourth stable build of Windows 10, called the &ldquo;Creators Update,&rdquo; Windows maximized the surveillance <a href=" https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law/ "> by force setting the telemetry mode to &ldquo;Full&rdquo;</a>. Além disso, para usuários que instalaram a quarta versão estável do Windows 10, chamada de “Atualização para Criadores”, o Windows maximizou a vigilância <a href=" https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law "> forçando a configuração do modo de telemetria para “Completo”</a>. 72 The <a href=" https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level "> &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, among other things, registry keys <a href=" https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10) "> which can contain sensitive information like administrator's login password</a>. O <a href=" https://docs.microsoft.com/pt-br/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level "> modo de telemetria “Completo”</a> permite que os engenheiros do Microsoft Windows acessem, entre outras coisas, as chaves de registro <a href=" https://docs.microsoft.com/pt-br/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10) "> que podem conter informações confidenciais, como a senha de login do administrador</a>. 74 By default, Windows 10 <a href=" https://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties/ ">sends debugging information to Microsoft, including core dumps</a>. Microsoft now distributes them to another company. Por padrão, o Windows 10 <a href=" http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties ">envia informações de depuração para a Microsoft, incluindo despejos principais</a>. A Microsoft agora os distribui para outra empresa. 76 <a href=" https://duo.com/decipher/bring-your-own-dilemma-oem-laptops-and-windows-10-security "> Windows 10 comes with 13 screens of snooping options</a>, all enabled by default, and turning them off would be daunting to most users. <a href=" https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security "> O Windows 10 vem com 13 telas de opções de bisbilhotamento</a>, todas habilitadas por padrão, e desligá-las seria assustador para a maioria dos usuários. 77 It appears <a href=" https://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/ "> Windows 10 sends data to Microsoft about what applications are running</a>. Parece que <a href=" http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/ "> o Windows 10 envia dados à Microsoft sobre quais aplicativos estão sendo executados</a>. 79 A downgrade to Windows 10 deleted surveillance-detection applications. Then another downgrade inserted a general spying program. Users noticed this and complained, so Microsoft renamed it <a href=" https://www.theregister.com/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/ "> to give users the impression it was gone</a>. Um <i lang="en">downgrade</i> para o Windows 10 excluiu aplicativos de detecção de vigilância. Em seguida, outro <i lang="en">downgrade</i> inseriu um programa de espionagem geral. Os usuários perceberam isso e reclamaram, então a Microsoft o renomeou como <a href=" https://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/ "> para dar aos usuários a impressão de que ele havia sumido</a>. 82 <a href=" https://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/ "> Windows 10 sends identifiable information to Microsoft</a>, even if a user turns off its Bing search and Cortana features, and activates the privacy-protection settings. <a href=" http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/ "> O Windows 10 envia informações identificáveis para a Microsoft</a>, mesmo se um usuário desativar a pesquisa do Bing e os recursos da Cortana, e ativar as configurações de proteção de privacidade. 89 It only gets worse with time. <a href=" https://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html "> Windows 10 requires users to give permission for total snooping</a>, including their files, their commands, their text input, and their voice input. Só piora com o tempo. <a href=" http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html "> O Windows 10 exige que os usuários deem permissão para bisbilhotamento total</a>, incluindo seus arquivos, seus comandos, sua entrada de texto e sua entrada de voz. 91 <a href=" https://web.archive.org/web/20140219183154/http://www.techrepublic.com/blog/asian-technology/japanese-government-warns-baidu-ime-is-spying-on-users/ "> Baidu's Japanese-input and Chinese-input apps spy on users</a>. <a href=" https://www.techrepublic.com/blog/asian-technology/japanese-government-warns-baidu-ime-is-spying-on-users/ "> Os aplicativos de entrada japonesa e chinesa do Baidu espionam os usuários</a>. 92 Spyware in older versions of Windows: <a href=" https://www.theregister.com/2003/02/28/windows_update_keeps_tabs/ "> Windows Update snoops on the user</a>. <a href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"> Windows 8.1 snoops on local searches</a>. And there's a <a href="http://www.marketoracle.co.uk/Article40836.html"> secret NSA key in Windows</a>, whose functions we don't know. <i lang="en">Spyware</i> em versões anteriores do Windows: <a href=" https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/ "> Windows Update bisbilhota o usuário</a>. <a href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"> Windows 8.1 bisbilhota pesquisas locais</a>. E há uma <a href="http://www.marketoracle.co.uk/Article40836.html"> chave secreta da NSA no Windows</a>, cujas funções não conhecemos. 96 Apple has <a href=" https://sneak.berlin/20201112/your-computer-isnt-yours/ ">implemented a malware in its computers that imposes surveillance</a> on users and reports users' computing to Apple. A Apple <a href=" https://sneak.berlin/20201112/your-computer-isnt-yours ">implementou um <em>malware</em> em seus computadores que impõe vigilância</a> aos usuários e relata a computação dos usuários à Apple. 99 Apple has made various <a href=" https://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud "> MacOS programs send files to Apple servers without asking permission</a>. This exposes the files to Big Brother and perhaps to other snoops. A Apple fez com que vários <a href=" http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud "> programas de MacOS enviassem arquivos para servidores Apple sem pedir permissão</a>. Isso expõe os arquivos ao <i lang="en">Big Brother</i> e talvez a outros bisbilhoteiros. 102 Apple admits the <a href=" https://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/ "> spying in a search facility</a>, but there's a lot <a href=" https://gothub.frontendfriendly.xyz/fix-macosx/yosemite-phone-home/blob/master/README.md "> more snooping that Apple has not talked about</a>. A Apple admite <a href=" http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/ "> espionagem em um mecanismo de pesquisa</a>, mas há muito <a href=" https://github.com/fix-macosx/yosemite-phone-home "> mais bisbilhotamento que a Apple não falou</a>. 103 Various operations in <a href=" https://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540 "> the latest MacOS send reports to Apple</a> servers. Várias operações <a href=" http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540 "> no MacOS mais recente enviam relatórios para os servidores da Apple</a>. 104 <a href=" https://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html "> Spotlight search</a> sends users' search terms to Apple. A <a href=" http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html "> pesquisa do Spotlight</a> envia os termos de pesquisa dos usuários para a Apple. 125 The natural extension of monitoring people through &ldquo;their&rdquo; phones is <a href=" https://news.northwestern.edu/stories/2016/01/fool-activity-tracker "> proprietary software to make sure they can't &ldquo;fool&rdquo; the monitoring</a>. A extensão natural do monitoramento de pessoas por meio de “seus” telefones é o <a href=" http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html "> software privativo garantir que eles não possam “enganar” o monitoramento</a>. 126 According to Edward Snowden, <a href=" https://www.bbc.com/news/uk-34444233 ">agencies can take over smartphones</a> by sending hidden text messages which enable them to turn the phones on and off, listen to the microphone, retrieve geo-location data from the GPS, take photographs, read text messages, read call, location and web browsing history, and read the contact list. This malware is designed to disguise itself from investigation. De acordo com Edward Snowden, <a href=" http://www.bbc.com/news/uk-34444233 ">as agências podem assumir o controle de smartphones</a> enviando mensagens de texto ocultas que permitem ligar os telefones e desligar, ouvir o microfone, recuperar dados de geolocalização do GPS, tirar fotos, ler mensagens de texto, ler chamadas, localização e histórico de navegação na web e ler a lista de contatos. Este <em>malware</em> foi projetado para se disfarçar de investigação. 127 <a href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"> The NSA can tap data in smart phones, including iPhones, Android, and BlackBerry</a>. While there is not much detail here, it seems that this does not operate via the universal back door that we know nearly all portable phones have. It may involve exploiting various bugs. There are <a href=" https://www.osnews.com/story/27416/the-second-operating-system-hiding-in-every-mobile-phone/ "> lots of bugs in the phones' radio software</a>. <a href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"> A NSA pode interceptar dados em smartphones, incluindo iPhones, Android e BlackBerry</a>. Embora não haja muitos detalhes aqui, parece que isso não funciona através do <em>backdoor</em> universal que sabemos que quase todos os telefones portáteis possuem. Pode envolver a exploração de vários bugs. Existem <a href=" http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone "> muitos bugs no software de rádio dos telefones</a>. 128 Portable phones with GPS <a href=" https://www.aclu.org/issues/privacy-technology/location-tracking/you-are-being-tracked "> will send their GPS location on remote command, and users cannot stop them</a>. (The US says it will eventually require all new portable phones to have GPS.) Telefones portáteis com GPS <a href=" http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers "> enviarão sua localização GPS por comando remoto, e os usuários não podem impedi-los</a>. (Os EUA afirmam que eventualmente exigirão que todos os novos telefones portáteis tenham GPS.) 131 <a href=" https://web.archive.org/web/20230101185726/https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558 "> The iMonster app store client programs collect many kinds of data</a> about the user's actions and private communications. &ldquo;Do not track&rdquo; options are available, but tracking doesn't stop if the user activates them: Apple keeps on collecting data for itself, although it claims not to send it to third parties. 132 <a href=" https://www.theregister.com/2022/11/14/apple_data_collection_lawsuit/ "> Apple is being sued</a> for that. 148 (From <a href=" https://web.archive.org/web/20150921152044/https://www.apple.com/icloud/photos/ ">Apple's iCloud information</a> as accessed on 24 Sep 2015.) The iCloud feature is <a href="https://support.apple.com/en-us/HT202033">activated by the startup of iOS</a>. The term &ldquo;cloud&rdquo; means &ldquo;please don't ask where.&rdquo; (Das <a href=" https://www.apple.com/icloud/photos/ ">informações do iCloud da Apple</a>, acessado em 24 de setembro de 2015.) O recurso iCloud é <a href="https://support.apple.com/en-us/HT202033">ativado pela inicialização do iOS</a>. O termo “nuvem” significa “por favor, não pergunte onde”. 151 Apple can, and regularly does, <a href=" https://arstechnica.com/gadgets/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/ "> remotely extract some data from iPhones for the state</a>. A Apple pode, e faz regularmente, <a href=" http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/ "> extrair remotamente alguns dados de iPhones para o estado</a>. 152 This may have improved with <a href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"> iOS 8 security improvements</a>; but <a href=" https://theintercept.com/2014/09/22/apple-data/ "> not as much as Apple claims</a>. Isso pode ter melhorado com <a href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"> melhorias de segurança do iOS 8</a>, mas <a href=" https://firstlook.org/theintercept/2014/09/22/apple-data/ "> não tanto quanto a Apple afirma</a>. 153 <a href=" https://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services "> Several &ldquo;features&rdquo; of iOS seem to exist for no possible purpose other than surveillance</a>. Here is the <a href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"> Technical presentation</a>. <a href=" http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services "> Vários “recursos” do iOS parecem existir para nenhum outro propósito além da vigilância</a>. Aqui está a <a href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"> apresentação técnica</a>. 154 The <a class="not-a-duplicate" href=" https://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html "> iBeacon</a> lets stores determine exactly where the iThing is, and get other info too. O <a class="not-a-duplicate" href=" http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html "> iBeacon</a> permite que as lojas determinem exatamente onde está o iCoisa e também obtenham outras informações. 155 <a href=" https://web.archive.org/web/20190924053515/https://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep "> Either Apple helps the NSA snoop on all the data in an iThing, or it is totally incompetent</a>. <a href=" http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep "> Ou a Apple ajuda a NSA a bisbilhotar todos os dados em um iCoisa ou é totalmente incompetente</a>. 156 The iThing also <a href=" https://www.theregister.com/2013/08/08/ios7_tracking_now_its_a_favourite_feature/ "> tells Apple its geolocation</a> by default, though that can be turned off. O iCoisa também <a href=" https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/ "> informa à Apple sua geolocalização</a> por padrão, embora isso possa ser desligado. 157 There is also a feature for web sites to track users, which is <a href=" https://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/ "> enabled by default</a>. (That article talks about iOS 6, but it is still true in iOS 7.) Há também um recurso para sites rastrearem usuários, que está <a href=" http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/ "> habilitado por padrão</a>. (Esse artigo fala sobre iOS 6, mas ainda é verdadeiro no iOS 7.) 168 Android tracks location for Google <a href=" https://www.techdirt.com/2017/11/21/investigation-finds-google-collected-location-data-even-with-location-services-turned-off/ "> even when &ldquo;location services&rdquo; are turned off, even when the phone has no SIM card</a>. O Android rastreia a localização para o Google <a href=" https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml "> mesmo quando os “serviços de localização” estão desligados, mesmo quando o telefone não tem cartão SIM</a>. 169 Some portable phones <a href=" https://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html ">are sold with spyware sending lots of data to China</a>. Alguns telefones portáteis <a href=" http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html ">são vendidos com <i lang="en">spyware</i> enviando muitos dados para a China</a>. 172 Samsung phones come with <a href=" https://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/ ">apps that users can't delete</a>, and they send so much data that their transmission is a substantial expense for users. Said transmission, not wanted or requested by the user, clearly must constitute spying of some kind. Os telefones da Samsung vêm com <a href=" http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/ "> aplicativos que os usuários não podem excluir</a> e enviam tantos dados que sua transmissão representa uma despesa substancial para os usuários. A referida transmissão, não desejada ou solicitada pelo usuário, deve claramente constituir espionagem de algum tipo. 174 Spyware in Android phones (and Windows? laptops): The Wall Street Journal (in an article blocked from us by a paywall) reports that <a href=" https://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj "> the FBI can remotely activate the GPS and microphone in Android phones and laptops</a> (presumably Windows laptops). Here is <a href=" https://cryptome.org/2013/08/fbi-hackers.htm ">more info</a>. <i lang="en">spyware</i> em telefones Android (e laptops Windows?): The Wall Street Journal (em um artigo bloqueado para nós por exigir acesso pago) relata que <a href=" http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj "> o FBI pode ativar remotamente o GPS e o microfone em telefones e laptops Android</a> (presumivelmente laptops Windows). Aqui estão <a href=" http://cryptome.org/2013/08/fbi-hackers.htm ">mais informações</a>. 177 Google Play intentionally sends app developers <a href=" https://gadgets360.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116 "> the personal details of users that install the app</a>. O Google Play envia intencionalmente aos desenvolvedores de aplicativos <a href=" http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116 "> os detalhes pessoais dos usuários que instalam o aplicativo</a>. 180 Some manufacturers add a <a href=" https://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/ "> hidden general surveillance package such as Carrier IQ</a>. Alguns fabricantes adicionam um <a href=" http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/ "> pacote oculto de vigilância geral, como o Carrier IQ</a>. 183 E-books can contain JavaScript code, and <a href=" https://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds "> sometimes this code snoops on readers</a>. Os e-books podem conter código JavaScript e, <a href=" http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds "> às vezes, esse código bisbilhota os leitores</a>. 188 Edge <a href=" https://www.neowin.net/news/edge-sends-images-you-view-online-to-microsoft-here-is-how-to-disable-that/ ">sends the URLs of images the user views to Microsoft's servers</a> by default, supposedly to &ldquo;enhance&rdquo; them. And these images <a href=" /proprietary/proprietary-surveillance.html#M201405140 ">may end up on the NSA's servers</a>. 189 Microsoft claims its nonfree browser sends the URLs without identifying you, which cannot be true, since at least your IP address is known to the server if you don't take extra measures. Either way, such enhancer service is unjust because any image editing <a href=" /philosophy/who-does-that-server-really-serve.html ">should be done on your own computer using installed free software</a>. 190 The article describes how to disable sending the URLs. That makes a change for the better, but we suggest that you instead switch to a freedom-respecting browser with additional privacy features such as <a href=" /software/gnuzilla/ ">IceCat</a>. 191 Some employers are <a href=" https://www.theguardian.com/money/2023/may/30/i-feel-constantly-watched-employees-working-under-surveillance-monitorig-software-productivity "> forcing employees to run &ldquo;monitoring software&rdquo;</a> on their computers. These extremely intrusive proprietary programs can take screenshots at regular intervals, log keystrokes, record audio and video, etc. Such practices have been shown to <a href=" https://www.eurofound.europa.eu/publications/report/2020/employee-monitoring-and-surveillance-the-challenges-of-digitalisation "> deteriorate employees' well-being</a>, and trade unions in the European union have voiced their concerns about them. The requirement for employee's consent, which exists in some countries, is a sham because most often the employee is not free to refuse. In short, these practices should be abolished. 192 A worldwide investigation found that most of the applications that school districts recommended for remote education during the COVID-19 pandemic <a href=" https://web.archive.org/web/20220525011540/https://www.washingtonpost.com/technology/2022/05/24/remote-school-app-tracking-privacy/ ">track and collect personal data from children as young as below the age of five</a>. These applications, and their websites, send the collected information to ad giants such as Facebook and Google, and they are still being used in the classrooms even after some of the schools reopened. 198 As of April 2019, it is <a href=" https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/ ">no longer possible to disable an unscrupulous tracking anti-feature</a> that <a href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports users when they follow ping links</a> in Apple Safari, Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge that is going to be based on Chromium. A partir de abril de 2019, <a href=" https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk ">não é mais possível desativar uma característica indesejável de rastreamento sem escrúpulos</a> que <a href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">denuncia usuários quando eles seguem links de ping</a> no Apple Safari, Google Chrome, Opera, Microsoft Edge e também no Microsoft Edge que será baseado no Chromium. 204 The Yandex company has started to <a href=" https://meduza.io/en/feature/2023/08/08/user-x-with-driver-y-traveled-from-point-a-to-point-b "> give away Yango taxi ride data to Russia's Federal Security Service (FSB)</a>. The Russian government (and whoever else receives the the data) thus has access to a wealth of personal information, including who traveled where, when, and with which driver. Yandex <a href=" https://yandex.ru/legal/confidential/?lang=en "> claims that it complies with European regulations</a> for data collected in the European Economic Area, Switzerland or Israel. But what about the rest of the world? 205 The Pinduoduo app <a href=" https://edition.cnn.com/2023/04/02/tech/china-pinduoduo-malware-cybersecurity-analysis-intl-hnk/index.html "> snoops on other apps, and takes control of them</a>. It also installs additional malware that is hard to remove. 206 Canada has fined the company Tim Hortons for making <a href=" https://arstechnica.com/tech-policy/2022/06/tim-hortons-coffee-app-broke-law-by-constantly-recording-users-movements/ "> an app that tracks people's movements</a> to learn things such as where they live, where they work, and when they visit competitors' stores. 207 New Amazon worker chat app <a href=" https://theintercept.com/2022/04/04/amazon-union-living-wage-restrooms-chat-app/ ">would ban specific words Amazon doesn't like</a>, such as &ldquo;union&rdquo;, &ldquo;restrooms&rdquo;, and &ldquo;pay raise&rdquo;. If the app was free, workers could modify the program so it acts as they wish, not how Amazon wants it. 208 The nonfree app &ldquo;Along,&rdquo; developed by a company controlled by Zuckerberg, <a href=" https://kappanonline.org/dont-go-along-with-corporate-schemes-to-gather-up-student-data/ "> leads students to reveal to their teacher personal information</a> about themselves and their families. Conversations are recorded and the collected data sent to the company, which grants itself the right to sell it. See also <a href=" /education/educational-malware-app-along.html#content ">Educational Malware App &ldquo;Along&rdquo;</a>. 209 The data broker X-Mode <a href=" https://themarkup.org/privacy/2022/01/27/gay-bi-dating-app-muslim-prayer-apps-sold-data-on-peoples-location-to-a-controversial-data-broker ">bought location data about 20,000 people collected by around 100 different malicious apps</a>. 234 This app is a spyware that can snoop on a lot of sensitive data, including user's location and contact list, and has <a href=" https://web.archive.org/web/20220321042716/https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/ "> near-complete control</a> over the phone. Esse aplicativo é um <i lang="en">spyware</i> que consegue bisbilhotar vários dados sensíveis, incluindo a localização e a lista de contato do usuário, e tem <a href=" https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/ "> controle quase completo</a> sobre seu telefone. 240 The MoviePass dis-service <a href=" https://www.cnet.com/culture/entertainment/moviepass-founder-wants-to-use-facial-recognition-to-score-you-free-movies/ "> is planning to use face recognition to track people's eyes</a> to make sure they won't put their phones down or look away during ads&mdash;and trackers. 245 The AppCensus database gives information on <a href=" https://www.appcensus.io/ "> how Android apps use and misuse users' personal data</a>. As of March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit the <a href="/proprietary/proprietary-surveillance.html#M201812290"> Advertising ID</a> to other companies, and <a href=" https://blog.appcensus.io/2019/02/14/ad-ids-behaving-badly/ "> 18,000 (23% of the total) link this ID to hardware identifiers</a>, so that users cannot escape tracking by resetting it. O banco de dados do AppCensus fornece informações sobre <a href=" https://www.appcensus.mobi "> como os aplicativos de Android usam e fazem mau uso dos dados pessoais dos usuários</a>. Até março de 2019, quase 78.000 foram analisados, dos quais 24.000 (31%) transmitem o <a href="/proprietary/proprietary-surveillance.html#M201812290"> ID de publicidade</a> para outras empresas e <a href=" https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/ "> 18.000 (23% do total) vinculam esse ID a identificadores de hardware</a>, para que os usuários não possam escapar do rastreamento redefinindo-o. 248 Twenty nine &ldquo;beauty camera&rdquo; apps that used to be on Google Play had one or more malicious functionalities, such as <a href=" https://www.androidpolice.com/2019/02/03/google-bans-29-beauty-camera-apps-from-the-play-store-that-steal-your-photos/ "> stealing users' photos instead of &ldquo;beautifying&rdquo; them</a>, pushing unwanted and often malicious ads on users, and redirecting them to phishing sites that stole their credentials. Furthermore, the user interface of most of them was designed to make uninstallation difficult. Vinte e nove aplicativos de “câmera de beleza” que costumavam estar no Google Play tinham uma ou mais funcionalidades maliciosas, como <a href=" http://web-old.archive.org/web/20190917162150/https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923 "> roubar fotos dos usuários</a> em vez de “embelezá-las”, empurrando anúncios indesejados e muitas vezes maliciosos para os usuários, e redirecionando-os para sites de <i lang="en">phishing</i> que roubaram suas credenciais. Além disso, a interface do usuário da maioria deles foi projetada para dificultar a desinstalação. 250 An investigation of the 150 most popular gratis VPN apps in Google Play found that <a href=" https://www.top10vpn.com/research/free-vpn-investigations/risk-index/ "> 25% fail to protect their users' privacy</a> due to DNS leaks. In addition, 85% feature intrusive permissions or functions in their source code&mdash;often used for invasive advertising&mdash;that could potentially also be used to spy on users. Other technical flaws were found as well. Uma investigação sobre os 150 aplicativos VPN mais populares do Google Play descobriu que <a href=" https://www.top10vpn.com/free-vpn-android-app-risk-index/ "> 25% deles não protegem a privacidade de seus usuários</a> devido a vazamentos de DNS. Além disso, 85% apresentam permissões intrusivas ou funções em seu código-fonte – muitas vezes usadas para publicidade invasiva – que também poderiam ser usadas para espionar usuários. Outras falhas técnicas foram encontradas também. 251 Moreover, a previous investigation had found that <a href=" https://www.top10vpn.com/research/free-vpn-investigations/ownership/ ">half of the top 10 gratis VPN apps have lousy privacy policies</a>. Além disso, uma investigação anterior descobrira que <a href=" https://www.top10vpn.com/free-vpn-app-investigation/ ">metade dos 10 aplicativos grátis e mais populares de VPN tinham péssimas políticas de privacidade</a>. 255 <a href=" https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps "> Other weather apps</a>, including Accuweather and WeatherBug, are tracking people's locations. <a href=" https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps "> Outros aplicativos de meteorologia</a>, incluindo Accuweather e WeatherBug, estão rastreando as localizações das pessoas. 259 Some Android apps <a href=" https://web.archive.org/web/20210418052600/https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/ "> track the phones of users that have deleted them</a>. Alguns aplicativos de Android <a href=" https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/ "> rastreiam os telefones de usuários que os excluíram</a>. 267 This is evidence that proprietary apps generally work against their users. To protect their privacy and freedom, Android users need to get rid of the proprietary software&mdash;both proprietary Android by <a href="https://replicant.us">switching to Replicant</a>, and the proprietary apps by getting apps from the free software only <a href="https://f-droid.org/">F-Droid store</a> that <a href=" https://f-droid.org/docs/Anti-Features/ "> prominently warns the user if an app contains anti-features</a>. Isso é evidência de que aplicativos privativos geralmente funcionam contra seus usuários. Para proteger sua privacidade e liberdade, os usuários do Android precisam se livrar do software privativo – tanto o Android privativo <a href="https://replicant.us">mudando para o Replicant</a> e os aplicativos privativos, obtendo aplicativos de software livre apenas da <a href="https://f-droid.org/">loja do F-Droid</a> que <a href=" https://f-droid.org/wiki/page/Antifeatures "> avisa o usuário de forma proeminente se um aplicativo contém características indesejadas</a>. 274 <a href=" https://web.archive.org/web/20230607090524/https://old.reddit.com/r/Instagram/comments/6xkhi8/ig_suddenly_asking_for_phone_number_not_visible/ ">Instagram is forcing users to give away their phone numbers</a> and won't let people continue using the app if they refuse. 277 20 dishonest Android apps recorded <a href=" https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts/ ">phone calls and sent them and text messages and emails to snoopers</a>. 20 aplicativos Android desonestos registram <a href=" https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts ">telefonemas e mensagens de texto e e-mails enviados para bisbilhoteiros</a>. 296 A <a href=" https://research.csiro.au/isp/wp-content/uploads/sites/106/2016/08/paper-1.pdf "> research paper</a> that investigated the privacy and security of 283 Android VPN apps concluded that &ldquo;in spite of the promises for privacy, security, and anonymity given by the majority of VPN apps&mdash;millions of users may be unawarely subject to poor security guarantees and abusive practices inflicted by VPN apps.&rdquo; Um <a href=" https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf "> artigo de pesquisa</a> que investigou a privacidade e a segurança de 283 aplicativos VPN para Android concluiu que, “apesar das promessas de privacidade, segurança e anonimato feitas pela maioria dos aplicativos VPN, milhões de usuários podem estar inadvertidamente sujeitos a garantias de segurança insatisfatórias e práticas abusivas infligidas por aplicativos VPN”. 310 Google's new voice messaging app <a href=" https://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google ">logs all conversations</a>. O novo aplicativo de mensagens de voz do Google <a href=" http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google "> registra todas as conversas</a>. 311 Facebook's new Magic Photo app <a href=" https://www.theregister.com/2015/11/10/facebook_scans_camera_for_your_friends/ "> scans your mobile phone's photo collections for known faces</a>, and suggests you circulate the picture you take according to who is in the frame. O novo aplicativo do Facebook, o Magic Photo, <a href=" https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/ "> percorre as coleções de fotos do seu celular em busca de rostos conhecidos</a> e sugere que você circule a foto tirada de acordo com quem está no quadro. 314 Facebook's app listens all the time, <a href=" https://www.independent.co.uk/tech/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html ">to snoop on what people are listening to or watching</a>. In addition, it may be analyzing people's conversations to serve them with targeted advertisements. O aplicativo do Facebook escuta o tempo todo, <a href=" https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html ">para bisbilhotar o que as pessoas estão ouvindo ou assistindo</a>. Além disso, pode estar analisando as conversas das pessoas para servi-las com anúncios direcionados. 315 A pregnancy test controller application not only can <a href=" https://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security "> spy on many sorts of data in the phone, and in server accounts, it can alter them too</a>. Um aplicativo de controle de teste de gravidez não só pode <a href=" http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security "> espionar muitos tipos de dados no telefone e em contas de servidor, ele também pode alterá-los</a>. 317 &ldquo;Cryptic communication,&rdquo; unrelated to the app's functionality, was <a href=" https://news.mit.edu/2015/data-transferred-android-apps-hiding-1119 "> found in the 500 most popular gratis Android apps</a>. “Comunicação enigmática” não relacionada à funcionalidade do aplicativo, foi <a href=" http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119 "> encontrada nos 500 aplicativos Android grátis mais populares</a>. 321 Like most &ldquo;music screaming&rdquo; disservices, Spotify is based on proprietary malware (DRM and snooping). In August 2015 it <a href=" https://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy "> demanded users submit to increased snooping</a>, and some are starting to realize that it is nasty. Como a maioria dos desserviços de “gritos musicais”, Spotify é baseado em <em>malware</em> privativo (DRM e bisbilhotamento). Em agosto de 2015, <a href=" http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy "> exigia que os usuários se submetessem a um bisbilhotamento maior</a>, e alguns estão começando a perceber que é desagradável. 322 This article shows the <a href=" https://www.theregister.com/2015/08/21/spotify_worse_than_the_nsa/ "> twisted ways that they present snooping as a way to &ldquo;serve&rdquo; users better</a>&mdash;never mind whether they want that. This is a typical example of the attitude of the proprietary software industry towards those they have subjugated. Este artigo mostra as <a href=" https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/ "> formas tortuosas de apresentar o bisbilhotamento como uma forma de “servir” usuários melhores</a> – não importa se eles querem isso. Este é um exemplo típico da atitude da indústria de software privativo para com aqueles que eles subjugaram. 324 Many retail businesses publish cr&hellip;apps that ask to <a href=" https://www.delish.com/kitchen-tools/a43252/how-food-apps-use-data/ "> spy on the user's own data</a>&mdash;often many kinds. 328 Gratis Android apps (but not <a href="/philosophy/free-sw.html">free software</a>) connect to 100 <a href=" https://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites ">tracking and advertising</a> URLs, on the average. Aplicativos grátis para Android (que não são <a href="/philosophy/free-sw.html">software livres</a>) conectam a 100 URLs de <a href=" http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites ">rastreamento e anúncios</a>, em média. 329 Widely used <a href=" https://freedom-to-tinker.com/2015/04/06/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/ ">proprietary QR-code scanner apps snoop on the user</a>. This is in addition to the snooping done by the phone company, and perhaps by the OS in the phone. Aplicativos privativos amplamente usados de <a href=" https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/ ">leitura de código QR bisbilhotam o usuário</a>. Isso além do bisbilhotamento feito pela companhia telefônica e, talvez, pelo sistema operacional do telefone. 331 Many proprietary apps for mobile devices report which other apps the user has installed. <a href=" https://techcrunch.com/2014/11/26/twitter-app-graph/ ">Twitter is doing this in a way that at least is visible and optional</a>. Not as bad as what the others do. Muitos aplicativos privativos para dispositivos móveis relatam quais outros aplicativos o usuário instalou. <a href=" http://techcrunch.com/2014/11/26/twitter-app-graph/ "> O Twitter está fazendo isso de uma forma que pelo menos seja visível e opcional</a>. Não tão ruim quanto o que os outros fazem. 333 The nonfree Snapchat app's principal purpose is to restrict the use of data on the user's computer, but it does surveillance too: <a href=" https://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers "> it tries to get the user's list of other people's phone numbers</a>. O principal objetivo do aplicativo não livre Snapchat é restringir o uso de dados no computador do usuário, mas ele também faz vigilância: <a href=" http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers "> tenta obter a lista do usuário dos números de telefone de outras pessoas</a>. 334 The Brightest Flashlight app <a href=" https://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers "> sends user data, including geolocation, for use by companies</a>. O aplicativo Brightest Flashlight <a href=" http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers "> envia dados do usuário, incluindo geolocalização, para uso por empresas</a>. 336 FTC says most mobile apps for children don't respect privacy: <a href=" https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/ "> https://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>. A FTC afirma que a maioria dos aplicativos móveis para crianças não respeita a privacidade: <a href=" http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/ "> http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>. 341 Skype contains <a href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>. Microsoft changed Skype <a href=" https://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data "> specifically for spying</a>. O Skype contém <a href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"><i lang="en">spyware</i></a>. A Microsoft mudou o Skype <a href=" http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data "> especificamente para espionar</a>. 349 ArenaNet surreptitiously installed a spyware program along with an update to the massive multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a href=" https://techraptor.net/gaming/news/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave "> to snoop on all open processes running on its user's computer</a>. A ArenaNet instalou sub-repticiamente um programa de <i lang="en">spyware</i> junto com uma atualização do enorme jogo multijogador Guild Wars 2. O <i lang="en">spyware</i> permitiu a ArenaNet <a href=" https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave "> bisbilhotar todos os processos abertos em execução no computador do usuário</a>. 351 Many <a href=" https://www.thestar.com/news/canada/video-game-companies-are-collecting-massive-amounts-of-data-about-you/article_31fba9a3-2760-57ae-9ae0-4083904bcb87.html "> video game consoles snoop on their users and report to the internet</a>&mdash;even what their users weigh. Muitos <a href=" http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/ "> consoles de videogame bisbilhotam seus usuários e informam à Internet</a> – até mesmo o peso dos usuários. 353 Modern gratis game cr&hellip;apps <a href=" https://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/ "> collect a wide range of data about their users and their users' friends and associates</a>. Aplicativos modernos de jogos grátis <a href=" http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/ "> coletam uma ampla gama de dados sobre seus usuários e amigos e associados de seus usuários</a>. 357 Angry Birds <a href=" https://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html "> spies for companies, and the NSA takes advantage to spy through it too</a>. Here's information on <a href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"> more spyware apps</a>. Angry Birds <a href=" http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html "> espiona para empresas e o NSA também aproveita para espioná-lo</a>. Aqui estão as informações sobre <a href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"> mais aplicativos <i lang="en">spyware</i></a>. 362 Most Internet connected devices in Mozilla's <a href=" https://web.archive.org/web/20220129065321/https://foundation.mozilla.org/en/privacynotincluded/ ">&ldquo;Privacy Not Included&rdquo;</a> list <a href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are designed to snoop on users</a> even if they meet Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure design of the program running on some of these devices <a href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes the user susceptible to be snooped on and exploited by crackers as well</a>. A maioria dos dispositivos conectados à Internet na lista de <a href=" https://foundation.mozilla.org/en/privacynotincluded ">“Privacidade não incluída”</a> da Mozilla <a href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">é projetada para bisbilhotar usuários</a> mesmo se o dispositivo atender os “Padrões Mínimos de Segurança” (<i lang="en">Minimum Security Standards</i>) da Mozilla. O design inseguro do programa em execução em alguns destes dispositivos <a href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">torna o usuário suscetível a ser bisbilhotado por <em>crackers</em> também</a>. 363 As tech companies add microphones to a wide range of products, including refrigerators and motor vehicles, they also set up transcription farms where human employees <a href=" https://getpocket.com/explore/item/silicon-valley-got-millions-to-let-siri-and-alexa-listen-in "> listen to what people say</a> and tweak the recognition algorithms. 364 The bad security in many Internet of Stings devices allows <a href=" https://www.techdirt.com/2017/08/28/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you/ ">ISPs to snoop on the people that use them</a>. A segurança ruim em muitos dispositivos da Internet das Picadas permite aos <a href=" https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml ">ISPs bisbilhotarem as pessoas que os usam</a>. 370 Today's &ldquo;smart&rdquo; TVs <a href=" https://www.techdirt.com/2022/04/14/its-still-stupidly-ridiculously-difficult-to-buy-a-dumb-tv/ "> push people to surrender to tracking via internet</a>. Some won't work unless they have a chance to download nonfree software. And they are designed for programmed obsolescence. 371 &ldquo;Smart&rdquo; TV manufacturers <a href=" https://www.theguardian.com/technology/2022/jan/29/what-your-smart-tv-knows-about-you-and-how-to-stop-it-harvesting-data "> spy on people using various methods</a>, and harvest their data. They are collecting audio, video, and TV usage data to profile people. 380 Vizio &ldquo;smart&rdquo; <a href=" https://www.ftc.gov/business-guidance/blog/2017/02/what-vizio-was-doing-behind-tv-screen ">TVs report everything that is viewed on them, and not just broadcasts and cable</a>. Even if the image is coming from the user's own computer, the TV reports what it is. The existence of a way to disable the surveillance, even if it were not hidden as it was in these TVs, does not legitimize the surveillance. <a href=" https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen ">TVs “inteligentes” da Vizio relatam tudo o que é visto sobre elas, e não apenas transmissões e canais a cabo</a>. Ainda que a imagem venha do próprio computador do usuário, a TV relata o que é. A existência de uma forma de desabilitar a vigilância, mesmo que não estivesse oculta como estava nessas TVs, não legitima a vigilância. 381 Some web and TV advertisements play inaudible sounds to be picked up by proprietary malware running on other devices in range so as to determine that they are nearby. Once your Internet devices are paired with your TV, advertisers can correlate ads with Web activity, and other <a href=" https://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/ "> cross-device tracking</a>. Alguns anúncios na web e na TV reproduzem sons inaudíveis a serem captados por <em>malware</em> privativo em execução em outros dispositivos ao alcance, a fim de determinar que eles estão próximos. Assim que seus dispositivos de Internet estiverem emparelhados com sua TV, os anunciantes podem correlacionar anúncios com atividades na web e outros <a href=" http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/ "> rastreamento entre dispositivos</a>. 384 Tivo's alliance with Viacom adds 2.3 million households to the 600 millions social media profiles the company already monitors. Tivo customers are unaware they're being watched by advertisers. By combining TV viewing information with online social media participation, Tivo can now <a href=" https://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102/ "> correlate TV advertisement with online purchases</a>, exposing all users to new combined surveillance by default. A aliança da Tivo com a Viacom adiciona 2,3 milhões de residências aos 600 milhões de perfis de mídia social que a empresa já monitora. Os clientes da Tivo não sabem que estão sendo observados pelos anunciantes. Ao combinar informações de exibição de TV com participação em mídia social online, o Tivo agora pode <a href=" http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102 "> correlacionar anúncios de TV com compras online</a>, expondo todos os usuários a uma nova vigilância combinada por padrão. 385 Vizio &ldquo;smart&rdquo; TVs recognize and <a href=" https://www.engadget.com/2015-07-24-vizio-ipo-inscape-acr.html ">track what people are watching</a>, even if it isn't a TV channel. As TVs “inteligentes” da Vizio reconhecem e <a href=" http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/ ">rastreiam o que as pessoas estão assistindo</a>, mesmo que não seja um canal de TV. 386 Verizon cable TV <a href=" https://arstechnica.com/information-technology/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/ "> snoops on what programs people watch, and even what they wanted to record</a>. A TV a cabo da Verizon <a href=" http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/ "> bisbilhota quais programas as pessoas assistem e até o que eles queriam gravar</a>. 387 Vizio <a href=" https://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html "> used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what users watch</a>. The TVs did not do that when first sold. Vizio <a href=" http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html "> usou uma “atualização” de firmware para fazer suas TVs bisbilhotarem o que os usuários assistem</a>. As TVs não faziam isso quando vendidas pela primeira vez. 390 In its privacy policy, Samsung explicitly confirms that <a href=" https://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs ">voice data containing sensitive information will be transmitted to third parties</a>. Em sua política de privacidade, a Samsung confirma explicitamente que <a href=" http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs "> dados de voz contendo informações sensíveis serão transmitidas a terceiros</a>. 391 The Amazon &ldquo;Smart&rdquo; TV is <a href=" https://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance "> snooping all the time</a>. A TV “inteligente” da Amazon está <a href=" http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance "> bisbilhotando a todo momento</a>. 392 More or less all &ldquo;smart&rdquo; TVs <a href=" https://myce.wiki/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/ ">spy on their users</a>. Mais ou menos todas as TVs “inteligentes” <a href=" http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/ ">espionam seus usuários</a>. 396 LG <a href=" https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/ "> disabled network features</a> on <em>previously purchased</em> &ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG begin to snoop on them and distribute their personal data. Enquanto isso, TVs da LG <a href=" http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml "> fazem muita espionagem de qualquer maneira</a>. 398 Even worse, it <a href=" https://rrrrambles.wordpress.com/2013/11/21/lg-tv-logging-filenames-from-network-folders/ "> snoops on other devices on the user's local network</a>. Pior ainda, ela <a href=" http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/ "> bisbilhota outros dispositivos na rede local do usuário</a>. 400 Meanwhile, LG TVs <a href=" https://www.techdirt.com/2014/05/20/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties/ "> do lots of spying anyway</a>. Enquanto isso, TVs da LG <a href=" http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml "> fazem muita espionagem de qualquer maneira</a>. 401 Spyware in LG &ldquo;smart&rdquo; TVs <a href=" https://doctorbeet.blogspot.com/2013/11/lg-smart-tvs-logging-usb-filenames-and.html "> reports what the user watches, and the switch to turn this off has no effect</a>. (The fact that the transmission reports a 404 error really means nothing; the server could save that data anyway.) <i lang="en">Spyware</i> nas TVs “inteligentes” da LG <a href=" http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html "> relata o que o usuário assiste e a opção para desligar isso não tem efeito</a>. (O fato de a transmissão relatar um erro 404 realmente não significa nada; o servidor poderia salvar esses dados de qualquer maneira.) 405 Surveillance cameras put in by government A to surveil for it may be surveilling for government B as well. That's because A put in a product <a href=" https://www.rferl.org/a/ukraine-cctv-moscow-spying-schemes-investigation/32747767.html "> made by B with nonfree software</a>. 407 <a href=" https://www.theguardian.com/technology/2023/jul/04/smile-youre-on-camera-self-driving-cars-are-here-and-theyre-watching-you "> Driverless cars in San Francisco collect videos constantly</a>, using cameras inside and outside, and governments have already collected those videos secretly. 408 As the Surveillance Technology Oversight Project says, they are &ldquo;driving us straight into authoritarianism.&rdquo; We must <a href=" /philosophy/surveillance-vs-democracy.html ">regulate <em>all</em> cameras that collect images that can be used to track people</a>, to make sure they are not used for that. 411 Amazon Ring &ldquo;security&rdquo; devices <a href=" https://www.engadget.com/2019-01-10-ring-gave-employees-access-customer-video-feeds.html "> send the video they capture to Amazon servers</a>, which save it long-term. Os dispositivos de “segurança” Amazon Ring <a href=" https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/ "> enviam o vídeo que eles capturam para os servidores da Amazon</a>, os quais armazenam-o a longo prazo. 414 Nearly all &ldquo;home security cameras&rdquo; <a href=" https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds-a8814384448/ "> give the manufacturer an unencrypted copy of everything they see</a>. &ldquo;Home insecurity camera&rdquo; would be a better name! Quase todas as “câmeras de segurança residencial” <a href=" https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/ "> fornecem ao fabricante uma cópia não criptografada de tudo que elas veem</a>. “Câmeras de insegurança residencial” seria um nome melhor! 421 The Nest Cam &ldquo;smart&rdquo; camera is <a href=" https://www.bbc.com/news/technology-34922712 ">always watching</a>, even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo; A câmera “inteligente” Nest Cam está <a href=" http://www.bbc.com/news/technology-34922712 ">sempre assistindo</a>, mesmo quando o “dono” desliga-a. 425 The Furby Connect has a <a href=" https://web.archive.org/web/20220604212722/https://www.contextis.com/en/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect "> universal back door</a>. If the product as shipped doesn't act as a listening device, remote changes to the code could surely convert it into one. O Furby Connect tem um <a href=" https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect "> <em>backdoor</em> universal</a>. Se o produto enviado não atua como um dispositivo de escuta, as alterações remotas no código certamente podem convertê-lo em um. 426 A remote-control sex toy was found to make <a href=" https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-surveillance ">audio recordings of the conversation between two users</a>. Um brinquedo sexual de controle remoto foi encontrado para fazer <a href=" https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei ">gravações de áudio da conversa entre dois usuários</a>. 435 The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que can be <a href=" https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws/ ">remotely controlled with a mobile phone</a>; physical access is not necessary. This would enable crackers to listen in on a child's conversations, and even speak into the toys themselves. Os brinquedos “inteligente” brinquedos My Friend Cayla e i-Que transmitem <a href=" https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws ">conversas de crianças para Nuance Communications</a>, a empresa de reconhecimento de voz com sede nos EUA. 437 The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit <a href=" https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws/ ">children's conversations to Nuance Communications</a>, a speech recognition company based in the U.S. Os brinquedos “inteligente” brinquedos My Friend Cayla e i-Que transmitem <a href=" https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws ">conversas de crianças para Nuance Communications</a>, a empresa de reconhecimento de voz com sede nos EUA. 439 Barbie <a href=" https://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673 ">is going to spy on children and adults</a>. Barbie <a href=" http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673 ">vai espionar crianças e adultos</a>. 445 Philips Hue, the most ubiquitous home automation product in the US, is planning to soon <a href=" https://boingboing.net/2023/09/27/philips-hue-to-make-you-create-an-account-and-log-in-to-adjust-your-lightbulbs.html "> force users to log in to the app server</a> in order to be able to adjust a lightbulb, or use other functionalities, in what amounts to a massive user-tracking data grab. 447 Google Nest <a href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"> is taking over ADT</a>. Google sent out a software update to its speaker devices using their back door <a href=" https://web.archive.org/web/20240123114737/https://www.protocol.com/google-smart-speaker-alarm-adt "> that listens for things like smoke alarms</a> and then notifies your phone that an alarm is happening. This means the devices now listen for more than just their wake words. Google says the software update was sent out prematurely and on accident and Google was planning on disclosing this new feature and offering it to customers who pay for it. O Google Nest <a href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"> está assumindo o ADT</a>. O Google enviou uma atualização de software para seus alto-falantes usando seu <em>backdoor</em> <a href=" https://www.protocol.com/google-smart-speaker-alarm-adt "> que escuta coisas como alarmes de fumaça</a> e notifica seu telefone de que um alarme está acontecendo. Isso significa que os dispositivos agora ouvem mais do que apenas as palavras de ativação. O Google diz que a atualização do software foi enviada prematuramente e por acidente e que estava planejando divulgar esse novo recurso e oferecê-lo aos clientes que pagam por ele. 463 A medical insurance company <a href=" https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next/ "> offers a gratis electronic toothbrush that snoops on its user by sending usage data back over the Internet</a>. Uma empresa de seguro médico <a href=" https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next "> oferece uma escova de dentes eletrônica grátis que bisbilhota o usuário, enviando dados de uso pela Internet</a>. 464 Sonos <a href=" https://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/ "> told all its customers, &ldquo;Agree&rdquo; to snooping or the product will stop working</a>. <a href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/"> Another article</a> says they won't forcibly change the software, but people won't be able to get any upgrades and eventually it will stop working. Sonos <a href=" http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/ "> disse a todos os seus consumidores: “Concordem” com bisbilhotamento ou o produto vai parar de funcionar</a>. <a href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/">Outro artigo</a> diz que eles não mudarão o software à força, mas as pessoas não conseguirão fazer nenhuma atualização e, eventualmente, ele vai parar de funcionar. 467 Nest thermometers send <a href=" https://bgr.com/general/google-nest-jailbreak-hack/ ">a lot of data about the user</a>. Termostatos do Nest enviam <a href=" http://bgr.com/2014/07/17/google-nest-jailbreak-hack ">muitos dados sobre o usuário</a>. 477 A very cheap &ldquo;smart watch&rdquo; comes with an Android app <a href=" https://www.theregister.com/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/ "> that connects to an unidentified site in China</a>. Um “relógio inteligente” muito barato vem com um aplicativo Android <a href=" https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/ "> que se conecta a um site não identificado na China</a>. 479 An LG &ldquo;smart&rdquo; watch is designed <a href=" https://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html "> to report its location to someone else and to transmit conversations too</a>. Um relógio “inteligente” da LG foi projetado para <a href=" http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html "> relatar sua localização a outra pessoa e também transmitir conversas</a>. 482 <a href=" https://web.archive.org/web/20240311120515/https://www.nytimes.com/2024/03/11/technology/carmakers-driver-tracking-insurance.html "> GM is spying on drivers</a> who own or rent their cars, and give away detailed driving data to insurance companies through data brokers. These companies then analyze the data, and hike up insurance prices if they think the data denotes &ldquo;risky driving.&rdquo; For the car to make this data available to anyone but the owner or renter of the car should be a crime. If the car is owned by a rental company, that company should not have access to it either. 483 Recent autos offer a feature by which the drivers can connect their snoop-phones to the car. That feature <a href=" https://therecord.media/class-action-lawsuit-cars-text-messages-privacy "> snoops on the calls and texts</a> and gives the data to the car manufacturer, and to the state. 485 In an article from Mozilla, every car brand they researched <a href=" https://foundation.mozilla.org/en/privacynotincluded/articles/its-official-cars-are-the-worst-product-category-we-have-ever-reviewed-for-privacy/ "> has failed their privacy tests</a>. Some car manufacturers explicitly mention that they collect data which includes &ldquo;sexual activities&rdquo; and &ldquo;genetic information&rdquo;. Not only collecting any of such data is a huge privacy violation in the first place, some companies assume drivers and passengers' consent before they get in the car. Notably, Tesla threatens that the car may be &ldquo;inoperable&rdquo; if the user opts out of data collection. 486 Tesla cars record videos of activity inside the car, and <a href=" https://arstechnica.com/tech-policy/2023/04/tesla-workers-shared-images-from-car-cameras-including-scenes-of-intimacy/ "> company staff can watch those recordings and copy them</a>. Or at least they were able to do so until last year. 488 GM is switching to a new audio/video system in its cars in order to <a href=" https://edition.cnn.com/2023/04/01/business/gm-apple-play-evs/index.html "> collect complete information about what people in the car watch or listen to, and also how they drive</a>. 490 Volkswagen <a href=" https://pluralistic.net/2023/02/28/kinderwagen/ "> tracks the location of every driver, and sells that data to third-parties</a>. However, it refuses to use the data to implement a feature for the benefit of its customers unless they pay extra money for it. 497 The FordPass Connect feature of some Ford vehicles has <a href=" https://web.archive.org/web/20200530023040/https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html "> near-complete access to the internal car network</a>. It is constantly connected to the cellular phone network and sends Ford a lot of data, including car location. This feature operates even when the ignition key is removed, and users report that they can't disable it. O recurso FordPass Connect de alguns veículos da Ford tem <a href=" https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html "> acesso quase completo à rede interna dos carros</a>. Ele está constantemente conectado à rede de telefonia celular e envia à Ford uma grande quantidade de dados, incluindo a localização do carro. Esse recurso funciona mesmo quando a chave de ignição é removida e os usuários relatam que não podem desativá-lo. 499 In China, it is mandatory for electric cars to be equipped with a terminal that <a href=" https://apnews.com/article/north-america-ap-top-news-international-news-shanghai-china-4a749a4211904784826b45e812cff4ca "> transfers technical data, including car location, to a government-run platform</a>. In practice, <a href="/proprietary/proprietary-surveillance.html#car-spying"> manufacturers collect this data</a> as part of their own spying, then forward it to the government-run platform. Na China, é obrigatório que os carros elétricos sejam equipados com um terminal que <a href=" https://www.apnews.com/4a749a4211904784826b45e812cff4ca "> transfira dados técnicos, incluindo localização de carros, para uma plataforma administrada pelo governo</a>. Na prática, os <a href="/proprietary/proprietary-surveillance.html#car-spying"> fabricantes coletam esses dados</a> como parte de sua própria espionagem e os encaminham para a plataforma administrada pelo governo. 510 Proprietary software in cars <a href=" https://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/ "> records information about drivers' movements</a>, which is made available to car manufacturers, insurance companies, and others. Software privativo em carros <a href=" http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/ "> registra informações sobre os movimentos dos motoristas</a>, que é disponibilizado a montadoras, seguradoras e outros. 520 The Markup investigated 80,000 popular web sites and <a href=" https://themarkup.org/blacklight/2020/09/22/blacklight-tracking-advertisers-digital-privacy-sensitive-websites "> reports on how much they snoop on users</a>. Almost 70,000 had third-party trackers. 5,000 fingerprinted the browser to identify users. 12,000 recorded the user's mouse clicks and movements. 522 When a page uses Disqus for comments, the proprietary Disqus software <a href=" https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook/ ">loads a Facebook software package into the browser of every anonymous visitor to the page, and makes the page's URL available to Facebook</a>. Quando uma página usa Disqus para comentários, o software privativo Disqus <a href=" https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook ">carrega um pacote de software do Facebook no navegador de cada visitante anônimo da página e disponibiliza a URL da página para o Facebook</a>. 525 Many web sites report all their visitors to Google by using the Google Analytics service, which <a href=" https://www.pcworld.com/article/460787/google_analytics_breaks_norwegian_privacy_laws_local_agency_said.html "> tells Google the IP address and the page that was visited</a>. Muitos sites relatam todos os visitantes do Google usando o serviço Google Analytics, que <a href=" http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/ "> informa ao Google o endereço IP e a página que foi visitada</a>. 530 The US government <a href=" https://themarkup.org/pixel-hunt/2022/04/28/applied-for-student-aid-online-facebook-saw-you ">sent personal data to Facebook</a> for every college student that applied for US government student aid. It justified this as being for a &ldquo;campaign.&rdquo; 532 Many web sites use JavaScript code <a href=" https://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081 "> to snoop on information that users have typed into a form but not sent</a>, in order to learn their identity. Some are <a href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege"> getting sued</a> for this. Muitos sites usam código JavaScript <a href=" http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081 "> para bisbilhotar informações que usuários digitaram em um formulário, mas não enviaram</a>, para aprender sua identidade. Alguns estão <a href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege"> sendo processados</a> por isso. 540 Flash and JavaScript are used for <a href=" https://arstechnica.com/information-technology/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/ "> &ldquo;fingerprinting&rdquo; devices</a> to identify users. Flash e JavaScript são usados para <a href=" http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/ "> dispositivos de “impressão digital”</a> para identificar usuários. 551 Google Chrome <a href=" https://web.archive.org/web/20151018132125/http://www.brad-x.com/2013/08/04/google-chrome-is-spyware/ "> spies on browser history, affiliations</a>, and other installed software. O Google Chrome <a href=" https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/ "> espia o histórico do navegador, afiliações</a> e outros softwares instalados. 555 Honorlock set a network of fake test answer honeypot sites, tempting people to get exam answers, but <a href=" https://themarkup.org/machine-learning/2022/02/15/a-network-of-fake-test-answer-sites-is-trying-to-incriminate-students ">that is a way to entrap students, so as to identify them and punish them</a>, using nonfree JS code to identify them. 564 While the world is still struggling with COVID-19 coronavirus, many <a href=" https://mashable.com/article/privacy-in-the-age-of-coronavirus ">people are in danger of surveillance</a> and their computers are infected with malware as a result of installing proprietary software. Enquanto o mundo ainda luta contra o coronavírus do COVID-19, muitas <a href=" https://mashable.com/article/privacy-in-the-age-of-coronavirus/ ">pessoas estão em perigo de vigilância</a> e seus computadores estão infectados com <em>malware</em> como resultado da instalação de software privativo. 565 Proprietary programs Google Meet, Microsoft Teams, and WebEx <a href=" https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex-a7383469308/ ">are collecting user's personal and identifiable data</a> including how long a call lasts, who's participating in the call, and the IP addresses of everyone taking part. From experience, this can even harm users physically if those companies hand over data to governments. Os programas privativos Google Meet, Microsoft Teams e WebEx <a href=" https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/ ">estão coletando dados pessoais e dados identificáveis</a>, incluindo a duração de uma chamada, quem está participando da chamada e os endereços IP de todos os participantes. Por experiência, isso pode até prejudicar fisicamente os usuários, se essas empresas entregarem os dados aos governos. 566 Microsoft <a href=" https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08 ">forces people to give their phone number</a> in order to be able to create an account on the company's network. On top of mistreating their users by providing nonfree software, Microsoft is tracking their lives outside the computer and violates their privacy. A Microsoft <a href=" https://answers.microsoft.com/pt-br/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08 ">força as pessoas a fornecerem seu número de telefone</a> para poder criar uma conta na rede da empresa. Além de maltratar seus usuários fornecendo software não livre, a Microsoft está rastreando suas vidas fora do computador e viola sua privacidade. 570 Since the beginning of 2017, <a href=" https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled ">Android phones have been collecting the addresses of nearby cellular towers</a>, even when location services are disabled, and sending that data back to Google. Desde o início de 2017, <a href=" https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/ ">telefones Android têm coletado os endereços de torres de celular próximas</a>, mesmo quando os serviços de localização estão desativados, e o envio desses dados de volta ao Google. 571 Investigation Shows <a href=" https://www.techdirt.com/2016/06/03/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions/ ">GCHQ Using US Companies, NSA To Route Around Domestic Surveillance Restrictions</a>. Investigação mostra <a href=" https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml ">GCHQ usando empresas dos EUA, NSA contorna as restrições de vigilância doméstica</a>. 573 The Cisco TNP IP phones are <a href=" https://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html "> spying devices</a>. Os telefones IP Cisco TNP são <a href=" http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html "> dispositivos espiões</a>. 576 Please see the <a href="/server/standards/README.translations.html">Translations README</a> for information on coordinating and contributing translations of this article. A equipe de traduções para o português brasileiro se esforça para oferecer traduções precisas e de boa qualidade, mas não estamos isentos de erros. Por favor, envie seus comentários e sugestões em geral sobre as traduções para <a href=" mailto:web-translators@gnu.org ">&lt;web-translators@gnu.org&gt;</a>. </p><p>Consulte o <a href="/server/standards/README.translations.html">Guia para as traduções</a> para mais informações sobre a coordenação e a contribuição com traduções das páginas deste site. ...
http://www.gnu.org/savannah-checkouts/gnu/gnun/reports/pt-br/proprietary/proprietary-surveillance.html - [detail] - [similar]
PREV NEXT
Powered by Hyper Estraier 1.4.13, with 213331 documents and 1081083 words.