proprietary-surveillance.de.po

Mismatched links: 430.

Mismatched ids: 1.

#text
8 | {+</a>&nbsp;/+} <a [-href="/proprietary/proprietary.html">Other examples
| of proprietary malware</a>-]
| {+href="/proprietary/proprietary.html">Malware</a>&nbsp;/ By
| type&nbsp;/+} 
</a>&nbsp;/ <a href="/proprietary/proprietary.html">Malware</a>&nbsp;/ By type&nbsp;/ 
<a href="/proprietary/">Weitere Beispiele proprietärer Schadsoftware</a> 
10 | Nonfree (proprietary) software is very often malware (designed to mistreat
| the user). Nonfree software is controlled by its developers, which puts
| them in a position of power over the users; <a
| href="/philosophy/free-software-even-more-important.html">that is the
| basic injustice</a>. The developers {+and manufacturers+} often exercise
| that power to the detriment of the users they ought to serve. 
Nonfree (proprietary) software is very often malware (designed to mistreat the user). Nonfree software is controlled by its developers, which puts them in a position of power over the users; <a href="/philosophy/free-software-even-more-important.html">that is the basic injustice</a>. The developers and manufacturers often exercise that power to the detriment of the users they ought to serve. 
Unfreie (proprietäre) Software entspricht sehr häufig einem Schadprogramm (entworfen, um <ins>unerwünschte und gegebenenfalls schädliche Funktionen auszuführen,</ins> Nutzer also schlecht behandeln). Unfreie Software wird von seinen Entwicklern kontrolliert, welches sie in eine Position der Macht gegenüber Nutzer versetzt. Das ist die <a href="/philosophy/free-software-even-more-important">grundlegende Ungerechtigkeit</a>. Häufig üben Entwickler diese Macht zum Schaden derer aus, denen sie eigentlich dienen sollte. 
15  
A common malicious functionality is to snoop on the user. This page records <strong>clearly established cases of proprietary software that spies on or tracks users</strong>. Manufacturers even refuse to <a href="https://techcrunch.com/2018/10/19/smart-home-devices-hoard-data-government-demands/">say whether they snoop on users for the state</a>. 
 
16  
All appliances and applications that are tethered to a specific server are snoopers by nature. We do not list them here because they have their own page: <a href="/proprietary/proprietary-tethers.html#about-page">Proprietary Tethers</a>. 
 
17  
There is a similar site named <a href="https://spyware.neocities.org">Spyware Watchdog</a> that classifies spyware programs, so that users can be more aware that they are installing spyware. 
 
30 | <a [-href="#SpywareInMobileApps">Spyware-]
| {+href="#SpywareInApplications">Spyware+} in [-Mobile-] Applications</a> 
<a href="#SpywareInApplications">Spyware in Applications</a> 
<a href="#SpywareInMobileApps">… in Anwendungssoftware</a> 
31 | <a [-href="#SpywareInMobileApps">Spyware in Mobile Applications</a>-]
| {+href="#SpywareInDesktopApps">Desktop Apps</a>+} 
<a href="#SpywareInDesktopApps">Desktop Apps</a> 
<a href="#SpywareInMobileApps">… in Anwendungssoftware</a> 
35 | <a [-href="#SpywareInChrome">Spyware-]
| {+href="#SpywareInEquipment">Spyware+} in [-Chrome</a>-] {+Connected
| Equipment</a>+} 
<a href="#SpywareInEquipment">Spyware in Connected Equipment</a> 
<a href="#SpywareInChrome">… in Chrome</a> 
41 | <a [-href="#SpywareOnMobiles">Spyware on Mobiles</a>-]
| {+href="#SpywareOnWearables">Wearables</a>+} 
<a href="#SpywareOnWearables">Wearables</a> 
<a href="#SpywareOnMobiles">Spionageprogramme in Mobilgeräten</a> 
47 | <a [-href="#SpywareInFlash">Spyware in JavaScript and Flash</a>-]
| {+href="#SpywareInJavaScript">JavaScript</a>+} 
<a href="#SpywareInJavaScript">JavaScript</a> 
<a href="#SpywareInFlash">… in JavaScript und Flash</a> 
49 | <a [-href="#SpywareInToys">Spyware-]
| {+href="#SpywareInNetworks">Spyware+} in [-Toys</a>-] {+Networks</a>+} 
<a href="#SpywareInNetworks">Spyware in Networks</a> 
<a href="#SpywareInToys">… in Spielzeug</a> 
51  
For decades, the Free Software movement has been denouncing the abusive surveillance machine of <a href="/proprietary/proprietary.html">proprietary software</a> companies such as <a href="/proprietary/malware-microsoft.html">Microsoft</a> and <a href="/proprietary/malware-apple.html">Apple</a>. In the recent years, this tendency to watch people has spread across industries, not only in the software business, but also in the hardware. Moreover, it also spread dramatically away from the keyboard, in the mobile computing industry, in the office, at home, in transportation systems, and in the classroom. 
Seit Jahrzehnten prangert die Freie-Software-Bewegung die dreiste Überwachungsmaschinerie von Unternehmen wie <a href="/proprietary/malware-microsoft">Microsoft</a> und <a href="/proprietary/malware-apple">Apple</a> an, die <a href="/proprietary/">proprietäre Software</a> entwickeln. In den letzten Jahren hat sich diese Tendenz der Beobachtung über Industrien ausgebreitet, nicht nur in der Softwarebranche, sondern auch in der Hardwarebranche. Darüber hinaus breitete es sich auch dramatisch weit entfernt der Tastatur aus, der <em>Mobile Computing</em><a href="#tn1" id="tn1-ref" class="transnote">[1]</a>-Industrie, im Büro, zu Hause, im Verkehrssysteme und im Klassenzimmer. 
60  
Entries in each category are in reverse chronological order, based on the dates of publication of linked articles. The latest additions are listed on the <a href="/proprietary/proprietary.html#latest">main page</a> of the Malware section. 
 
62  
<span class="anchor-reference-id">(<a href="#OSSpyware">#OSSpyware</a>)</span> 
 
64  
<span class="anchor-reference-id">(<a href="#SpywareInWindows">#SpywareInWindows</a>)</span> 
 
65  
Microsoft is <a href="https://www.howtogeek.com/442609/confirmed-windows-10-setup-now-prevents-local-account-creation/">tricking users to create an account on their network</a> to be able to install and use the Windows operating system, which is malware. The account can be used for surveillance and/or violating people's rights in many ways, such as turning their purchased software to a subscription product. 
 
66  
HP's proprietary operating system <a href="http://www.bbc.com/news/technology-42309371">includes a proprietary keyboard driver with a key logger in it</a>. 
HPs proprietäres Betriebssystem <a href="https://web.archive.org/web/20180112210801/https://www.bbc.com/news/technology-42309371" title="HP laptops found to have hidden keylogger, unter: https://www.bbc.com/news/technology-42309371 BBC 2017 (Internet Archive).">enthält proprietären Tastaturtreiber mit Keylogger</a>. 
69 | The <a
| href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level">
| &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers
| to access, among other things, registry keys <a
| [-href="https://technet.microsoft.com/en-us/library/cc939702.aspx">which-]
| {+href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)">
| which+} can contain sensitive information like administrator's login
| password</a>. 
The <a href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level"> &ldquo;Full&rdquo; telemetry mode</a> allows Microsoft Windows engineers to access, among other things, registry keys <a href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc939702(v=technet.10)"> which can contain sensitive information like administrator's login password</a>. 
<a href="https://docs.microsoft.com/de-de/windows/privacy/configure-windows-diagnostic-data-in-your-organization#stufe-vollständig">Telemetrie-Stufe „Vollständig“</a> ermöglicht Microsoft Windows-Ingenieuren unter anderem Zugriff auf Registrierungsschlüssel, <a href="https://technet.microsoft.com/de-de/library/cc939702.aspx">die vertrauliche Informationen wie das Administrator-Anmeldekennwort enthalten können</a>. 
71  
By default, Windows 10 <a href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties">sends debugging information to Microsoft, including core dumps</a>. Microsoft now distributes them to another company. 
Windows 10 sendet standardmäßig <a href="//betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties">Debugging-Informationen an Microsoft, einschließlich Core Dumps</a>. Microsoft vermarktet diese nun an andere Unternehmen. 
74  
It appears <a href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/"> Windows 10 sends data to Microsoft about what applications are running</a>. 
<a href="https://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/" title="Microsoft may be collecting more data than initially thought, unter: https://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/ 2016.">Windows 10 sendet scheinbar Daten über ausgeführte Anwendungen</a>. 
76 | A downgrade to Windows 10 deleted surveillance-detection applications.
| Then another downgrade inserted a general spying program. Users noticed
| this and complained, so Microsoft renamed it <a
| [-href="http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/">to-]
| {+href="https://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/">
| to+} give users the impression it was gone</a>. 
A downgrade to Windows 10 deleted surveillance-detection applications. Then another downgrade inserted a general spying program. Users noticed this and complained, so Microsoft renamed it <a href="https://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/"> to give users the impression it was gone</a>. 
Ein „Rückrüsten“ auf Windows 10 löschte die für Sicherheitsüberwachung zuständige Anwendungen. Daraufhin führte ein anderes Downgrade abermals ein allgemeines Spionageorogramm ein. Benutzer bemerkten dies jedoch und klagten, woraufhin Microsoft es umbenannte, <a href="//www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/" title="Andrew Orlowski, Sneaky Microsoft renamed its data slurper before sticking it back in Windows 10, The Register 2015.">um bei Benutzern den Eindruck zu erwecken, es sei weg</a>. 
78 | <a
| [-href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">-]
| {+href="https://web.archive.org/web/20150905163414/http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">+}
| Intel devices will be able to listen for speech all the time, even when
| &ldquo;off.&rdquo;</a> 
<a href="https://web.archive.org/web/20150905163414/http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"> Intel devices will be able to listen for speech all the time, even when &ldquo;off.&rdquo;</a> 
<a href="//www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping" title="Mike Lowe, Cortana is always listening with new Wake-On-Voice tech, even when Windows 10 is sleeping">Geräte von Intel werden selbst bei „ausgeschalteten“ Zustand in der Lage sein, die ganze Zeit der Sprache, sprich der Umgebung, zu lauschen</a>. 
79  
<a href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"> Windows 10 sends identifiable information to Microsoft</a>, even if a user turns off its Bing search and Cortana features, and activates the privacy-protection settings. 
<a href="//arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/" title="Even when told not to, Windows 10 just can’t stop talking to Microsoft, unter: arstechnica.com 2015.">Windows 10 sendet identifizierbare Daten an Microsoft</a>, selbst wenn seine Bing-Suche und besondere Cortana-Eigenschaften deaktiviert und „Schutz für die Privatsphäre“-Einstellungen aktiviert sind. 
80 | Windows 10 <a
| [-href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">-]
| {+href="https://web.archive.org/web/20180923125732/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">+}
| ships with default settings that show no regard for the privacy of its
| users</a>, giving Microsoft the &ldquo;right&rdquo; to snoop on the users'
| files, text input, voice input, location info, contacts, calendar records
| and web browsing history, as well as automatically connecting the machines
| to open hotspots and showing targeted ads. 
Windows 10 <a href="https://web.archive.org/web/20180923125732/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"> ships with default settings that show no regard for the privacy of its users</a>, giving Microsoft the &ldquo;right&rdquo; to snoop on the users' files, text input, voice input, location info, contacts, calendar records and web browsing history, as well as automatically connecting the machines to open hotspots and showing targeted ads. 
Windows 10 wird <a href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">mit Standardeinstellungen ausgeliefert, die keinerlei Rücksicht auf die Privatsphäre seiner Nutzerinnen und Nutzer nimmt</a>, was Microsoft das „Recht“ gibt Nutzer-Dateien, Text- und Spracheingaben, Ortsangaben, Kontakte, Termine und den Internetverlauf auszuschnüffeln sowie Rechner automatisch mit offenen Hotspots zu verbinden und personenbezogene Werbung einzublenden. 
82 | Microsoft uses Windows 10's &ldquo;privacy policy&rdquo; to overtly impose
| a &ldquo;right&rdquo; to look at users' files at any time. Windows 10 full
| disk encryption <a
| [-href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/">-]
| {+href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/">+}
| gives Microsoft a key</a>. 
Microsoft uses Windows 10's &ldquo;privacy policy&rdquo; to overtly impose a &ldquo;right&rdquo; to look at users' files at any time. Windows 10 full disk encryption <a href="https://edri.org/our-work/microsofts-new-small-print-how-your-personal-data-abused/"> gives Microsoft a key</a>. 
Microsoft verwendet Windows 10 „Datenschutzerklärung“ um unverhohlen ein „Recht“ aufzuerlegen, jederzeit Nutzerdaten ausspähen zu können. Die Windows-10-Festplattenverschlüsselung <a href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/" title="Microsoft’s new small print – how your personal data is (ab)used, unter: edri.org 2015.">übergibt Microsoft dafür eigens einen Schlüssel</a>. 
86 This is a preview version, no final: not suited for productive application 
It only gets worse with time. <a href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html"> Windows 10 requires users to give permission for total snooping</a>, including their files, their commands, their text input, and their voice input. 
Es wird immer schlimmer: <a href="//www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html" title="Microsoft’s Windows 10 has permission to spy on you, unter: techworm.net 2014.">Windows 10 verlangt die Erlaubnis zum totalen Ausschnüffeln</a>, einschließlich sämtlicher Dateien, der Befehlssätze sowie der Text- und Spracheingaben. 
88 | Spyware in {+older versions of+} Windows: <a
| href="http{+s+}://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
| Windows Update snoops on the [-user.</a>-] {+user</a>.+} <a
| [-href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">-]
| {+href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">+}
| Windows 8.1 snoops on local searches[-.-]</a>. And there's a <a
| href="http://www.marketoracle.co.uk/Article40836.html">{+ +}secret NSA
| key in Windows</a>, whose functions we don't know. 
Spyware in older versions of Windows: <a href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/"> Windows Update snoops on the user</a>. <a href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"> Windows 8.1 snoops on local searches</a>. And there's a <a href="http://www.marketoracle.co.uk/Article40836.html"> secret NSA key in Windows</a>, whose functions we don't know. 
Spionageprogramme in Windows: <a href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/" title="Windows Update keeps tabs on all system software, unter: theregister.co.uk 2003.">Windows Update spioniert Nutzer aus</a>; <a href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175" title="A look at the black underbelly of Windows 8.1 'Blue', unter: infoworld.com 2013.">Windows 8.1 schnüffelt in lokaler Suche herum</a>; und es gibt einen <a href="http://www.marketoracle.co.uk/Article40836.html" title="NSA Built Back Door In All Microsoft Windows Software Since 1999, unter: marketoracle.co.uk 2013.">geheimen NSA-Schlüssel in Windows</a>, dessen Funktionen wir nicht kennen. 
89  
Microsoft's snooping on users did not start with Windows 10. There's a lot more <a href="/proprietary/malware-microsoft.html"> Microsoft malware</a>. 
Microsofts ausspionieren von Nutzern fing nicht erst mit Windows 10 an. Es gibt noch eine Menge mehr <a href="/proprietary/malware-microsoft" title="Microsofts Software ist Schadsoftware, unter: gnu.org 2014 ff.">Schadprogramme von Microsoft</a>. 
91  
<span class="anchor-reference-id">(<a href="#SpywareInMacOS">#SpywareInMacOS</a>)</span> 
 
92  
Apple has <a href="https://sneak.berlin/20201112/your-computer-isnt-yours">implemented a malware in its computers that imposes surveillance</a> on users and reports users' computing to Apple. 
 
94  
Adware Doctor, an ad blocker for MacOS, <a href="https://www.vice.com/en/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports the user's browsing history</a>. 
 
95 (" ") unnecessary inconvenience!!!#. type: Content of: <ul><li><p> 
Apple has made various <a href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"> MacOS programs send files to Apple servers without asking permission</a>. This exposes the files to Big Brother and perhaps to other snoops. 
Apple hat verschiedenen <a href="//www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud" title="Apple users raise privacy concerns after hard-drive files uploaded to servers, unter: theguardian.com 2014.">Mac OS-Programmen Dateien an Apple-Server ohne vorherige Zustimmung senden lassen</a>. Das setzt die Dateien dem Großen Bruder und vielleicht anderen Schnüffeleien aus. 
97 | [-<a
| href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">-]MacOS
| automatically {+<a
| href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">+}
| sends to Apple servers unsaved documents being edited</a>. The [-<a
| href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/">-]
| things you have not decided to save are {+<a
| href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/">+}
| even more [-sensitive-] {+sensitive</a>+} than the things you have stored
| in [-files</a>.-] {+files.+} 
MacOS automatically <a href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"> sends to Apple servers unsaved documents being edited</a>. The things you have not decided to save are <a href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/"> even more sensitive</a> than the things you have stored in files. 
<a href="//www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/" title="How one man’s private files ended up on Apple’s iCloud without his consent, unter: washingtonpost.com 2014."> <em>Ungespeicherte</em> [iCloud-Apps-]Dokumente automatisch in iCloud gespeichert.</a> Die <a href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter" title="Apple Copies Your Files Without Your Knowledge or Consent, unter: schneier.com 2014.">Dinge, bei denen man sich entschieden hat sie nicht zu speichern, sind noch heikler als die Dinge, die man in Dateien gespeichert hat</a>. 
98  
Apple admits the <a href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/"> spying in a search facility</a>, but there's a lot <a href="https://github.com/fix-macosx/yosemite-phone-home"> more snooping that Apple has not talked about</a>. 
Apple räumt die <a href="//www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/" title="Spotlight Suggestions in OS X Yosemite and iOS: Are You Staying Private?, unter: intego.com 2014.">Bespitzelung von Suchmöglichkeiten</a> ein, aber es gibt noch viel <a href="https://github.com/fix-macosx/yosemite-phone-home" title="fix-macosx/yosemite-phone-home, unter: github.com 2014.">mehr unerwähnte Schnüffelei</a>. 
99  
Various operations in <a href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"> the latest MacOS send reports to Apple</a> servers. 
Safari und Spotlight <a href="//lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540" title="Safari and Spotlight Can Send Data to Apple, Here's How to Turn it Off. unter: lifehacker.com 2014.">senden Berichte an Apple</a>-Server. 
100  
<a href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"> Spotlight search</a> sends users' search terms to Apple. 
<a href="//finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html" title="Privacy advocates worry over new Apple iPhone tracking feature, unter: finance.yahoo.com 2014.">Spotlight-Suche</a> sendet Suchbegriffe der Nutzer an Apple. 
101  
There's a lot more <a href="#SpywareIniThings">iThing spyware</a>, and <a href="/proprietary/malware-apple.html">Apple malware</a>. 
Es gibt noch viel mehr Beispiele für <a href="#SpywareIniThings">Spionagesoftware in iDingern</a> und <a href="/proprietary/malware-apple">Schadsoftware von Apple</a>. 
102 | [-<a href="#SpywareAtLowLevel">Spyware at Low Level</a>-]{+<span
| id="SpywareAtLowLevel"></span>+} 
<span id="SpywareAtLowLevel"></span> 
<a href="#SpywareAtLowLevel">Spionageprogramme auf niedrigem Niveau</a> 
104  
<span class="anchor-reference-id">(<a href="#SpywareInBIOS">#SpywareInBIOS</a>)</span> 
 
105 | <a
| [-href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">-]
| {+href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">+}
| Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
| installs. Note that the specific sabotage method Lenovo used did not
| affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not
| really clean since <a
| href="/proprietary/malware-microsoft.html">Microsoft puts in its own
| malware</a>. 
<a href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"> Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows installs. Note that the specific sabotage method Lenovo used did not affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean since <a href="/proprietary/malware-microsoft.html">Microsoft puts in its own malware</a>. 
<a href="https://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html" title="Lenovo collects usage data on ThinkPad, ThinkCentre and ThinkStation PCs, unter: computerworld.com 2015.">Lenovo installiert(e) heimlich <i>unerwünschte vorinstallierte Software</i> („Crapware“) via BIOS</a> auf Windows-Installationen. <em>Beachten Sie</em>, dass diese konkrete von Lenovo verwendete <strong>Sabotage-Methode keinerlei Einfluss auf GNU-Systeme</strong> (mit Linux-Kern) hatte; auch ist eine „saubere“ Windows-Installation nicht wirklich sauber, da <a href="/proprietary/malware-microsoft">Microsoft eigene Schadprogramme einbaut</a>. 
107  
<span class="anchor-reference-id">(<a href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span> 
 
109  
<span class="anchor-reference-id">(<a href="#SpywareInTelephones">#SpywareInTelephones</a>)</span> 
 
110  
<a href="https://www.elsalvador.com/eldiariodehoy/app-chivo-bitcoin-pone-en-riesgo-datos-personales-de-usuarios/852310/2021/">El Salvador Dictatorship's Chivo wallet is spyware</a>, it's a proprietary program that breaks users' freedom and spies on people; demands personal data such as the national ID number and does face recognition, and it is bad security for its data. It also asks for almost every malware permission in people's smartphones. 
 
111  
The article criticizes it for faults in &ldquo;data protection&rdquo;, though <a href="/philosophy/surveillance-vs-democracy.html">&ldquo;data protection&rdquo; is the wrong approach to privacy anyway</a>. 
 
112  
<a href="https://www.theguardian.com/technology/2021/jun/17/nine-out-of-10-health-apps-harvest-user-data-global-study-shows">Almost all proprietary health apps harvest users' data</a>, including sensitive health information, tracking identifiers, and cookies to track user activities. Some of these applications are tracking users across different platforms. 
 
113  
The proprietary program Clubhouse is malware and a privacy disaster. Clubhouse <a href="https://www.theguardian.com/commentisfree/2021/feb/20/why-hot-new-social-app-clubhouse-spells-nothing-but-trouble">collects people's personal data such as recordings of people's conversations</a>, and, as a secondary problem, does not encrypt them, which shows a bad security part of the issue. 
 
116  
As of 2021, WhatsApp (one of Facebook's subsidiaries) is <a href="https://www.forbes.com/sites/carlypage/2021/01/08/whatsapp-tells-users-share-your-data-with-facebook-or-well-deactivate-your-account/">forcing its users to hand over sensitive personal data</a> to its parent company. This increases Facebook's power over users, and further jeopardizes people's privacy and security. 
 
117  
Instead of WhatsApp you can use <a href="https://directory.fsf.org/wiki/Jami">GNU Jami</a>, which is free software and will not collect your data. 
 
118  
Most apps are malware, but Trump's campaign app, like Modi's campaign app, is <a href="https://www.technologyreview.com/2020/06/21/1004228/trumps-data-hungry-invasive-app-is-a-voter-surveillance-tool-of-extraordinary-scope/"> especially nasty malware, helping companies snoop on users as well as snooping on them itself</a>. 
 
120  
Tiny Lab Productions, along with online ad businesses run by Google, Twitter and three other companies are facing a lawsuit <a href="https://www.nytimes.com/interactive/2018/09/12/technology/kids-apps-data-privacy-google-twitter.html">for violating people's privacy by collecting their data from mobile games and handing over these data to other companies/advertisers</a>. 
 
121  
The natural extension of monitoring people through &ldquo;their&rdquo; phones is <a href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"> proprietary software to make sure they can't &ldquo;fool&rdquo; the monitoring</a>. 
Der natürliche verlängerte Arm der Überwachung der Menschen mittels „ihrer” Smartphones ist <a href="//www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html" title="Marla Paul, You Can’t Fool This Activity Tracker, Northwestern University 2016.">proprietäre Software, um sicherstellen zu können, dass sie die Überwachung nicht „austricksen“</a>. 
122  
According to Edward Snowden, <a href="http://www.bbc.com/news/uk-34444233">agencies can take over smartphones</a> by sending hidden text messages which enable them to turn the phones on and off, listen to the microphone, retrieve geo-location data from the GPS, take photographs, read text messages, read call, location and web browsing history, and read the contact list. This malware is designed to disguise itself from investigation. 
<a href="//www.bbc.com/news/uk-34444233">Behörden können Smartphones per versteckter Textnachrichten übernehmen</a>, wodurch diese ein- bzw. ausgeschaltet, das Mikrofon abgehört, Geo-Positionsdaten via GPS abgerufen, fotografiert, SMS-Nachrichten, Telefonate, Positions- und Webbrowser-Verläufe und die Kontakte ausgelesen werden können, so Edward Snowden. Dieses Schadprogramm ist so entworfen, bei Untersuchungen etwas völlig anderes vorzugaukeln. 
123 | <a
| [-href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">-]
| {+href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">+}
| The NSA can tap data in smart phones, including iPhones, Android, and
| BlackBerry</a>. While there is not much detail here, it seems that this
| does not operate via the universal back door that we know nearly all
| portable phones have. It may involve exploiting various bugs. There are
| <a
| href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
| lots of bugs in the phones' radio software</a>. 
<a href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"> The NSA can tap data in smart phones, including iPhones, Android, and BlackBerry</a>. While there is not much detail here, it seems that this does not operate via the universal back door that we know nearly all portable phones have. It may involve exploiting various bugs. There are <a href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"> lots of bugs in the phones' radio software</a>. 
<a href="//www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">Der US-Geheimdienst NSA kann sich Zugang zu iPhone- und BlackBerry-Geräten sowie zu Geräten mit Android-Betriebssystem verschaffen</a>. Es gibt zwar kaum Details, es scheint aber, dass dies nicht über die universelle Hintertür funktioniert, von der wir wissen, dass sie nahezu alle tragbaren Telefone haben. Dies kann verschiedene ausnutzbare Programmfehler einschließen. Es gibt viele <a href="//www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">Programmfehler in der Mobilfunksoftware von Mobiltelefonen</a>. 
124 | Portable phones with GPS {+<a
| href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">+}
| will send their GPS location on remote command{+,+} and users cannot stop
| [-them: <a
| href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
| http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.-]
| {+them</a>.+} (The US says it will eventually require all new portable
| phones to have GPS.) 
Portable phones with GPS <a href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"> will send their GPS location on remote command, and users cannot stop them</a>. (The US says it will eventually require all new portable phones to have GPS.) 
Smartphones mit GPS senden per Remotebefehl ihren GPS-Standort und Nutzer können dies nicht unterbinden: <a href="//www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers" title="How the Government Is Tracking Your Movements, unter: aclu.org 2014.">Wie die Regierung Ihre Bewegungen verfolgt</a> (die USA sagen, sie würden letzten Endes verlangen, dass alle neuen mobilen Telefone GPS haben). 
126  
<span class="anchor-reference-id">(<a href="#SpywareIniThings">#SpywareIniThings</a>)</span> 
 
127  
<a href="https://www.cpomagazine.com/data-privacy/icloud-data-turned-over-to-chinese-government-conflicts-with-apples-privacy-first-focus/">Apple is moving its Chinese customers' iCloud data to a datacenter controlled by the Chinese government</a>. Apple is already storing the encryption keys on these servers, obeying Chinese authority, making all Chinese user data available to the government. 
 
128  
Facebook <a href="https://www.dailymail.co.uk/news/article-8747541/Facebook-accused-watching-Instagram-users-mobile-cameras.html">snoops on Instagram</a> users by surreptitously turning on the device's camera. 
 
129  
Apple whistleblower Thomas Le Bonniec reports that Apple made a practice of surreptitiously activating the Siri software to <a href="https://www.politico.eu/wp-content/uploads/2020/05/Public-Statement-Siri-recordings-TLB.pdf"> record users' conversations when they had not activated Siri</a>. This was not just occasional, it was systematic practice. 
 
132  
Safari occasionally <a href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/"> sends browsing data from Apple devices in China to the Tencent Safe Browsing service</a>, to check URLs that possibly correspond to &ldquo;fraudulent&rdquo; websites. Since Tencent collaborates with the Chinese government, its Safe Browsing black list most certainly contains the websites of political opponents. By linking the requests originating from single IP addresses, the government can identify dissenters in China and Hong Kong, thus endangering their lives. 
 
133  
In spite of Apple's supposed commitment to privacy, iPhone apps contain trackers that are busy at night <a href="https://www.oregonlive.com/opinion/2019/05/its-3-am-do-you-know-who-your-iphone-is-talking-to.html"> sending users' personal information to third parties</a>. 
 
142  
(From <a href="https://www.apple.com/icloud/photos/">Apple's iCloud information</a> as accessed on 24 Sep 2015.) The iCloud feature is <a href="https://support.apple.com/en-us/HT202033">activated by the startup of iOS</a>. The term &ldquo;cloud&rdquo; means &ldquo;please don't ask where.&rdquo; 
Quelle: <a href="https://www.apple.com/de/icloud/photos/">Apple – iCloud – Fotos:</a>, unter: https://www.apple.com/de/icloud/photos. (abgerufen: 2015-09-24)<br />Das iCloud-Feature wird <a href="https://support.apple.com/en-us/HT202033">beim Startvorgang von iOS aktiviert</a>. Der Begriff <em>„Cloud“</em> bzw. <em>„Datenwolke“</em> bedeutet soviel wie <em>‚Bitte stell’ keine Fragen wo <ins>(meine Daten gespeichert und verarbeitet werden)</ins>‘</em>. 
143  
There is a way to <a href="https://support.apple.com/en-us/HT201104"> deactivate iCloud</a>, but it's active by default so it still counts as a surveillance functionality. 
Es gibt eine Möglichkeit, <a href="https://support.apple.com/de-de/HT201104" title="Häufig gestellte Fragen zu iCloud Drive, unter: https://support.apple.com/de-de/HT201104">iCloud deaktivieren</a> zu können, sie ist jedoch standardmäßig aktiviert, so dass sie noch immer als Überwachungsfunktion gewertet wird. 
145  
Apple can, and regularly does, <a href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"> remotely extract some data from iPhones for the state</a>. 
Apple kann <a href="//arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/" title="New guidelines outline what iPhone data Apple can give to police, unter: arstechnica.com 2014.">aus der Ferne irgendwelche Daten von iPhones für Vater Staat anzapfen</a>&#160;&#8209;&#160;und macht es regelmäßig. 
146 | This may have improved with <a
| [-href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">-]
| {+href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">+}
| iOS 8 security improvements</a>; but <a
| href="https://firstlook.org/theintercept/2014/09/22/apple-data/"> not as
| much as Apple claims</a>. 
This may have improved with <a href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/"> iOS 8 security improvements</a>; but <a href="https://firstlook.org/theintercept/2014/09/22/apple-data/"> not as much as Apple claims</a>. 
Dies mag sich mit den jüngsten <a href="//www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html" title="Apple will no longer unlock most iPhones, iPads for police, even with search warrants, unter: washingtonpost.com 2014.">iOS 8-Sicherheitsverbesserungen</a> gebessert haben, allerdings <a href="https://firstlook.org/theintercept/2014/09/22/apple-data/" title="Apple Still Has Plenty of Your Data for the Feds, unter: firstlook.org 2014.">nicht so sehr wie es Apple behauptet</a>. 
147  
<a href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"> Several &ldquo;features&rdquo; of iOS seem to exist for no possible purpose other than surveillance</a>. Here is the <a href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"> Technical presentation</a>. 
<a href="//www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services" title="iPhone 'backdoors' can be used for surveillance, warns researcher, unter: theguardian.com 2014.">Einige „Merkmale“ von iOS scheinen aus keinem anderen Zweck außer der Überwachung vorhanden zu sein</a>. Hier eine technische <a href="//www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf" type="application/pdf" title="Jonathan Zdziarski, Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices, unter: pentest.com 2014.">Präsentation</a>. 
148  
The <a class="not-a-duplicate" href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"> iBeacon</a> lets stores determine exactly where the iThing is, and get other info too. 
<a href="//finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html" title="Privacy advocates worry over new Apple iPhone tracking feature, unter: finance.yahoo.com 2014." class="not-a-duplicate">iBeacon</a> lässt Filialen genau bestimmen, wo sich ein iDing befindet und holt sich natürlich auch andere Informationen. 
149 | <a
| href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
| Either Apple helps the NSA snoop on all the data in an iThing, or it is
| totally [-incompetent.</a>-] {+incompetent</a>.+} 
<a href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"> Either Apple helps the NSA snoop on all the data in an iThing, or it is totally incompetent</a>. 
<a href="//www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep" title="How The NSA Hacks Your iPhone (Presenting DROPOUT JEEP), unter: zerohedge.com 2013.">Apple hilft der NSA entweder in all den Daten in einem iDing herumzuschnüffeln</a> oder ist völlig unfähig.<a href="#tn02" id="tn02-ref" class="transnote">[2]</a><a href="#tn03" id="tn03-ref" class="transnote">[3]</a><a href="#tn04" id="tn04-ref" class="transnote">[4]</a> 
150 | The iThing also <a
| href="http{+s+}://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
| tells Apple its geolocation</a> by default, though that can be turned off. 
The iThing also <a href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"> tells Apple its geolocation</a> by default, though that can be turned off. 
Das iDing <ins>erhebt Bewegungsprofile und</ins> teilt Apple standardmäßig die <a href="//www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/" title="Apple: Of course we stalk your EVERY move. iOS 7 has a new map to prove it, unter: theregister.co.uk 2013.">genaue Ortung</a> mit&#160;&#8209;&#160;aber das kann abgeschaltet werden. 
151  
There is also a feature for web sites to track users, which is <a href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"> enabled by default</a>. (That article talks about iOS 6, but it is still true in iOS 7.) 
Ebenfalls ist eine Eigenschaft für Internetpräsenzen enthalten, die <a href="//nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/" title="Apple resumes User Tracking with iOS 6. Here's how to disable it, unter: nakedsecurity.sophos.com 2012.">Nutzer standardmäßig aktiv verfolgt</a> (in dem Artikel geht es um iOS 6, er trifft aber auch auf iOS 7 zu). 
154  
<span class="anchor-reference-id">(<a href="#SpywareInAndroid">#SpywareInAndroid</a>)</span> 
 
155  
Baidu apps were <a href="https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/"> caught collecting sensitive personal data</a> that can be used for lifetime tracking of users, and putting them in danger. More than 1.4 billion people worldwide are affected by these proprietary apps, and users' privacy is jeopardized by this surveillance tool. Data collected by Baidu may be handed over to the Chinese government, possibly putting Chinese people in danger. 
 
156  
Samsung is forcing its smartphone users in Hong Kong (and Macau) <a href="https://blog.headuck.com/2020/10/12/samsung-phones-force-mainland-china-dns-service-upon-hong-kong-wifi-users/">to use a public DNS in Mainland China</a>, using software update released in September 2020, which causes many unease and privacy concerns. 
 
157  
Xiaomi phones <a href="https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use/">report many actions the user takes</a>: starting an app, looking at a folder, visiting a website, listening to a song. They send device identifying information too. 
 
158  
Other nonfree programs snoop too. For instance, Spotify and other streaming dis-services make a dossier about each user, and <a href="/malware/proprietary-surveillance.html#M201508210"> they make users identify themselves to pay</a>. Out, out, damned Spotify! 
 
160  
Facebook's app got &ldquo;consent&rdquo; to <a href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"> upload call logs automatically from Android phones</a> while disguising what the &ldquo;consent&rdquo; was for. 
 
161  
An Android phone was observed to track location even while in airplane mode. It didn't send the location data while in airplane mode. Instead, <a href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"> it saved up the data, and sent them all later</a>. 
 
163  
Some portable phones <a href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are sold with spyware sending lots of data to China</a>. 
Mehrere Mobilgeräte <a href="https://web.archive.org/web/20161116213010///www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html" title="Kryptowire Discovered Mobile Phone Firmware That Transmitted Personally Identifiable Information (PII) Without User Consent Or Disclosure, PRNewswire.com 2016 (Internet Archive).">senden große Datenmengen nach China</a>. 
166  
Samsung phones come with <a href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps that users can't delete</a>, and they send so much data that their transmission is a substantial expense for users. Said transmission, not wanted or requested by the user, clearly must constitute spying of some kind. 
Samsung-Smartphones werden mit <a href="//arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/" title="Samsung sued for loading devices with unremovable crapware (in China), unter: arstechnica.com 2015.">Applikationen, die Nutzer nicht entfernen können</a> vorinstalliert, und sie senden so viel Daten, deren Übermittlung erhebliche Kosten verursacht. Die besagte Übermittlung, nicht vom Nutzer gewollt oder abgefordert, stellt eindeutig eine Art von Ausspionieren dar. 
169 | Spyware is present in some Android devices when they are sold. Some
| Motorola [-phones modify-] {+phones, made when this company was owned by
| Google, use a modified version of+} Android [-to-] {+that+} <a
| href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
| send{+s+} personal data to Motorola</a>. 
Spyware is present in some Android devices when they are sold. Some Motorola phones, made when this company was owned by Google, use a modified version of Android that <a href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"> sends personal data to Motorola</a>. 
In einigen Android-Geräten ist bereits bei Verkauf Software zum Ausspähen vorhanden. In einigen Motorola-Telefonen wurde Android modifiziert um <a href="//www.beneaththewaves.net/Projects/Motorola_Is_Listening.html" title=" Motorola Is Listening, unter: beneaththewaves.net 2013.">persönliche Daten an Motorola</a> zu senden. 
170 | A Motorola phone <a
| [-href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">-]
| {+href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">+}
| listens for voice all the time</a>. 
A Motorola phone <a href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"> listens for voice all the time</a>. 
Ein Motorola-Telefon <a href="//www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/" title="Ryan Whitwam, Motorola’s new X8 ARM chip: Underpinning the always-on future of Android, unter: ITProPortal.com ">lauscht die ganze Zeit der Stimme</a>. 
171  
Google Play intentionally sends app developers <a href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"> the personal details of users that install the app</a>. 
<b>Google Play</b> sendet App-Entwicklern vorsätzlich <a href="//gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116" title="Google Play Store policy raises privacy concerns, unter: gadgets.ndtv.com 2013.">persönliche Details von Nutzern, die die App installieren</a>. 
174 | Some manufacturers add a <a
| href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
| hidden general surveillance package such as Carrier [-IQ.</a>-] {+IQ</a>.+} 
Some manufacturers add a <a href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"> hidden general surveillance package such as Carrier IQ</a>. 
Einige Hersteller fügen ein <a href="//androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/" title="What is Carrier IQ?, unter: androidsecuritytest.com 2011.">verstecktes allgemeines Überwachungspaket wie Carrier IQ</a> hinzu. 
176  
<span class="anchor-reference-id">(<a href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span> 
 
177  
E-books can contain JavaScript code, and <a href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"> sometimes this code snoops on readers</a>. 
E-Bücher können JavaScript-Funktionen enthalten, und <a href="https://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds" title="Men make up their minds about books faster than women, study finds, unter: https://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds The Guardian 2017.">so die Leserschaft bisweilen ausschnüffeln</a>. 
178 | Adobe made &ldquo;Digital Editions,&rdquo; the e-reader used by most US
| libraries, <a
| [-href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">-]
| {+href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">+}
| send lots of data to Adobe</a>. Adobe's &ldquo;excuse&rdquo;: it's needed
| to check DRM! 
Adobe made &ldquo;Digital Editions,&rdquo; the e-reader used by most US libraries, <a href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"> send lots of data to Adobe</a>. Adobe's &ldquo;excuse&rdquo;: it's needed to check DRM! 
<b>Adobe Digital Editions</b>, die von US-Biblioteken meist genutzte Software zum Betrachten von elektronischen Büchern, spitzelt Nutzer aus und <a href="//www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/" title="Adobe Digital Editions 4 Spies on Users - Because of DRM, unter: computerworlduk.com 2014.">sendet viele Daten an Adobe</a>. Adobes „Entschuldigtung“ dafür: es sei zur Überprüfung von DRM erforderlich! 
181 | <span class="anchor-reference-id">(<a
| [-href="#SpywareIniThings">#SpywareIniThings</a>)</span>-]
| {+href="#SpywareInApplications">#SpywareInApplications</a>)</span>+} 
<span class="anchor-reference-id">(<a href="#SpywareInApplications">#SpywareInApplications</a>)</span> 
 
183 | <span class="anchor-reference-id">(<a
| [-href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>-]
| {+href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span>+} 
<span class="anchor-reference-id">(<a href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span> 
 
184  
Microsoft's Office 365 suite enables employers <a href="https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance">to snoop on each employee</a>. After a public outburst, Microsoft stated that <a href="https://www.theguardian.com/technology/2020/dec/02/microsoft-apologises-productivity-score-critics-derided-workplace-surveillance">it would remove this capability</a>. Let's hope so. 
 
185  
Some Avast and AVG extensions for Firefox and Chrome were found to <a href="https://www.itpro.co.uk/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome"> snoop on users' detailed browsing habits</a>. Mozilla and Google removed the problematic extensions from their stores, but this shows once more how unsafe nonfree software can be. Tools that are supposed to protect a proprietary system are, instead, infecting it with additional malware (the system itself being the original malware). 
 
186  
Foundry's graphics software <a href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"> reports information to identify who is running it</a>. The result is often a legal threat demanding a lot of money. 
 
190  
<span class="anchor-reference-id">(<a href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span> 
 
191  
A building in LA, with a supermarket in it, <a href="https://www.latimes.com/business/story/2021-11-09/column-trader-joes-parking-app">demands customers load a particular app to pay for parking in the parking lot</a>, and accept pervasive surveillance. They also have the option of entering their license plate numbers in a kiosk. That is an injustice, too. 
 
192  
<a href="https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/">TikTok apps collect biometric identifiers and biometric information from users' smartphones</a>. The company behind it does whatever it wants and collects whatever data it can. 
 
193  
The <a href="https://www.wired.com/story/weddings-social-media-apps-photos-memories-miscarriage-problem/">WeddingWire app saves people's wedding photos forever and hands over data to others</a>, giving users no control over their personal information/data. The app also sometimes shows old photos and memories to users, without giving them any control over this either. 
 
194  
Many cr&hellip;apps, developed by various companies for various organizations, do <a href="https://www.expressvpn.com/digital-security-lab/investigation-xoth"> location tracking unknown to those companies and those organizations</a>. It's actually some widely used libraries that do the tracking. 
 
196  
The Apple iOS version of Zoom <a href="https://www.vice.com/en/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account">is sending users' data to Facebook</a> even if the user doesn't have a Facebook account. According to the article, Zoom and Facebook don't even mention this surveillance on their privacy policy page, making this an obvious violation of people's privacy even in their own terms. 
 
197  
The Alipay Health Code app estimates whether the user has Covid-19 and <a href="https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html"> tells the cops directly</a>. 
 
198 | The Amazon [-&ldquo;Smart&rdquo; TV-] {+Ring app does+} <a
| [-href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
| snooping all the time</a>.-]
| {+href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report">
| surveillance for other companies as well as for Amazon</a>.+} 
The Amazon Ring app does <a href="https://www.theguardian.com/technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"> surveillance for other companies as well as for Amazon</a>. 
Amazons „intelligentes“ Fernsehen <a href="//www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance" title="Amazon’s Echo and the smart TVs that are listening to and watching everything you do, unter: theguardian.com 2014.">schnüffelt immer aus</a>. 
199  
The ToToc messaging app seems to be a <a href="https://www.nytimes.com/2019/12/22/us/politics/totok-app-uae.html"> spying tool for the government of the United Arab Emirates</a>. Any nonfree program could be doing this, and that is a good reason to use free software instead. 
 
201  
iMonsters and Android phones, when used for work, give employers powerful <a href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy"> snooping and sabotage capabilities</a> if they install their own software on the device. Many employers demand to do this. For the employee, this is simply nonfree software, as fundamentally unjust and as dangerous as any other nonfree software. 
 
202  
The Chinese Communist Party's &ldquo;Study the Great Nation&rdquo; app requires users to grant it <a href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"> access to the phone's microphone, photos, text messages, contacts, and internet history</a>, and the Android version was found to contain a back-door allowing developers to run any code they wish in the users' phone, as &ldquo;superusers.&rdquo; Downloading and using this app is mandatory at some workplaces. 
 
203  
Note: The <a href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html"> Washington Post version of the article</a> (partly obfuscated, but readable after copy-pasting in a text editor) includes a clarification saying that the tests were only performed on the Android version of the app, and that, according to Apple, &ldquo;this kind of &lsquo;superuser&rsquo; surveillance could not be conducted on Apple's operating system.&rdquo; 
 
204  
The Facebook app <a href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/"> tracks users even when it is turned off</a>, after tricking them into giving the app broad permissions in order to use one of its functionalities. 
 
205  
Some nonfree period-tracking apps including MIA Fem and Maya <a href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem"> send intimate details of users' lives to Facebook</a>. 
 
206  
Keeping track of who downloads a proprietary program is a form of surveillance. There is a proprietary program for adjusting a certain telescopic rifle sight. <a href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/"> A US prosecutor has demanded the list of all the 10,000 or more people who have installed it</a>. 
 
208  
Many unscrupulous mobile-app developers keep finding ways to <a href="https://www.cnet.com/tech/mobile/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/"> bypass user's settings</a>, regulations, and privacy-enhancing features of the operating system, in order to gather as much private data as they possibly can. 
 
210  
Many Android apps can track users' movements even when the user says <a href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location"> not to allow them access to locations</a>. 
 
212  
The Femm &ldquo;fertility&rdquo; app is secretly a <a href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners"> tool for propaganda</a> by natalist Christians. It spreads distrust for contraception. 
 
214  
BlizzCon 2019 imposed a <a href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"> requirement to run a proprietary phone app</a> to be allowed into the event. 
 
215  
This app is a spyware that can snoop on a lot of sensitive data, including user's location and contact list, and has <a href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/"> near-complete control</a> over the phone. 
 
216  
Data collected by menstrual and pregnancy monitoring apps is often <a href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"> available to employers and insurance companies</a>. Even though the data is &ldquo;anonymized and aggregated,&rdquo; it can easily be traced back to the woman who uses the app. 
 
217  
This has harmful implications for women's rights to equal employment and freedom to make their own pregnancy choices. Don't use these apps, even if someone offers you a reward to do so. A free-software app that does more or less the same thing without spying on you is available from <a href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a href="https://dcs.megaphone.fm/BLM6228935164.mp3?key=7e4b8f7018d13cdc2b5ea6e5772b6b8f"> a new one is being developed</a>. 
 
218  
Google tracks the movements of Android phones and iPhones running Google apps, and sometimes <a href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"> saves the data for years</a>. 
 
220  
Many Android phones come with a huge number of <a href="https://web.archive.org/web/20190326145122/https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"> preinstalled nonfree apps that have access to sensitive data without users' knowledge</a>. These hidden apps may either call home with the data, or pass it on to user-installed apps that have access to the network but no direct access to the data. This results in massive surveillance on which the user has absolutely no control. 
 
221  
A study of 24 &ldquo;health&rdquo; apps found that 19 of them <a href="https://www.vice.com/en/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"> send sensitive personal data to third parties</a>, which can use it for invasive advertising or discriminating against people in poor medical condition. 
 
223  
Facebook offered a convenient proprietary library for building mobile apps, which also <a href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"> sent personal data to Facebook</a>. Lots of companies built apps that way and released them, apparently not realizing that all the personal data they collected would go to Facebook as well. 
 
225  
The AppCensus database gives information on <a href="https://www.appcensus.mobi"> how Android apps use and misuse users' personal data</a>. As of March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit the <a href="/proprietary/proprietary-surveillance.html#M201812290"> Advertising ID</a> to other companies, and <a href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"> 18,000 (23% of the total) link this ID to hardware identifiers</a>, so that users cannot escape tracking by resetting it. 
 
227  
Many nonfree apps have a surveillance feature for <a href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"> recording all the users' actions</a> in interacting with the app. 
 
228  
Twenty nine &ldquo;beauty camera&rdquo; apps that used to be on Google Play had one or more malicious functionalities, such as <a href="https://www.teleanalysis.com/these-29-beauty-camera-apps-steal-private-photo/"> stealing users' photos</a> instead of &ldquo;beautifying&rdquo; them, pushing unwanted and often malicious ads on users, and redirecting them to phishing sites that stole their credentials. Furthermore, the user interface of most of them was designed to make uninstallation difficult. 
 
230  
An investigation of the 150 most popular gratis VPN apps in Google Play found that <a href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"> 25% fail to protect their users' privacy</a> due to DNS leaks. In addition, 85% feature intrusive permissions or functions in their source code&mdash;often used for invasive advertising&mdash;that could potentially also be used to spy on users. Other technical flaws were found as well. 
 
231  
Moreover, a previous investigation had found that <a href="https://www.top10vpn.com/free-vpn-app-investigation/">half of the top 10 gratis VPN apps have lousy privacy policies</a>. 
 
232  
<small>(It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; These apps are gratis, but they are <em>not</em> <a href="/philosophy/free-sw.html">free software</a>.)</small> 
 
233  
The Weather Channel app <a href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"> stored users' locations to the company's server</a>. The company is being sued, demanding that it notify the users of what it will do with the data. 
 
235  
<a href="https://www.vice.com/en/article/gy77wy/stop-using-third-party-weather-apps"> Other weather apps</a>, including Accuweather and WeatherBug, are tracking people's locations. 
 
236  
Around 40% of gratis Android apps <a href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"> report on the user's actions to Facebook</a>. 
 
239  
Some Android apps <a href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"> track the phones of users that have deleted them</a>. 
 
240  
Some Google apps on Android <a href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"> record the user's location even when users disable &ldquo;location tracking&rdquo;</a>. 
 
252  
Spotify app <a href="https://www.sec.gov/Archives/edgar/data/1639920/000119312518063434/d494294df1.htm">harvests users' data to personally identify and know people</a> through music, their mood, mindset, activities, and tastes. There are over 150 billion events logged daily on the program which contains users' data and personal information. 
 
254 | The Sarahah app <a
| href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
| uploads all phone numbers and email addresses</a> in user's address book
| to developer's server. [-Note that this article misuses the words
| &ldquo;<a href="/philosophy/free-sw.html">free software</a>&rdquo;
| referring to zero price.-] 
The Sarahah app <a href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"> uploads all phone numbers and email addresses</a> in user's address book to developer's server. 
Die App <b>Sarahah</b> <a href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">lädt alle Telefonnummern und E-Mail-Adressen</a> aus Adressbuch des Nutzers an Server des Entwicklers hoch.<br />Hinweis: Dieser Artikel bezieht sich mit Worten „<a href="/philosophy/free-sw.html" xml:lang="en" lang="en">Free Software</a>“ missbräuchlich auf Null-Preis. 
255  
<small>(Note that this article misuses the words &ldquo;<a href="/philosophy/free-sw.html">free software</a>&rdquo; referring to zero price.)</small> 
 
262 | Apps for BART <a
| [-href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop-]
| {+href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
| snoop+} on users</a>. 
Apps for BART <a href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"> snoop on users</a>. 
Apps für <i>Bay Area Rapid Transit</i> (BART), <ins>ein öffentliches Nahverkehrsunternehmen im Gebiet um die Bucht von San Francisco, </ins><a href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/" title="Passengers Say Commuter Rail App Illegally Collects Personal User Data, unter: Consumerist.com 2017.">beschnüffeln Nutzer</a>. 
266 | Faceapp appears to do lots of surveillance, judging by <a
| [-href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">-]
| {+href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">+}
| how much access it demands to personal data in the device</a>. 
Faceapp appears to do lots of surveillance, judging by <a href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"> how much access it demands to personal data in the device</a>. 
<b>Faceapp</b> scheint eine Menge zu überwachen und zu beurteilen, <a href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/" title="Everything that’s wrong with FaceApp, the latest creepy photo app for your face, unter: washingtonpost.com 2017.">wie viel Zugang es auf persönliche Daten im Gerät einfordert</a>. 
267 | Users are suing Bose for <a
| [-href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">-]
| {+href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">+}
| distributing a spyware app for its headphones</a>. Specifically, the app
| would record the names of the audio files users listen to along with the
| headphone's unique serial number. 
Users are suing Bose for <a href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"> distributing a spyware app for its headphones</a>. Specifically, the app would record the names of the audio files users listen to along with the headphone's unique serial number. 
US-Nutzer verklagt Bose:-<a href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/" title="Bose headphones have been spying on customers, lawsuit claims, unter: washingtonpost.com 2017.">App späht offenbar über Kopfhörer aus</a>, welche Musik gerade läuft, welche Hörbücher und Radiosender der Nutzer sich anhört u. a., und leitet die Informationen an Drittanbieter weiter. 
289  
Google's new voice messaging app <a href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs all conversations</a>. 
Googles neue Messaging-App <b>Allo</b> <a href="//www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google" title=", unter: theverge.com 2016.">protokolliert sämtliche Kommunikation</a>. 
290 | Facebook's new Magic Photo app <a
| [-href="http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">scans-]
| {+href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
| scans+} your mobile phone's photo collections for known faces</a>, and
| suggests you [-to share-] {+circulate+} the picture you take according to
| who is in the frame. 
Facebook's new Magic Photo app <a href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"> scans your mobile phone's photo collections for known faces</a>, and suggests you circulate the picture you take according to who is in the frame. 
Facebooks neue Magic Photo-App <a href="//www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">untersucht die Foto-Sammlungen <em>Ihres</em> Mobiltelefons nach bekannten Gesichtern</a> und schlägt das gewählte Bild zu teilen vor, je nach dem wer sich in dem Ausschnitt befindet. 
293 | Facebook's app listens all the time, <a
| [-href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to-]
| {+href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html">to+}
| snoop on what people are listening to or watching</a>. In addition, it may
| be analyzing people's conversations to serve them with targeted
| advertisements. 
Facebook's app listens all the time, <a href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-listen-what-they-re-saying-claims-professor-a7057526.html">to snoop on what people are listening to or watching</a>. In addition, it may be analyzing people's conversations to serve them with targeted advertisements. 
Facebooks App lauscht die ganze Zeit um <a href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">auszuschnüffeln, was man anhört oder -guckt</a>. Darüber hinaus können Konversationen analysiert werden, um gezielte Werbung zu kredenzen. 
294  
A pregnancy test controller application not only can <a href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"> spy on many sorts of data in the phone, and in server accounts, it can alter them too</a>. 
Ein Bluetooth-Schwangerschaftstest- App kann nicht nur viele <a href="//www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security" title="First Response's Bluetooth pregnancy test is intriguing — and a privacy nightmare, unter: TheVerge.com 2016.">Daten im Smartphone und in Server-Konten ausschnüffeln, sondern auch ändern</a>. 
295 | Apps that include <a
| [-href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">-]
| {+href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">+}
| Symphony surveillance software snoop on what radio and TV programs are
| playing nearby</a>. Also on what users post on various sites such as
| Facebook, Google+ and Twitter. 
Apps that include <a href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"> Symphony surveillance software snoop on what radio and TV programs are playing nearby</a>. Also on what users post on various sites such as Facebook, Google+ and Twitter. 
Apps <ins>mit enthaltener <a href="//techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/" title=" Alex Hernandez, Symphony Advanced Media Software Tracks Your Digital Life Through Your Smartphone Mic, Techaeris 2016.">Symphony-Überwachungssoftware schnüffeln in Echtzeit aus</a>, Radio- und Fernsehsendungen oder was auch immer ausgeschnüffelt werden soll</ins>. Auch auf was die Nutzer auf verschiedenen Internetpräsenzen wie Facebook, Google+ und Twitter schreiben. 
296  
&ldquo;Cryptic communication,&rdquo; unrelated to the app's functionality, was <a href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"> found in the 500 most popular gratis Android apps</a>. 
„Kryptische Kommunikation“ ohne Bezug auf die Funktionalität der App <a href="//news.mit.edu/2015/data-transferred-android-apps-hiding-1119" title="Larry Hardesty, What are your apps hiding?, MIT News Office 2015.">in 500 der populärsten kostenlosen Android-Apps gefunden</a>. 
299 | More than 73% {+and 47%+} of [-the most popular-] {+mobile applications,
| for+} Android [-apps-] {+and iOS respectively+} <a
| [-href="http://jots.pub/a/2015103001/index.php">share-]
| {+href="https://techscience.org/a/2015103001/">hand over+} personal,
| behavioral and location information</a> of their users [-with-] {+to+}
| third parties. 
More than 73% and 47% of mobile applications, for Android and iOS respectively <a href="https://techscience.org/a/2015103001/">hand over personal, behavioral and location information</a> of their users to third parties. 
Mehr als 73 % und 47 % der populärsten Android- und iOS-Apps <a href="//jots.pub/a/2015103001/index.php">teilen persönliche sowie Verhaltens- und Positionsinformationem</a> mit Dritten. 
300  
Like most &ldquo;music screaming&rdquo; disservices, Spotify is based on proprietary malware (DRM and snooping). In August 2015 it <a href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"> demanded users submit to increased snooping</a>, and some are starting to realize that it is nasty. 
Wie die meisten „Musik schreienden“ Bärendienste basiert <b>Spotify</b> auf proprietärer Schadsoftware: DRM und Schnüffeln. Im August 2015 wurden <a href="//www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy" title="Spotify's chief executive apologises after user backlash over new privacy policy, unter: www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy 2015.">Nutzer aufgefordert einem Blanko-Brief zum Datenzugriff zuzustimmen</a>, und so manche beginnen zu begreifen, dass es Übel ist. 
301 | This article shows the <a
| href="http{+s+}://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
| twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
| users better</a>&mdash;never mind whether they want that. This is a
| typical example of the attitude of the proprietary software industry
| towards those they have subjugated. 
This article shows the <a href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"> twisted ways that they present snooping as a way to &ldquo;serve&rdquo; users better</a>&mdash;never mind whether they want that. This is a typical example of the attitude of the proprietary software industry towards those they have subjugated. 
Dieser Artikel erläutert die <a href="//www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/" title="Spotify now officially even worse than the NSA, unter: www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/ 2015.">verworrenen Richtungen das Ausspionieren als eine Möglichkeit zu präsentieren, Nutzer besser zu „dienen“</a>&#160;&#8209;&#160;egal, ob sie das wollen. Dies ist ein typisches Beispiel für die Haltung der proprietären Softwareindustrie gegenüber denjenigen, die sie unterjocht haben. 
303 | <a
| [-href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A-]
| {+href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf">
| A+} study in 2015</a> found that 90% of the top-ranked gratis proprietary
| Android apps contained recognizable tracking libraries. For the paid
| proprietary apps, it was only 60%. 
<a href="https://www.cl.cam.ac.uk/~arb33/papers/FerreiraEtAl-Securacy-WiSec2015.pdf"> A study in 2015</a> found that 90% of the top-ranked gratis proprietary Android apps contained recognizable tracking libraries. For the paid proprietary apps, it was only 60%. 
Eine <a href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf" title="Short: A Measurement Study of Tracking in Paid Mobile Applications, unter: http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf 2015." type="application/pdf">Studie aus 2015</a> ergab, dass 90 % der Top-Rankings kostenloser proprietärer Android-Apps erkennbare Tracking-Bibliotheken enthielten. Für die nicht kostenlosen proprietären Apps waren es nur 60 %. 
305 || No change detected. The change might only be in amounts of spaces. 
Gratis Android apps (but not <a href="/philosophy/free-sw.html">free software</a>) connect to 100 <a href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking and advertising</a> URLs, on the average. 
Gratis Android-Anwendungen (die jedoch keine <a href="/philosophy/free-sw">Freie Software</a> darstellen), stellen für <a href="//www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites" title=" Free Android apps connect to thousands of tracking and ad URLs, research shows, unter: theguardian.com 2015.">Verfolgungs- und Werbezwecke</a> durchschnittlich zu mehr als 100 Internetadressen eine Verbindung her. 
308  
Many proprietary apps for mobile devices report which other apps the user has installed. <a href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter is doing this in a way that at least is visible and optional</a>. Not as bad as what the others do. 
Viele proprietäre Applikationen für Mobilgeräte melden, welche anderen Apps vom Nutzer installiert wurden. <a href="//techcrunch.com/2014/11/26/twitter-app-graph/" title="Twitter’s New App Tracking Capabilities To Help Personalize User Experience, Benefit Advertisers, unter: techcrunch.com 2014.">Twitter macht dies auf eine Weise, die zumindest sichtbar und optional ist</a>. Nicht so schlimm wie das, was andere tun. 
309  
The Simeji keyboard is a smartphone version of Baidu's <a href="/proprietary/proprietary-surveillance.html#baidu-ime">spying <abbr title="Input Method Editor">IME</abbr></a>. 
 
310 | The nonfree Snapchat app's principal purpose is to restrict the use of
| data on the user's computer, but it does surveillance too: <a
| href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
| it tries to get the user's list of other people's phone [-numbers.</a>-]
| {+numbers</a>.+} 
The nonfree Snapchat app's principal purpose is to restrict the use of data on the user's computer, but it does surveillance too: <a href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"> it tries to get the user's list of other people's phone numbers</a>. 
Hauptzweck der unfreien <ins>Instant-Messaging</ins>-App <em>Snapchat</em> ist die Datennutzung auf dem Rechner des Nutzers zu beschränken, aber gleichzeitig überwacht sie auch: <a href="//www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers" title="Snapchat users' phone numbers may be exposed to hackers, unter: theguardian.com 2013.">sie versucht an die Telefonnummern anderer Kontakte zu gelangen</a>. 
311 | The Brightest Flashlight app <a
| href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
| sends user data, including geolocation, for use by [-companies.</a>-]
| {+companies</a>.+} 
The Brightest Flashlight app <a href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"> sends user data, including geolocation, for use by companies</a>. 
Die Taschenlampen-App <b>Brightest Flashlight Free</b> hat <a href="//www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers" title="Android torch app with over 50m downloads silently sent user location and device data to advertisers, unter: theguardian.com 2013.">unerlaubt Nutzerdaten sowie Aufenthaltsort gespeichert und an Werbenetzwerke gesendet</a>.<a href="#tn07" id="tn07-ref" class="transnote">[7]</a> 
313  
FTC says most mobile apps for children don't respect privacy: <a href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"> http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>. 
Laut US-Wettbewerbsaufsichtsbehörde FTC respektieren die meisten mobilen Applikationen für Kinder nicht die Privatsphäre: <a href="//arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/" title="FTC: disclosures severely lacking in kids’ mobile apps—and it’s getting worse, unter: arstechnica.com 2012.">Mobile Apps für Kinder: immer noch nicht die Qualität</a>. 
315  
<span class="anchor-reference-id">(<a href="#SpywareInSkype">#SpywareInSkype</a>)</span> 
 
316  
Skype refuses to say whether it can <a href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop on calls</a>. 
 
318 | [-Spyware in Skype:-]{+Skype contains+} <a
| [-href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
| http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.-]
| {+href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.+}
| Microsoft changed Skype <a
| href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
| specifically for spying</a>. 
Skype contains <a href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>. Microsoft changed Skype <a href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"> specifically for spying</a>. 
<a href="//www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/" title="Project Chess: How U.S. Snoops On Your Skype, unter: forbes.com 2013.">Die USA schnüffelt in Ihrem Skype herum</a>. Microsoft änderte Skype <a href="//www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data" title="Microsoft handed the NSA access to encrypted messages, unter: theguardian.com 2013.">eigens für die Bespitzelung</a>. 
320  
<span class="anchor-reference-id">(<a href="#SpywareInGames">#SpywareInGames</a>)</span> 
 
321  
Microsoft is imposing its surveillance on the game of Minecraft by <a href="https://www.theverge.com/2020/10/22/21527647/minecraft-microsoft-account-mojang-java">requiring every player to open an account on Microsoft's network</a>. Microsoft has bought the game and will merge all accounts into its network, which will give them access to people's data. 
 
322  
Minecraft players <a href="https://directory.fsf.org/wiki/Minetest">can play Minetest</a> instead. The essential advantage of Minetest is that it is free software, meaning it respects the user's computer freedom. As a bonus, it offers more options. 
 
323  
Microsoft recorded users of Xboxes and had <a href="https://www.vice.com/en/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana"> human workers listen to the recordings</a>. 
 
325  
Red Shell is a spyware that is found in many proprietary games. It <a href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"> tracks data on users' computers and sends it to third parties</a>. 
 
328 | Many <a
| href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
| video game consoles snoop on their users and report to the
| internet</a>&mdash;[- -]even what their users weigh. 
Many <a href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"> video game consoles snoop on their users and report to the internet</a>&mdash;even what their users weigh. 
Viele <a href="//www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">Videospielkonsolen schnüffeln Nutzer hinterher und Senden alles ins Internet</a>&#160;&#8209;&#160;sogar, was man wiegt. 
330  
Modern gratis game cr&hellip;apps <a href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"> collect a wide range of data about their users and their users' friends and associates</a>. 
Moderne, kostenlose Spiel-Sch…-Apps <a href="//toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/" title="Eli Hodapp, ‚We Own You“ - Confessions of an Anonymous Free to Play Producer, toucharcade.com 2015.">sammeln eine Vielzahl von Daten über ihre Nutzer und deren Freunde und Partner</a>. 
334  
Angry Birds <a href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"> spies for companies, and the NSA takes advantage to spy through it too</a>. Here's information on <a href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"> more spyware apps</a>. 
<b>Angry Birds</b> <a href="//www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html" title="Spy Agencies Tap Data Streaming From Phone Apps, unter: nytimes.com 2014.">spitzelt für Unternehmen, und die NSA profitiert durch deren Bespitzelung ebenfalls</a><a href="#tn2" id="tn2-ref" title="Cookies erforderlich" class="transnote noteClass">[**]</a>. Weitere Informationen zu <a href="//confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html" title="Analysis of What Information Angry Birds Collects, unter: confabulator.blogspot.de 2012.">Spyware-Anwendungen</a>.<a href="#tn05" id="tn05-ref" class="transnote">[5]</a> 
335 | <a
| href="http{+s+}://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
| More about NSA app spying</a>. 
<a href="https://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"> More about NSA app spying</a>. 
<a href="//www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">Mehr zur NSA-App-Spionage</a>. 
336  
Blizzard Warden is a hidden &ldquo;cheating-prevention&rdquo; program that <a href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"> spies on every process running on a gamer's computer and sniffs a good deal of personal data</a>, including lots of activities which have nothing to do with cheating. 
 
338 | <span class="anchor-reference-id">(<a
| [-href="#SpywareInSkype">#SpywareInSkype</a>)</span>-]
| {+href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>+} 
<span class="anchor-reference-id">(<a href="#SpywareInEquipment">#SpywareInEquipment</a>)</span> 
 
339  
Most Internet connected devices in Mozilla's <a href="https://foundation.mozilla.org/en/privacynotincluded">&ldquo;Privacy Not Included&rdquo;</a> list <a href="https://foundation.mozilla.org/privacynotincluded/arlo-video-doorbell">are designed to snoop on users</a> even if they meet Mozilla's &ldquo;Minimum Security Standards.&rdquo; Insecure design of the program running on some of these devices <a href="https://foundation.mozilla.org/privacynotincluded/vibratissimo-panty-buster">makes the user susceptible to be snooped and exploited by crackers as well</a>. 
 
342 | [-It-]{+<small>(It+} is unfortunate that the article uses the term <a
| [-href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.-]
| {+href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;<
| /a>.)</small>+} 
<small>(It is unfortunate that the article uses the term <a href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.)</small> 
Es ist bedauerlich, dass der Artikel den Begriff <a href="/philosophy/words-to-avoid#Monetize">„monetarisieren“</a> verwendet. 
344  
<span class="anchor-reference-id">(<a href="#SpywareInTVSets">#SpywareInTVSets</a>)</span> 
 
346  
TV manufacturers are turning to produce only &ldquo;Smart&rdquo; TV sets (which include spyware) that <a href="https://frame.work/blog/in-defense-of-dumb-tvs">it's now very hard to find a TV that doesn't spy on you</a>. 
 
348  
TV manufacturers are able to <a href="https://www.zdnet.com/article/fbi-warns-about-snoopy-smart-tvs-spying-on-you/">snoop every second of what the user is watching</a>. This is illegal due to the Video Privacy Protection Act of 1988, but they're circumventing it through EULAs. 
 
349  
Vizio TVs <a href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"> collect &ldquo;whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and this data is sold to third parties. This is in return for &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly lower retail prices. 
 
352 | Some &ldquo;Smart&rdquo; TVs automatically <a
| [-href="https://news.ycombinator.com/item?id=16727319">load-]
| {+href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
| load+} downgrades that install a surveillance app</a>. 
Some &ldquo;Smart&rdquo; TVs automatically <a href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"> load downgrades that install a surveillance app</a>. 
Einige „kluge“ TV-Geräte <a href="https://news.ycombinator.com/item?id=16727319" title="My Sony “smart” TV has updated itself and tried to force me to use a new app, Guidelines 2018.">laden automatisch Downgrades herunter, die eine Überwachungs-App installieren</a>. 
355  
Some web and TV advertisements play inaudible sounds to be picked up by proprietary malware running on other devices in range so as to determine that they are nearby. Once your Internet devices are paired with your TV, advertisers can correlate ads with Web activity, and other <a href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"> cross-device tracking</a>. 
Einige Internet- und TV-Spots spielen von auf in Reichweite befindlichen anderen Geräten laufender proprietärer Schadsoftware aufgreifbare unhörbare Töne ab, um bestimmen zu können, dass sie sich in der Nähe befinden. Sobald Ihre internetfähigen Geräte mit Ihrem Fernsehgerät] verbunden sind, können Werbetreibende Anzeigen mit Netzaktivität und anderen <a href="//arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/" title="Dan Goodin, Beware of ads that use inaudible sound to link your phone, TV, tablet, and PC, Ars Technica 2015.">geräteübergreifenden Verfolgen korrelieren</a>. 
356 | Vizio goes a step further than other TV manufacturers in spying on their
| users: their <a
| href="http{+s+}://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
| &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and link
| them your IP address</a> so that advertisers can track you across devices. 
Vizio goes a step further than other TV manufacturers in spying on their users: their <a href="https://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"> &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and link them your IP address</a> so that advertisers can track you across devices. 
Vizio geht in puncto Spionage seiner Nutzer sogar noch einen Schritt weiter als andere Fernsehhersteller: ihre <a href="//www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">„smart“ TVs analysieren detailliert Sehgewohnheiten und verknüpfen diese mit der IP-Adresse</a>, damit Werbetreibende einen über die Geräte verfolgen können. 
358 | Tivo's alliance with Viacom adds 2.3 million households to the 600
| millions social media profiles the company already monitors. Tivo
| customers are unaware they're being watched by advertisers. By combining
| TV viewing information with online social media participation, Tivo can
| now <a
| href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">{+
| +}correlate TV advertisement with online purchases</a>, exposing all users
| to new combined surveillance by default. 
Tivo's alliance with Viacom adds 2.3 million households to the 600 millions social media profiles the company already monitors. Tivo customers are unaware they're being watched by advertisers. By combining TV viewing information with online social media participation, Tivo can now <a href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"> correlate TV advertisement with online purchases</a>, exposing all users to new combined surveillance by default. 
Das Bündnis des <ins>US-Herstellers von digitalen Videorekordern</ins> Tivo mit dem US-Medienkonzern Viacom führt 2,3 Millionen Haushalte zu den 600 Millionen sozialen Medien-Profilen, die das Unternehmen bereits überwacht, hinzu. TiVo-Kunden sind sich dessen nicht bewusst, dass sie von Werbetreibenden beobachtet werden. Durch Verbinden von Informationen über das Fernsehverhalten mit Online-Social-Media-Beteiligung kann Tivo jetzt <a href="//www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102" title="Lisa Richwine, Viacom, TiVo partner to give TV advertisers more data, Thomson Reuters 2015.">TV-Werbung mit Online-Käufen korrelieren</a> und standardmäßig alle Nutzer neuer gemeinsamer Überwachung aussetzen. 
359  
Vizio &ldquo;smart&rdquo; TVs recognize and <a href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what people are watching</a>, even if it isn't a TV channel. 
Vizio<ins>, ein amerikanisches, nicht börsennotiertes Unternehmen im Bereich Unterhaltungselektronik,</ins> „smarte“ Fernsehgeräte identifizieren und <a href="//www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/" title="Richard Lawler, Vizio IPO plan shows how its TVs track what you're watching, unter: engadget.com 2015.">zeichnen alles auf was man anguckt</a>, selbst wenn es sich nicht um ein Fernsehprogramm handelt. 
360 | [-<a
| href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon-]{+Verizon+}
| cable TV {+<a
| href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">+}
| snoops on what programs people watch, and even what they wanted to
| [-record.</a>-] {+record</a>.+} 
Verizon cable TV <a href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"> snoops on what programs people watch, and even what they wanted to record</a>. 
Das Glasfaser-Internet-TV-Angebot von <a href="//arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/" title="Verizon FiOS reps know what TV channels you watch, unter: arstechnica.com 2015.">Verizon FiOS TV schnüffelt welche Programme man guckt, sogar was man plant aufzunehmen</a>. 
361  
Vizio <a href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"> used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what users watch</a>. The TVs did not do that when first sold. 
Vizio<ins>, ein nicht börsennotiertes US-Unternehmen im Bereich Unterhaltungselektronik,</ins> <a href="//boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html" title="Telescreen watch: Vizio adds spyware to its TVs, unter: boingboing.net 2015.">verwendete eine Firmware-„Verbesserung“, um ihre Fernsehgeräte u. a. zu veranlassen, herumzuschnüffeln, was Zuschauer sich angucken</a>. Die Fernseher taten dies zuvor nicht. 
362 | The Samsung &ldquo;Smart&rdquo; TV <a
| [-href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits-]
| {+href="https://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
| transmits+} users' voice on the internet to another company, Nuance</a>.
| Nuance can save it and would then have to give it to the US or some other
| government. 
The Samsung &ldquo;Smart&rdquo; TV <a href="https://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"> transmits users' voice on the internet to another company, Nuance</a>. Nuance can save it and would then have to give it to the US or some other government. 
Samsung und LG „Smart“-TV-Geräte <a href="//www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm" title="Samsung and LG smart TVs share your voice data with a third party, unter: consumerreports.org 2015.">übertragen die Stimme der Nutzer über das Internet an eine dritte Firma, Nuance</a>. Nuance kann es sichern und würde es dann der US-Regierung oder einer anderen aushändigen müssen. 
364  
In its privacy policy, Samsung explicitly confirms that <a href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice data containing sensitive information will be transmitted to third parties</a>. 
Samsung bestätigt in seinen Datenschutzbestimmungen explizit, dass Sprachdaten mit vertraulichen Informationen an Dritte übermittelt werden. 
365 | The Amazon &ldquo;Smart&rdquo; TV {+is+} <a
| [-href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is-]
| {+href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">+}
| snooping all the time</a>. 
The Amazon &ldquo;Smart&rdquo; TV is <a href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"> snooping all the time</a>. 
Amazons „intelligentes“ Fernsehen <a href="//www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance" title="Amazon’s Echo and the smart TVs that are listening to and watching everything you do, unter: theguardian.com 2014.">schnüffelt immer aus</a>. 
366  
More or less all &ldquo;smart&rdquo; TVs <a href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy on their users</a>. 
Mehr oder weniger alle <a href="https://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/" title="Willem Aldershoff, Researchers: All Smart TVs spy on you, unter: myce.com 2014.">„Smart“-TVs spähen</a> Nutzer aus. 
370 | Spyware in [-<a
| href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">-]
| LG &ldquo;smart&rdquo; [-TVs</a>-] {+TVs <a
| href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">+}
| reports what the user watches, and the switch to turn this off has no
| [-effect.-] {+effect</a>.+} (The fact that the transmission reports a 404
| error really means nothing; the server could save that data anyway.) 
Spyware in LG &ldquo;smart&rdquo; TVs <a href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"> reports what the user watches, and the switch to turn this off has no effect</a>. (The fact that the transmission reports a 404 error really means nothing; the server could save that data anyway.) 
<a href="//doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html" title="LG Smart TVs logging USB filenames and viewing info to LG servers, unter: doctorbeet.blogspot.co.uk 2013.">LG „Smart“-TV</a>-Geräte erfassen und senden das Sehverhalten des Nutzers auch gegen dessen Willen <ins>unverschlüsselt an LG-Server</ins> (die Tatsache, dass der Server auf den Empfang mit einer HTTP-Fehlermeldung <em>‚404 Nicht gefunden‘</em> reagiert, bedeutet eigentlich nichts: der Server konnte die Daten trotzdem erfassen).<a href="#tn06" id="tn06-ref" class="transnote">[6]</a> 
371  
Even worse, it <a href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"> snoops on other devices on the user's local network</a>. 
Schlimmer noch ist, <a href="//rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/" title="LG TV logging filenames from network folders, unter: rambles.renney.me 2013.">LG schnüffelt andere Geräte im lokalen Netzwerk des Nutzers aus</a>. 
373  
Meanwhile, LG TVs <a href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"> do lots of spying anyway</a>. 
In der Zwischenzeit <a href="//www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml" title="LG Will Take The 'Smart' Out Of Your Smart TV If You Don't Agree To Share Your Viewing And Search Data With Third Parties, unter: techdirt.com 2014.">spionieren Fernsehgeräte von LG trotzdem aus</a>. 
374  
<a href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"> Crackers found a way to break security on a &ldquo;smart&rdquo; TV</a> and use its camera to watch the people who are watching TV. 
<a href="//www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html" title="Is your TV watching you? Security alert over Samsung's Smart TV as hackers claim they can access its hard drive and seize control of built-in cameras, unter: dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html 2017.">Cracker fanden einen Weg die Sicherheit eines „intelligenten“ TVs zu knacken</a>, und nutzen dessen Kamera um Zuschauer zu beobachten. 
376  
<span class="anchor-reference-id">(<a href="#SpywareInCameras">#SpywareInCameras</a>)</span> 
 
377  
Amazon Ring &ldquo;security&rdquo; devices <a href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"> send the video they capture to Amazon servers</a>, which save it long-term. 
 
380  
Nearly all &ldquo;home security cameras&rdquo; <a href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"> give the manufacturer an unencrypted copy of everything they see</a>. &ldquo;Home insecurity camera&rdquo; would be a better name! 
 
382  
Over 70 brands of network-connected surveillance cameras have <a href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"> security bugs that allow anyone to watch through them</a>. 
Überwachungskameras mit Verbindung ins Internet von mehr als <a href="//www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html" title="Remote Code Execution in CCTV-DVR affecting over 70 different vendors, unter: Kerneron Security, kerneronsec.com 2016.">70 Markenartikel haben Sicherheitslücken, die jedermann zugucken lassen</a>. 
383  
The Nest Cam &ldquo;smart&rdquo; camera is <a href="http://www.bbc.com/news/technology-34922712">always watching</a>, even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo; 
Die „aufgeweckte“ Kamera <b>Nest Cam</b> (vormals <b>Dropcam</b>) <a href="//www.bbc.com/news/technology-34922712" title="Nest Cam smart camera is 'always on' even when 'off', BBC News 2015." >guckt immer zu</a>, selbst wenn der besitzende „Eigentümer“ sie ausgeschaltet hat. 
386  
<span class="anchor-reference-id">(<a href="#SpywareInToys">#SpywareInToys</a>)</span> 
 
395 | &ldquo;CloudPets&rdquo; toys with microphones <a
| href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
| leak childrens' conversations to the manufacturer</a>. Guess what? <a
| [-href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">-]
| {+href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">+}
| Crackers found a way to access the data</a> collected by the
| manufacturer's snooping. 
&ldquo;CloudPets&rdquo; toys with microphones <a href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"> leak childrens' conversations to the manufacturer</a>. Guess what? <a href="https://www.vice.com/en/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"> Crackers found a way to access the data</a> collected by the manufacturer's snooping. 
CloudPets-Spielzeuge mit Mikrofonen <a href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults" title="CloudPets stuffed toys leak details of half a million users, unter: theguardian.com 2017.">lassen Plauderei von Kindern an Hersteller durchsickern</a>. Und, man ahnt es: <a href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings" title="Internet of Things Teddy Bear Leaked 2 Million Parent and Kids Message Recordings, unter: motherboard.vice.com 2017.">Cracker fanden einen Weg um auf die Daten zuzugreifen</a>, die durch das Ausschnüffeln des Herstellers gesammelt wurden. 
399  
Barbie <a href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is going to spy on children and adults</a>. 
Barbie <a href="//www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673" title="Wi-fi “spy” Barbie records children's conversations - and could be a target for hackers, say experts, unter: mirror.co.uk 2015.">wird Kinder und Erwachsene ausspionieren</a>. 
401  
<span class="anchor-reference-id">(<a href="#SpywareInDrones">#SpywareInDrones</a>)</span> 
 
404  
<span class="anchor-reference-id">(<a href="#SpywareAtHome">#SpywareAtHome</a>)</span> 
 
405  
Many employers are using nonfree software, including videoconference software, to <a href="https://www.theguardian.com/world/2020/sep/27/shirking-from-home-staff-feel-the-heat-as-bosses-ramp-up-remote-surveillance"> surveil and monitor staff working at home</a>. If the program reports whether you are &ldquo;active,&rdquo; that is in effect a malicious surveillance feature. 
 
406  
Google Nest <a href="https://blog.google/products/google-nest/partnership-adt-smarter-home-security/"> is taking over ADT</a>. Google sent out a software update to its speaker devices using their back door <a href="https://www.protocol.com/google-smart-speaker-alarm-adt"> that listens for things like smoke alarms</a> and then notifies your phone that an alarm is happening. This means the devices now listen for more than just their wake words. Google says the software update was sent out prematurely and on accident and Google was planning on disclosing this new feature and offering it to customers who pay for it. 
 
407  
&ldquo;Bossware&rdquo; is malware that bosses <a href="https://www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers"> coerce workers into installing in their own computers</a>, so the bosses can spy on them. 
 
409  
Internet-tethered Amazon Ring had a security vulnerability that enabled attackers to <a href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password"> access the user's wifi password</a>, and snoop on the household through connected surveillance devices. 
 
411  
Google &ldquo;Assistant&rdquo; records users' conversations <a href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even when it is not supposed to listen</a>. Thus, when one of Google's subcontractors discloses a thousand confidential voice recordings, users were easily identified from these recordings. 
 
414  
Amazon Alexa collects a lot more information from users than is necessary for correct functioning (time, location, recordings made without a legitimate prompt), and sends it to Amazon's servers, which store it indefinitely. Even worse, Amazon forwards it to third-party companies. Thus, even if users request deletion of their data from Amazon's servers, <a href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"> the data remain on other servers</a>, where they can be accessed by advertising companies and government agencies. In other words, deleting the collected information doesn't cancel the wrong of collecting it. 
 
416  
Some of users' commands to the Alexa service are <a href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"> recorded for Amazon employees to listen to</a>. The Google and Apple voice assistants do similar things. 
 
417  
A fraction of the Alexa service staff even has access to <a href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"> location and other personal data</a>. 
 
418  
Since the client program is nonfree, and data processing is done &ldquo;<a href="/philosophy/words-to-avoid.html#CloudComputing">in the cloud</a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where it's done&rdquo;), users have no way to know what happens to the recordings unless human eavesdroppers <a href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"> break their non-disclosure agreements</a>. 
 
419  
The HP <a href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"> &ldquo;ink subscription&rdquo; cartridges have DRM that constantly communicates with HP servers</a> to make sure the user is still paying for the subscription, and hasn't printed more pages than were paid for. 
 
421  
Crackers found a way to break the security of an Amazon device, and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"> turn it into a listening device</a> for them. 
 
423  
<small>(These crackers are probably hackers too, but please <a href="https://stallman.org/articles/on-hacking.html"> don't use &ldquo;hacking&rdquo; to mean &ldquo;breaking security&rdquo;</a>.)</small> 
 
425  
Lots of &ldquo;smart&rdquo; products are designed <a href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to listen to everyone in the house, all the time</a>. 
Viele „intelligente“ Produkte wurden entworfen <a href="https://www.cnet.com/pictures/products-with-alexa-built-in-smart-home/" title="Just how many products have Alexa built in? (Bildergalerie), unter: https://www.cnet.com/pictures/products-with-alexa-built-in-smart-home/ 2017.">um ein jeden im Hause zu belauschen&#160;&#8209;&#160;und zwar immer</a>. 
427  
Nest thermometers send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of data about the user</a>. 
<a href="https://bgr.com/2014/07/17/google-nest-jailbreak-hack/" title="Hackers target Nest as a warning to Google about data-sharing, unter: bgr.com 2014.">Nest-Thermostate senden eine Menge Daten über den Nutzer</a>. 
428 | <a
| [-href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">-]
| {+href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">+}
| Rent-to-own computers were programmed to spy on their renters</a>. 
<a href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"> Rent-to-own computers were programmed to spy on their renters</a>. 
<a href="//consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm" title=" Rent-to-own giant accused of spying on its customers, unter: consumerman.com 2013.">Mietkauf-Rechner wurden so programmiert, um Mieter auszuspionieren</a>. 
430 | <span class="anchor-reference-id">(<a
| [-href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>-]
| {+href="#SpywareOnWearables">#SpywareOnWearables</a>)</span>+} 
<span class="anchor-reference-id">(<a href="#SpywareOnWearables">#SpywareOnWearables</a>)</span> 
 
431  
Tommy Hilfiger clothing <a href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will monitor how often people wear it</a>. 
 
434  
Internet-enabled watches with proprietary software are malware, violating people (specially children's) privacy. In addition, they have a lot of security flaws. They <a href="https://www.wired.com/story/kid-smartwatch-security-vulnerabilities/"> permit security breakers (and unauthorized people) to access</a> the watch. 
 
436 | [-It is unfortunate-]{+<small>(Note+} that [-the-] {+this+} article
| [-uses-] {+misuses+} the [-term <a
| href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.-]
| {+word &ldquo;<a
| href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo; to mean
| &ldquo;crackers.&rdquo;)</small>+} 
<small>(Note that this article misuses the word &ldquo;<a href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo; to mean &ldquo;crackers.&rdquo;)</small> 
Es ist bedauerlich, dass der Artikel den Begriff <a href="/philosophy/words-to-avoid#Monetize">„monetarisieren“</a> verwendet. 
439  
An LG &ldquo;smart&rdquo; watch is designed <a href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"> to report its location to someone else and to transmit conversations too</a>. 
Eine „intelligente“ Uhr von LG dient dazu dessen <a href="https://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html" title="LG's New Smart Watch Lets You Spy On Your Kids, unter: https://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html The Huffington Post UK 2014.">Standort an jemand anderen zu melden sowie auch Gespräche zu übermitteln</a>. 
441  
<span class="anchor-reference-id">(<a href="#SpywareInVehicles">#SpywareInVehicles</a>)</span> 
 
442  
<a href="https://gizmodo.com/get-ready-for-in-car-ads-1846888390">Ford is planning to force ads on drivers in cars</a>, with the ability for the owner to pay extra to turn them off. The system probably imposes surveillance on drivers too. 
 
443  
New Toyotas will <a href="https://www.theregister.com/2020/08/18/aws_toyota_alliance/"> upload data to AWS to help create custom insurance premiums</a> based on driver behaviour. 
 
445  
Most modern cars now <a href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html"> record and send various kinds of data to the manufacturer</a>. For the user, access to the data is nearly impossible, as it involves cracking the car's computer, which is always hidden and running with proprietary software. 
 
446  
Tesla cars collect lots of personal data, and <a href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"> when they go to a junkyard the driver's personal data goes with them</a>. 
 
447  
The FordPass Connect feature of some Ford vehicles has <a href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"> near-complete access to the internal car network</a>. It is constantly connected to the cellular phone network and sends Ford a lot of data, including car location. This feature operates even when the ignition key is removed, and users report that they can't disable it. 
 
449  
In China, it is mandatory for electric cars to be equipped with a terminal that <a href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"> transfers technical data, including car location, to a government-run platform</a>. In practice, <a href="/proprietary/proprietary-surveillance.html#car-spying"> manufacturers collect this data</a> as part of their own spying, then forward it to the government-run platform. 
 
450  
GM <a href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"> tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; cars, minute by minute. 
 
454 | AI-powered driving apps can <a
| [-href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">-]
| {+href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">+}
| track your every move</a>. 
AI-powered driving apps can <a href="https://www.vice.com/en/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"> track your every move</a>. 
KI-gestützte Apps zur Steuerung von Fahrzeugen können <a href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move" title="AI-Powered Driving Apps Can Track Your Every Move, Motherboard 2017.">jede Bewegung verfolgen</a>. 
455  
Computerized cars with nonfree software are <a href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"> snooping devices</a>. 
Rechnergestützte Autos mit unfreier Software <a href="//www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html" title="Your Car's Been Studying You Closely and Everyone Wants the Data, unter: http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html 2016.">schnüffeln Geräte aus</a>. 
457  
That's easy to do because the system has no authentication when accessed through the modem. However, even if it asked for authentication, you couldn't be confident that Nissan has no access. The software in the car is proprietary, <a href="/philosophy/free-software-even-more-important.html">which means it demands blind faith from its users</a>. 
Da das System keine Authentifizierung beim Zugriff auf das Mobilfunkmodem durchführt, ist das einfach. Doch selbst wenn diese angefordert würde, könnte man nicht mit Gewissheit sagen, ob Nissan nicht auch Zugang hätte. Die Software im Auto ist proprietär, was bedeutet, sie <a href="/philosophy/free-software-even-more-important">erfordert blindes Vertrauen von seinen Nutzern</a>. 
459 | Tesla cars allow the company to extract data remotely and determine the
| car's location at any time. (See [-<a
| href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">-]
| Section 2, paragraphs b and [-c.</a>).-] {+c of the <a
| href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf">
| privacy statement</a>.)+} The company says it doesn't store this
| information, but if the state orders it to get the data and hand it over,
| the state can store it. 
Tesla cars allow the company to extract data remotely and determine the car's location at any time. (See Section 2, paragraphs b and c of the <a href="https://www.tesla.com/sites/default/files/pdfs/en_US/tmi_privacy_statement_external_6-14-2013_v2.pdf"> privacy statement</a>.) The company says it doesn't store this information, but if the state orders it to get the data and hand it over, the state can store it. 
Fahrzeuge des amerikanischen Herstellers Tesla ermöglichen dem Unternehmen Datenmaterial mittels Fernzugriff abzugreifen und jederzeit die Position des Fahrzeugs zu bestimmen (siehe <a href="//www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf" type="application/pdf" hreflang="en">Datenschutzerklärung, Abschnitt 2 Abs. b und c</a>). Das Unternehmen gibt an, dass es diese Informationen nicht speichert, aber wenn staatliche Stellen deren Aushändigung anordnen und die Daten übergeben werden, könnte der Staat sie speichern. 
460  
Proprietary software in cars <a href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"> records information about drivers' movements</a>, which is made available to car manufacturers, insurance companies, and others. 
Proprietäre Software in Autos <a href="//www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/" title="Chris Woodyard and Jayne O'Donnell, Your car may be invading your privacy, unter: www.usatoday.com 2013.">zeichnet Informationen über Fahrzeugbewegungen auf</a>, welche Automobilhersteller, Versicherungsunternehmen und anderen verfügbar gemacht wird. 
463  
<span class="anchor-reference-id">(<a href="#SpywareInVR">#SpywareInVR</a>)</span> 
 
464  
Oculus headsets <a href="https://www.theverge.com/2020/8/18/21372435/oculus-facebook-login-change-separate-account-support-end-quest-october">require users to identify themselves to Facebook</a>. This will give Facebook free rein to pervasively snoop on Oculus users. 
 
468  
<span class="anchor-reference-id">(<a href="#SpywareOnTheWeb">#SpywareOnTheWeb</a>)</span> 
 
469  
In addition, many web sites spy on their visitors. Web sites are not programs, so it <a href="/philosophy/network-services-arent-free-or-nonfree.html"> makes no sense to call them &ldquo;free&rdquo; or &ldquo;proprietary&rdquo;</a>, but the surveillance is an abuse all the same. 
Viele Internetpräsenzen spionieren obendrein ihre Besucher aus. Webauftritte sind keine Programme, es <a href="/philosophy/network-services-arent-free-or-nonfree" title="Netzwerkdienste sind nicht frei oder unfrei; sie werfen andere Fragen auf, unter: gnu.org 2012.">ergibt keinen Sinn, sie <em>frei</em> oder <em>proprietär</em> zu nennen</a>, aber nichtsdestotrotz ist die Überwachung ein Missbrauch. 
470  
As of April 2019, it is <a href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/">no longer possible to disable an unscrupulous tracking anti-feature</a> that <a href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports users when they follow ping links</a> in Apple Safari, Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge that is going to be based on Chromium. 
 
471  
Until 2015, any tweet that listed a geographical tag <a href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/"> sent the precise GPS location to Twitter's server</a>. It still contains these GPS locations. 
 
475 | <a
| [-href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">-]
| {+href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">+}
| Microsoft SkyDrive allows the NSA to directly examine users' data</a>. 
<a href="https://web.archive.org/web/20190421070310/https://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"> Microsoft SkyDrive allows the NSA to directly examine users' data</a>. 
<a href="//www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/" title="Microsoft openly offered cloud data to support NSA PRISM programme, unter: itproportal.com 2014."><b>Microsoft SkyDrive</b> ermöglicht der NSA direkte Auswertung von Nutzerdaten</a>.<a href="#tn08" class="transnote">[8]</a><a href="#tn09" class="transnote">[9]</a> 
477 | Many web sites report all their visitors to Google by using the Google
| Analytics service, which <a
| href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
| tells Google the IP address and the page that was [-visited.</a>-]
| {+visited</a>.+} 
Many web sites report all their visitors to Google by using the Google Analytics service, which <a href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"> tells Google the IP address and the page that was visited</a>. 
Viele Internetpräsenzen melden all ihre Besucher mithilfe des <b>Google Analytics</b>-Dienstes an Google, welcher <a href="//www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/" title="Google Analytics breaks Norwegian privacy laws, local agency said, unter: pcworld.idg.com.au 2012.">IP-Addresse und besuchte Internetseite mitteilt</a>. 
479  
Pages that contain &ldquo;Like&rdquo; buttons <a href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"> enable Facebook to track visitors to those pages</a>&mdash;even users that don't have Facebook accounts. 
Internetseiten, die <em>Gefällt mir</em>-Schaltflächen enthalten, <a href="/https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html" title="Facebook's privacy lie: Aussie exposes 'tracking' as new patent uncovered, unter: smh.com.au 2011-">ermöglichen Facebook, Besucher jener Seiten zu verfolgen</a>&#160;&#8209;&#160;sogar Nutzer, die keine Facebook-Konten haben. 
481 | <span class="anchor-reference-id">(<a
| [-href="#SpywareInMacOS">#SpywareInMacOS</a>)</span>-]
| {+href="#SpywareInJavaScript">#SpywareInJavaScript</a>)</span>+} 
<span class="anchor-reference-id">(<a href="#SpywareInJavaScript">#SpywareInJavaScript</a>)</span> 
 
482 | Many web sites use JavaScript code <a
| href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
| to snoop on information that users have typed into a form but not
| sent</a>, in order to learn their identity. Some are <a
| [-href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">-]
| {+href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege">+}
| getting sued</a> for this. 
Many web sites use JavaScript code <a href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"> to snoop on information that users have typed into a form but not sent</a>, in order to learn their identity. Some are <a href="https://www.manatt.com/insights/newsletters/advertising-law/sites-illegally-tracked-consumers-new-suits-allege"> getting sued</a> for this. 
Viele Internetpräsenzen schleusen JavaScript-Code ein um <a href="https://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081" title="Before You Hit ‚Submit‘, This Company Has Already Logged Your Personal Data, Gizmodoo 2017.">vom Nutzer eingegebene Informationen in Formularen auszuspionieren, die noch nicht abgesendet sind</a>, um mehr über deren Identität zu erfahren. Einige wurden <a href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege" title="Sites Illegally Tracked Consumers New Suits Allege, Manatt 2017.">nun verklagt</a>. 
483  
The chat facilities of some customer services use the same sort of malware to <a href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119"> read what the user is typing before it is posted</a>. 
 
484  
British Airways used <a href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree JavaScript on its web site to give other companies personal data on its customers</a>. 
 
489  
<span class="anchor-reference-id">(<a href="#SpywareInFlash">#SpywareInFlash</a>)</span> 
 
490 | Flash and JavaScript are [-also-] used for <a
| href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
| &ldquo;fingerprinting&rdquo; devices</a> to identify users. 
Flash and JavaScript are used for <a href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"> &ldquo;fingerprinting&rdquo; devices</a> to identify users. 
Flash und JavaScript werden ebenso für <a href="//arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/" title="Top sites (and maybe the NSA) track users with “device fingerprinting”, unter: arstechnica.com 2013.">„Fingerabdruck“-Geräte</a> zur Identifizierung von Nutzern verwendet. 
491 | Flash Player's <a
| [-href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">-]
| {+href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/">+}
| cookie feature helps web sites track visitors</a>. 
Flash Player's <a href="https://web.archive.org/web/20200808151607/http://www.imasuper.com/2008/10/09/flash-cookies-the-silent-privacy-killer/"> cookie feature helps web sites track visitors</a>. 
Flash Player-Funktion hilft <a href="//www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/" title="Flash Cookies: The Silent Privacy Killer, unter: imasuper.com 2008.">Besucher von Internetpräsenzen mittels Flash-Cookie zu verfolgen</a>. 
493  
<span class="anchor-reference-id">(<a href="#SpywareInChrome">#SpywareInChrome</a>)</span> 
 
494  
Google's proprietary Chrome web browser <a href="https://www.techrepublic.com/article/new-chrome-feature-can-tell-sites-and-webapps-when-youre-idle/"> added a surveillance API (idle detection API)</a> which lets websites ask Chrome to report when a user with a web page open is idle. 
 
495  
Google Chrome is an <a href="https://www.mercurynews.com/2019/06/21/google-chrome-has-become-surveillance-software-its-time-to-switch/"> instrument of surveillance</a>. It lets thousands of trackers invade users' computers and report the sites they visit to advertising and data companies, first of all to Google. Moreover, if users have a Gmail account, Chrome automatically logs them in to the browser for more convenient profiling. On Android, Chrome also reports their location to Google. 
 
496  
The best way to escape surveillance is to switch to <a href="/software/icecat/">IceCat</a>, a modified version of Firefox with several changes to protect users' privacy. 
 
497  
Low-priced Chromebooks for schools are <a href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"> collecting far more data on students than is necessary, and store it indefinitely</a>. Parents and students complain about the lack of transparency on the part of both the educational services and the schools, the difficulty of opting out of these services, and the lack of proper privacy policies, among other things. 
 
498  
But complaining is not sufficient. Parents, students and teachers should realize that the software Google uses to spy on students is nonfree, so they can't verify what it really does. The only remedy is to persuade school officials to <a href="/education/edu-schools.html"> exclusively use free software</a> for both education and school administration. If the school is run locally, parents and teachers can mandate their representatives at the School Board to refuse the budget unless the school initiates a switch to free software. If education is run nation-wide, they need to persuade legislators (e.g., through free software organizations, political parties, etc.) to migrate the public schools to free software. 
 
500 | Google Chrome includes a module that <a
| [-href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">-]
| {+href="https://www.privateinternetaccess.com/blog/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">+}
| activates microphones and transmits audio to its servers</a>. 
Google Chrome includes a module that <a href="https://www.privateinternetaccess.com/blog/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"> activates microphones and transmits audio to its servers</a>. 
<b>Chrome</b>-Modul <a href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">aktiviert Mikrofon und übermittelt Hörbares</a> an seine Server. 
501  
Google Chrome <a href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"> spies on browser history, affiliations</a>, and other installed software. 
<b>Chrome</b> <a href="" title="Oops! That page can’t be found, unter: https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/ 2013.">schnüffelt Browserverlauf, Zugehörigkeiten</a> und andere installierte Software aus. 
502 | Google Chrome contains a key logger that <a
| [-href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">-]
| {+href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/">+}
| sends Google every URL typed in</a>, one key at a time. 
Google Chrome contains a key logger that <a href="https://web.archive.org/web/20190126075111/http://www.favbrowser.com/google-chrome-spyware-confirmed/"> sends Google every URL typed in</a>, one key at a time. 
<b>Chrome</b> enthält „Tasten-Protokollierer“, der <a href="//www.favbrowser.com/google-chrome-spyware-confirmed/" title="Google Chrome – Spyware? Confirmed?, unter: FavBrowser.com 2008.">Google jede eingegebene URL sendet</a>, Taste für Taste. 
504 | <span class="anchor-reference-id">(<a
| [-href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>-]
| {+href="#SpywareInNetworks">#SpywareInNetworks</a>)</span>+} 
<span class="anchor-reference-id">(<a href="#SpywareInNetworks">#SpywareInNetworks</a>)</span> 
 
505  
Ed Tech companies use their surveillance power to manipulate students, and direct them into tracks towards various levels of knowledge, power and prestige. The article argues that <a href="https://blogs.lse.ac.uk/medialse/2021/10/25/algorithmic-injustice-in-education-why-tech-companies-should-require-a-license-to-operate-in-childrens-education/">these companies should obtain licenses to operate</a>. That wouldn't hurt, but it doesn't address the root of the problem. All data acquired in a school about any student, teacher, or employee must not leave the school, and must be kept in computers that belong to the school and run free (as in freedom) software. That way, the school district and/or parents can control what is done with those data. 
 
506  
<a href="https://me2ba.org/me2ba-product-testing-spotlight-report-published-data-sharing-in-primary-secondary-school-mobile-apps-2/">60% of school apps are sending student data to potentially high-risk third parties</a>, putting students and possibly all other school workers under surveillance. This is made possible by using unsafe and proprietary programs made by data-hungry corporations. 
 
508  
The United States' government is reportedly considering <a href="https://www.infosecurity-magazine.com/news/private-companies-may-spy-on/">teaming up with private companies to monitor American citizens' private online activity and digital communications</a>. 
 
510  
Google <a href="https://www.indiatoday.in/technology/news/story/disha-ravi-arrest-puts-privacy-of-all-google-india-users-in-doubt-1769772-2021-02-16">handed over personal data of Indian protesters and activists to Indian police</a> which led to their arrest. The cops requested the IP address and the location where a document was created and with that information, they identified protesters and activists. 
 
511  
The HonorLock online exam proctoring program is a surveillance tool that <a href="https://www.eff.org/deeplinks/2020/09/students-are-pushing-back-against-proctoring-surveillance-apps">tracks students and collects data</a> such as face, driving license, and network information, among others, in blatant violation of students' privacy. 
 
513  
While the world is still struggling with COVID-19 coronavirus, many <a href="https://mashable.com/article/privacy-in-the-age-of-coronavirus/">people are in danger of surveillance</a> and their computers are infected with malware as a result of installing proprietary software. 
 
514  
Proprietary programs Google Meet, Microsoft Teams, and WebEx <a href="https://www.consumerreports.org/video-conferencing-services/videoconferencing-privacy-issues-google-microsoft-webex/">are collecting user's personal and identifiable data</a> including how long a call lasts, who's participating in the call, and the IP addresses of everyone taking part. From experience, this can even harm users physically if those companies hand over data to governments. 
 
515  
Microsoft <a href="https://answers.microsoft.com/en-us/outlook_com/forum/all/why-does-my-new-e-mail-account-need-a-phone-number/70049eaf-3b66-4d02-87cc-79dc73c2ea08">forces people to give their phone number</a> in order to be able to create an account on the company's network. On top of mistreating their users by providing nonfree software, Microsoft is tracking their lives outside the computer and violates their privacy. 
 
516  
Google invites people to <a href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss"> let Google monitor their phone use, and all internet use in their homes, for an extravagant payment of $20</a>. 
 
518  
<a href="https://www.theverge.com/2018/8/13/17684660/google-turn-off-location-history-data">Google will track people even if people turn off location history</a>, using Google Maps, weather updates, and browser searches. Google basically uses any app activity to track people. 
 
519  
Since the beginning of 2017, <a href="https://qz.com/1131515/google-collects-android-users-locations-even-when-location-services-are-disabled/">Android phones have been collecting the addresses of nearby cellular towers</a>, even when location services are disabled, and sending that data back to Google. 
 
522 | [-Spyware in-]{+The+} Cisco TNP IP [-phones:-] {+phones are+} <a
| href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
| [-http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a>-]
| {+spying devices</a>.+} 
The Cisco TNP IP phones are <a href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"> spying devices</a>. 
Spionageprogramm in Cisco TNP VOIP-Telefonen: <a href="https://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html" title="Your Cisco phone is listening to you: 29C3 talk on breaking Cisco phones, unter: boingboing.net 2012.">Telefon hört mit</a>.<a href="#tnhacking-cisco" id="tnhacking-cisco-ref" class="transnote">[12]</a> 
523 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
! GNU should report facts briefly and crisply! Also resulting !
! consequences should not be swept away by an own opinion! !
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
TRANSLATORS: Use space (SPC) as msgstr if you don't have notes. 
*GNUN-SLOT: TRANSLATOR'S NOTES* 
<p><strong>Anmerkungen des Übersetzungsteams</strong>:</p>
<ol id="transnote">
<li> <em>Spionage-</em> oder <em>Spähprogramm</em> bzw. <em>Schnüffelsoftware</em> (engl. ‚Spyware‘, ein Kofferwort aus <i><b>Spy</b></i> ‚Spion‘ und <i>Soft<b>ware</b></i>) bezeichnet Software, die Daten eines Rechnernutzers ohne dessen Wissen oder Zustimmung an den Softwarehersteller („nach Hause telefonieren“) oder an Dritte sendet oder dazu genutzt wird, dem Nutzer über Werbeeinblendungen Produkte anzubieten.</li>
<li id="tn1"><a href="#tn1-ref">[*]</a> <em>Mobile Computing</em> bezeichnet jede Art von elektronischer Datenverarbeitung, Internet oder Intranet und entsprechende Kommunikationsverbindungen wie WAN, LAN, WLAN usw. und kann ein drahtloses privates Netzwerk (WPAN) oder ein Piconet bilden.
<p><em>Mobile Computing</em> kann in mindestens drei unterschiedliche Klassen unterteilt werden: jede Art von portablen Rechnern, Smartphones und tragbaren Rechnersystemen „am Körper“ (beispielsweise Hörgeräte, Armbanduhren, Brillen usw.).</p></li>
<li id="tn2"><a href="#tn2-ref">[**]</a> <span class="noteClass">Hinweis:</span> Einige Funktionen auf dieser Seite werden möglicherweise nicht korrekt dargestellt oder ausgeführt, da Cookies erforderlich sind.</li>
<li><p><strong>Weiterführende Referenzen</strong>:</p>
<ol style="list-style-type:none">
<li id="tn01"><a href="#tn01-ref">[1]</a> Heise Online, <a href="//www.heise.de/tp/artikel/5/5274/1.html"><cite>Peinlicher Fehler deckt die Unterwanderung von Windows durch die NSA auf</cite></a>, unter: heise.de 1999. (abgerufen 2014-10-23)</li>
<li id="tn02"><a href="#tn02-ref">[2]</a> Spiegel Online, <a href="//www.spiegel.de/netzwelt/netzpolitik/neue-dokumente-der-geheime-werkzeugkasten-der-nsa-a-941153.html"><cite> Neue Dokumente: Der geheime Werkzeugkasten der NSA</cite></a>, unter: spiegel.de 2013. (abgerufen 2014-05-06)</li>
<li id="tn03"><a href="#tn03-ref">[3]</a> Spiegel Online, <a href="//www.spiegel.de/netzwelt/netzpolitik/nsa-ueberwachung-apple-verneint-kenntnis-von-spionageprogramm-a-941414.html"><cite> NSA-Software für iPhones: Apple verneint Kenntnis von Spionageprogramm</cite></a>, unter: spiegel.de 2014. (abgerufen 2014-05-06)</li>
<li id="tn04"><a href="#tn04-ref">[4]</a> Der Spiegel, <a href="//www.spiegel.de/spiegel/print/d-111320266.html"><cite>iSpy</cite></a>, unter: spiegel.de 2013. (abgerufen 2014-05-06)<br /></li>
<li id="tn05"><a href="#tn05-ref">[5]</a> Heise Online, <a href="//heise.de/-2098447"><cite>Die NSA und Mobil-Apps: Geheimdienste schnüffeln Angry Birds aus</cite></a>, unter: heise.de 2014. (abgerufen 2014-02-03)<br />
Spiegel Online, <a href="//www.spiegel.de/netzwelt/netzpolitik/angry-birds-nsa-und-gchq-zapfen-apps-an-a-945872.html"><cite>NSA und GCHQ: Geheimdienste greifen Daten von App-Nutzern ab</cite></a>, unter: spiegel.de 2014. (abgerufen 2014-06-20)<br />
Spiegel Online, <a href="//www.spiegel.de/netzwelt/netzpolitik/squeaky-dolphin-gchq-analysiert-facebook-und-youtube-a-945919.html"><cite> "Squeaky Dolphin": Britischer Geheimdienst analysiert Klicks auf Facebook und YouTube</cite></a>, unter: spiegel.de 2014. (abgerufen 2014-06-20)</li>
<li id="tn06"><a href="#tn06-ref">[6]</a> Heise Security, <a href="//heise.de/-2051973"><cite>LG Smart-TVs spähen Nutzer aus</cite></a>, unter: heise.de 2013. (abgerufen 2013-12-06)</li>
<li id="tn07"><a href="#tn07-ref">[7]</a> Die Welt, <a href="//www.welt.de/wirtschaft/webwelt/article122654943/Taschenlampen-App-spioniert-Handynutzer-aus.html"><cite>Datenhandel: Taschenlampen-App spioniert Handynutzer aus</cite></a>, unter: welt.de 2013. (abgerufen 2013-12-06)</li>
<li id="tn08"><a href="#tn08-ref">[8]</a> Heise Online, <a href="//heise.de/-1916340"><cite>PRISM-Überwachungskandal: Microsoft ermöglicht NSA Zugriff auf Skype, Outlook.com, Skydrive</cite></a>, unter: heise.de 2013. (abgerufen 2014-06-01)</li>
<li id="tn09"><a href="#tn09-ref">[9]</a> Telepolis, <a href="//www.heise.de/tp/artikel/39/39499/1.html"><cite>Neue NSA-Dokumente enthüllen die Zusammenarbeit von Microsoft mit der NSA</cite></a>, unter: heise.de 2013. (abgerufen 2014-06-01)</li>
<li id="tn2017a-eurosp"><a href="#tn2017a-eurosp-ref">[10]</a> Arp, Quiring, Wressnegger, Rieck (2017), <cite><a
href="https://www.sec.cs.tu-bs.de/pubs/2017a-eurosp.pdf" type="application/pdf">Privacy Threats through Ultrasonic Side Channels on Mobile Devices</a></cite>, unter: https://www.sec.cs.tu-bs.de/pubs/2017a-eurosp.pdf. (abgerufen 2017-05-09)</li>
<li id="tn3704642"><a href="#tn3704642-ref">[11]</a> Stefan Krempl (2017), <cite><a
href="https://heise.de/-3704642">Tracking: Forscher finden Ultraschall-Spyware in 234 Android-Apps</a></cite>, unter: https://heise.de/-3704642. (abgerufen 2017-05-09)</li>
<li id="tnhacking-cisco"><a href="#tnhacking-cisco-ref">[12]</a> Ang Cui und Michael Costello (2013), <cite><a
href="https://media.ccc.de/v/29c3-5400-en-hacking_cisco_phones_h264">Hacking Cisco Phones. Just because you are paranoid doesn't mean your phone isn't listening to everything you say</a></cite>, unter: https://media.ccc.de/v/29c3-5400-en-hacking_cisco_phones_h264. (abgerufen 2017-07-16)</li>
</ol></li></ol> 
525 || No change detected. The change might only be in amounts of spaces. 
Please see the <a href="/server/standards/README.translations.html">Translations README</a> for information on coordinating and contributing translations of this article. 
Bei der Übersetzung dieses Werkes wurde mit größter Sorgfalt vorgegangen. Trotzdem können Fehler nicht völlig ausgeschlossen werden. Sollten Sie Fehler bemerken oder Vorschläge, Kommentare oder Fragen zu diesem Dokument haben, wenden Sie sich bitte an unser Übersetzungsteam <a href="mailto:web-translators@gnu.org?cc=www-de-translators@gnu.org">&lt;web-translators@gnu.org&gt;</a>.</p>
<p>Weitere Informationen über die Koordinierung und Einsendung von Übersetzungen unserer Internetpräsenz finden Sie in der <a href="/server/standards/README.translations">LIESMICH für Übersetzungen</a>. 
527  
This page is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>. 
Dieses Werk ist lizenziert unter einer <a rel="license" href="//creativecommons.org/licenses/by/4.0/deed.de">Creative Commons Namensnennung 4.0 International</a>-Lizenz.