malware-google.de.po

Mismatched links: 91.

Mismatched ids: 3.

#text
8 | {+</a>&nbsp;/+} <a [-href="/proprietary/proprietary.html">Other examples
| of proprietary malware</a>-]
| {+href="/proprietary/proprietary.html">Malware</a>&nbsp;/ By
| company&nbsp;/+} 
</a>&nbsp;/ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/ By company&nbsp;/ 
<a href="/proprietary/">Weitere Beispiele proprietärer Schadsoftware</a> 
10 | Nonfree (proprietary) software is very often malware (designed to mistreat
| the user). Nonfree software is controlled by its developers, which puts
| them in a position of power over the users; <a
| href="/philosophy/free-software-even-more-important.html">that is the
| basic injustice</a>. The developers {+and manufacturers+} often exercise
| that power to the detriment of the users they ought to serve. 
Nonfree (proprietary) software is very often malware (designed to mistreat the user). Nonfree software is controlled by its developers, which puts them in a position of power over the users; <a href="/philosophy/free-software-even-more-important.html">that is the basic injustice</a>. The developers and manufacturers often exercise that power to the detriment of the users they ought to serve. 
Unfreie (proprietäre) Software entspricht sehr häufig einem Schadprogramm (entworfen, um <ins>unerwünschte und gegebenenfalls schädliche Funktionen auszuführen,</ins> den Benutzer also schlecht behandeln). Unfreie Software wird von den Entwicklern kontrolliert, welches sie in eine Position der Macht gegenüber den Nutzern versetzt. <a href="/philosophy/free-software-even-more-important">Das ist die grundlegende Ungerechtigkeit!</a> Häufig üben Entwickler diese Macht zum Schaden der Benutzer aus, denen sie eigentlich dienen sollte. 
16 | <a [-href="#back-doors">Back doors</a>-] {+href="#drm">DRM</a>+} 
<a href="#drm">DRM</a> 
<a href="#back-doors">Hintertüren</a> 
21 | <a [-href="#sabotage">Sabotage</a>-] {+href="#tyrants">Tyrants</a>+} 
<a href="#tyrants">Tyrants</a> 
<a href="#sabotage">Sabotage</a> 
23  
The <a href="https://www.google.com/mobile/android/market-tos.html"> Google Play Terms of Service</a> insist that the user of Android accept the presence of universal back doors in apps released by Google. 
 
25  
ChromeBooks are programmed for obsolescence: ChromeOS has a universal back door that is used for updates and <a href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/"> ceases to operate at a predefined date</a>. From then on, there appears to be no support whatsoever for the computer. 
 
27  
Android has a <a href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change"> back door for remotely changing &ldquo;user&rdquo; settings</a>. 
 
30 | In Android, <a
| [-href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">-]
| {+href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html">+}
| Google has a back door to remotely delete [-apps.</a>-] {+apps</a>.+} (It
| [-is-] {+was+} in a program called [-GTalkService).-] {+GTalkService,
| which seems since then to have been merged into Google Play.)+} 
In Android, <a href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"> Google has a back door to remotely delete apps</a>. (It was in a program called GTalkService, which seems since then to have been merged into Google Play.) 
Google hat in <a href="//www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html" title="Google throws 'kill switch' on Android phones, unter: computerworld.com 2011.">Android eine Hintertür, um Applikationen aus der Ferne zu löschen</a> (sie befindet sich in einem Programm namens <em>GTalkService</em> <ins>[das über den Dienst <em>Google Play</em> aufgerufen wird, A. d. Ü.]</ins>).<!--a href="#tn02" id="tn02-ref" class="transnote">[2]</a --> 
31 | Google can also <a
| href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
| forcibly and remotely install apps</a> through [-GTalkService (which
| seems, since that article, to have been merged into Google Play).-]
| {+GTalkService.+} This is not equivalent to a universal back door, but
| permits various dirty tricks. 
Google can also <a href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"> forcibly and remotely install apps</a> through GTalkService. This is not equivalent to a universal back door, but permits various dirty tricks. 
Ebenso kann Google über den GTalkService-Dienst (der seit erscheinen dieses Artikels mit dem Google Play-Dienst zusammengeführt worden zu sein scheint) <a href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">Apps zwangsweise und per Fernzugriff installieren</a>. Dies ist nicht nur gleichbedeutend mit einer universellen Hintertür, sondern erlaubt weitere verschiedene schmutzige Tricks. <!--a href="#tn05" id="tn05-ref" class="transnote">[5]</a><a href="#tn06" id="tn06-ref" class="transnote">[6]</a --> 
34  
Google <a href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts"> offers censorship software</a>, ostensibly for parents to put into their children's computers. 
<a href="https://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts" title="Google 'Family Link' gives parents a way to monitor preteens' accounts, unter: csmonitor.com 2017.">Zensursoftware</a> gibt Nutzern mit Kindern ein mächtiges Werkzeug in die Hand. 
36 | For example, an extension was <a
| [-href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/">-]
| {+href="https://web.archive.org/web/20170120094917/https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/">+}
| banned from the Chrome Web Store, and permanently disabled</a> on more
| than 40,000 computers. 
For example, an extension was <a href="https://web.archive.org/web/20170120094917/https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/"> banned from the Chrome Web Store, and permanently disabled</a> on more than 40,000 computers. 
Beispielsweise wurde eine <a href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/" title="Why Is Google Blocking This Ad-Blocker On Chrome?, unter: Consumerist.com 2017.">Erweiterung im <em>Chrome Web Store</em> gesperrt und auf mehr als 40.000 Computern dauerhaft deaktiviert</a>. 
37  
<a href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones"> Google censored installation of Samsung's ad-blocker</a> on Android phones, saying that blocking ads is &ldquo;interference&rdquo; with the sites that advertise (and surveil users through ads). 
<a href="https://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones" title="Jasper Jackson, Google pulls adblocking app for Samsung phones, The Guardian 2016.">Google zensiert Installation von Samsungs Werbeblocker</a> mit der Begründung, dass das Blockieren von Werbung eine „Interferenz“ mit den werbenden (und Nutzer mittels Werbeanzeigen überwachenden) Internetpräsenzen verursacht. 
39  
Google's censorship, unlike that of Apple, is not total: Android allows users to install apps in other ways. You can install free programs from f-droid.org. 
Googles Zensur, im Gegensatz zu der von Apple, ist nicht 100%ig. Android ermöglicht Nutzern das Installieren von Apps auf andere Weise: man kann freie Programme <ins>(und deren Quellcode)</ins> via <b><a href="https://f-droid.org">F-Droid</a></b> installieren. 
41 | [-<a href="#drm">Digital-]{+Digital+} restrictions [-management</a>-]
| {+management,+} or [-&ldquo;DRM&rdquo; means-] {+&ldquo;DRM,&rdquo; refers
| to+} functionalities designed to restrict what users can do with the data
| in their computers. 
Digital restrictions management, or &ldquo;DRM,&rdquo; refers to functionalities designed to restrict what users can do with the data in their computers. 
<a href="#drm">Digitale Rechte-Minderung (DRM)</a><br />&#8209;&#160;Funktionen, entwickelt um zu beschränken, was Nutzer mit den Daten auf ihren Rechnern tun können. 
42 | Google now allows Android apps to detect whether a device has been rooted,
| <a
| href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/">and
| refuse to install if so</a>. {+The Netflix app uses this ability to
| enforce DRM by refusing to install on rooted Android devices.+} 
Google now allows Android apps to detect whether a device has been rooted, <a href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/">and refuse to install if so</a>. The Netflix app uses this ability to enforce DRM by refusing to install on rooted Android devices. 
Google ermöglicht Android-Apps nun zu erkennen, ob ein Gerät entsperrt worden ist, <a href="//www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/" title="Corbin Davenport, Netflix confirms it is blocking rooted/unlocked devices, app itself is still working (for now), unter: androidpolice.com 2017.">und wenn ja, die Installation zu verweigern</a>. 
44  
Chrome <a href="http://boingboing.net/2017/01/30/google-quietly-makes-optiona.html">implements DRM</a>. So does Chromium, through nonfree software that is effectively part of it. 
Chrome <a href="https://boingboing.net/2017/01/30/google-quietly-makes-optiona.html" title="Google quietly makes ”optional“ web DRM mandatory in Chrome, unter: https://boingboing.net/2017/01/30/google-quietly-makes-optiona.html Boing Boing 2017.">setzt DRM um</a>. Gleiches gilt durch unfreie Software für Chromium, die praktisch Teil davon ist. 
45 | <a
| [-href="https://bugs.chromium.org/p/chromium/issues/detail?id=686430">More-]
| {+href="https://bugs.chromium.org/p/chromium/issues/detail_ezt?id=686430">More+}
| information</a>. 
<a href="https://bugs.chromium.org/p/chromium/issues/detail_ezt?id=686430">More information</a>. 
<a href="https://bugs.chromium.org/p/chromium/issues/detail?id=686430" title="Please allow disabling Widevine/EME again, unter: bugs.chromium.org 2017.">Weitere Informationen</a>. 
49  
<a href="https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phones"> The pegasus spyware used vulnerabilities on proprietary smartphone operating systems</a> to impose surveillance on people. It can record people's calls, copy their messages, and secretly film them, using a security vulnerability. There's also <a href="https://info.lookout.com/rs/051-ESQ-475/images/lookout-pegasus-technical-analysis.pdf"> a technical analysis of this spyware</a> available in PDF format. 
 
51 | [-It is unfortunate-]{+<small>Please note+} that the article [-uses the
| term <a
| href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.-]
| {+wrongly refers to crackers as &ldquo;<a
| href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small>
| +} 
<small>Please note that the article wrongly refers to crackers as &ldquo;<a href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small> 
Es ist bedauerlich, dass der Artikel den Begriff <a href="/philosophy/words-to-avoid#Monetize">„monetarisieren“</a> verwendet. 
52  
TikTok <a href="https://boingboing.net/2020/08/11/tiktok-exploited-android-secur.html"> exploited an Android vulnerability</a> to obtain user MAC addresses. 
 
53  
Many Android apps can track users' movements even when the user says <a href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"> not to allow them access to locations</a>. 
 
55 | <a
| [-href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">-]
| {+href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">+}
| The NSA can tap data in smart phones, including iPhones, Android, and
| BlackBerry</a>. While there is not much detail here, it seems that this
| does not operate via the universal back door that we know nearly all
| portable phones have. It may involve exploiting various bugs. There are
| <a
| href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
| lots of bugs in the phones' radio software</a>. 
<a href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"> The NSA can tap data in smart phones, including iPhones, Android, and BlackBerry</a>. While there is not much detail here, it seems that this does not operate via the universal back door that we know nearly all portable phones have. It may involve exploiting various bugs. There are <a href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"> lots of bugs in the phones' radio software</a>. 
<a href="//www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">Der US-Geheimdienst NSA kann sich Zugang zu iPhone- und BlackBerry-Geräten sowie zu Geräten mit Android-Betriebssystem verschaffen</a>. Es gibt zwar kaum Details, es scheint aber, dass dies nicht über die universelle Hintertür funktioniert, von der wir wissen, dass sie nahezu alle tragbaren Telefone haben. Dies kann verschiedene ausnutzbare Programmfehler einschließen. Es gibt viele <a href="//www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">Programmfehler in der Mobilfunksoftware von Mobiltelefonen</a>. 
58  
<a href="https://arstechnica.com/gadgets/2021/06/even-creepier-covid-tracking-google-silently-pushed-app-to-users-phones/">Google automatically installed an app on many proprietary Android phones</a>. The app might or might not do malicious things but the power Google has over proprietary Android phones is dangerous. 
 
59  
Google is modifying Chromium so that <a href="https://tech.slashdot.org/story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-will-break-content-blocking-extensions-including-various-ad-blockers"> extensions won't be able to alter or block whatever the page contains</a>. Users could conceivably reverse the change in a fork of Chromium, but surely Chrome (nonfree) will have the same change, and users can't fix it there. 
 
62  
A new app published by Google <a href="https://www.xda-developers.com/google-device-lock-controller-banks-payments/">lets banks and creditors deactivate people's Android devices</a> if they fail to make payments. If someone's device gets deactivated, it will be limited to basic functionality, such as emergency calling and access to settings. 
 
63 | Revolv is [-an IoT-] {+a+} device [-which-] {+that+} managed &ldquo;smart
| home&rdquo; operations: switching [-the-] lights, operate motion sensors,
| regulating temperature, etc. {+Its proprietary software depends on a
| remote server to do these tasks.+} On May 15th, 2016, [-Google said-]
| {+Google/Alphabet <a
| href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">intentionally
| broke+} it [-would shut-] {+by shutting+} down the [-service linked to the
| device, making it unusable.-] {+server</a>.+} 
Revolv is a device that managed &ldquo;smart home&rdquo; operations: switching lights, operate motion sensors, regulating temperature, etc. Its proprietary software depends on a remote server to do these tasks. On May 15th, 2016, Google/Alphabet <a href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">intentionally broke it by shutting down the server</a>. 
<b>Revolv</b> ist ein <i>Internet der Dinge</i> (IdD)-Gerät, das „intelligente Heimautomatisierung“ steuerte: Beleuchtungen, Bewegungssensoren, Temperaturen usw. Am 15. Mai 2016 teilte Google mit, dass es den Dienst, der mit dem Gerät verbunden ist, deaktiviere würde, und damit unbenutzbar macht. 
65  
Google has long had <a href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a back door to remotely unlock an Android device</a>, unless its disk is encrypted (possible since Android 5.0 Lollipop, but still not quite the default). 
Google hat eine <a href="//www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted" title="Samuel Gibbs, Google can unlock some Android devices remotely, district attorney says, unter: theguardian.com 2015.">Hintertür eingebaut, um ein Android-Gerät aus der Ferne zurückzusetzen</a>, sofern die Daten auf dem Gerät nicht vollverschlüsselt sind (geplant seit Android 5.0 Lollipop, aber noch nicht ganz der Standard). 
67  
Google's proprietary Chrome web browser <a href="https://www.techrepublic.com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"> added a surveillance API (idle detection API)</a> which lets websites ask Chrome to report when a user with a web page open is idle. 
 
68  
Google <a href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16">handed over personal data of Indian protesters and activists to Indian police</a> which led to their arrest. The cops requested the IP address and the location where a document was created and with that information, they identified protesters and activists. 
 
69  
Google Nest <a href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"> is taking over ADT</a>. Google sent out a software update to its speaker devices using their back door <a href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that listens for things like smoke alarms</a> and then notifies your phone that an alarm is happening. This means the devices now listen for more than just their wake words. Google says the software update was sent out prematurely and on accident and Google was planning on disclosing this new feature and offering it to customers who pay for it. 
 
70  
Proprietary programs Google Meet, Microsoft Teams, and WebEx <a href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/">are collecting user's personal and identifiable data</a> including how long a call lasts, who's participating in the call, and the IP addresses of everyone taking part. From experience, this can even harm users physically if those companies hand over data to governments. 
 
71  
Google, Apple, and Microsoft (and probably some other companies) <a href="https://www.lifewire.com/wifi-positioning-system-1683343">are collecting people's access points and GPS coordinates (which can identify people's precise location) even if their GPS is turned off</a>, without the person's consent, using proprietary software implemented in person's smartphone. Though merely asking for permission would not necessarily legitimize this. 
 
72  
Google &ldquo;Assistant&rdquo; records users' conversations <a href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even when it is not supposed to listen</a>. Thus, when one of Google's subcontractors discloses a thousand confidential voice recordings, users were easily identified from these recordings. 
 
75  
Google Chrome is an <a href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/"> instrument of surveillance</a>. It lets thousands of trackers invade users' computers and report the sites they visit to advertising and data companies, first of all to Google. Moreover, if users have a Gmail account, Chrome automatically logs them in to the browser for more convenient profiling. On Android, Chrome also reports their location to Google. 
 
76  
The best way to escape surveillance is to switch to <a href="/software/icecat/">IceCat</a>, a modified version of Firefox with several changes to protect users' privacy. 
 
77  
Google tracks the movements of Android phones and iPhones running Google apps, and sometimes <a href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"> saves the data for years</a>. 
 
79  
Google invites people to <a href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss"> let Google monitor their phone use, and all internet use in their homes, for an extravagant payment of $20</a>. 
 
81  
An Android phone was observed to track location even while in airplane mode. It didn't send the location data while in airplane mode. Instead, <a href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"> it saved up the data, and sent them all later</a>. 
 
82  
Tiny Lab Productions, along with online ad businesses run by Google, Twitter and three other companies are facing a lawsuit <a href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html">for violating people's privacy by collecting their data from mobile games and handing over these data to other companies/advertisers</a>. 
 
83  
<a href="https://www.theverge.com/2018/8/13/17684660/google-turn-off-location-history-data">Google will track people even if people turn off location history</a>, using Google Maps, weather updates, and browser searches. Google basically uses any app activity to track people. 
 
84  
Since the beginning of 2017, <a href="https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/">Android phones have been collecting the addresses of nearby cellular towers</a>, even when location services are disabled, and sending that data back to Google. 
 
85  
Some Google apps on Android <a href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"> record the user's location even when users disable &ldquo;location tracking&rdquo;</a>. 
 
88  
Low-priced Chromebooks for schools are <a href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"> collecting far more data on students than is necessary, and store it indefinitely</a>. Parents and students complain about the lack of transparency on the part of both the educational services and the schools, the difficulty of opting out of these services, and the lack of proper privacy policies, among other things. 
 
89  
But complaining is not sufficient. Parents, students and teachers should realize that the software Google uses to spy on students is nonfree, so they can't verify what it really does. The only remedy is to persuade school officials to <a href="/education/edu-schools.html"> exclusively use free software</a> for both education and school administration. If the school is run locally, parents and teachers can mandate their representatives at the School Board to refuse the budget unless the school initiates a switch to free software. If education is run nation-wide, they need to persuade legislators (e.g., through free software organizations, political parties, etc.) to migrate the public schools to free software. 
 
90  
Google's new voice messaging app <a href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs all conversations</a>. 
Googles neue Messaging-App <b>Allo</b> <a href="//www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google" title=", unter: theverge.com 2016.">protokolliert sämtliche Kommunikation</a>. 
94 | Google Chrome includes a module that <a
| [-href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">-]
| {+href="https://www.privateinternetaccess.com/blog/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">+}
| activates microphones and transmits audio to its servers</a>. 
Google Chrome includes a module that <a href="https://www.privateinternetaccess.com/blog/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"> activates microphones and transmits audio to its servers</a>. 
<b>Google Chrome</b>-Modul <a href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">aktiviert Mikrofon und übermittelt Hörbares</a> an seine Server. 
95  
Nest thermometers send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of data about the user</a>. 
Nest-Thermometer <a href="https://bgr.com/2014/07/17/google-nest-jailbreak-hack/" title="Hackers target Nest as a warning to Google about data-sharing, unter: bgr.com 2014.">senden viele Daten</a> über Nutzer. 
96  
Google Chrome <a href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"> spies on browser history, affiliations</a>, and other installed software. 
<b>Chrome</b> <a href="" title="Oops! That page can’t be found, unter: https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/ 2013.">schnüffelt Browserverlauf, Zugehörigkeiten</a> und andere installierte Software aus. 
97 | Spyware in Android phones (and Windows? laptops): The Wall Street Journal
| (in an article blocked from us by a paywall) reports that <a
| href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
| the FBI can remotely activate the GPS and microphone in Android phones and
| [-laptops</a>. (I suspect this means-] {+laptops</a> (presumably+}
| Windows [-laptops.)-] {+laptops).+} Here is <a
| href="http://cryptome.org/2013/08/fbi-hackers.htm">more info</a>. 
Spyware in Android phones (and Windows? laptops): The Wall Street Journal (in an article blocked from us by a paywall) reports that <a href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"> the FBI can remotely activate the GPS and microphone in Android phones and laptops</a> (presumably Windows laptops). Here is <a href="http://cryptome.org/2013/08/fbi-hackers.htm">more info</a>. 
Spionageprogramme in Android-Telefonen (und „Windows-Laptops“?): Die amerikanische Tageszeitung <span xml:lang="en" lang="en">The Wall Street Journal</span> berichtet (in einem von uns durch eine Bezahlschranke blockierten Artikel), dass die <a href="//www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj" title="FBI can remotely activate Android and laptop microphones, reports WSJ, unter: theverge.com 2013.">amerikanische Bundespolizei FBI aus der Ferne GPS und Mikrofon in Android-Telefonen und Laptops aktivieren kann</a> (vermutlich deutet dies auf „Windows-Laptops“ hin). Hier <a href="//cryptome.org/2013/08/fbi-hackers.htm" title="FBI Taps Hacker Tactics to Spy on Suspects, unter: cryptome.org 2013.">weitere Informationen</a>. 
98 | Spyware is present in some Android devices when they are sold. Some
| Motorola [-phones modify-] {+phones, made when this company was owned by
| Google, use a modified version of+} Android [-to-] {+that+} <a
| href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
| send{+s+} personal data to Motorola</a>. 
Spyware is present in some Android devices when they are sold. Some Motorola phones, made when this company was owned by Google, use a modified version of Android that <a href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"> sends personal data to Motorola</a>. 
In einigen Android-Geräten ist bereits bei Verkauf Software zum Ausspähen vorhanden. In einigen Motorola-Telefonen wurde Android modifiziert, um <a href="//www.beneaththewaves.net/Projects/Motorola_Is_Listening.html" title="Motorola Is Listening, unter: beneaththewaves.net 2013.">persönliche Daten an Motorola</a> zu senden. 
99 | A Motorola phone <a
| [-href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">-]
| {+href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">+}
| listens for voice all the time</a>. 
A Motorola phone <a href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"> listens for voice all the time</a>. 
Ein Motorola-Telefon <a href="//www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/" title="Ryan Whitwam, Motorola’s new X8 ARM chip: Underpinning the always-on future of Android, unter: ITProPortal.com ">lauscht die ganze Zeit der Stimme</a>. 
100  
Google Play intentionally sends app developers <a href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"> the personal details of users that install the app</a>. 
<b>Google Play</b> sendet App-Entwicklern vorsätzlich <a href="//gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116" title=" Google Play Store policy raises privacy concerns, unter: gadgets.ndtv.com 2013.">persönliche Details von Nutzern, die die App installieren</a>. 
103 | Many web sites report all their visitors to Google by using the Google
| Analytics service, which <a
| href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
| tells Google the IP address and the page that was [-visited.</a>-]
| {+visited</a>.+} 
Many web sites report all their visitors to Google by using the Google Analytics service, which <a href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"> tells Google the IP address and the page that was visited</a>. 
Viele Internetpräsenzen berichten all ihre Besucher mithilfe des Google Analytics-Dienstes an Google, der <a href="//www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/" title="Google Analytics breaks Norwegian privacy laws, local agency said, unter: pcworld.idg.com.au 2012.">Google die IP-Addresse und die besuchte Internetseite mitteilt</a>. 
104 | Google Chrome contains a key logger that <a
| [-href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">-]
| {+href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/">+}
| sends Google every URL typed in</a>, one key at a time. 
Google Chrome contains a key logger that <a href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/"> sends Google every URL typed in</a>, one key at a time. 
<b>Google Chrome</b> enthält „Tasten-Protokollierer“, der <a href="//www.favbrowser.com/google-chrome-spyware-confirmed/" title="Google Chrome – Spyware? Confirmed?, unter: FavBrowser.com 2008.">Google jede eingegebene URL übermittelt</a>, Taste für Taste. 
106 | [-<a href="#tyrants">Tyrants</a>&mdash;systems-]{+Tyrants are systems+}
| that reject any operating system not &ldquo;authorized&rdquo; by the
| manufacturer. 
Tyrants are systems that reject any operating system not &ldquo;authorized&rdquo; by the manufacturer. 
<a href="#tyrants">Tyrannen</a><br />&#8209;&#160;Systeme, die jedes nicht vom Hersteller „autorisierte“ Betriebssystem zurückweisen. 
107 | {+Motorola, then owned by Google, made+} <a
| href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html">
| [-Some-] Android phones [-made by Google-] {+that+} are tyrants</a>
| (though someone found a way to crack the restriction). [-Fortunately,
| most Android devices are not tyrants.-] 
Motorola, then owned by Google, made <a href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html"> Android phones that are tyrants</a> (though someone found a way to crack the restriction). 
<a href="https://web.archive.org/web/20130512155205/http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html" title="Unlocking the Motorola Bootloader, unter: blog.azimuthsecurity.com 2013 (Internet Archive).">Einige von Google hergestellte Android-Mobilgeräte sind Tyrannen</a> (obwohl jemand ein Weg fand die Restriktion zu <i>‚cracken‘</i>). Glücklicherweise sind die meisten Android-Geräte keine Tyrannen. 
110 || No change detected. The change might only be in amounts of spaces. 
Please see the <a href="/server/standards/README.translations.html">Translations README</a> for information on coordinating and contributing translations of this article. 
Bei der Übersetzung dieses Werkes wurde mit größter Sorgfalt vorgegangen. Trotzdem können Fehler nicht völlig ausgeschlossen werden. Sollten Sie Fehler bemerken oder Vorschläge, Kommentare oder Fragen zu diesem Dokument haben, wenden Sie sich bitte an unser Übersetzungsteam <a href="mailto:web-translators@gnu.org?cc=www-de-translators@gnu.org">&lt;web-translators@gnu.org&gt;</a>.</p>
<p>Weitere Informationen über die Koordinierung und Einsendung von Übersetzungen unserer Internetpräsenz finden Sie in der <a href="/server/standards/README.translations">LIESMICH für Übersetzungen</a>. 
112  
This page is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>. 
Dieses Werk ist lizenziert unter einer <a rel="license" href="//creativecommons.org/licenses/by/4.0/deed.de">Creative Commons Namensnennung 4.0 International</a>-Lizenz.