Merge pull request 'Removed deprecated/old stuff' (#121) from codddfeea/SpywareWatchdog_REWRITE:removing-old into master

Reviewed-on: https://codeberg.org/shadow/SpywareWatchdog/pulls/121
This commit is contained in:
anonymous 2022-04-20 06:19:55 +02:00
commit 084b583829
32 changed files with 118 additions and 1039 deletions

View File

@ -1,59 +0,0 @@
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<meta
http-equiv="Content-type"
content="application/xhtml+xml;charset=utf-8"
/>
<title>1Password — Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head>
<body>
<div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<img src="../images/1pw_logo.png" alt="1Password Logo" />
<h1>1Password</h1>
<p>
1password is a password management service
</p>
<h2>Spyware Level: <span class="red">Not Rated</span></h2>
<p>
This article is a stub and still needs to be written. If you want to
write it, email me so I don't duplicate effort.
https://1password.com/legal/privacy/
https://www.macworld.com/article/2996213/security/1password-is-still-secure-but-you-can-reduce-a-potential-risk.html
https://paul.reviews/privacy-password-managers-a-reality-check/
>Third-Party Data Processors >Your Secure and Service data are held by
third party data processors, who provide us with hosting and other
infrastructure services. The locations of these are described above.
In many cases (but we cannot promise that this will always be the
case) even Service data held by these entities is encrypted with keys
held only by us. >Data needed to process payments is collected by our
payment processor, Stripe, Inc., which conforms to a U.S.-E.U. Privacy
Shield Framework. See https://stripe.com/privacy-shield-policy
</p>
</div>
<hr />
<div class="footer">
<b>This article was created on 6/16/2018</b><br />
<b>This article was last edited on 6/16/2018</b>
<!--Dont change-->
<p>
If you want to edit this article, or contribute your own article(s), visit us
at the git repo on
<a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.
</p>
<p>
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="../LICENSE.txt">
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
</a>
<!--Dont change-->
</div>
</div>
</body>
</html>

View File

@ -1,142 +0,0 @@
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<meta
http-equiv="Content-type"
content="application/xhtml+xml;charset=utf-8"
/>
<title>AMD — Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head>
<body>
<div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<h1>
<span class="red">UNFINISHED ARTICLE — UNDER CONSTRUCTION — BAD FORMATTING</span>
</h1>
<img src="../images/amd_logo.png" alt="AMD logo" />
<h1>AMD CPU Family</h1>
<p>
Advanced Micro Devices, Inc. is an American multinational
semiconductor company based in Santa Clara, California, that develops
computer processors and related technologies for business and consumer
markets. This article is specifically about the CPUs that are
produced by AMD and nothing else. The logo is one of many logos used
by AMD, but the article is not about any one specific CPU.
<b>No rating is given</b> because this is not an article about any
specific product, and the rating system is difficult to fit into this
article.
</p>
<br />
<p>
Modern CPU models produced by AMD contain an embedded ARM co-processor
called the Platform Security Processor (PSP). Nearly all AMD CPUs
produced since 2013 operate under the supervision of this separate,
more privileged, environment consisting of an integrated ARM processor
with access to isolated resources as well as main system memory and
I/O.
<sup><a href="#s1">[1]</a></sup>
</p>
<br />
<p>
This article isn't complete. This is a work-in-progress and so this
article is not formatted properly...
</p>
<p>
http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf
(page 11)
</p>
<br />
<p>
While ARM and AMD tout the “Trusted Execution Environment” as useful
for secure payment, anti-theft and malware protection, they also
discuss content protection or DRM as a use case.
https://www.owasp.o../images/c/c8/OWASP_Security_Tapas_-_TrustZone%2C_TEE_and_Mobile_Security_final.pdf
</p>
<p>Possible uses … DRM</p>
<p>
Researchers have already been able to identify exploits in AMDs
Platform Security Processor. In 2018 researchers published a
vulnerability in which a specially crafted certificate could lead to a
stack overflow in the PSPs TPM firmware allowing for remote code
execution. (https://seclists.org/fulldisclosure/2018/Jan/12) Another
group goes on to detail how an attacker might leverage exploits
RYZENFALL or FALLOUT to gain foothold in networks with Ryzen based
systems.
(https://www.techpowerup.com/242386/cts-labs-responds-to-a-techpowerup-technical-questionnaire)
</p>
<hr/>
<p>
Please note that Family 16h and Family 15h-Models60h and later contain
a PSP
</p>
<h2><font color="red">NOT TRUSTED:</font></h2>
<ul>
<li>
Kaveri (Steamroller “BDv3”)
https://www.amd.com/system/files/TechDocs/51590_15h_Models_30h-3Fh_A-Series_PDS.pdf
(page 6)
https://arstechnica.com/information-technology/2012/06/amd-to-add-arm-processors-to-boost-chip-security/
</li>
<li>
Carrizo/Bristol Ridge (Excavator “BDv4”)
https://www.anandtech.com/show/8995/amd-at-isscc-2015-carrizo-and-excavator-details
</li>
<li>All Zen based CPUs (17h family)</li>
</ul>
<h2><font color="yellow">POTENTIALLY TRUSTED:</font></h2>
<ul>
<li>
Jaguar (the only 16h family CPU that does NOT have PSP):
http://support.amd.com/TechDocs/52128_16h_Software_Opt_Guide.zip
(page 8)
https://en.wikipedia.org/wiki/Puma_(microarchitecture)#Improvements_over_Jaguar
</li>
<li>
All K5-K10, Bobcat, Bulldozer (“BDv1”) and Piledriver (“BDv2”)
</li>
<li>
All K5-K10, Bobcat, Bulldozer (“BDv1”) and Piledriver (“BDv2”)
</li>
</ul>
</div>
<hr />
<div class="footer">
<div class="sources">
<h4>Sources:</h4>
<ol>
<li id="s1">
<a
href="http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf"
>AMD Security and Server innovation</a
>
<a
href="http://web.archive.org/web/20180422100442/http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf"
>[web.archive.org]</a
>
<a href="http://archive.vn/7dYOZ">[archive.vn]</a><br />
</li>
</ol>
</div>
<hr />
<b>This article was last edited on 1/10/2019</b>
<!--Dont change-->
<p>
If you want to edit this article, or contribute your own article(s), visit us
at the git repo on
<a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.
</p>
<p>
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="../LICENSE.txt"
><img class="icon" src="../images/cc0.png" alt="CC0 License"
/></a>
<!--Dont change-->
</div>
</div>
</body>
</html>

View File

@ -1,44 +0,0 @@
<!-- NOTICE!!!! -->
<!-- BEFORE MAKING A PULL REQUEST OR PUSH PLEASE ALWAYS CHECK WITH THE VALIDATOR -->
<!-- http://validator.w3.org/#validate-by-input -->
<!-- NOTICE!!!! -->
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<title>Browsers — Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head>
<body>
<div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<h1>Browsers</h1>
<p>The tier list has been deprecated for a while now, and was kept only for historical purposes. Because the deprecated page keeps getting linked to, it will be removed.</p>
<br/>
<p>If you want a tier list, you can visit these sites: <a href="https://tilde.club/~acz/shadow_wiki/browsers.xhtml">ShadowWiki</a> <a href="http://abrx6wcpzkfpwxb5eb2wsra2wnkrv2macdtkpnrepswodz5jxd4schyd.onion/browsers.xhtml">[Tor]</a> <a href="http://63gxkfc4hlcbxrdoepw2i2hyxai5qkxmi636ag3y7sf5tq3imoya.b32.i2p/browsers.xhtml">[I2P]</a> or <a href="https://digdeeper.neocities.org/ghost/browsers.html">Digdeeper</a> <a href="http://digdeep4orxw6psc33yxa2dgmuycj74zi6334xhxjlgppw6odvkzkiad.onion/ghost/browsers.html">[Tor]</a> <a href="http://kbbd6h7kg32va4indf7efc4rhdfet6zm7466fntzgc634va3k2pa.b32.i2p/ghost/browsers.html">[I2P]</a>. These external resources don't represent the Online Spyware Watchdog as a site, and are simply used as a point of reference for those interested.</p>
</div>
<hr/>
<div class="footer">
<b>This article was created on 2/10/2021</b><br/>
<b>This article was last edited on 2/10/2021</b>
<!--Dont change-->
<p>
If you want to edit this article, or contribute your own article(s), visit us
at the git repo on
<a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.
</p>
<p>
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="../LICENSE.txt">
<img class="icon" src="../images/cc0.png" alt="CC0 License"/>
</a>
<!--Dont change-->
</div>
</div>
</body>
</html>

View File

@ -1,45 +0,0 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
</head>
<body>
<meta name="viewport" content="width=device-width, initial-scale=1">
<h1>Example Article</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/example_logo.png" alt="Images are in the /images folder">
<p>
This part of the article should have the name of the program and what it does, and who develops it.
</p>
<h2>Spyware Level: <font color="lime">Not Rated</font></h2>
<p>
A breif explanation of what the software does, and a summary of the rest of the article, should go here. This paragraph is for readers
who don't want to read the entire article and it should assert all of the things that the rest of the article proves below.
</p>
<h3>Spyware Feature X</h3>
<p>
This program has spyware feature X in it. There should be some kind of proof here. If it doesn't contain original research, the source
should be cited like this: <sup><a href="#1">[1]</a></sup>.
</p>
<hr>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
<a href="http://example.com/">Example Source</a>
<a href="http://web.archive.org/web/20180729230956/http://example.com/">[web.archive.org]</a>
<a href="http://archive.is/tgJjl">[archive.is]</a><br>
</p>
<hr>
<p><b>
This article was last edited on 7/30/2018
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
</p>
<a href="../LICENSE.txt"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
</body>
</html>

View File

@ -1,25 +0,0 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
</head>
<body>
<h1>foobar2000</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/foobar_logo.png" alt="foobar2000 Logo">
<p>
foobar2000 is an advanced freeware audio player for the Windows platform.
</p>
<h2>Spyware Level: <font color=yellow>Not Rated</font></h2>
<p>
foobar2000 does not make its source code available, which could be hiding spyware features.
</p>
<p>
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
</p>
<a href="../LICENSE.txt"><img src="../images/cc0.png" alt="CC0 License"></a>
</body>
</html>

View File

@ -1,66 +0,0 @@
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<meta
http-equiv="Content-type"
content="application/xhtml+xml;charset=utf-8"
/>
<title>Godot — Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head>
<body>
<div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<img src="../images/godot_logo.png" alt="Godot Logo" />
<h1>Godot</h1>
<p>
Godot is a videogame engine
</p>
<h2>Spyware Level: <span class="red">Not Rated</span></h2>
<p>
Godot claims in its privacy policy<sup>1</sup>that they
collect the following data:
<ul>
<li>your first and last name</li>
<li>your title and your companys name</li>
<li>your home, billing, name of a city or town,
state/province</li>
<li>your country code</li>
<li>your e-mail address</li>
<li>your telephone number</li>
<li>any other identifier that permits Godot to make
physical or online contact with you</li>
</ul>
</p>
<h3>Sources</h3>
<p><a href="https://godotengine.org/privacy-policy">Godot
privacy
policy</a><a href="https://web.archive.org/web/20200918125741/https://godotengine.org/privacy-policy">
[archive.org]</a>
</div>
<hr />
<div class="footer">
<b>This article was created on 2020-11-02</b><br />
<b>This article was last edited on 2020-11-02</b>
<!--Dont change-->
<p>
If you want to edit this article, or contribute your own article(s), visit us
at the git repo on
<a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.
</p>
<p>
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="../LICENSE.txt">
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
</a>
<!--Dont change-->
</div>
</div>
</body>
</html>

View File

@ -22,7 +22,6 @@
<div class="directory-list"> <div class="directory-list">
<h2>Web Browsers</h2> <h2>Web Browsers</h2>
<ul> <ul>
<li><a href="../articles/browsers.html">Comparison between web browsers</a></li>
<li><a href="../articles/badwolf.html">BadWolf</a> <a href="../articles/badwolf_de.html">[deutsch]</a> </li> <li><a href="../articles/badwolf.html">BadWolf</a> <a href="../articles/badwolf_de.html">[deutsch]</a> </li>
<li><a href="../articles/brave.html">Brave</a> <a href="../articles/brave_ru.html">[Русский]</a></li> <li><a href="../articles/brave.html">Brave</a> <a href="../articles/brave_ru.html">[Русский]</a></li>
<li><a href="../articles/chrome.html">Google Chrome</a> <a href="../articles/chrome_es.html">[Español]</a> <a href="chrome_pl.html">[Polski]</a></li> <li><a href="../articles/chrome.html">Google Chrome</a> <a href="../articles/chrome_es.html">[Español]</a> <a href="chrome_pl.html">[Polski]</a></li>
@ -83,7 +82,7 @@
<li><a href="../articles/steam.html">Steam</a> <a href="../articles/steam_ru.html">[Русский]</a></li> <li><a href="../articles/steam.html">Steam</a> <a href="../articles/steam_ru.html">[Русский]</a></li>
<li><a href="../articles/redshell.html">Red Shell</a></li> <li><a href="../articles/redshell.html">Red Shell</a></li>
<li><a href="../articles/unity.html">Unity</a></li> <li><a href="../articles/unity.html">Unity</a></li>
<li><a href="../articles/razer_en.html">Razer</a> <a href="../articles/razer.html">[Español]</a></li> <li><a href="../articles/razer.html">Razer</a> <a href="../articles/razer_es.html">[Español]</a></li>
<li><a href="../articles/ksp.html">Kerbal Space Program</a></li> <li><a href="../articles/ksp.html">Kerbal Space Program</a></li>
<li><a href="../articles/gzdoom.html">GZDoom</a></li> <li><a href="../articles/gzdoom.html">GZDoom</a></li>
</ul> </ul>

View File

@ -1,39 +0,0 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang="en-us">
<head>
<link rel="stylesheet" href="../style.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
</head>
<body>
<center>
<h1>Online Spyware Classification Project Unfinished Article Catalog</h1>
<p>
This is a catalog of all of the articles that are currently works-in-progress. The articles here are either unfinished, or not accurate and need to be edited before they can be added to the normal catalog. If you want to edit any of these articles, or contribute your own articles, visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. These articles need the most help, so feel free to contribute!
</p>
<p>The <a href="../requested_articles.txt">requested articles</a> file also has a list of articles that have been requested, and the state of those
requests.</p>
<hr>
<p>
<a href="../articles/signal.html">Signal</a><br>
<a href="../articles/utorrent.html">uTorrent</a><br>
<a href="../articles/nvidia.html">Nvidia Drivers</a><br>
<a href="../articles/1password.html">1password</a><br>
<a href="../articles/foobar2000.html">foobar2000</a><br>
<a href="../articles/example.html">Example Article</a><br>
<a href="../guides/classify.html">Classification Guide</a><br>
</p>
<h3>Other Options</h3>
<p>
<a href="../articles/index.html">Main Catalog</a><br>
<a href="../index.html">Back to Home</a><br>
</p>
</center>
</body>
</html>

View File

@ -1,80 +0,0 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
</head>
<body>
<h1>Nvidia Graphics Card Drivers</h1>
<img src="../images/nvidia_logo.png" alt="Nvidia logo">
<p><a href="../articles/index.html">Back to catalog</a></p>
<h2>UNFINISHED ARTICLE- UNDER CONSTRUCTION</h2>
<p>This article is about the graphics card driver software used for modern Nvidia graphics cards. It is not about any one specific driver.</p>
<h2>Spyware Level: <font color=red>Not Rated</font></h2>
<p>
Nvidia produces graphics cards, and of course to use this hardware you need to install their drivers. Unfortunately Nvidia's drivers are riddled with
spyware and the installation process is a minefield of serious privacy pitfalls, with options selected by default that have serious privacy
implications they have if actually enabled. It isn't possible to install any of their drivers without bundled spyware being installed onto your computer,
which needs to be cleaned up after the installation.
</p>
<h3>Nvidia's installer is bundled with other spyware programs</h3>
<p>
When attempting to install an Nvidia graphics card driver you will be shown an option to install the spyware program GeForce Experience onto your computer.
This program is malware that is also developed by Nvidia as well, and has a huge range of serious privacy issues, including scanning and uploading information
about the files onto your computer to Nvidia. (An article about GeForce Experience is planned)
</p>
<img src="../images/nvidia_bundling.png" alt="Nvidia driver installation screenshot">
<h3>Nvidia drivers install telemetry services onto the host machine</h3>
<p>
When the installation is finished, these services will show up (This is on Windows 7):
</p>
<img src="../images/nvidia_spyware_service.png" alt="Nvidia spyware services">
<p>
These can at least be disabled like so:
</p>
<img src="../images/nvidia_spyware_disable.png" alt="Nvidia spyware service disable">
<p>Nvidia telemetry domains can also be blocked at the hosts file although the source is two years old:
<ul>
<li>0.0.0.0 telemetry.gfe.nvidia.com</li>
<li>0.0.0.0 gfe.nvidia.com</li>
<li>0.0.0.0 services.gfe.nvidia.com</li>
<li>0.0.0.0 accounts.nvgs.nvidia.com</li>
<li>0.0.0.0 events.gfe.nvidia.com</li>
<li>0.0.0.0 images.nvidiagrid.net</li>
<li>0.0.0.0 rds-assets.nvidia.com</li>
<li>0.0.0.0 assets.nvidiagrid.net</li>
</ul>
</p>
<hr>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
<a href="https://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">Section 14 of the HTTP/1.1 Specification</a>
<a href="http://webarchive.loc.gov/all/20160922055153/http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[webarchive.loc.gov]</a>
<a href="https://web.archive.org/web/20180522154719/http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[web.archive.org]</a>
<a href="http://archive.is/20180425174415/https://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[archive.is]</a>
<a href="https://webarchive.nrscotland.gov.uk/20170610193333/http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[webarchive.nrscotland.gov.uk]</a>
<a href="http://www.webcitation.org/6tcP2LTQW">[www.webcitation.org]</a>
<a href="http://arquivo.pt/wayback/20160108175646/http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[arquivo.pt]</a>
<a href="http://veebiarhiiv.digar.ee/a/20150704125123/http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[veebiarhiiv.digar.ee]</a>
<a href="http://webarchive.proni.gov.uk/20110424091530/http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[webarchive.proni.gov.uk]</a><br>
<a href="https://web.archive.org/web/20180410192231/https://www.reddit.com/r/nvidia/comments/8b5nej/updated_remove_mandatory_login_of_geforce/">Blocking Nvidia Domains</a><br>
</p>
<hr>
<p><b>
This article was last edited on 7/22/2018
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
</p>
<a href="../LICENSE.txt"><img src="../images/cc0.png" alt="CC0 License"></a>
</body>
</html>

View File

@ -11,7 +11,7 @@
<h1>Pale Moon</h1> <h1>Pale Moon</h1>
<p> <p>
Pale Moon is a fork of an old <a href="../articles/firefox.html">Firefox</a> version, before the user interface change that put off many people. Version 28.4 was used to Pale Moon is a fork of an old <a href="../articles/firefox.html">Firefox</a> version, before the user interface change that put off many people. Version 28.4 was used to
write this article. This article replaces an old article (<a href="../articles/palemoon_old.html">here</a>). write this article.
</p> </p>
<p> <p>
<h2>Spyware Level: <font color=yellow>Medium</font></h2> <h2>Spyware Level: <font color=yellow>Medium</font></h2>

View File

@ -10,7 +10,7 @@
<img src="../images/palemoon_logo.png" alt="Pale Moon logo"> <img src="../images/palemoon_logo.png" alt="Pale Moon logo">
<h1>Pale Moon</h1> <h1>Pale Moon</h1>
<p> <p>
Pale Moon es un fork de una versión vieja de <a href="../articles/firefox_es.html">Firefox</a>, antes del cambio de interfaz de usuario que molestó a tanta gente. La versión 28.4 fue usada para escribir este artículo. Este artículo sirve de reemplazo para uno más viejo (<a href="../articles/palemoon_old.html">[Inglés]</a>). Pale Moon es un fork de una versión vieja de <a href="../articles/firefox_es.html">Firefox</a>, antes del cambio de interfaz de usuario que molestó a tanta gente. La versión 28.4 fue usada para escribir este artículo.
</p> </p>
<p> <p>
<h2>Nivel de Spyware: <font color=yellow>Medio</font></h2> <h2>Nivel de Spyware: <font color=yellow>Medio</font></h2>

View File

@ -1,100 +0,0 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<meta charset="UTF-8">
<title>Outdated Pale Moon — Spyware Watchdog</title>
</head>
<body>
<img src="../images/palemoon_logo.png" alt="Pale Moon logo">
<h1>Pale Moon</h1>
<center>
<h3><font color=red>Note: This article is outdated. <a href="../articles/palemoon.html">Here</a> is the updated version. </font></h3>
</center>
<p>
Pale Moon is a fork of an old <a href="../articles/firefox.html">Firefox</a> version, before the user interface change that put off many people. But is it a worthy alternative to FF in terms of privacy? Versions 27.7.2 and 28.1.0 were both tested for this article.
</p>
<p>
<h2>Spyware Level: <font color=yellow>Medium</font></h2>
<p>After following the <a href="/guides/palemoon.html">mitigation guide</a>, this software is <font color=lime><b>Not Spyware</b></font>.
</p>
<p>
Connects to a MASSIVE amount of trackers, and these requests can <b>only be avoided on subsequent runs</b>. Has geolocation, search suggestions, and auto-updates. Sends SSL certificates from the sites you visit. Together made 169 unsolicited requests upon my first run of it, but again, most of them can be avoided on subsequent runs. Pale Moon, in the end, has less privacy issues than Firefox, aside from its terrible start page, so the rating is Medium.
</p>
<h3>First run</h3>
<p>
If this is your first run of Pale Moon, it will automatically connect to its first run webpage (http://palemoon.org/firstrun.html), which in turn will make a bunch of requests for location-aware Google Ads.
</p>
<h3>Pale Moon's start page</h3>
<p>
By default, Pale Moon's start page is set to https://palemoon.start.me, and it will automatically make a connection to it upon its first run. That page will then (again) make a bunch of requests for various trackers — here is a list:
<ul>
<li>Google Ads (location-aware)</li>
<li>Facebook (so if you're logged in, they know who you are)</li>
<li>Quantserve ("Quantcast is an American technology company, founded in 2006, that specializes in audience measurement and real-time advertising.")</li>
<li>Amazon Ads</li>
<li>Criteo ("Criteo is a personalized retargeting company that works with Internet retailers to serve personalized online display advertisements to consumers who have previously visited the advertiser's website.")</li>
<li>Scorecardresearch ("ScorecardResearch conducts research by collecting Internet web browsing data and then uses that data to help show how people use the Internet")</li>
<li>HubSpot ("HubSpot is an inbound marketing and sales platform that helps companies attract visitors, convert leads, and close customers.")</li>
<li>Alexa Metrics</li>
<li>Twitter Ads and Analytics</li>
<li>A few others</li>
</ul>
<p>
All these requests contain the Pale Moon start page referrer, so they know where you came from. They also all set uniquely identifying cookies, so if you come across another website with these trackers included, they will know you're the person from the Pale Moon's start page, and could start building a profile from your browsing habits. You can easily delete the cookies and change the start page so that it never appears again, but <b>there is no way to avoid the requests being made upon Pale Moon's first run.</b>
</p>
<h3>Blocking privacy-enhancing addons</h3>
<p>
Pale Moon blocks privacy enhancing addons like NoScript, citing this rationale for
blocking such an imporant addon: <i>"NoScript is known to cause severe issues with a large (and growing) number of websites. Unless finely tuned for every website visited,
NoScript will cause display issues and functional issues. "</i><sup><a href="#1">[1]</a></sup> So, it looks like Pale Moon's developers are actively working against the interests of its
privacy-concerned users, and would rather allow websites to execute malicious ECMAScript programs on unsuspecting user's machines, than to be blamed for a broken website.
<b><font color=yellow>To disable this blocklist, set extensions.blocklist.enabled to false in about:config.</font></b>
</p>
<h3>Auto-updates</h3>
<p>
Pale Moon will automatically update itself, addons and search engines, as well as its blocklist.xml file with the addons it considers "malicious". Some of these can be turned off from the GUI, and some only from about:config.
</p>
<h3>Search Suggestions</h3>
<p>The default search engine is the privacy-respecting DuckDuckGo, however search suggestions are enabled by default, which could send a request for every letter you've typed, all while you think it stays in-browser until you press Enter. Can be turned off by right-clicking the search bar.
</p>
<h3>Geolocation</h3>
<p>Pale Moon connects to Mozilla's geolocation services.</p>
<h3>OCSP querying</h3>
<p>Will automatically check every site's SSL certificate to see if it is valid, which necessitates sending it to a third party. Can be turned off from the GUI.</p>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
<a href="http://blocklist.palemoon.org/info/?id=pm112">This Add-on to your browser has been blocked or disabled.</a>
<a href="https://web.archive.org/web/20180514135250/http://blocklist.palemoon.org/info/?id=pm112">[web.archive.org]</a>
<a href="http://archive.is/EiraE">[archive.is]</a>
<br>
</p>
<hr>
<h2>Credits</h2>
<p>
This article was written by <a href="https://digdeeper.neocities.org/">digdeeper.neocities.org</a><br>
Formatting changes and some sections were written by the site maintainer.
</p>
<hr>
<p><b>
This article was created on 6/7/2018<br>
This article was last updated on 10/14/2018
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -7,59 +7,63 @@
<title>Razer — Spyware Watchdog</title> <title>Razer — Spyware Watchdog</title>
</head> </head>
<body> <body>
<img src="../images/razer_logo.png"> <img src="../images/razer_logo.png">
<h1>Razer</h1> <h1>Razer</h1>
<center> <center>
<p><a href="../articles/razer_en.html">English Translation</a></p> <p><a href="../articles/razer.html">Spanish Article</a></p>
</center> </center>
<p>Razer es una compañía que hace programas y hardware para videojugadores</p> <p>Razer is a company that makes software and hardware for gamers.</p>
<h2>Nivel de spyware: <b style="color:red;">EXTREMADAMENTE ALTO</b></h2>
<h3>Información que recolecta</h3>
<p>Razer confirma<sup><a href="#1">[1]</a></sup> que recolecta estos datos:</p>
<ul>
<li>Correo electrónico</li>
<li>Nombre</li>
<li>Información de contacto</li>
<li>La información que envias cuando los contactas (mensaje y demás)</li>
<li>El tiempo que usas sus productos/servicios</li>
<li>Los datos que envias en encuestas</li>
<li>Dirección IP, geolocalización, sistema operativo, navegador</li>
</ul>
<p>Razer tambien admite<sup><a href="#1">[1]</a> <a href="#2">[2]</a> </sup>que vende los datos de los usuarios</p>
<p>También dice que los empleados pueden ver esos datos.</p>
<h3>Razer te obliga a crear una cuenta para usar sus productos</h3>
<img class="screenshot" src="../images/theevidence.png">
<p style="font-family:monospace">¿Dónde está el botón para iniciar sesión en otro momento?</p>
<p>Sin una cuenta, no puedes configurar ni tu teclado ni tu ratón, no puedes cambiar el DPI del ratón (A no ser que haya un botón en el ratón para eso)</p>
<p>Basicamente, cada vez que abras el software para cambiar el color del ratón o lo que sea, Razer recibirá tus datos.</p>
<p>Estás obligado a conectarte a "la nube" para cargar configuraciones, esto quiere decir que las configuraciones de tu hardware están en el ordenador de otra persona, y saben quien las tiene (las configuraciones)</p>
<hr> <h2>Spyware level: <b style="color:red;">EXTREMELY HIGH</b></h2>
<center>
<h2>Mas lecturas</h2> <h3>Data collection</h3>
<a href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a> <p>Razer confirms that they collect this data:</p>
<hr> <ul>
<h2>Crédito</h2>
<p>This article was written by: <li>E-mail</li>
<a href="mailto:qorg[@]vxempire.xyz">qorg11</a> <li>Full name</li>
</p> <li>Contact info</li>
<hr> <li>Info you send when you contact them (texts and such)</li>
<h2>Referencias</h2> <li>The time you use their services and products</li>
<p>1. <a id="1" href="https://www.razer.com/legal/privacy-policy">Razer - Privacy Policy | Razer United States</a> <a href="https://archive.fo/sVOGz">[archive.is]</a><br> <li>Info you send via polls</li>
<li>IP, geolocation, OS and browser version</li>
</ul>
<p>
Razer also admits<sup><a href="#1">[1]</a><a href="#2">[2]</a></sup> that they sell users' info. They also claim that the employees can see this data.
Razer FORCES you to create an account to use YOUR products.
</p>
<img class="screenshot" src="../images/theevidence.png">
<p>
Where is the option "Sign in later" at? Without an account, you CAN'T configure your keyboard,
change your mouse DPI and RGB configuration and such, this means that the configurations you set to your (Razer) peripherals are in somebody
else's PC, and Razer knows who has that (your) info.
</p>
<hr>
<center>
<h2>Further reading</h2>
<a href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a>
<hr>
<h2>Credit</h2>
<p>This article was written by:
<a href="mailto:qorg[@]vxempire.xyz">qorg11</a>
</p>
<hr>
<h2>References</h2>
<p>1. <a id="1" href="https://www.razer.com/legal/privacy-policy">Razer — Privacy Policy | Razer United States</a> <a href="https://archive.fo/sVOGz">[archive.is]</a><br>
2. <a id="2" href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a> <a href="https://archive.fo/sjgDR">[archive.is]</a></p> 2. <a id="2" href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a> <a href="https://archive.fo/sjgDR">[archive.is]</a></p>
<hr>
<hr>
<p><b> <p><b>
This article was created on 3/4/2019 This article was translated on 3/10/2019<br>
This is a translation of the Spanish article. It may become outdated in the future. Check the dates on both articles.
</b></p> </b></p>
<p> <p>
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted. If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
</p> </p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a> <a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
<p><a href="../articles/index.html">Back to catalog</a></p> <p><a href="../articles/index.html">Back to catalog</a></p>
</center> </center>
</body> </body>

View File

@ -1,70 +0,0 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang="en-us">
<head>
<link rel="stylesheet" href="../style.css">
<meta charset="UTF-8">
<title>Razer — Spyware Watchdog</title>
</head>
<body>
<img src="../images/razer_logo.png">
<h1>Razer</h1>
<center>
<p><a href="../articles/razer.html">Spanish Article</a></p>
</center>
<p>Razer is a company that makes software and hardware for gamers.</p>
<h2>Spyware level: <b style="color:red;">EXTREMELY HIGH</b></h2>
<h3>Data collection</h3>
<p>Razer confirms that they collect this data:</p>
<ul>
<li>E-mail</li>
<li>Full name</li>
<li>Contact info</li>
<li>Info you send when you contact them (texts and such)</li>
<li>The time you use their services and products</li>
<li>Info you send via polls</li>
<li>IP, geolocation, OS and browser version</li>
</ul>
<p>
Razer also admits<sup><a href="#1">[1]</a><a href="#2">[2]</a></sup> that they sell users' info. They also claim that the employees can see this data.
Razer FORCES you to create an account to use YOUR products.
</p>
<img class="screenshot" src="../images/theevidence.png">
<p>
Where is the option "Sign in later" at? Without an account, you CAN'T configure your keyboard,
change your mouse DPI and RGB configuration and such, this means that the configurations you set to your (Razer) peripherals are in somebody
else's PC, and Razer knows who has that (your) info.
</p>
<hr>
<center>
<h2>Further reading</h2>
<a href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a>
<hr>
<h2>Credit</h2>
<p>This article was written by:
<a href="mailto:qorg[@]vxempire.xyz">qorg11</a>
</p>
<hr>
<h2>References</h2>
<p>1. <a id="1" href="https://www.razer.com/legal/privacy-policy">Razer — Privacy Policy | Razer United States</a> <a href="https://archive.fo/sVOGz">[archive.is]</a><br>
2. <a id="2" href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a> <a href="https://archive.fo/sjgDR">[archive.is]</a></p>
<hr>
<p><b>
This article was translated on 3/10/2019<br>
This is a translation of the Spanish article. It may become outdated in the future. Check the dates on both articles.
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

66
articles/razer_es.html Normal file
View File

@ -0,0 +1,66 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang="en-us">
<head>
<link rel="stylesheet" href="../style.css">
<meta charset="UTF-8">
<title>Razer — Spyware Watchdog</title>
</head>
<body>
<img src="../images/razer_logo.png">
<h1>Razer</h1>
<center>
<p><a href="../articles/razer_en.html">English Translation</a></p>
</center>
<p>Razer es una compañía que hace programas y hardware para videojugadores</p>
<h2>Nivel de spyware: <b style="color:red;">EXTREMADAMENTE ALTO</b></h2>
<h3>Información que recolecta</h3>
<p>Razer confirma<sup><a href="#1">[1]</a></sup> que recolecta estos datos:</p>
<ul>
<li>Correo electrónico</li>
<li>Nombre</li>
<li>Información de contacto</li>
<li>La información que envias cuando los contactas (mensaje y demás)</li>
<li>El tiempo que usas sus productos/servicios</li>
<li>Los datos que envias en encuestas</li>
<li>Dirección IP, geolocalización, sistema operativo, navegador</li>
</ul>
<p>Razer tambien admite<sup><a href="#1">[1]</a> <a href="#2">[2]</a> </sup>que vende los datos de los usuarios</p>
<p>También dice que los empleados pueden ver esos datos.</p>
<h3>Razer te obliga a crear una cuenta para usar sus productos</h3>
<img class="screenshot" src="../images/theevidence.png">
<p style="font-family:monospace">¿Dónde está el botón para iniciar sesión en otro momento?</p>
<p>Sin una cuenta, no puedes configurar ni tu teclado ni tu ratón, no puedes cambiar el DPI del ratón (A no ser que haya un botón en el ratón para eso)</p>
<p>Basicamente, cada vez que abras el software para cambiar el color del ratón o lo que sea, Razer recibirá tus datos.</p>
<p>Estás obligado a conectarte a "la nube" para cargar configuraciones, esto quiere decir que las configuraciones de tu hardware están en el ordenador de otra persona, y saben quien las tiene (las configuraciones)</p>
<hr>
<center>
<h2>Mas lecturas</h2>
<a href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a>
<hr>
<h2>Crédito</h2>
<p>This article was written by:
<a href="mailto:qorg[@]vxempire.xyz">qorg11</a>
</p>
<hr>
<h2>Referencias</h2>
<p>1. <a id="1" href="https://www.razer.com/legal/privacy-policy">Razer - Privacy Policy | Razer United States</a> <a href="https://archive.fo/sVOGz">[archive.is]</a><br>
2. <a id="2" href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a> <a href="https://archive.fo/sjgDR">[archive.is]</a></p>
<hr>
<p><b>
This article was created on 3/4/2019
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
</p>
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html>

View File

@ -1,56 +0,0 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
</head>
<body>
<h1>systemd</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<h1><font color=red>This article is not accurate and needs to be rewritten</font></h1>
<h2>Spyware Level: <font color="yellow">Not Rated</font></h2>
<p>
A lot of people asked me to write this article, so here is my attempt at writing it. Lots of people have lots of reasons to dislike systemd, and a lot of them wonder if
there is also a privacy reason to dislike systemd. But I have not ever heard of any kind of telemetry, phoning home, or any other kind of spyware in the systemd software
suite. systemd is free software so anyone can look at the code. And a lot of people have spent a lot of time cataloging why they don't like systemd. But if you read their
reasons, none of them mention any kind of spyware hiding inside of systemd's codebase that can be actually proven. So, I can't write that systemd is spyware until someone
can prove that it is spyware. If you have proof then feel free to email me and I will be happy to change this rating.
</p>
<p>
This line of reasoning for giving systemd a "Not Spyware" rating has some flaws, and the most obvious one is that it isn't reasonable to audit the 1 million lines of systemd
code for spyware. But this is still too generic of a criticism to make about it, because while in theory it is true, there needs to be real proof. Maybe the take-away is
that while there are many reasons to not like systemd, it's really probably not violating anyone's privacy, just because of how much scrutiny it has gotten. Maybe it should be
rated "Potential Spyware" or a lower, "Probably Not Spyware"? I think that the rating should be taken with a grain of salt because of this.
</p>
<p>
I have personally never used systemd and I don't have the skills to actually audit it or run tests on it myself. So this isn't a very good place to look when looking for reasons
to dislike systemd. At the very least, I can point to anti-systemd web pages that I am sure would be the first to report on systemd potentially violating the privacy of its users.
But I don't want to call them "sources" or anything because what they talk about is beyond the scope of this website.
</p>
<hr>
<h2>Anti systemd web pages</h2>
<p>
<a href="https://suckless.org/sucks/systemd/">systemd is the best example of Suck.</a>
<a href="https://web.archive.org/web/20180725191931/https://suckless.org/sucks/systemd">[web.archive.org]</a>
<a href="http://archive.li/BfS7l">[archive.is]</a><br>
<a href="http://without-systemd.org/wiki/index.php/Arguments_against_systemd">Arguments against systemd</a>
<a href="http://web.archive.org/web/20180802045154/http://without-systemd.org/wiki/index.php/Arguments_against_systemd">[web.archive.org]</a>
<a href="http://archive.li/bnmIo">[archive.is]</a><br>
<a href="https://web.archive.org/web/20170724100245/https://muchweb.me/systemd-nsa-attempt/">Is systemd an NSA attempt?</a>
</p>
<hr>
<p><b>
This article was last edited on 8/7/2018
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
</p>
<a href="../LICENSE.txt"><img src="../images/cc0.png" alt="CC0 License"></a>
</body>
</html>

View File

@ -1,102 +0,0 @@
<!-- NOTICE!!!! -->
<!-- BEFORE MAKING A PULL REQUEST OR PUSH PLEASE ALWAYS CHECK WITH THE VALIDATOR -->
<!-- http://validator.w3.org/#validate-by-input -->
<!-- NOTICE!!!! -->
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<title>Tiktok — Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head>
<body>
<div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<img
src="../images/example_logo.png"
alt="Images are in the ../images folder"
/>
<h1>Tiktok</h1>
<h3> Work in progress</h3>
<p>
Tiktok is a social media app allowing people to post short form videos, usually from a couple seconds
to up to 3 minutes long in length.
</p>
<p>
Like Discord, TikTok is spyware because all data goes through a central server, and multidues of data on you and your device are collected, sometimes even without your consent.
</p>
<h3>
Tiktok collects mass amounts of data
</h3>
<p>
Tiktok explicitly confirms in its privacy policy<sup
><a href="#s1">[1]</a></sup
>
that it collects/can access the following information:
</p>
<ul>
<li>Age of user</li>
<li>ID cards (if submitted)</li>
<li>Device UUID</li>
<li>User's e-mail address</li>
<li>Content from your clipboard</li>
<li>All images and videos stored on your phone</li>
</ul>
<p>It also collects data from outside companies ("advertising partners") from third parties without your consent.</p>
<h3>
Tiktok shares this data with companies in the business of spyware.
</h3>
</div>
<hr/>
<div class="footer">
<div class="futher">
<h4>Further Reading:</h4>
<ol>
<li><a href="">Source</a>
<a href="">[web.archive.org]</a>
<a href="">[archive.is]</a></li>
</ol>
</div>
<hr/>
<div class="sources">
<h4>Sources:</h4>
<ol>
<li id="s1">
<a href="">Source1</a>
<a href="">[web.archive.org]</a>
<a href="">[archive.is]</a>
<a href="">[ghostarchive.org]</a>
</li>
<li id="s2">
<a href="">Source2</a>
<a href="">[web.archive.org]</a>
<a href="">[archive.is]</a>
<a href="">[ghostarchive.org]</a>
</li>
</ol>
</div>
<hr/>
<b>This article was created on mm/dd/yyyy</b><br/>
<b>This article was last edited on mm/dd/yyyy</b>
<!--Dont change-->
<p>
If you want to edit this article, or contribute your own article(s), visit us
at the git repo on
<a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.
</p>
<p>
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="../LICENSE.txt">
<img class="icon" src="../images/cc0.png" alt="CC0 License"/>
</a>
<!--Dont change-->
</div>
</div>
</body>
</html>

Binary file not shown.

Before

Width:  |  Height:  |  Size: 15 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 4.9 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 2.9 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 100 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 2.6 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 6.2 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 1.7 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 92 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 7.2 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 14 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 3.7 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 224 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 1.6 KiB

View File

@ -1,92 +0,0 @@
This text file is so that I can list all of the articles that
people have requested to be made, so that I don't forget about
anyone's request. If you are interested in writing articles
for the site and need help choosing something to review, this
list is a good place to start.
1password — made a "stub" article:
https://spyware.neocities.org/articles/1password.html
Ask.com services (excite, myway) — no progress has been made
Merge information from http://archive.is/baCzK and https://www.ghacks.net/2016/02/08/steam-uses-insecure-out-of-date-chromium-browser/
to the steam article, also run it through MITMproxy to find what requests it makes. — no progress has been made
Create a new class of articles about browser addons, the following explicitly:
NoScript (allegedly phones home? needs a test to see if that's true or not...)
Stylish (definite spyware)
Ghostery
No progress made on any of those ^
uTorrent — stub article: https://spyware.neocities.org/articles/utorrent.html
Write about Razor mouse products:
Useful links:
https://www.razer.com/legal/privacy-policy
http://wp.xin.at/archives/1438
For mitigation guides there's an easy way to run any program without letting it connect to the internet using scripts through iptables and there's always the --net=none option with firejail.
https://serverfault.com/questions/550276/how-to-block-internet-access-to-certain-programs-on-linux I use 'ni' instead of 'no-internet'.
No progress has been made ^
Write about the oculus rift:
https://www.roadtovr.com/oculus-vr-privacy-policy-serves-needs-facebook-not-users/
https://www.roadtovr.com/error-rendered-many-rifts-useless-simple-workaround/
No Progress ^
Write about privacy badger: https://www.eff.org/privacybadger#faq-Why-does-my-browser-connect-to-fastly.com-IP-addresses-on-startup-after-installing-Privacy-Badger
Write about lenovo bundling spyware:
https://www.makeuseof.com/tag/security-failings-demonstrate-avoid-lenovo/
Write about HP bundling spyware:
https://www.extremetech.com/computing/259605-hp-caught-installing-spyware-windows-10-systems-without-permission-notification
https://www.engadget.com/2017/11/28/hp-quietly-installs-system-slowing-spyware-on-its-pcs/
Write about Dell bundling spyware:
https://www.techdirt.com/articles/20050530/2333212.shtml
https://arstechnica.com/information-technology/2015/11/dell-does-superfish-ships-pcs-with-self-signed-root-certificates/
Write about TOSHIBA bundling spyware:
https://www.shouldiremoveit.com/TOSHIBA-Service-Station-5383-program.aspx
Write about Acer bundling spyware:
https://www.pcmag.com/article2/0,2817,2477704,00.asp
Rate CPU's for spyware:
https://libreboot.org/faq.html#amd
https://libreboot.org/faq.html#intel
Some progress made with that. See AMD CPU article. Still need to finish that.
Write about visual studio — no progress
write about geary — no progress
Add this tag to the top of everything:
<meta name="viewport" content="width=device-width, initial-scale=1">
Ublock Origin — No progress (phoning home? check privacy policy)
> please add to overview browsers like Seamonkey, Srware Iron and Sphere
> browser: https://sphere.tenebris.cc <https://sphere.tenebris.cc/>
Did Iron and Sphere
Write about the Bromite Android Browser
-I don't have an android phone. So someone else will have to write it, I don't have the means to do a reveiw of it.
write articles about alternatives to Discord:
Signal
XMPP
Mumble, etc.
No progress has been made yet.
Write an article about Facebook.
Write an article about TikTok.

View File

@ -1,70 +0,0 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.w3.org/MarkUp/SCHEMA/xhtml11.xsd" xml:lang="en">
<head>
<title>Signal</title>
<link rel="stylesheet" type="text/css" href="../style.css"/>
</head>
<body>
<h1 >Signal</h1>
<p><img src="../images/Signal-logo.png" /></p>
<p>Signal is a "private" instant messenger.</p>
<h2 >Spyware level: <font style="color:yellow;">MEDIUM</font></h2>
<h2 >You need to give Signal your phone number to work</h1>
<p>You cannot create an account in Signal without giving it your phone number.</p>
<h3 >Signal is not completly Peer-To-Peer</h1>
<p>Signal claims to be a Peer-To-Peer messenger. But this is not true because Signal stores <strong>your phone number</strong> in the servers.<a href="#fn1" class="footnote-ref" ><sup>1</sup></a></p>
<h1>Signal has the decryption keys of their messages</h1>
<p>
The Signal legal terms<sup>3</sup> claims they have the
decryption keys:<br/>
<i>
"Additional technical information is stored on our servers,
including randomly generated authentication tokens, keys, push
tokens, and other material that is necessary to establish
calls and transmit messages. Signal limits this additional
technical information to the minimum required to operate the
Services."
</i>
<br/>
It also says it would give info to the government and law
enforcement agencies:<br/>
<i>
Third Parties. We work with third parties to provide some of our
Services. For example, our Third-Party Providers send a
verification code to your phone number when you register for our
Services. These providers are bound by their Privacy Policies to
safeguard that information. If you use other Third-Party
Services like YouTube, Spotify, Giphy, etc. in connection with
our Services, their Terms and Privacy Policies govern your use
of those services.
</i>
<br/>
Please note the "Services like youtube, spotify, giphy". Those
sites are in the Signal source code<sup>4</sup>, so they can spy
on you.
Then, we have this:<br/>
<i>
Other instances where Signal may need to share your data
To meet any applicable law, regulation, legal process or enforceable governmental request.
To enforce applicable Terms, including investigation of potential violations.
To detect, prevent, or otherwise address fraud, security, or technical issues.
To protect against harm to the rights, property, or safety of Signal, our users, or the public as required or permitted by law.
</i>
<br/>
</p>
<h3 >Further reading</h1>
<p><a href="https://kill-9.xyz/harmful/software/signal">Signal considered harmful</a></p>
<h1 >References</h1>
<section class="footnotes" role="doc-endnotes">
<p>1: <a href="https://blog.0day.rocks/a-look-into-signals-encrypted-profiles-5491908186c1">A Look Into Signals Encrypted Profiles</a></p>
<p>2: <a href="https://github.com/signalapp/Signal-Android/issues/127">Request: Google Play signed download alternative</a></p>
<p>3: <a href="https://signal.org/legal/">https://signal.org/legal/</a></p>
<p>4: <a href="https://signal.org/blog/signal-and-giphy-update/">https://signal.org/blog/signal-and-giphy-update/</a></p>
</section>
</body>
</html>