malware-appliances.de.po

Mismatched links: 157.

Mismatched ids: 3.

#text
8 | {+</a>&nbsp;/+} <a [-href="/proprietary/proprietary.html">Other examples
| of proprietary malware</a>-]
| {+href="/proprietary/proprietary.html">Malware</a>&nbsp;/ By
| product&nbsp;/+} 
</a>&nbsp;/ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/ By product&nbsp;/ 
<a href="/proprietary/">Weitere Beispiele proprietärer Schadsoftware</a> 
10 | Nonfree (proprietary) software is very often malware (designed to mistreat
| the user). Nonfree software is controlled by its developers, which puts
| them in a position of power over the users; <a
| href="/philosophy/free-software-even-more-important.html">that is the
| basic injustice</a>. The developers {+and manufacturers+} often exercise
| that power to the detriment of the users they ought to serve. 
Nonfree (proprietary) software is very often malware (designed to mistreat the user). Nonfree software is controlled by its developers, which puts them in a position of power over the users; <a href="/philosophy/free-software-even-more-important.html">that is the basic injustice</a>. The developers and manufacturers often exercise that power to the detriment of the users they ought to serve. 
Unfreie (proprietäre) Software entspricht sehr häufig einem Schadprogramm (entworfen, um <ins>unerwünschte und gegebenenfalls schädliche Funktionen auszuführen,</ins> den Benutzer also schlecht behandeln). Unfreie Software wird von den Entwicklern kontrolliert, welches sie in eine Position der Macht gegenüber den Nutzern versetzt. <a href="/philosophy/free-software-even-more-important">Das ist die grundlegende Ungerechtigkeit!</a> Häufig üben Entwickler diese Macht zum Schaden der Benutzer aus, denen sie eigentlich dienen sollte. 
13  
Canon's all-in-one printer, scanner, and fax machine <a href="https://www.bleepingcomputer.com/news/legal/canon-sued-for-disabling-scanner-when-printers-run-out-of-ink/">will stop you from using any of its features if it's out of ink</a>! Since there's no need for ink to use scan or fax, Canon is sued by its customers for this malicious behavior. The proprietary software installed on Canon machines arbitrarily restricts users from using their device as they wish. 
 
14  
Recent Samsung TVs have a back door with which Samsung can <a href="https://www.pcmag.com/news/samsung-can-remotely-disable-any-of-its-tvs-worldwide"> brick them remotely</a>. 
 
15  
Most Internet connected devices in Mozilla's <a href="https://foundation.mozilla.org/en/privacynotincluded">&ldquo;Privacy Not Included&rdquo;</a> list <a href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are designed to snoop on users</a> even if they meet Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure design of the program running on some of these devices <a href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes the user susceptible to be snooped and exploited by crackers as well</a>. 
 
16  
Some Wavelink and JetStream wifi routers have universal back doors that enable unauthenticated users to remotely control not only the routers, but also any devices connected to the network. There is evidence that <a href="https://cybernews.com/security/walmart-exclusive-routers-others-made-in-china-contain-backdoors-to-control-devices/"> this vulnerability is actively exploited</a>. 
 
17  
If you consider buying a router, we encourage you to get one that <a href="https://ryf.fsf.org/categories/routers">runs on free software</a>. Any attempts at introducing malicious functionalities in it (e.g., through a firmware update) will be detected by the community, and soon corrected. 
 
18  
If unfortunately you own a router that runs on proprietary software, don't panic! You may be able to replace its firmware with a free operating system such as <a href="https://librecmc.org">libreCMC</a>. If you don't know how, you can get help from a nearby GNU/Linux user group. 
 
19  
The Focals eyeglass display, with snooping microphone, has been eliminated. Google eliminated it by buying the manufacturer and shutting it down. It also <a href="https://www.ctvnews.ca/sci-tech/canadian-smart-glasses-going-offline-weeks-after-company-bought-by-google-1.5042010">shut down the server these devices depend on</a>, which caused the ones already sold to cease to function. 
 
21  
The Mellow sous-vide cooker is tethered to a server. The company suddenly <a href="https://www.slashgear.com/mellow-sous-vide-owners-get-unwelcome-subscription-surprise-27630842/"> turned this tethering into a subscription</a>, forbidding users from taking advantage of the &ldquo;advanced features&rdquo; of the cooker unless they pay a monthly fee. 
 
22  
TV manufacturers are able to <a href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop every second of what the user is watching</a>. This is illegal due to the Video Privacy Protection Act of 1988, but they're circumventing it through EULAs. 
 
23  
<a href="https://www.wired.com/story/ripple20-iot-vulnerabilities/?bxid=5bd66d4c2ddf9c619437e4b8&amp;cndid=9608804&amp;esrc=Wired_etl_load&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_bran%5C"> A disasterous security bug</a> touches millions of products in the Internet of Stings. 
 
25  
Wink sells a &ldquo;smart&rdquo; home hub that is tethered to a server. In May 2020, it ordered the purchasers to start <a href="https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html"> paying a monthly fee for the use of that server</a>. Because of the tethering, the hub is useless without that. 
 
26  
Some security breakers (wrongly referred in this article as <a href="/philosophy/words-to-avoid.html#Hacker">&ldquo;hackers&rdquo;</a>) managed to interfere the Amazon Ring proprietary system, and <a href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras">access its camera, speakers and microphones</a>. 
 
27  
Internet-tethered Amazon Ring had a security vulnerability that enabled attackers to <a href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"> access the user's wifi password</a>, and snoop on the household through connected surveillance devices. 
 
29  
Best Buy made controllable appliances and <a href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6"> shut down the service to control them through</a>. 
 
31  
The Jibo robot toys were tethered to the manufacturer's server, and <a href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"> the company made them all cease to work</a> by shutting down that server. 
 
33  
The Medtronics Conexus Telemetry Protocol has <a href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"> two vulnerabilities that affect several models of implantable defibrillators</a> and the devices they connect to. 
 
35  
The Ring (now Amazon) doorbell camera is designed so that the manufacturer (now Amazon) can watch all the time. Now it turns out that <a href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"> anyone else can also watch, and fake videos too</a>. 
 
36  
The third party vulnerability is presumably unintentional and Amazon will probably fix it. However, we do not expect Amazon to change the design that <a href="/proprietary/proprietary-surveillance.html#M201901100">allows Amazon to watch</a>. 
 
37  
The HP <a href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"> &ldquo;ink subscription&rdquo; cartridges have DRM that constantly communicates with HP servers</a> to make sure the user is still paying for the subscription, and hasn't printed more pages than were paid for. 
 
39  
Amazon Ring &ldquo;security&rdquo; devices <a href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"> send the video they capture to Amazon servers</a>, which save it long-term. 
 
42  
Vizio TVs <a href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"> collect &ldquo;whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and this data is sold to third parties. This is in return for &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly lower retail prices. 
 
45  
Nearly all &ldquo;home security cameras&rdquo; <a href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"> give the manufacturer an unencrypted copy of everything they see</a>. &ldquo;Home insecurity camera&rdquo; would be a better name! 
 
47  
Printer manufacturers are very innovative&mdash;at blocking the use of independent replacement ink cartridges. Their &ldquo;security upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="https://www.vice.com/en/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"> HP and Epson have done this</a>. 
 
48  
Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the company's server. They have all the nasty characteristics of such devices: <a href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"> surveillance, and danger of sabotage</a> (of a specific user, or of all users at once), as well as the risk of an outage (which is what just happened). 
 
50  
Researchers have discovered how to <a href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"> hide voice commands in other audio</a>, so that people cannot hear them, but Alexa and Siri can. 
 
54 | Some &ldquo;Smart&rdquo; TVs automatically <a
| [-href="https://news.ycombinator.com/item?id=16727319">load-]
| {+href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
| load+} downgrades that install a surveillance app</a>. 
Some &ldquo;Smart&rdquo; TVs automatically <a href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"> load downgrades that install a surveillance app</a>. 
Einige „Kluge“ TVs <a href="https://news.ycombinator.com/item?id=16727319" title="Unter: Guidelines 2018.">laden automatisch Downgrades herunter, die eine Überwachungs-App installieren</a>. 
65  
<a href="/proprietary/proprietary-tethers.html">More about proprietary tethering</a>. 
<a href="/proprietary/proprietary-tethers">Weitere Beispiele proprietärer (Internet-)Anbindungen</a> 
68 | [-Note-]{+<small>(Note+} that this article misuses the term <a
| href="/philosophy/words-to-avoid.html#Hacker">&ldquo;hackers&rdquo;</a>
| referring to [-crackers.-] {+crackers.)</small>+} 
<small>(Note that this article misuses the term <a href="/philosophy/words-to-avoid.html#Hacker">&ldquo;hackers&rdquo;</a> referring to crackers.)</small> 
Beachten Sie, dass dieser Artikel den Begriff <em><a href="/philosophy/words-to-avoid#Hacker">„Hacker“</a></em> mit Bezug auf <em>Cracker</em> missbraucht. 
71 | [-It-]{+<small>(It+} is unfortunate that the article uses the term <a
| [-href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.-]
| {+href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;<
| /a>.)</small>+} 
<small>(It is unfortunate that the article uses the term <a href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.)</small> 
Es ist bedauerlich, dass der Artikel den Begriff <a href="/philosophy/words-to-avoid#Monetize">„monetarisieren“</a> verwendet. 
72 | Sonos <a
| href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
| told all its customers, &ldquo;Agree&rdquo; to snooping or the product
| will stop working</a>. <a
| [-href="https://consumerist.com/2017/08/23/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/#more-10287321">Another-]
| {+href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/">
| Another+} article</a> says they won't forcibly change the software, but
| people won't be able to get any upgrades and eventually it will stop
| working. 
Sonos <a href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/"> told all its customers, &ldquo;Agree&rdquo; to snooping or the product will stop working</a>. <a href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/"> Another article</a> says they won't forcibly change the software, but people won't be able to get any upgrades and eventually it will stop working. 
Sonos <a href="//www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/" title="Sonos says users must accept new privacy policy or devices may ”cease to function“, unter: http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/ 2017.">erzählt all seinen Kunden, dem Schnüffeln „zuzustimmen“ oder das Produkt würde aufhören zu funktionieren</a>. <a href="https://consumerist.com/2017/08/23/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/#more-10287321" title="Sonos Holds Software Updates Hostage If You Don’t Sign New Privacy Agreement, unter: https://consumerist.com/2017/08/23/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/#more-10287321 2017.">Ein weiterer Artikel</a> besagt die Software würde nicht zwingend geändert werden, aber Nutzer nicht in der Lage sein irgendwelche Verbesserungen zu erhalten, und schließlich aufhören zu funktionieren. 
75  
The proprietary code that runs pacemakers, insulin pumps, and other medical devices is <a href="http://www.bbc.co.uk/news/technology-40042584"> full of gross security faults</a>. 
Proprietäre Code, der Herzschrittmacher, Insulinpumpen und andere medizinische Geräte betreibt, ist <a href="//www.bbc.co.uk/news/technology-40042584" title="'Thousands' of known bugs found in pacemaker code, unter: bbc.com/news/technology-40042584 2017.">voller grober Sicherheitsmängel</a>. 
77 https://www.spiegel.de/netzwelt/gadgets/bose-soll-mit-bose-connect-hoerverhalten-der-kunden-ausspaehen-a-1144134.html
| Users are suing Bose for <a
| [-href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">-]
| {+href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">+}
| distributing a spyware app for its headphones</a>. Specifically, the app
| would record the names of the audio files users listen to along with the
| headphone's unique serial number. 
Users are suing Bose for <a href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"> distributing a spyware app for its headphones</a>. Specifically, the app would record the names of the audio files users listen to along with the headphone's unique serial number. 
US-Nutzer verklagt Bose: <a href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/" title="Bose headphones have been spying on customers, lawsuit claims, unter: washingtonpost.com 2017.">App späht offenbar über Kopfhörer aus</a>, welche Musik gerade läuft, welche Hörbücher und Radiosender der Nutzer sich anhört u. a., und leitet die Informationen an Drittanbieter weiter. 
79 | Anova sabotaged users' cooking devices with a downgrade that tethered them
| to a remote server. <a
| [-href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless-]
| {+href="https://web.archive.org/web/20170415145520/https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/">Unless+}
| users create an account on Anova's servers, their cookers won't
| [-function.</a>-] {+function</a>.+} 
Anova sabotaged users' cooking devices with a downgrade that tethered them to a remote server. <a href="https://web.archive.org/web/20170415145520/https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/">Unless users create an account on Anova's servers, their cookers won't function</a>. 
Anova sabotierte Kochgeräte mit einem Downgrade, welches sie mit einen Remote-Server verbunden hat. <a href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Solange kein Kundenkonto erstellt wurde, funktionierten die Geräte nicht.</a> 
80 (dishwasher) -> machine to disinfect medical products and laboratory equipment
(in German) Internet of (Crackable) Things: Miele's machine to disinfect medical products and laboratory equipment <has security vulnerability>.
Source::
https://www.miele.de/en/m/miele-admits-communication-glitch-4072.htm [en]
https://www.miele.de/de/m/miele-raeumt-kommunikationspanne-ein-4072.htm [de]
https://www.miele.co.uk/professional/large-capacity-washer-disinfectors-560.htm?mat=10339600&name=PG_8528
| When Miele's Internet of Stings hospital disinfectant dishwasher is <a
| [-href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">-]
| {+href="https://www.vice.com/en/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">+}
| connected to the Internet, its security is crap</a>. 
When Miele's Internet of Stings hospital disinfectant dishwasher is <a href="https://www.vice.com/en/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"> connected to the Internet, its security is crap</a>. 
Mieles „Internet der [knackbaren] Dinge“-Gerät zur Desinfektion medizinischer Geräte und Laborbedarf <a href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit" title="A Hackable Dishwasher [sic] Is Connecting Hospitals to the Internet of Shit, unter: motherboard.vice.com 2017.">enthält Sicherheitslücke</a>.<a href="#tn-iot01" id="tn-iot01-ref" class="tnote">[1]</a> 
88  
The CIA exploited existing vulnerabilities in &ldquo;smart&rdquo; TVs and phones to design a malware that <a href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html"> spies through their microphones and cameras while making them appear to be turned off</a>. Since the spyware sniffs signals, it bypasses encryption. 
 
89 | &ldquo;CloudPets&rdquo; toys with microphones <a
| href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
| leak childrens' conversations to the manufacturer</a>. Guess what? <a
| [-href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">-]
| {+href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">+}
| Crackers found a way to access the data</a> collected by the
| manufacturer's snooping. 
&ldquo;CloudPets&rdquo; toys with microphones <a href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"> leak childrens' conversations to the manufacturer</a>. Guess what? <a href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"> Crackers found a way to access the data</a> collected by the manufacturer's snooping. 
CloudPets-Spielzeuge mit Mikrofonen <a href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults" title="CloudPets stuffed toys leak details of half a million users, unter: theguardian.com 2017.">lassen Plauderei von Kindern an Hersteller durchsickern</a>. Und, man ahnt es: <a href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings" title="Internet of Things Teddy Bear Leaked 2 Million Parent and Kids Message Recordings, unter: motherboard.vice.com 2017.">Cracker fanden einen Weg um auf die Daten zuzugreifen</a>, die durch das Ausschnüffeln des Herstellers gesammelt wurden. 
91  
If you buy a used &ldquo;smart&rdquo; car, house, TV, refrigerator, etc., usually <a href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the previous owners can still remotely control it</a>. 
Steht der Kauf eines gebrauchten „schlauen“ Autos, Hauses, TV-Geräts, Kühlschranks usw. an, <ins>ist zu beachten, dass</ins> <a href="https://boingboing.net/2017/02/20/the-previous-owners-of-used.html" title="The previous owners of used “smart” cars can still control them via the cars' apps (not just cars!), unter: boingboing.net 2017.">Vorbesitzer diese noch immer fernsteuern können</a>. 
93  
A cracker would be able to <a href="https://uploadvr.com/hackable-webcam-oculus-sensor-be-aware/"> turn the Oculus Rift sensors into spy cameras</a> after breaking into the computer they are connected to. 
 
94 | [-It is unfortunate that-]{+<small>(Unfortunately,+} the article [-uses
| the term-] <a
| [-href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.-]
| {+href="/philosophy/words-to-avoid.html#Hacker">improperly refers to
| crackers as &ldquo;hackers&rdquo;</a>.)</small>+} 
<small>(Unfortunately, the article <a href="/philosophy/words-to-avoid.html#Hacker">improperly refers to crackers as &ldquo;hackers&rdquo;</a>.)</small> 
Es ist bedauerlich, dass der Artikel den Begriff <a href="/philosophy/words-to-avoid#Monetize">„monetarisieren“</a> verwendet. 
103  
Samsung's &ldquo;Smart Home&rdquo; has a big security hole; <a href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"> unauthorized people can remotely control it</a>. 
Erhebliche Sicherheitslücke in Samsung <em>„Smart Home“</em>: <a href="//arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/" title="Dan Goodin, Samsung Smart Home flaws let hackers make keys to front door, unter: Ars Technica, arstechnica.com 2016">Unautorisierte können aus der Ferne Steuerung übernehmen</a>. 
106 | Malware {+was+} found on <a
| href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
| security cameras available through Amazon</a>. 
Malware was found on <a href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"> security cameras available through Amazon</a>. 
<a href="//www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html" title="Jacob Brogan, Malware Found on Security Cameras Available Through Amazon, unter: The Slate, slate.com 2016.">Schadsoftware auf über Amazon<ins>-Marktplatz</ins> erhältliche Überwachungskameras gefunden</a>. 
108 | Revolv is [-an IoT-] {+a+} device [-which-] {+that+} managed &ldquo;smart
| home&rdquo; operations: switching [-the-] lights, operate motion sensors,
| regulating temperature, etc. {+Its proprietary software depends on a
| remote server to do these tasks.+} On May 15th, 2016, [-Google said-]
| {+Google/Alphabet <a
| href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">intentionally
| broke+} it [-would shut-] {+by shutting+} down the [-service linked to the
| device, making it unusable.-] {+server</a>.+} 
Revolv is a device that managed &ldquo;smart home&rdquo; operations: switching lights, operate motion sensors, regulating temperature, etc. Its proprietary software depends on a remote server to do these tasks. On May 15th, 2016, Google/Alphabet <a href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">intentionally broke it by shutting down the server</a>. 
<b>Revolv</b> ist ein <i>Internet der Dinge</i> (IdD)-Gerät, das „intelligente Heimautomatisierung“ steuerte: Beleuchtungen, Bewegungssensoren, Temperaturen usw. Am 15. Mai 2016 teilte Google mit, dass es den Dienst, der mit dem Gerät verbunden ist, deaktiviere würde, und damit unbenutzbar macht. 
110  
Over 70 brands of network-connected surveillance cameras have <a href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"> security bugs that allow anyone to watch through them</a>. 
Überwachungskameras mit Verbindung ins Internet von mehr als <a href="//www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html" title="Remote Code Execution in CCTV-DVR affecting over 70 different vendors, unter: Kerneron Security, kerneronsec.com 2016.">70 Markenartikel haben Sicherheitslücken, die jedermann zugucken lassen</a>. 
111  
The <a href="http://michaelweinberg.org/post/137045828005/free-the-cube"> &ldquo;Cube&rdquo; 3D printer was designed with DRM</a>: it won't accept third-party printing materials. It is the Keurig of printers. Now it is being discontinued, which means that eventually authorized materials won't be available and the printers may become unusable. 
Der <a href="https://web.archive.org/web/20160116115255/http://michaelweinberg.org/post/137045828005/free-the-cube" title="Free the Cube, unter: michaelweinberg.org 2016 (Internet Archive).">„Cube“ 3D-Drucker wurde mit DRM entworfen</a>: es werden keine Druckmaterialien von Drittanbietern akzeptiert. Es ist das Keurig (ein US-amerikanischer Kaffeekonzern, A. d. Ü.) unter den Druckern. Nun wird die Produktion eingestellt, sodass autorisierte Materialien letztlich nicht mehr verfügbar und der Drucker unbrauchbar werden könnte. 
112  
With a <a href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"> printer that gets the Respects Your Freedom</a>, this problem would not even be a remote possibility. 
Mit einem <a href="https://www.fsf.org/resources/hw/endorsement/respects-your-freedom">Respects Your Freedom</a> zertifizierten <a href="https://www.fsf.org/resources/hw/endorsement/aleph-objects">3D-Drucker</a> wäre dieses Problem nicht einmal eine entfernte Möglichkeit. 
116 | <a
| [-href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">-]
| {+href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html">+}
| Some D-Link routers</a> have a back door for changing settings in a dlink
| of an eye. 
<a href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html"> Some D-Link routers</a> have a back door for changing settings in a dlink of an eye. 
Einige <a href="//www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html" title="Backdoor found in D-Link router firmware code, unter: itworld.com 2013.">D-Link Router haben Hintertür</a> zum Ändern von Einstellungen.<a href="#tn03" id="tn03-ref" class="transnote">[3]</a> 
117 | <a href="http://sekurak.pl/tp-link-httptftp-backdoor/"> The TP-Link
| router has a back{+ +}door</a>. 
<a href="http://sekurak.pl/tp-link-httptftp-backdoor/"> The TP-Link router has a back door</a>. 
<a href="//sekurak.pl/tp-link-httptftp-backdoor/" title="TP-Link HTTP/TFTP backdoor, unter: sekurak.pl 2013.">TP-Link-Router hat eine Hintertür</a>. <a href="//sekurak.pl/more-information-about-tp-link-backdoor/" title="More information about TP-Link backdoor, unter: sekurak.pl 2013."><small>[mehr]</small></a> 
119 | The [-<a href="http://www.bbc.com/news/technology-34922712">Nest-]
| {+Nest+} Cam &ldquo;smart&rdquo; camera is [-always-] {+<a
| href="http://www.bbc.com/news/technology-34922712">always+}
| watching</a>, even when the &ldquo;owner&rdquo; switches it
| &ldquo;off.&rdquo; 
The Nest Cam &ldquo;smart&rdquo; camera is <a href="http://www.bbc.com/news/technology-34922712">always watching</a>, even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo; 
Die „aufgeweckte“ Kamera <b>Nest Cam</b> (vormals Dropcam) <a href="//www.bbc.com/news/technology-34922712" title="Nest Cam smart camera is 'always on' even when 'off', BBC News 2015." >guckt immer zu</a>, selbst wenn der besitzende „Eigentümer“ sie ausgeschaltet hat. 
121 | ARRIS cable modem has a <a
| href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
| back{+ +}door in the back{+ +}door</a>. 
ARRIS cable modem has a <a href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"> back door in the back door</a>. 
Kabelmodems von Arris haben <a href="https://web.archive.org/web/20160603141911/https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1" title="Bernardo Rodrigues, ARRIS Cable Modem has a Backdoor in the Backdoor, w00tsec 2015 (Internet Archive).">Hintertür in der Hintertür</a>. 
122  
Some web and TV advertisements play inaudible sounds to be picked up by proprietary malware running on other devices in range so as to determine that they are nearby. Once your Internet devices are paired with your TV, advertisers can correlate ads with Web activity, and other <a href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"> cross-device tracking</a>. 
Einige Internet- und TV-Spots spielen von auf in Reichweite befindlichen anderen Geräten laufender proprietärer Schadsoftware aufgreifbare unhörbare Töne ab, um bestimmen zu können, dass sie sich in der Nähe befinden. Sobald Ihre internetfähigen Geräte mit Ihrem Fernsehgerät] verbunden sind, können Werbetreibende Anzeigen mit Netzaktivität und anderen <a href="//arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/" title="Dan Goodin, Beware of ads that use inaudible sound to link your phone, TV, tablet, and PC, Ars Technica 2015.">geräteübergreifenden Verfolgen korrelieren</a>. 
123 | Vizio goes a step further than other TV manufacturers in spying on their
| users: their <a
| href="http{+s+}://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
| &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and link
| them your IP address</a> so that advertisers can track you across devices. 
Vizio goes a step further than other TV manufacturers in spying on their users: their <a href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"> &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and link them your IP address</a> so that advertisers can track you across devices. 
Vizio geht in puncto Spionage seiner Benutzer sogar noch einen Schritt weiter als andere Fernsehhersteller: ihre <a href="//www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">„smart“ TVs analysieren detailliert Sehgewohnheiten und verknüpfen diese mit der IP-Adresse</a>, damit Werbetreibende einen über die Geräte verfolgen können. 
125 || No change detected. The change might only be in amounts of spaces. 
Tivo's alliance with Viacom adds 2.3 million households to the 600 millions social media profiles the company already monitors. Tivo customers are unaware they're being watched by advertisers. By combining TV viewing information with online social media participation, Tivo can now <a href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"> correlate TV advertisement with online purchases</a>, exposing all users to new combined surveillance by default. 
Das Bündnis des <ins>US-Herstellers von digitalen Videorekordern</ins> Tivo mit dem US-Medienkonzern Viacom führt 2,3 Millionen Haushalte zu den 600 Millionen sozialen Medien-Profilen, die das Unternehmen bereits überwacht, hinzu. TiVo-Kunden sind sich dessen nicht bewusst, dass sie von Werbetreibenden beobachtet werden. Durch Verbinden von Informationen über das Fernsehverhalten mit Online-Social-Media-Beteiligung kann Tivo jetzt <a href="//www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102" title="Lisa Richwine, Viacom, TiVo partner to give TV advertisers more data, Thomson Reuters 2015.">TV-Werbung mit Online-Käufen korrelieren</a> und standardmäßig alle Nutzer neuer gemeinsamer Überwachung aussetzen. 
126 | [-<a
| href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">-]FitBit
| fitness trackers have a {+<a
| href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">+}
| Bluetooth vulnerability</a> that allows attackers to send malware to the
| devices, which can subsequently spread to computers and other FitBit
| trackers that interact with them. 
FitBit fitness trackers have a <a href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"> Bluetooth vulnerability</a> that allows attackers to send malware to the devices, which can subsequently spread to computers and other FitBit trackers that interact with them. 
FitBit Fitness-Überwacher haben <a href="//www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/" title="Hack Delivers First Ever Malware to Fitness Trackers, unter: tripwire.com 2015.">Bluetooth-Sicherheitslücke</a>, die Angreifern erlaubt Schadsoftware auf Geräte zu übertragen, die sich anschließend mit damit interagierenden Rechnern und anderen FitBit-Überwachungsgeräten austauscht. 
127 | &ldquo;Self-encrypting&rdquo; disk drives do the encryption with
| proprietary firmware so you can't trust it. Western Digital's [-<a
| href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">-]
| &ldquo;My Passport&rdquo; drives {+<a
| href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">+}
| have a back door</a>. 
&ldquo;Self-encrypting&rdquo; disk drives do the encryption with proprietary firmware so you can't trust it. Western Digital's &ldquo;My Passport&rdquo; drives <a href="https://www.vice.com/en/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"> have a back door</a>. 
„Selbstverschlüsselnde“ Plattenlaufwerke führen die Verschlüsselung mittels proprietärer Firmware durch, der man daher nicht uneingeschränkt vertrauen kann. Western Digitals „My Passport“-Festplatten <a href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption" title="Some Popular 'Self Encrypting' Hard Drives Have Really Bad Encryption, unter: motherboard.vice.com 2015.">haben eine Hintertür</a>. 
128  
Vizio &ldquo;smart&rdquo; TVs recognize and <a href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what people are watching</a>, even if it isn't a TV channel. 
Vizio<ins>, ein amerikanisches, nicht börsennotiertes Unternehmen im Bereich Unterhaltungselektronik,</ins> „smarte“ Fernsehgeräte identifizieren und <a href="//www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/" title="Richard Lawler, Vizio IPO plan shows how its TVs track what you're watching, unter: engadget.com 2015.">zeichnen alles auf was man anguckt</a>, selbst wenn es sich nicht um ein Fernsehprogramm handelt. 
129  
Due to bad security in a drug pump, crackers could use it to <a href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"> kill patients</a>. 
Aufgrund der schlechten Sicherheit in einer Medikamentenpumpe könnten Cracker <a href="//www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/" title="Hacker Can Send Fatal Dose to Hospital Drug Pumps, unter: wired.com 2015.">Patienten töten</a>. 
130 | [-<a
| href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">-]Verizon
| cable TV {+<a
| href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">+}
| snoops on what programs people [-watch</a>,-] {+watch,+} and even what
| they wanted to [-record.-] {+record</a>.+} 
Verizon cable TV <a href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"> snoops on what programs people watch, and even what they wanted to record</a>. 
Das Glasfaser-Web-TV-Angebot von <a href="//arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/" title="Verizon FiOS reps know what TV channels you watch, unter: arstechnica.com 2015.">Verizon FiOS TV schnüffelt aus, welche Programme man guckt, sogar was man plant aufzunehmen</a>. 
133  
Vizio <a href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"> used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what users watch</a>. The TVs did not do that when first sold. 
Vizio<ins>, ein nicht börsennotiertes US-Unternehmen im Bereich Unterhaltungselektronik,</ins> <a href="//boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html" title="Telescreen watch: Vizio adds spyware to its TVs, unter: boingboing.net 2015.">verwendete eine Firmware-„Verbesserung“, um ihre Fernsehgeräte u. a. zu veranlassen, herumzuschnüffeln, was Zuschauer sich angucken</a>. Die Fernseher taten dies zuvor nicht. 
134 | [-<a
| href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">-]Barbie
| [-is-] {+<a
| href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is+}
| going to [-spy</a>-] {+spy+} on children and [-adults.-] {+adults</a>.+} 
Barbie <a href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is going to spy on children and adults</a>. 
Barbie <a href="//www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673" title="Wi-fi “spy” Barbie records children's conversations - and could be a target for hackers, say experts, unter: mirror.co.uk 2015.">wird Kinder und Erwachsene ausspionieren</a>. 
135 | The Samsung &ldquo;[-s-]{+S+}mart&rdquo; TV <a
| href="http{+s+}://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
| transmits users' voice on the internet to another company, Nuance</a>.
| Nuance can save it and would then have to give it to the US or some other
| government. 
The Samsung &ldquo;Smart&rdquo; TV <a href="https://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"> transmits users' voice on the internet to another company, Nuance</a>. Nuance can save it and would then have to give it to the US or some other government. 
Samsung und LG „Smart“-TV-Geräte <a href="//www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm" title="Samsung and LG smart TVs share your voice data with a third party, unter: consumerreports.org 2015.">übertragen die Stimme der Benutzer über das Internet an eine dritte Firma, Nuance</a>. Nuance kann es sichern und würde es dann der US-Regierung oder einer anderen aushändigen müssen. 
137  
In its privacy policy, Samsung explicitly confirms that <a href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice data containing sensitive information will be transmitted to third parties</a>. 
In seiner Datenschutzbestimmung bestätigt Samsung ausdrücklich, dass <a href="https://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs" title="Samsung warns customers not to discuss personal information in front of smart TVs, unter: theweek.com 2016.">Sprachdaten, die vertrauliche Informationen enthalten, an Dritte übertragen</a> werden. 
138 | The Amazon &ldquo;[-s-]{+S+}mart&rdquo; TV is <a
| href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
| snooping all the time</a>. 
The Amazon &ldquo;Smart&rdquo; TV is <a href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"> snooping all the time</a>. 
Amazon „Smart“-TV-Geräte <a href="//www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance" title="Amazon’s Echo and the smart TVs that are listening to and watching everything you do, unter: theguardian.com 2014.">schnüffeln die ganze Zeit mit</a>. 
139  
More or less all &ldquo;smart&rdquo; TVs <a href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy on their users</a>. 
Mehr oder weniger alle <a href="//www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/" title="Willem Aldershoff, Researchers: All Smart TVs spy on you, unter: myce.com 2014.">„Smart“-TVs spionieren</a> Nutzer aus. 
143  
Nest thermometers send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of data about the user</a>. 
Nest-Thermostate senden<a href="https://bgr.com/2014/07/17/google-nest-jailbreak-hack/" title="Hackers target Nest as a warning to Google about data-sharing, unter: bgr.com 2014."> eine Menge Daten über den Nutzer</a>. 
144  
LG <a href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"> disabled network features</a> on <em>previously purchased</em> &ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG begin to snoop on them and distribute their personal data. 
LG <a href="//www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml" title="LG Will Take The 'Smart' Out Of Your Smart TV If You Don't Agree To Share Your Viewing And Search Data With Third Parties, unter: techdirt.com 2014.">deaktiviert Netzwerkfunktionen</a> auf <em>zuvor gekauften</em> „Smart“-Fernsehgeräten, sofern Käufer nicht zustimmen LG herumschnüffeln und persönlichen Daten verteilen zu lassen. 
145  
Lots of <a href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"> hospital equipment has lousy security</a>, and it can be fatal. 
Eine Menge <a href="//www.wired.com/2014/04/hospital-equipment-vulnerable/" title="It’s Insanely Easy to Hack Hospital Equipment, unter: wired.com 2014.">Geräte in Krankenhäusern haben eine lausige Sicherheit</a>, und das kann tödlich sein.<a href="#tn03" class="transnote">[3]</a> 
146  
<a href="http://www.bunniestudios.com/blog/?p=3554"> Some flash memories have modifiable software</a>, which makes them vulnerable to viruses. 
<a href="//www.bunniestudios.com/blog/?p=3554" title="On Hacking MicroSD Cards, unter: bunniestudios.com 2013.">Einige Flash-Speicher enthalten modifizierbare Software</a>, die sie anfällig für Viren macht. 
148  
<a href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"> Point-of-sale terminals running Windows were taken over</a> and turned into a botnet for the purpose of collecting customers' credit card numbers. 
<ins>Geräte bzw. Terminals zum bargeldlosen Zahlen an elektronischen Kassen (eigentlich <i>Verkaufsort</i>), sogenannte </ins><a
href="//arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/" title="Credit card fraud comes of age with advances in point-of-sale botnets, unter: arstechnica.com 2013."><i>Point-of-Sale</i> (POS)-Terminals wurden&#160;&#8209;&#160;unter Windows&#160;&#8209;&#160;übernommen und zu einem Botnetz</a> gemacht, um Kreditkartendaten von Kunden zu sammeln. 
149 | [-<a
| href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">-]Spyware
| in LG &ldquo;smart&rdquo; [-TVs</a>-] {+TVs <a
| href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">+}
| reports what the user watches, and the switch to turn this off has no
| [-effect.-] {+effect</a>.+} (The fact that the transmission reports a 404
| error really means nothing; the server could save that data anyway.) 
Spyware in LG &ldquo;smart&rdquo; TVs <a href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"> reports what the user watches, and the switch to turn this off has no effect</a>. (The fact that the transmission reports a 404 error really means nothing; the server could save that data anyway.) 
<a href="//doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html" title="LG Smart TVs logging USB filenames and viewing info to LG servers, unter: doctorbeet.blogspot.co.uk 2013.">LG „Smart“-TV</a>-Geräte erfassen und senden das Sehverhalten des Nutzers auch gegen dessen Willen <ins>unverschlüsselt an LG-Server</ins> (die Tatsache, dass der Server auf den Empfang mit einer HTTP-Fehlermeldung <em>‚404 Nicht gefunden‘</em> reagiert, bedeutet eigentlich nichts: der Server konnte die Daten trotzdem erfassen).<a href="#tn06" id="tn06-ref" class="transnote">[6]</a> 
150  
Even worse, it <a href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"> snoops on other devices on the user's local network</a>. 
Schlimmer noch ist, <a href="//rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/" title="LG TV logging filenames from network folders, unter: rambles.renney.me 2013.">LG schnüffelt andere Geräte im lokalen Netzwerk des Nutzers aus</a>. 
152  
<a href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up"> DVDs and Bluray disks have DRM</a>. 
<a href="https://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up" title="Who’s driving the copyright laws? Consumers insist on the right to ‘back it up’, unter: NCL Technology Issues, nclnet.org 2013 (Internet Archive).">DVDs und Blu-Rays weisen DRM auf</a>. 
155 | The [-<a
| href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">-]
| FTC punished a company for making webcams with {+<a
| href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">+}
| bad [-security</a>-] {+security+} so that it was easy for anyone to watch
| [-them.-] {+through them</a>.+} 
The FTC punished a company for making webcams with <a href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html"> bad security so that it was easy for anyone to watch through them</a>. 
Die US-Bundeshandelskommission <a href="//www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html" title="Eeward Wyatt, F.T.C. Says Webcam’s Flaw Put Users’ Lives on Display, unter: The New York Times, nytimes.com 2013.">FTC straft Unternehmen wegen Herstellung von Webcams mit schlechten Sicherheitsstandards ab</a>, so dass es für jedermann leicht war zuzugucken.<a href="#tn02" id="tn02-ref" class="transnote">[2]</a> 
156 | <a href="http://spritesmods.com/?art=hddhack&amp;page=6"> Replaceable
| nonfree software in disk drives can be written by a nonfree
| [-program.</a>-] {+program</a>.+} This makes any system vulnerable to
| persistent attacks that normal forensics won't detect. 
<a href="http://spritesmods.com/?art=hddhack&amp;page=6"> Replaceable nonfree software in disk drives can be written by a nonfree program</a>. This makes any system vulnerable to persistent attacks that normal forensics won't detect. 
<a href="//spritesmods.com/?art=hddhack&amp;page=6" title="Hard disk hacking, unter: spritesmods.com 2013.">Austauschbare unfreie Software in Festplatten kann von einem unfreien Programm geschrieben werden</a>. Dies macht ein System anfällig für dauerhafte Angriffe, die übliche Forensik nicht erkennt.  
157 | It is possible to <a
| href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
| kill people by taking control of medical implants by radio</a>. More
| information in <a
| href="http://www.bbc.co.uk/news/technology-17631838">BBC News</a> and <a
| [-href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">-]
| {+href="https://ioactive.com/broken-hearts-how-plausible-was-the-homeland-pacemaker-hack/">+}
| IOActive Labs Research blog</a>. 
It is possible to <a href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/"> kill people by taking control of medical implants by radio</a>. More information in <a href="http://www.bbc.co.uk/news/technology-17631838">BBC News</a> and <a href="https://ioactive.com/broken-hearts-how-plausible-was-the-homeland-pacemaker-hack/"> IOActive Labs Research blog</a>. 
Durch <a href="//siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/" title="Famed Hacker Barnaby Jack Dies Days Before Scheduled Black Hat Appearance, unter: siliconangle.com 2013.">Übernahme der Steuerung von medizinischen Implantate per Funk</a> zu töten ist möglich. Mehr Informationen unter <a href="//www.bbc.co.uk/news/technology-17631838" xml:lang="en" lang="en" title="Medical device hack attacks may kill, researchers warn">BBC News</a> und im <a href="//blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html" xml:lang="en" lang="en" title="“Broken Hearts”: How plausible was the Homeland pacemaker hack?, unter: blog.ioactive.com 2013.">IOActive Labs Research</a>-Blog. 
158  
<a href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/"> &ldquo;Smart homes&rdquo;</a> turn out to be stupidly vulnerable to intrusion. 
<a href="//www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/" title="When 'Smart Homes' Get Hacked: I Haunted A Complete Stranger's House Via The Internet, unter: forbes.com 2013."><em>„Intelligentes Wohnen“</em> [engl.]</a> entpuppt sich dummerweise anfällig für Angriffe. 
160 | [-<a
| href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">-]{+The+}
| Cisco TNP IP phones are {+<a
| href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">+}
| spying devices</a>. 
The Cisco TNP IP phones are <a href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"> spying devices</a>. 
<a href="https://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html" title="Your Cisco phone is listening to you: 29C3 talk on breaking Cisco phones, unter: boingboing.net 2012.">Cisco TNP IP-Telefone sind Spionagegeräte</a>. 
161 | [-<a
| href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F">-]Samsung
| &ldquo;Smart&rdquo; TVs have {+<a
| href="https://wiki.samygo.tv/index.php?title=SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F">+}
| turned Linux into the base for a tyrant system</a> so as to impose DRM.
| What enables Samsung to do this is that Linux is released under GNU GPL
| version 2, <a href="/licenses/rms-why-gplv3.html">not version 3</a>,
| together with a weak interpretation of GPL version 2. 
Samsung &ldquo;Smart&rdquo; TVs have <a href="https://wiki.samygo.tv/index.php?title=SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F"> turned Linux into the base for a tyrant system</a> so as to impose DRM. What enables Samsung to do this is that Linux is released under GNU GPL version 2, <a href="/licenses/rms-why-gplv3.html">not version 3</a>, together with a weak interpretation of GPL version 2. 
<a href="https://web.archive.org/web/20161104165038/http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F" title="What are Restricted Firmwares?, in: SamyGO for DUMMIES, unter: wiki.SamyGO.tv 2012 (Internet Archive).">Samsung „Smart“-Fernseher haben <b>Linux</b> als Basis für ein Tyrannen-System verwandelt</a> um DRM durchzusetzen. Was dies Samsung ermöglichte, ist, dass Linux unter <b>GNU GPL</b> in der Version 2&#160;&#8209;&#160;<a href="/licenses/rms-why-gplv3">nicht Version 3</a>&#160;&#8209;&#160;zusammen mit einer schwachen Interpretation von Version 2 freigegeben ist. 
162  
<a href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"> Crackers found a way to break security on a &ldquo;smart&rdquo; TV</a> and use its camera to watch the people who are watching TV. 
<a href="//www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html" title="Is your TV watching you? Security alert over Samsung's Smart TV as hackers claim they can access its hard drive and seize control of built-in cameras, unter: dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html 2017.">Cracker fanden einen Weg die Sicherheit eines „intelligenten“ TVs zu knacken</a>, und nutzen dessen Kamera um Zuschauer zu beobachten. 
163 | Some LG TVs <a
| [-href="http://openlgtv.org.ru/wiki/index.php/Achievements">are-]
| {+href="https://web.archive.org/web/20190917164647/http://openlgtv.org.ru/wiki/index.php/Achievements">
| are+} tyrants</a>. 
Some LG TVs <a href="https://web.archive.org/web/20190917164647/http://openlgtv.org.ru/wiki/index.php/Achievements"> are tyrants</a>. 
Einige <a href="http://openlgtv.org.ru/wiki/index.php/Achievements" title="Achievements: Tested Matrix, unter: OpenLGTV.org 2012.">LG-Fernsehgeräte sind Tyrannen</a>. 
164 Eine Sicherheitslücke stellt einen Fehler in einer Software dar, durch den
ein Programm mit Schadwirkung (Malware) oder ein Angreifer in ein
Rechnersystem eindringen kann.
(IoD) Internet of Dongs // Internet der Dödel
TRANSLATORS: Use space (SPC) as msgstr if you don't have notes. 
*GNUN-SLOT: TRANSLATOR'S NOTES* 
<!--p><strong>Anmerkungen des Übersetzungsteams:</strong></p>
<ol id="transnote">
<li><ol>
<li><p><strong>Weiterführende Referenzen:</strong></p>
<ol style="list-style-type:none">
<li id="tn-iot01"><a href="#tn-iot01-ref">[1]</a> Heise Autos, <cite><a
href="//www.silicon.de/41643593/iot-bug-bei-miele-zeigt-fallstricke-der-digitalisierung-auf/">IoT-Bug bei Miele zeigt Fallstricke der Digitalisierung auf</a></cite>, unter: silicon.de 2017. (abgerufen 2017-04-12) </li>
</ol></li>
<li id="tn-iot02"><a href="#tn-iot02-ref">[2]</a> Technology Review Magazin, <cite><a
href="https://heise.de/-3910105">Wenn das Sexspielzeug spioniert</a></cite>, unter: https://heise.de/-3910105 2017. (abgerufen 2017-12-05) </li>
</ol></li></ol></li>
</ol--> 
166 || No change detected. The change might only be in amounts of spaces. 
Please see the <a href="/server/standards/README.translations.html">Translations README</a> for information on coordinating and contributing translations of this article. 
Bei der Übersetzung dieses Werkes wurde mit größter Sorgfalt vorgegangen. Trotzdem können Fehler nicht völlig ausgeschlossen werden. Sollten Sie Fehler bemerken oder Vorschläge, Kommentare oder Fragen zu diesem Dokument haben, wenden Sie sich bitte an unser Übersetzungsteam <a href="mailto:web-translators@gnu.org?cc=www-de-translators@gnu.org">&lt;web-translators@gnu.org&gt;</a>.</p>
<p>Weitere Informationen über die Koordinierung und Einsendung von Übersetzungen unserer Internetpräsenz finden Sie in der <a href="/server/standards/README.translations">LIESMICH für Übersetzungen</a>. 
168  
This page is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>. 
Dieses Werk ist lizenziert unter einer <a rel="license" href="//creativecommons.org/licenses/by/4.0/deed.de">Creative Commons Namensnennung 4.0 International</a>-Lizenz.