- This article is a stub and still needs to be written. If you want to
- write it, email me so I don't duplicate effort.
- https://1password.com/legal/privacy/
- https://www.macworld.com/article/2996213/security/1password-is-still-secure-but-you-can-reduce-a-potential-risk.html
- https://paul.reviews/privacy-password-managers-a-reality-check/
- >Third-Party Data Processors >Your Secure and Service data are held by
- third party data processors, who provide us with hosting and other
- infrastructure services. The locations of these are described above.
- In many cases (but we cannot promise that this will always be the
- case) even Service data held by these entities is encrypted with keys
- held only by us. >Data needed to process payments is collected by our
- payment processor, Stripe, Inc., which conforms to a U.S.-E.U. Privacy
- Shield Framework. See https://stripe.com/privacy-shield-policy
-
- UNFINISHED ARTICLE — UNDER CONSTRUCTION — BAD FORMATTING
-
-
-
AMD CPU Family
-
- Advanced Micro Devices, Inc. is an American multinational
- semiconductor company based in Santa Clara, California, that develops
- computer processors and related technologies for business and consumer
- markets. This article is specifically about the CPUs that are
- produced by AMD and nothing else. The logo is one of many logos used
- by AMD, but the article is not about any one specific CPU.
- No rating is given because this is not an article about any
- specific product, and the rating system is difficult to fit into this
- article.
-
-
-
- Modern CPU models produced by AMD contain an embedded ARM co-processor
- called the Platform Security Processor (PSP). Nearly all AMD CPUs
- produced since 2013 operate under the supervision of this separate,
- more privileged, environment consisting of an integrated ARM processor
- with access to isolated resources as well as main system memory and
- I/O.
- [1]
-
-
-
- This article isn't complete. This is a work-in-progress and so this
- article is not formatted properly...
-
- While ARM and AMD tout the “Trusted Execution Environment” as useful
- for secure payment, anti-theft and malware protection, they also
- discuss content protection or DRM as a use case.
- https://www.owasp.o../images/c/c8/OWASP_Security_Tapas_-_TrustZone%2C_TEE_and_Mobile_Security_final.pdf
-
-
Possible uses … DRM
-
- Researchers have already been able to identify exploits in AMD’s
- Platform Security Processor. In 2018 researchers published a
- vulnerability in which a specially crafted certificate could lead to a
- stack overflow in the PSP’s TPM firmware allowing for remote code
- execution. (https://seclists.org/fulldisclosure/2018/Jan/12) Another
- group goes on to detail how an attacker might leverage exploits
- RYZENFALL or FALLOUT to gain foothold in networks with Ryzen based
- systems.
- (https://www.techpowerup.com/242386/cts-labs-responds-to-a-techpowerup-technical-questionnaire)
-
-
-
- Please note that Family 16h and Family 15h-Models60h and later contain
- a PSP
-
- Jaguar (the only 16h family CPU that does NOT have PSP):
- http://support.amd.com/TechDocs/52128_16h_Software_Opt_Guide.zip
- (page 8)
- https://en.wikipedia.org/wiki/Puma_(microarchitecture)#Improvements_over_Jaguar
-
-
- All K5-K10, Bobcat, Bulldozer (“BDv1”) and Piledriver (“BDv2”)
-
-
- All K5-K10, Bobcat, Bulldozer (“BDv1”) and Piledriver (“BDv2”)
-
The tier list has been deprecated for a while now, and was kept only for historical purposes. Because the deprecated page keeps getting linked to, it will be removed.
-
-
If you want a tier list, you can visit these sites: ShadowWiki[Tor][I2P] or Digdeeper[Tor][I2P]. These external resources don't represent the Online Spyware Watchdog as a site, and are simply used as a point of reference for those interested.
-This part of the article should have the name of the program and what it does, and who develops it.
-
-
Spyware Level: Not Rated
-
-A breif explanation of what the software does, and a summary of the rest of the article, should go here. This paragraph is for readers
-who don't want to read the entire article and it should assert all of the things that the rest of the article proves below.
-
-
Spyware Feature X
-
-This program has spyware feature X in it. There should be some kind of proof here. If it doesn't contain original research, the source
-should be cited like this: [1].
-
- If you want to edit this article, or contribute your own article(s), visit us at the git repo on Codeberg. All contributions must be licensed under the CC0 license to be accepted.
-
-foobar2000 is an advanced freeware audio player for the Windows platform.
-
-
Spyware Level: Not Rated
-
-foobar2000 does not make its source code available, which could be hiding spyware features.
-
-
- If you want to edit this article, or contribute your own article(s), visit us at the git repo on Codeberg. All contributions must be licensed under the CC0 license to be accepted.
-
-This is a catalog of all of the articles that are currently works-in-progress. The articles here are either unfinished, or not accurate and need to be edited before they can be added to the normal catalog. If you want to edit any of these articles, or contribute your own articles, visit us at the git repo on Codeberg. These articles need the most help, so feel free to contribute!
-
-
The requested articles file also has a list of articles that have been requested, and the state of those
- requests.
This article is about the graphics card driver software used for modern Nvidia graphics cards. It is not about any one specific driver.
-
-
Spyware Level: Not Rated
-
-
- Nvidia produces graphics cards, and of course to use this hardware you need to install their drivers. Unfortunately Nvidia's drivers are riddled with
- spyware and the installation process is a minefield of serious privacy pitfalls, with options selected by default that have serious privacy
- implications they have if actually enabled. It isn't possible to install any of their drivers without bundled spyware being installed onto your computer,
- which needs to be cleaned up after the installation.
-
-
Nvidia's installer is bundled with other spyware programs
-
- When attempting to install an Nvidia graphics card driver you will be shown an option to install the spyware program GeForce Experience onto your computer.
- This program is malware that is also developed by Nvidia as well, and has a huge range of serious privacy issues, including scanning and uploading information
- about the files onto your computer to Nvidia. (An article about GeForce Experience is planned)
-
-
-
Nvidia drivers install telemetry services onto the host machine
-
- When the installation is finished, these services will show up (This is on Windows 7):
-
-
-
- These can at least be disabled like so:
-
-
-
Nvidia telemetry domains can also be blocked at the hosts file although the source is two years old:
-
- If you want to edit this article, or contribute your own article(s), visit us at the git repo on Codeberg. All contributions must be licensed under the CC0 license to be accepted.
-
Pale Moon is a fork of an old Firefox version, before the user interface change that put off many people. Version 28.4 was used to
- write this article. This article replaces an old article (here).
+ write this article.
- Pale Moon es un fork de una versión vieja de Firefox, antes del cambio de interfaz de usuario que molestó a tanta gente. La versión 28.4 fue usada para escribir este artículo. Este artículo sirve de reemplazo para uno más viejo ([Inglés]).
+ Pale Moon es un fork de una versión vieja de Firefox, antes del cambio de interfaz de usuario que molestó a tanta gente. La versión 28.4 fue usada para escribir este artículo.
Note: This article is outdated. Here is the updated version.
-
-
- Pale Moon is a fork of an old Firefox version, before the user interface change that put off many people. But is it a worthy alternative to FF in terms of privacy? Versions 27.7.2 and 28.1.0 were both tested for this article.
-
-
-
Spyware Level: Medium
-
After following the mitigation guide, this software is Not Spyware.
-
-
- Connects to a MASSIVE amount of trackers, and these requests can only be avoided on subsequent runs. Has geolocation, search suggestions, and auto-updates. Sends SSL certificates from the sites you visit. Together made 169 unsolicited requests upon my first run of it, but again, most of them can be avoided on subsequent runs. Pale Moon, in the end, has less privacy issues than Firefox, aside from its terrible start page, so the rating is Medium.
-
-
First run
-
- If this is your first run of Pale Moon, it will automatically connect to its first run webpage (http://palemoon.org/firstrun.html), which in turn will make a bunch of requests for location-aware Google Ads.
-
-
Pale Moon's start page
-
- By default, Pale Moon's start page is set to https://palemoon.start.me, and it will automatically make a connection to it upon its first run. That page will then (again) make a bunch of requests for various trackers — here is a list:
-
-
Google Ads (location-aware)
-
Facebook (so if you're logged in, they know who you are)
-
Quantserve ("Quantcast is an American technology company, founded in 2006, that specializes in audience measurement and real-time advertising.")
-
Amazon Ads
-
Criteo ("Criteo is a personalized retargeting company that works with Internet retailers to serve personalized online display advertisements to consumers who have previously visited the advertiser's website.")
-
Scorecardresearch ("ScorecardResearch conducts research by collecting Internet web browsing data and then uses that data to help show how people use the Internet")
-
HubSpot ("HubSpot is an inbound marketing and sales platform that helps companies attract visitors, convert leads, and close customers.")
-
Alexa Metrics
-
Twitter Ads and Analytics
-
A few others
-
-
- All these requests contain the Pale Moon start page referrer, so they know where you came from. They also all set uniquely identifying cookies, so if you come across another website with these trackers included, they will know you're the person from the Pale Moon's start page, and could start building a profile from your browsing habits. You can easily delete the cookies and change the start page so that it never appears again, but there is no way to avoid the requests being made upon Pale Moon's first run.
-
-
-
Blocking privacy-enhancing addons
-
-Pale Moon blocks privacy enhancing addons like NoScript, citing this rationale for
-blocking such an imporant addon: "NoScript is known to cause severe issues with a large (and growing) number of websites. Unless finely tuned for every website visited,
-NoScript will cause display issues and functional issues. "[1] So, it looks like Pale Moon's developers are actively working against the interests of its
-privacy-concerned users, and would rather allow websites to execute malicious ECMAScript programs on unsuspecting user's machines, than to be blamed for a broken website.
-To disable this blocklist, set extensions.blocklist.enabled to false in about:config.
-
-
Auto-updates
-
- Pale Moon will automatically update itself, addons and search engines, as well as its blocklist.xml file with the addons it considers "malicious". Some of these can be turned off from the GUI, and some only from about:config.
-
-
-
Search Suggestions
-
The default search engine is the privacy-respecting DuckDuckGo, however search suggestions are enabled by default, which could send a request for every letter you've typed, all while you think it stays in-browser until you press Enter. Can be turned off by right-clicking the search bar.
-
-
-
Geolocation
-
Pale Moon connects to Mozilla's geolocation services.
-
-
OCSP querying
-
Will automatically check every site's SSL certificate to see if it is valid, which necessitates sending it to a third party. Can be turned off from the GUI.
- This article was written by digdeeper.neocities.org
- Formatting changes and some sections were written by the site maintainer.
-
-
-
- This article was created on 6/7/2018
- This article was last updated on 10/14/2018
-
-
- If you want to edit this article, or contribute your own article(s), visit us at the git repo on Codeberg. All contributions must be licensed under the CC0 license to be accepted.
-
La información que envias cuando los contactas (mensaje y demás)
-
El tiempo que usas sus productos/servicios
-
Los datos que envias en encuestas
-
Dirección IP, geolocalización, sistema operativo, navegador
-
-
Razer tambien admite[1][2]que vende los datos de los usuarios
-
También dice que los empleados pueden ver esos datos.
-
Razer te obliga a crear una cuenta para usar sus productos
-
-
¿Dónde está el botón para iniciar sesión en otro momento?
-
Sin una cuenta, no puedes configurar ni tu teclado ni tu ratón, no puedes cambiar el DPI del ratón (A no ser que haya un botón en el ratón para eso)
-
Basicamente, cada vez que abras el software para cambiar el color del ratón o lo que sea, Razer recibirá tus datos.
-
Estás obligado a conectarte a "la nube" para cargar configuraciones, esto quiere decir que las configuraciones de tu hardware están en el ordenador de otra persona, y saben quien las tiene (las configuraciones)
Info you send when you contact them (texts and such)
+
The time you use their services and products
+
Info you send via polls
+
IP, geolocation, OS and browser version
+
+
+
+ Razer also admits[1][2] that they sell users' info. They also claim that the employees can see this data.
+ Razer FORCES you to create an account to use YOUR products.
+
+
+
+ Where is the option "Sign in later" at? Without an account, you CAN'T configure your keyboard,
+ change your mouse DPI and RGB configuration and such, this means that the configurations you set to your (Razer) peripherals are in somebody
+ else's PC, and Razer knows who has that (your) info.
+
- This article was created on 3/4/2019
+ This article was translated on 3/10/2019
+ This is a translation of the Spanish article. It may become outdated in the future. Check the dates on both articles.
If you want to edit this article, or contribute your own article(s), visit us at the git repo on Codeberg. All contributions must be licensed under the CC0 license to be accepted.