diff --git a/articles/1password.html b/articles/1password.html deleted file mode 100644 index b496eef..0000000 --- a/articles/1password.html +++ /dev/null @@ -1,59 +0,0 @@ - - - - - 1Password — Spyware Watchdog - - - - -
- -
- 1Password Logo -

1Password

-

- 1password is a password management service -

-

Spyware Level: Not Rated

-

- This article is a stub and still needs to be written. If you want to - write it, email me so I don't duplicate effort. - https://1password.com/legal/privacy/ - https://www.macworld.com/article/2996213/security/1password-is-still-secure-but-you-can-reduce-a-potential-risk.html - https://paul.reviews/privacy-password-managers-a-reality-check/ - >Third-Party Data Processors >Your Secure and Service data are held by - third party data processors, who provide us with hosting and other - infrastructure services. The locations of these are described above. - In many cases (but we cannot promise that this will always be the - case) even Service data held by these entities is encrypted with keys - held only by us. >Data needed to process payments is collected by our - payment processor, Stripe, Inc., which conforms to a U.S.-E.U. Privacy - Shield Framework. See https://stripe.com/privacy-shield-policy -

-
-
- -
- - diff --git a/articles/amd.html b/articles/amd.html deleted file mode 100644 index c0aaa6d..0000000 --- a/articles/amd.html +++ /dev/null @@ -1,142 +0,0 @@ - - - - - AMD — Spyware Watchdog - - - - -
- -
-

- UNFINISHED ARTICLE — UNDER CONSTRUCTION — BAD FORMATTING -

- AMD logo -

AMD CPU Family

-

- Advanced Micro Devices, Inc. is an American multinational - semiconductor company based in Santa Clara, California, that develops - computer processors and related technologies for business and consumer - markets. This article is specifically about the CPUs that are - produced by AMD and nothing else. The logo is one of many logos used - by AMD, but the article is not about any one specific CPU. - No rating is given because this is not an article about any - specific product, and the rating system is difficult to fit into this - article. -

-
-

- Modern CPU models produced by AMD contain an embedded ARM co-processor - called the Platform Security Processor (PSP). Nearly all AMD CPUs - produced since 2013 operate under the supervision of this separate, - more privileged, environment consisting of an integrated ARM processor - with access to isolated resources as well as main system memory and - I/O. - [1] -

-
-

- This article isn't complete. This is a work-in-progress and so this - article is not formatted properly... -

-

- http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf - (page 11) -

-
-

- While ARM and AMD tout the “Trusted Execution Environment” as useful - for secure payment, anti-theft and malware protection, they also - discuss content protection or DRM as a use case. - https://www.owasp.o../images/c/c8/OWASP_Security_Tapas_-_TrustZone%2C_TEE_and_Mobile_Security_final.pdf -

-

Possible uses … DRM

-

- Researchers have already been able to identify exploits in AMD’s - Platform Security Processor. In 2018 researchers published a - vulnerability in which a specially crafted certificate could lead to a - stack overflow in the PSP’s TPM firmware allowing for remote code - execution. (https://seclists.org/fulldisclosure/2018/Jan/12) Another - group goes on to detail how an attacker might leverage exploits - RYZENFALL or FALLOUT to gain foothold in networks with Ryzen based - systems. - (https://www.techpowerup.com/242386/cts-labs-responds-to-a-techpowerup-technical-questionnaire) -

-
-

- Please note that Family 16h and Family 15h-Models60h and later contain - a PSP -

-

NOT TRUSTED:

- -

POTENTIALLY TRUSTED:

- -
-
- -
- - diff --git a/articles/browsers.html b/articles/browsers.html deleted file mode 100644 index 3e7428b..0000000 --- a/articles/browsers.html +++ /dev/null @@ -1,44 +0,0 @@ - - - - - - - - - - - Browsers — Spyware Watchdog - - - -
- -
-

Browsers

-

The tier list has been deprecated for a while now, and was kept only for historical purposes. Because the deprecated page keeps getting linked to, it will be removed.

-
-

If you want a tier list, you can visit these sites: ShadowWiki [Tor] [I2P] or Digdeeper [Tor] [I2P]. These external resources don't represent the Online Spyware Watchdog as a site, and are simply used as a point of reference for those interested.

-
-
- -
- - diff --git a/articles/example_old.html b/articles/example_old.html deleted file mode 100644 index d9d2cf6..0000000 --- a/articles/example_old.html +++ /dev/null @@ -1,45 +0,0 @@ - - - - - - Spyware Watchdog - - - -

Example Article

-

Back to catalog

- Images are in the /images folder -

-This part of the article should have the name of the program and what it does, and who develops it. -

-

Spyware Level: Not Rated

-

-A breif explanation of what the software does, and a summary of the rest of the article, should go here. This paragraph is for readers -who don't want to read the entire article and it should assert all of the things that the rest of the article proves below. -

-

Spyware Feature X

-

-This program has spyware feature X in it. There should be some kind of proof here. If it doesn't contain original research, the source -should be cited like this: [1]. -

-
-

Sources

-

- 1. - Example Source - [web.archive.org] - [archive.is]
-

-
-

- This article was last edited on 7/30/2018 -

-

- If you want to edit this article, or contribute your own article(s), visit us at the git repo on Codeberg. All contributions must be licensed under the CC0 license to be accepted. -

- CC0 Liscence - - - - diff --git a/articles/foobar2000.html b/articles/foobar2000.html deleted file mode 100644 index 986efe3..0000000 --- a/articles/foobar2000.html +++ /dev/null @@ -1,25 +0,0 @@ - - - - - - - Spyware Watchdog - - -

foobar2000

-

Back to catalog

- foobar2000 Logo -

-foobar2000 is an advanced freeware audio player for the Windows platform. -

-

Spyware Level: Not Rated

-

-foobar2000 does not make its source code available, which could be hiding spyware features. -

-

- If you want to edit this article, or contribute your own article(s), visit us at the git repo on Codeberg. All contributions must be licensed under the CC0 license to be accepted. -

- CC0 License - - diff --git a/articles/godot.html b/articles/godot.html deleted file mode 100644 index 9bb93f8..0000000 --- a/articles/godot.html +++ /dev/null @@ -1,66 +0,0 @@ - - - - - Godot — Spyware Watchdog - - - - -
- -
- Godot Logo -

Godot

-

- Godot is a videogame engine -

-

Spyware Level: Not Rated

-

- Godot claims in its privacy policy1that they - collect the following data: - -

- -

-

Sources

-

Godot - privacy - policy - [archive.org] -

-
- -
- - diff --git a/articles/index.html b/articles/index.html index c931fd4..61aa402 100644 --- a/articles/index.html +++ b/articles/index.html @@ -22,7 +22,6 @@

Web Browsers

diff --git a/articles/index2.html b/articles/index2.html deleted file mode 100644 index 7681460..0000000 --- a/articles/index2.html +++ /dev/null @@ -1,39 +0,0 @@ - - - - - - - Spyware Watchdog - - -
- -

Online Spyware Classification Project Unfinished Article Catalog

-

-This is a catalog of all of the articles that are currently works-in-progress. The articles here are either unfinished, or not accurate and need to be edited before they can be added to the normal catalog. If you want to edit any of these articles, or contribute your own articles, visit us at the git repo on Codeberg. These articles need the most help, so feel free to contribute! -

-

The requested articles file also has a list of articles that have been requested, and the state of those - requests.

-
-

- Signal
- uTorrent
- - Nvidia Drivers
- - 1password
- foobar2000
- - Example Article
- Classification Guide
-

-

Other Options

-

- Main Catalog
- Back to Home
-

-
- - - diff --git a/articles/nvidia.html b/articles/nvidia.html deleted file mode 100644 index 8ea0468..0000000 --- a/articles/nvidia.html +++ /dev/null @@ -1,80 +0,0 @@ - - - - - - - Spyware Watchdog - - -

Nvidia Graphics Card Drivers

- Nvidia logo -

Back to catalog

- -

UNFINISHED ARTICLE- UNDER CONSTRUCTION

- -

This article is about the graphics card driver software used for modern Nvidia graphics cards. It is not about any one specific driver.

- -

Spyware Level: Not Rated

- -

- Nvidia produces graphics cards, and of course to use this hardware you need to install their drivers. Unfortunately Nvidia's drivers are riddled with - spyware and the installation process is a minefield of serious privacy pitfalls, with options selected by default that have serious privacy - implications they have if actually enabled. It isn't possible to install any of their drivers without bundled spyware being installed onto your computer, - which needs to be cleaned up after the installation. -

-

Nvidia's installer is bundled with other spyware programs

-

- When attempting to install an Nvidia graphics card driver you will be shown an option to install the spyware program GeForce Experience onto your computer. - This program is malware that is also developed by Nvidia as well, and has a huge range of serious privacy issues, including scanning and uploading information - about the files onto your computer to Nvidia. (An article about GeForce Experience is planned) -

- Nvidia driver installation screenshot -

Nvidia drivers install telemetry services onto the host machine

-

- When the installation is finished, these services will show up (This is on Windows 7): -

- Nvidia spyware services -

- These can at least be disabled like so: -

- Nvidia spyware service disable -

Nvidia telemetry domains can also be blocked at the hosts file although the source is two years old: -

-

-
-

Sources

-

- 1. - Section 14 of the HTTP/1.1 Specification - [webarchive.loc.gov] - [web.archive.org] - [archive.is] - [webarchive.nrscotland.gov.uk] - [www.webcitation.org] - [arquivo.pt] - [veebiarhiiv.digar.ee] - [webarchive.proni.gov.uk]
- Blocking Nvidia Domains
-

- - -
-

- This article was last edited on 7/22/2018 -

-

- If you want to edit this article, or contribute your own article(s), visit us at the git repo on Codeberg. All contributions must be licensed under the CC0 license to be accepted. -

- CC0 License - - diff --git a/articles/palemoon.html b/articles/palemoon.html index 55307ad..d80b97c 100644 --- a/articles/palemoon.html +++ b/articles/palemoon.html @@ -11,7 +11,7 @@

Pale Moon

Pale Moon is a fork of an old Firefox version, before the user interface change that put off many people. Version 28.4 was used to - write this article. This article replaces an old article (here). + write this article.

Spyware Level: Medium

diff --git a/articles/palemoon_es.html b/articles/palemoon_es.html index 50803d2..d316bfa 100644 --- a/articles/palemoon_es.html +++ b/articles/palemoon_es.html @@ -10,7 +10,7 @@ Pale Moon logo

Pale Moon

- Pale Moon es un fork de una versión vieja de Firefox, antes del cambio de interfaz de usuario que molestó a tanta gente. La versión 28.4 fue usada para escribir este artículo. Este artículo sirve de reemplazo para uno más viejo ([Inglés]). + Pale Moon es un fork de una versión vieja de Firefox, antes del cambio de interfaz de usuario que molestó a tanta gente. La versión 28.4 fue usada para escribir este artículo.

Nivel de Spyware: Medio

diff --git a/articles/palemoon_old.html b/articles/palemoon_old.html deleted file mode 100644 index 4f3abbf..0000000 --- a/articles/palemoon_old.html +++ /dev/null @@ -1,100 +0,0 @@ - - - - - - - Outdated Pale Moon — Spyware Watchdog - - - Pale Moon logo -

Pale Moon

-
-

Note: This article is outdated. Here is the updated version.

-
-

- Pale Moon is a fork of an old Firefox version, before the user interface change that put off many people. But is it a worthy alternative to FF in terms of privacy? Versions 27.7.2 and 28.1.0 were both tested for this article. -

-

-

Spyware Level: Medium

-

After following the mitigation guide, this software is Not Spyware. -

-

- Connects to a MASSIVE amount of trackers, and these requests can only be avoided on subsequent runs. Has geolocation, search suggestions, and auto-updates. Sends SSL certificates from the sites you visit. Together made 169 unsolicited requests upon my first run of it, but again, most of them can be avoided on subsequent runs. Pale Moon, in the end, has less privacy issues than Firefox, aside from its terrible start page, so the rating is Medium. -

-

First run

-

- If this is your first run of Pale Moon, it will automatically connect to its first run webpage (http://palemoon.org/firstrun.html), which in turn will make a bunch of requests for location-aware Google Ads. -

-

Pale Moon's start page

-

- By default, Pale Moon's start page is set to https://palemoon.start.me, and it will automatically make a connection to it upon its first run. That page will then (again) make a bunch of requests for various trackers — here is a list: -

-

- All these requests contain the Pale Moon start page referrer, so they know where you came from. They also all set uniquely identifying cookies, so if you come across another website with these trackers included, they will know you're the person from the Pale Moon's start page, and could start building a profile from your browsing habits. You can easily delete the cookies and change the start page so that it never appears again, but there is no way to avoid the requests being made upon Pale Moon's first run. - -

-

Blocking privacy-enhancing addons

-

-Pale Moon blocks privacy enhancing addons like NoScript, citing this rationale for -blocking such an imporant addon: "NoScript is known to cause severe issues with a large (and growing) number of websites. Unless finely tuned for every website visited, -NoScript will cause display issues and functional issues. "[1] So, it looks like Pale Moon's developers are actively working against the interests of its -privacy-concerned users, and would rather allow websites to execute malicious ECMAScript programs on unsuspecting user's machines, than to be blamed for a broken website. -To disable this blocklist, set extensions.blocklist.enabled to false in about:config. -

-

Auto-updates

-

- Pale Moon will automatically update itself, addons and search engines, as well as its blocklist.xml file with the addons it considers "malicious". Some of these can be turned off from the GUI, and some only from about:config. -

- -

Search Suggestions

-

The default search engine is the privacy-respecting DuckDuckGo, however search suggestions are enabled by default, which could send a request for every letter you've typed, all while you think it stays in-browser until you press Enter. Can be turned off by right-clicking the search bar. -

- -

Geolocation

-

Pale Moon connects to Mozilla's geolocation services.

- -

OCSP querying

-

Will automatically check every site's SSL certificate to see if it is valid, which necessitates sending it to a third party. Can be turned off from the GUI.

-
-
-

Sources

-

- - 1. - This Add-on to your browser has been blocked or disabled. - [web.archive.org] - [archive.is] -
- -

-
-

Credits

-

- This article was written by digdeeper.neocities.org
- Formatting changes and some sections were written by the site maintainer. -

-
-

- This article was created on 6/7/2018
- This article was last updated on 10/14/2018 -

-

- If you want to edit this article, or contribute your own article(s), visit us at the git repo on Codeberg. All contributions must be licensed under the CC0 license to be accepted. -

- CC0 License -

Back to catalog

-
- - diff --git a/articles/razer.html b/articles/razer.html index 221bb44..a241d7a 100644 --- a/articles/razer.html +++ b/articles/razer.html @@ -7,60 +7,64 @@ Razer — Spyware Watchdog - -

Razer

-
-

English Translation

-
-

Razer es una compañía que hace programas y hardware para videojugadores

-

Nivel de spyware: EXTREMADAMENTE ALTO

-

Información que recolecta

-

Razer confirma[1] que recolecta estos datos:

- -

Razer tambien admite[1] [2] que vende los datos de los usuarios

-

También dice que los empleados pueden ver esos datos.

-

Razer te obliga a crear una cuenta para usar sus productos

- -

¿Dónde está el botón para iniciar sesión en otro momento?

-

Sin una cuenta, no puedes configurar ni tu teclado ni tu ratón, no puedes cambiar el DPI del ratón (A no ser que haya un botón en el ratón para eso)

-

Basicamente, cada vez que abras el software para cambiar el color del ratón o lo que sea, Razer recibirá tus datos.

-

Estás obligado a conectarte a "la nube" para cargar configuraciones, esto quiere decir que las configuraciones de tu hardware están en el ordenador de otra persona, y saben quien las tiene (las configuraciones)

+ +

Razer

+
+

Spanish Article

+
+

Razer is a company that makes software and hardware for gamers.

-
-
-

Mas lecturas

- The Razer Synapse 2.0 spy ware -
-

Crédito

-

This article was written by: - qorg11 -

-
-

Referencias

-

1. Razer - Privacy Policy | Razer United States [archive.is]
+

Spyware level: EXTREMELY HIGH

+ +

Data collection

+

Razer confirms that they collect this data:

+ + +

+ Razer also admits[1][2] that they sell users' info. They also claim that the employees can see this data. + Razer FORCES you to create an account to use YOUR products. +

+ +

+ Where is the option "Sign in later" at? Without an account, you CAN'T configure your keyboard, + change your mouse DPI and RGB configuration and such, this means that the configurations you set to your (Razer) peripherals are in somebody + else's PC, and Razer knows who has that (your) info. +

+ +
+
+

Further reading

+ The Razer Synapse 2.0 spy ware +
+

Credit

+

This article was written by: + qorg11 +

+
+

References

+

1. Razer — Privacy Policy | Razer United States [archive.is]
2. The Razer Synapse 2.0 spy ware [archive.is]

- - - -
+

- This article was created on 3/4/2019 + This article was translated on 3/10/2019
+ This is a translation of the Spanish article. It may become outdated in the future. Check the dates on both articles.

If you want to edit this article, or contribute your own article(s), visit us at the git repo on Codeberg. All contributions must be licensed under the CC0 license to be accepted.

- CC0 Liscence + CC0 License

Back to catalog

- \ No newline at end of file + diff --git a/articles/razer_en.html b/articles/razer_en.html deleted file mode 100644 index a241d7a..0000000 --- a/articles/razer_en.html +++ /dev/null @@ -1,70 +0,0 @@ - - - - - - - Razer — Spyware Watchdog - - - -

Razer

-
-

Spanish Article

-
-

Razer is a company that makes software and hardware for gamers.

- -

Spyware level: EXTREMELY HIGH

- -

Data collection

-

Razer confirms that they collect this data:

- - -

- Razer also admits[1][2] that they sell users' info. They also claim that the employees can see this data. - Razer FORCES you to create an account to use YOUR products. -

- -

- Where is the option "Sign in later" at? Without an account, you CAN'T configure your keyboard, - change your mouse DPI and RGB configuration and such, this means that the configurations you set to your (Razer) peripherals are in somebody - else's PC, and Razer knows who has that (your) info. -

- -
-
-

Further reading

- The Razer Synapse 2.0 spy ware -
-

Credit

-

This article was written by: - qorg11 -

-
-

References

-

1. Razer — Privacy Policy | Razer United States [archive.is]
- 2. The Razer Synapse 2.0 spy ware [archive.is]

- -
-

- This article was translated on 3/10/2019
- This is a translation of the Spanish article. It may become outdated in the future. Check the dates on both articles. -

- -

- If you want to edit this article, or contribute your own article(s), visit us at the git repo on Codeberg. All contributions must be licensed under the CC0 license to be accepted. -

- CC0 License -

Back to catalog

-
- - diff --git a/articles/razer_es.html b/articles/razer_es.html new file mode 100644 index 0000000..221bb44 --- /dev/null +++ b/articles/razer_es.html @@ -0,0 +1,66 @@ + + + + + + + Razer — Spyware Watchdog + + + +

Razer

+
+

English Translation

+
+

Razer es una compañía que hace programas y hardware para videojugadores

+

Nivel de spyware: EXTREMADAMENTE ALTO

+

Información que recolecta

+

Razer confirma[1] que recolecta estos datos:

+ +

Razer tambien admite[1] [2] que vende los datos de los usuarios

+

También dice que los empleados pueden ver esos datos.

+

Razer te obliga a crear una cuenta para usar sus productos

+ +

¿Dónde está el botón para iniciar sesión en otro momento?

+

Sin una cuenta, no puedes configurar ni tu teclado ni tu ratón, no puedes cambiar el DPI del ratón (A no ser que haya un botón en el ratón para eso)

+

Basicamente, cada vez que abras el software para cambiar el color del ratón o lo que sea, Razer recibirá tus datos.

+

Estás obligado a conectarte a "la nube" para cargar configuraciones, esto quiere decir que las configuraciones de tu hardware están en el ordenador de otra persona, y saben quien las tiene (las configuraciones)

+ +
+
+

Mas lecturas

+ The Razer Synapse 2.0 spy ware +
+

Crédito

+

This article was written by: + qorg11 +

+
+

Referencias

+

1. Razer - Privacy Policy | Razer United States [archive.is]
+ 2. The Razer Synapse 2.0 spy ware [archive.is]

+ + + + +
+

+ This article was created on 3/4/2019 +

+ +

+ If you want to edit this article, or contribute your own article(s), visit us at the git repo on Codeberg. All contributions must be licensed under the CC0 license to be accepted. +

+ CC0 Liscence +

Back to catalog

+
+ + \ No newline at end of file diff --git a/articles/systemd.html b/articles/systemd.html deleted file mode 100644 index 8efae28..0000000 --- a/articles/systemd.html +++ /dev/null @@ -1,56 +0,0 @@ - - - - - - - Spyware Watchdog - - -

systemd

-

Back to catalog

-

This article is not accurate and needs to be rewritten

-

Spyware Level: Not Rated

-

-A lot of people asked me to write this article, so here is my attempt at writing it. Lots of people have lots of reasons to dislike systemd, and a lot of them wonder if -there is also a privacy reason to dislike systemd. But I have not ever heard of any kind of telemetry, phoning home, or any other kind of spyware in the systemd software -suite. systemd is free software so anyone can look at the code. And a lot of people have spent a lot of time cataloging why they don't like systemd. But if you read their -reasons, none of them mention any kind of spyware hiding inside of systemd's codebase that can be actually proven. So, I can't write that systemd is spyware until someone -can prove that it is spyware. If you have proof then feel free to email me and I will be happy to change this rating. -

-

-This line of reasoning for giving systemd a "Not Spyware" rating has some flaws, and the most obvious one is that it isn't reasonable to audit the 1 million lines of systemd -code for spyware. But this is still too generic of a criticism to make about it, because while in theory it is true, there needs to be real proof. Maybe the take-away is -that while there are many reasons to not like systemd, it's really probably not violating anyone's privacy, just because of how much scrutiny it has gotten. Maybe it should be -rated "Potential Spyware" or a lower, "Probably Not Spyware"? I think that the rating should be taken with a grain of salt because of this. -

-

-I have personally never used systemd and I don't have the skills to actually audit it or run tests on it myself. So this isn't a very good place to look when looking for reasons -to dislike systemd. At the very least, I can point to anti-systemd web pages that I am sure would be the first to report on systemd potentially violating the privacy of its users. -But I don't want to call them "sources" or anything because what they talk about is beyond the scope of this website. -

-
-

Anti systemd web pages

-

- systemd is the best example of Suck. - [web.archive.org] - [archive.is]
- - Arguments against systemd - [web.archive.org] - [archive.is]
- - Is systemd an NSA attempt? - -

-
-

- This article was last edited on 8/7/2018 -

-

- If you want to edit this article, or contribute your own article(s), visit us at the git repo on Codeberg. All contributions must be licensed under the CC0 license to be accepted. -

- CC0 License - - - diff --git a/articles/tiktok.html b/articles/tiktok.html deleted file mode 100644 index ae8f5ce..0000000 --- a/articles/tiktok.html +++ /dev/null @@ -1,102 +0,0 @@ - - - - - - - - - - - Tiktok — Spyware Watchdog - - - -
- -
- Images are in the ../images folder -

Tiktok

-

Work in progress

-

- Tiktok is a social media app allowing people to post short form videos, usually from a couple seconds - to up to 3 minutes long in length. -

-

- Like Discord, TikTok is spyware because all data goes through a central server, and multidues of data on you and your device are collected, sometimes even without your consent. -

-

- Tiktok collects mass amounts of data -

-

- Tiktok explicitly confirms in its privacy policy[1] - that it collects/can access the following information: -

-
    -
  • Age of user
  • -
  • ID cards (if submitted)
  • -
  • Device UUID
  • -
  • User's e-mail address
  • -
  • Content from your clipboard
  • -
  • All images and videos stored on your phone
  • - -
-

It also collects data from outside companies ("advertising partners") from third parties without your consent.

-

- Tiktok shares this data with companies in the business of spyware. -

-
-
- -
- - diff --git a/images/1pw_logo.png b/images/1pw_logo.png deleted file mode 100644 index 568ebc5..0000000 Binary files a/images/1pw_logo.png and /dev/null differ diff --git a/images/Signal-logo.png b/images/Signal-logo.png deleted file mode 100644 index 77c393c..0000000 Binary files a/images/Signal-logo.png and /dev/null differ diff --git a/images/amd_logo.png b/images/amd_logo.png deleted file mode 100644 index 7f272e0..0000000 Binary files a/images/amd_logo.png and /dev/null differ diff --git a/images/discord government requests.png b/images/discord government requests.png deleted file mode 100644 index 8fb11d7..0000000 Binary files a/images/discord government requests.png and /dev/null differ diff --git a/images/foobar_logo.png b/images/foobar_logo.png deleted file mode 100644 index c681119..0000000 Binary files a/images/foobar_logo.png and /dev/null differ diff --git a/images/godot_logo.png b/images/godot_logo.png deleted file mode 100644 index be9c4e5..0000000 Binary files a/images/godot_logo.png and /dev/null differ diff --git a/images/graybg.jpg b/images/graybg.jpg deleted file mode 100644 index c0e5dd4..0000000 Binary files a/images/graybg.jpg and /dev/null differ diff --git a/images/nvidia_bundling.png b/images/nvidia_bundling.png deleted file mode 100644 index 3e6f461..0000000 Binary files a/images/nvidia_bundling.png and /dev/null differ diff --git a/images/nvidia_logo.png b/images/nvidia_logo.png deleted file mode 100644 index f7b5347..0000000 Binary files a/images/nvidia_logo.png and /dev/null differ diff --git a/images/nvidia_spyware_disable.png b/images/nvidia_spyware_disable.png deleted file mode 100644 index 469d1b3..0000000 Binary files a/images/nvidia_spyware_disable.png and /dev/null differ diff --git a/images/nvidia_spyware_service.png b/images/nvidia_spyware_service.png deleted file mode 100644 index 9c33bfc..0000000 Binary files a/images/nvidia_spyware_service.png and /dev/null differ diff --git a/images/violation.png b/images/violation.png deleted file mode 100644 index d912f80..0000000 Binary files a/images/violation.png and /dev/null differ diff --git a/images/vivaldi_head.png b/images/vivaldi_head.png deleted file mode 100644 index cf61c9f..0000000 Binary files a/images/vivaldi_head.png and /dev/null differ diff --git a/requested_articles.txt b/requested_articles.txt deleted file mode 100644 index dfc1de5..0000000 --- a/requested_articles.txt +++ /dev/null @@ -1,92 +0,0 @@ -This text file is so that I can list all of the articles that -people have requested to be made, so that I don't forget about -anyone's request. If you are interested in writing articles -for the site and need help choosing something to review, this -list is a good place to start. - -1password — made a "stub" article: -https://spyware.neocities.org/articles/1password.html - -Ask.com services (excite, myway) — no progress has been made - -Merge information from http://archive.is/baCzK and https://www.ghacks.net/2016/02/08/steam-uses-insecure-out-of-date-chromium-browser/ -to the steam article, also run it through MITMproxy to find what requests it makes. — no progress has been made - -Create a new class of articles about browser addons, the following explicitly: -NoScript (allegedly phones home? needs a test to see if that's true or not...) -Stylish (definite spyware) -Ghostery - -No progress made on any of those ^ - -uTorrent — stub article: https://spyware.neocities.org/articles/utorrent.html - -Write about Razor mouse products: -Useful links: -https://www.razer.com/legal/privacy-policy -http://wp.xin.at/archives/1438 -For mitigation guides there's an easy way to run any program without letting it connect to the internet using scripts through iptables and there's always the --net=none option with firejail. -https://serverfault.com/questions/550276/how-to-block-internet-access-to-certain-programs-on-linux I use 'ni' instead of 'no-internet'. - -No progress has been made ^ - -Write about the oculus rift: -https://www.roadtovr.com/oculus-vr-privacy-policy-serves-needs-facebook-not-users/ -https://www.roadtovr.com/error-rendered-many-rifts-useless-simple-workaround/ - -No Progress ^ - -Write about privacy badger: https://www.eff.org/privacybadger#faq-Why-does-my-browser-connect-to-fastly.com-IP-addresses-on-startup-after-installing-Privacy-Badger - -Write about lenovo bundling spyware: -https://www.makeuseof.com/tag/security-failings-demonstrate-avoid-lenovo/ - -Write about HP bundling spyware: -https://www.extremetech.com/computing/259605-hp-caught-installing-spyware-windows-10-systems-without-permission-notification -https://www.engadget.com/2017/11/28/hp-quietly-installs-system-slowing-spyware-on-its-pcs/ - -Write about Dell bundling spyware: -https://www.techdirt.com/articles/20050530/2333212.shtml -https://arstechnica.com/information-technology/2015/11/dell-does-superfish-ships-pcs-with-self-signed-root-certificates/ - -Write about TOSHIBA bundling spyware: -https://www.shouldiremoveit.com/TOSHIBA-Service-Station-5383-program.aspx - -Write about Acer bundling spyware: -https://www.pcmag.com/article2/0,2817,2477704,00.asp - -Rate CPU's for spyware: -https://libreboot.org/faq.html#amd -https://libreboot.org/faq.html#intel - -Some progress made with that. See AMD CPU article. Still need to finish that. - -Write about visual studio — no progress -write about geary — no progress - -Add this tag to the top of everything: - - -Ublock Origin — No progress (phoning home? check privacy policy) - -> please add to overview browsers like Seamonkey, Srware Iron and Sphere -> browser: https://sphere.tenebris.cc - -Did Iron and Sphere - - -Write about the Bromite Android Browser - --I don't have an android phone. So someone else will have to write it, I don't have the means to do a reveiw of it. - -write articles about alternatives to Discord: - -Signal -XMPP -Mumble, etc. - -No progress has been made yet. - -Write an article about Facebook. -Write an article about TikTok. - diff --git a/wip/signal.html b/wip/signal.html deleted file mode 100644 index cf111d7..0000000 --- a/wip/signal.html +++ /dev/null @@ -1,70 +0,0 @@ - - - - - Signal - - - - -

Signal

-

-

Signal is a "private" instant messenger.

-

Spyware level: MEDIUM

-

You need to give Signal your phone number to work

-

You cannot create an account in Signal without giving it your phone number.

-

Signal is not completly Peer-To-Peer

-

Signal claims to be a Peer-To-Peer messenger. But this is not true because Signal stores your phone number in the servers.1

-

Signal has the decryption keys of their messages

-

- The Signal legal terms3 claims they have the - decryption keys:
- - "Additional technical information is stored on our servers, - including randomly generated authentication tokens, keys, push - tokens, and other material that is necessary to establish - calls and transmit messages. Signal limits this additional - technical information to the minimum required to operate the - Services." - -
- It also says it would give info to the government and law - enforcement agencies:
- - Third Parties. We work with third parties to provide some of our - Services. For example, our Third-Party Providers send a - verification code to your phone number when you register for our - Services. These providers are bound by their Privacy Policies to - safeguard that information. If you use other Third-Party - Services like YouTube, Spotify, Giphy, etc. in connection with - our Services, their Terms and Privacy Policies govern your use - of those services. - -
- Please note the "Services like youtube, spotify, giphy". Those - sites are in the Signal source code4, so they can spy - on you. - - Then, we have this:
- - Other instances where Signal may need to share your data - - To meet any applicable law, regulation, legal process or enforceable governmental request. - To enforce applicable Terms, including investigation of potential violations. - To detect, prevent, or otherwise address fraud, security, or technical issues. - To protect against harm to the rights, property, or safety of Signal, our users, or the public as required or permitted by law. - -
-

-

Further reading

-

Signal considered harmful

-

References

-
-

1: A Look Into Signal’s Encrypted Profiles

-

2: Request: Google Play signed download alternative

-

3: https://signal.org/legal/

-

4: https://signal.org/blog/signal-and-giphy-update/

-
- -