Merge pull request 'Removed deprecated/old stuff' (#121) from codddfeea/SpywareWatchdog_REWRITE:removing-old into master
Reviewed-on: https://codeberg.org/shadow/SpywareWatchdog/pulls/121
|
@ -1,59 +0,0 @@
|
||||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
|
||||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
|
||||||
<head>
|
|
||||||
<meta
|
|
||||||
http-equiv="Content-type"
|
|
||||||
content="application/xhtml+xml;charset=utf-8"
|
|
||||||
/>
|
|
||||||
<title>1Password — Spyware Watchdog</title>
|
|
||||||
<link rel="stylesheet" href="../style.css" />
|
|
||||||
</head>
|
|
||||||
|
|
||||||
<body>
|
|
||||||
<div class="case">
|
|
||||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
|
||||||
<div class="main">
|
|
||||||
<img src="../images/1pw_logo.png" alt="1Password Logo" />
|
|
||||||
<h1>1Password</h1>
|
|
||||||
<p>
|
|
||||||
1password is a password management service
|
|
||||||
</p>
|
|
||||||
<h2>Spyware Level: <span class="red">Not Rated</span></h2>
|
|
||||||
<p>
|
|
||||||
This article is a stub and still needs to be written. If you want to
|
|
||||||
write it, email me so I don't duplicate effort.
|
|
||||||
https://1password.com/legal/privacy/
|
|
||||||
https://www.macworld.com/article/2996213/security/1password-is-still-secure-but-you-can-reduce-a-potential-risk.html
|
|
||||||
https://paul.reviews/privacy-password-managers-a-reality-check/
|
|
||||||
>Third-Party Data Processors >Your Secure and Service data are held by
|
|
||||||
third party data processors, who provide us with hosting and other
|
|
||||||
infrastructure services. The locations of these are described above.
|
|
||||||
In many cases (but we cannot promise that this will always be the
|
|
||||||
case) even Service data held by these entities is encrypted with keys
|
|
||||||
held only by us. >Data needed to process payments is collected by our
|
|
||||||
payment processor, Stripe, Inc., which conforms to a U.S.-E.U. Privacy
|
|
||||||
Shield Framework. See https://stripe.com/privacy-shield-policy
|
|
||||||
</p>
|
|
||||||
</div>
|
|
||||||
<hr />
|
|
||||||
<div class="footer">
|
|
||||||
<b>This article was created on 6/16/2018</b><br />
|
|
||||||
<b>This article was last edited on 6/16/2018</b>
|
|
||||||
<!--Dont change-->
|
|
||||||
<p>
|
|
||||||
If you want to edit this article, or contribute your own article(s), visit us
|
|
||||||
at the git repo on
|
|
||||||
<a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.
|
|
||||||
</p>
|
|
||||||
<p>
|
|
||||||
All contributions must be licensed under the CC0 license to be
|
|
||||||
accepted.
|
|
||||||
</p>
|
|
||||||
<a href="../LICENSE.txt">
|
|
||||||
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
|
|
||||||
</a>
|
|
||||||
<!--Dont change-->
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
</body>
|
|
||||||
</html>
|
|
|
@ -1,142 +0,0 @@
|
||||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
|
||||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
|
||||||
<head>
|
|
||||||
<meta
|
|
||||||
http-equiv="Content-type"
|
|
||||||
content="application/xhtml+xml;charset=utf-8"
|
|
||||||
/>
|
|
||||||
<title>AMD — Spyware Watchdog</title>
|
|
||||||
<link rel="stylesheet" href="../style.css" />
|
|
||||||
</head>
|
|
||||||
|
|
||||||
<body>
|
|
||||||
<div class="case">
|
|
||||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
|
||||||
<div class="main">
|
|
||||||
<h1>
|
|
||||||
<span class="red">UNFINISHED ARTICLE — UNDER CONSTRUCTION — BAD FORMATTING</span>
|
|
||||||
</h1>
|
|
||||||
<img src="../images/amd_logo.png" alt="AMD logo" />
|
|
||||||
<h1>AMD CPU Family</h1>
|
|
||||||
<p>
|
|
||||||
Advanced Micro Devices, Inc. is an American multinational
|
|
||||||
semiconductor company based in Santa Clara, California, that develops
|
|
||||||
computer processors and related technologies for business and consumer
|
|
||||||
markets. This article is specifically about the CPUs that are
|
|
||||||
produced by AMD and nothing else. The logo is one of many logos used
|
|
||||||
by AMD, but the article is not about any one specific CPU.
|
|
||||||
<b>No rating is given</b> because this is not an article about any
|
|
||||||
specific product, and the rating system is difficult to fit into this
|
|
||||||
article.
|
|
||||||
</p>
|
|
||||||
<br />
|
|
||||||
<p>
|
|
||||||
Modern CPU models produced by AMD contain an embedded ARM co-processor
|
|
||||||
called the Platform Security Processor (PSP). Nearly all AMD CPUs
|
|
||||||
produced since 2013 operate under the supervision of this separate,
|
|
||||||
more privileged, environment consisting of an integrated ARM processor
|
|
||||||
with access to isolated resources as well as main system memory and
|
|
||||||
I/O.
|
|
||||||
<sup><a href="#s1">[1]</a></sup>
|
|
||||||
</p>
|
|
||||||
<br />
|
|
||||||
<p>
|
|
||||||
This article isn't complete. This is a work-in-progress and so this
|
|
||||||
article is not formatted properly...
|
|
||||||
</p>
|
|
||||||
<p>
|
|
||||||
http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf
|
|
||||||
(page 11)
|
|
||||||
</p>
|
|
||||||
<br />
|
|
||||||
<p>
|
|
||||||
While ARM and AMD tout the “Trusted Execution Environment” as useful
|
|
||||||
for secure payment, anti-theft and malware protection, they also
|
|
||||||
discuss content protection or DRM as a use case.
|
|
||||||
https://www.owasp.o../images/c/c8/OWASP_Security_Tapas_-_TrustZone%2C_TEE_and_Mobile_Security_final.pdf
|
|
||||||
</p>
|
|
||||||
<p>Possible uses … DRM</p>
|
|
||||||
<p>
|
|
||||||
Researchers have already been able to identify exploits in AMD’s
|
|
||||||
Platform Security Processor. In 2018 researchers published a
|
|
||||||
vulnerability in which a specially crafted certificate could lead to a
|
|
||||||
stack overflow in the PSP’s TPM firmware allowing for remote code
|
|
||||||
execution. (https://seclists.org/fulldisclosure/2018/Jan/12) Another
|
|
||||||
group goes on to detail how an attacker might leverage exploits
|
|
||||||
RYZENFALL or FALLOUT to gain foothold in networks with Ryzen based
|
|
||||||
systems.
|
|
||||||
(https://www.techpowerup.com/242386/cts-labs-responds-to-a-techpowerup-technical-questionnaire)
|
|
||||||
</p>
|
|
||||||
<hr/>
|
|
||||||
<p>
|
|
||||||
Please note that Family 16h and Family 15h-Models60h and later contain
|
|
||||||
a PSP
|
|
||||||
</p>
|
|
||||||
<h2><font color="red">NOT TRUSTED:</font></h2>
|
|
||||||
<ul>
|
|
||||||
<li>
|
|
||||||
Kaveri (Steamroller “BDv3”)
|
|
||||||
https://www.amd.com/system/files/TechDocs/51590_15h_Models_30h-3Fh_A-Series_PDS.pdf
|
|
||||||
(page 6)
|
|
||||||
https://arstechnica.com/information-technology/2012/06/amd-to-add-arm-processors-to-boost-chip-security/
|
|
||||||
</li>
|
|
||||||
<li>
|
|
||||||
Carrizo/Bristol Ridge (Excavator “BDv4”)
|
|
||||||
https://www.anandtech.com/show/8995/amd-at-isscc-2015-carrizo-and-excavator-details
|
|
||||||
</li>
|
|
||||||
<li>All Zen based CPUs (17h family)</li>
|
|
||||||
</ul>
|
|
||||||
<h2><font color="yellow">POTENTIALLY TRUSTED:</font></h2>
|
|
||||||
<ul>
|
|
||||||
<li>
|
|
||||||
Jaguar (the only 16h family CPU that does NOT have PSP):
|
|
||||||
http://support.amd.com/TechDocs/52128_16h_Software_Opt_Guide.zip
|
|
||||||
(page 8)
|
|
||||||
https://en.wikipedia.org/wiki/Puma_(microarchitecture)#Improvements_over_Jaguar
|
|
||||||
</li>
|
|
||||||
<li>
|
|
||||||
All K5-K10, Bobcat, Bulldozer (“BDv1”) and Piledriver (“BDv2”)
|
|
||||||
</li>
|
|
||||||
<li>
|
|
||||||
All K5-K10, Bobcat, Bulldozer (“BDv1”) and Piledriver (“BDv2”)
|
|
||||||
</li>
|
|
||||||
</ul>
|
|
||||||
</div>
|
|
||||||
<hr />
|
|
||||||
<div class="footer">
|
|
||||||
<div class="sources">
|
|
||||||
<h4>Sources:</h4>
|
|
||||||
<ol>
|
|
||||||
<li id="s1">
|
|
||||||
<a
|
|
||||||
href="http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf"
|
|
||||||
>AMD Security and Server innovation</a
|
|
||||||
>
|
|
||||||
<a
|
|
||||||
href="http://web.archive.org/web/20180422100442/http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf"
|
|
||||||
>[web.archive.org]</a
|
|
||||||
>
|
|
||||||
<a href="http://archive.vn/7dYOZ">[archive.vn]</a><br />
|
|
||||||
</li>
|
|
||||||
</ol>
|
|
||||||
</div>
|
|
||||||
<hr />
|
|
||||||
<b>This article was last edited on 1/10/2019</b>
|
|
||||||
<!--Dont change-->
|
|
||||||
<p>
|
|
||||||
If you want to edit this article, or contribute your own article(s), visit us
|
|
||||||
at the git repo on
|
|
||||||
<a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.
|
|
||||||
</p>
|
|
||||||
<p>
|
|
||||||
All contributions must be licensed under the CC0 license to be
|
|
||||||
accepted.
|
|
||||||
</p>
|
|
||||||
<a href="../LICENSE.txt"
|
|
||||||
><img class="icon" src="../images/cc0.png" alt="CC0 License"
|
|
||||||
/></a>
|
|
||||||
<!--Dont change-->
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
</body>
|
|
||||||
</html>
|
|
|
@ -1,44 +0,0 @@
|
||||||
<!-- NOTICE!!!! -->
|
|
||||||
|
|
||||||
<!-- BEFORE MAKING A PULL REQUEST OR PUSH PLEASE ALWAYS CHECK WITH THE VALIDATOR -->
|
|
||||||
<!-- http://validator.w3.org/#validate-by-input -->
|
|
||||||
|
|
||||||
<!-- NOTICE!!!! -->
|
|
||||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
|
||||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
|
||||||
<head>
|
|
||||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
|
||||||
<title>Browsers — Spyware Watchdog</title>
|
|
||||||
<link rel="stylesheet" href="../style.css" />
|
|
||||||
</head>
|
|
||||||
<body>
|
|
||||||
<div class="case">
|
|
||||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
|
||||||
<div class="main">
|
|
||||||
<h1>Browsers</h1>
|
|
||||||
<p>The tier list has been deprecated for a while now, and was kept only for historical purposes. Because the deprecated page keeps getting linked to, it will be removed.</p>
|
|
||||||
<br/>
|
|
||||||
<p>If you want a tier list, you can visit these sites: <a href="https://tilde.club/~acz/shadow_wiki/browsers.xhtml">ShadowWiki</a> <a href="http://abrx6wcpzkfpwxb5eb2wsra2wnkrv2macdtkpnrepswodz5jxd4schyd.onion/browsers.xhtml">[Tor]</a> <a href="http://63gxkfc4hlcbxrdoepw2i2hyxai5qkxmi636ag3y7sf5tq3imoya.b32.i2p/browsers.xhtml">[I2P]</a> or <a href="https://digdeeper.neocities.org/ghost/browsers.html">Digdeeper</a> <a href="http://digdeep4orxw6psc33yxa2dgmuycj74zi6334xhxjlgppw6odvkzkiad.onion/ghost/browsers.html">[Tor]</a> <a href="http://kbbd6h7kg32va4indf7efc4rhdfet6zm7466fntzgc634va3k2pa.b32.i2p/ghost/browsers.html">[I2P]</a>. These external resources don't represent the Online Spyware Watchdog as a site, and are simply used as a point of reference for those interested.</p>
|
|
||||||
</div>
|
|
||||||
<hr/>
|
|
||||||
<div class="footer">
|
|
||||||
<b>This article was created on 2/10/2021</b><br/>
|
|
||||||
<b>This article was last edited on 2/10/2021</b>
|
|
||||||
<!--Dont change-->
|
|
||||||
<p>
|
|
||||||
If you want to edit this article, or contribute your own article(s), visit us
|
|
||||||
at the git repo on
|
|
||||||
<a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.
|
|
||||||
</p>
|
|
||||||
<p>
|
|
||||||
All contributions must be licensed under the CC0 license to be
|
|
||||||
accepted.
|
|
||||||
</p>
|
|
||||||
<a href="../LICENSE.txt">
|
|
||||||
<img class="icon" src="../images/cc0.png" alt="CC0 License"/>
|
|
||||||
</a>
|
|
||||||
<!--Dont change-->
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
</body>
|
|
||||||
</html>
|
|
|
@ -1,45 +0,0 @@
|
||||||
<!DOCTYPE HTML>
|
|
||||||
<html lang=”en-us”>
|
|
||||||
<head>
|
|
||||||
<link rel="stylesheet" href="../style.css">
|
|
||||||
<meta charset="UTF-8">
|
|
||||||
<title>Spyware Watchdog</title>
|
|
||||||
</head>
|
|
||||||
<body>
|
|
||||||
<meta name="viewport" content="width=device-width, initial-scale=1">
|
|
||||||
<h1>Example Article</h1>
|
|
||||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
|
||||||
<img src="../images/example_logo.png" alt="Images are in the /images folder">
|
|
||||||
<p>
|
|
||||||
This part of the article should have the name of the program and what it does, and who develops it.
|
|
||||||
</p>
|
|
||||||
<h2>Spyware Level: <font color="lime">Not Rated</font></h2>
|
|
||||||
<p>
|
|
||||||
A breif explanation of what the software does, and a summary of the rest of the article, should go here. This paragraph is for readers
|
|
||||||
who don't want to read the entire article and it should assert all of the things that the rest of the article proves below.
|
|
||||||
</p>
|
|
||||||
<h3>Spyware Feature X</h3>
|
|
||||||
<p>
|
|
||||||
This program has spyware feature X in it. There should be some kind of proof here. If it doesn't contain original research, the source
|
|
||||||
should be cited like this: <sup><a href="#1">[1]</a></sup>.
|
|
||||||
</p>
|
|
||||||
<hr>
|
|
||||||
<h2>Sources</h2>
|
|
||||||
<p>
|
|
||||||
<a name="1">1.</a>
|
|
||||||
<a href="http://example.com/">Example Source</a>
|
|
||||||
<a href="http://web.archive.org/web/20180729230956/http://example.com/">[web.archive.org]</a>
|
|
||||||
<a href="http://archive.is/tgJjl">[archive.is]</a><br>
|
|
||||||
</p>
|
|
||||||
<hr>
|
|
||||||
<p><b>
|
|
||||||
This article was last edited on 7/30/2018
|
|
||||||
</b></p>
|
|
||||||
<p>
|
|
||||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
|
||||||
</p>
|
|
||||||
<a href="../LICENSE.txt"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
|
|
||||||
|
|
||||||
</body>
|
|
||||||
|
|
||||||
</html>
|
|
|
@ -1,25 +0,0 @@
|
||||||
<!--Old Style-->
|
|
||||||
<!DOCTYPE HTML>
|
|
||||||
<html lang=”en-us”>
|
|
||||||
<head>
|
|
||||||
<link rel="stylesheet" href="../style.css">
|
|
||||||
<meta charset="UTF-8">
|
|
||||||
<title>Spyware Watchdog</title>
|
|
||||||
</head>
|
|
||||||
<body>
|
|
||||||
<h1>foobar2000</h1>
|
|
||||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
|
||||||
<img src="../images/foobar_logo.png" alt="foobar2000 Logo">
|
|
||||||
<p>
|
|
||||||
foobar2000 is an advanced freeware audio player for the Windows platform.
|
|
||||||
</p>
|
|
||||||
<h2>Spyware Level: <font color=yellow>Not Rated</font></h2>
|
|
||||||
<p>
|
|
||||||
foobar2000 does not make its source code available, which could be hiding spyware features.
|
|
||||||
</p>
|
|
||||||
<p>
|
|
||||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
|
||||||
</p>
|
|
||||||
<a href="../LICENSE.txt"><img src="../images/cc0.png" alt="CC0 License"></a>
|
|
||||||
</body>
|
|
||||||
</html>
|
|
|
@ -1,66 +0,0 @@
|
||||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
|
||||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
|
||||||
<head>
|
|
||||||
<meta
|
|
||||||
http-equiv="Content-type"
|
|
||||||
content="application/xhtml+xml;charset=utf-8"
|
|
||||||
/>
|
|
||||||
<title>Godot — Spyware Watchdog</title>
|
|
||||||
<link rel="stylesheet" href="../style.css" />
|
|
||||||
</head>
|
|
||||||
|
|
||||||
<body>
|
|
||||||
<div class="case">
|
|
||||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
|
||||||
<div class="main">
|
|
||||||
<img src="../images/godot_logo.png" alt="Godot Logo" />
|
|
||||||
<h1>Godot</h1>
|
|
||||||
<p>
|
|
||||||
Godot is a videogame engine
|
|
||||||
</p>
|
|
||||||
<h2>Spyware Level: <span class="red">Not Rated</span></h2>
|
|
||||||
<p>
|
|
||||||
Godot claims in its privacy policy<sup>1</sup>that they
|
|
||||||
collect the following data:
|
|
||||||
|
|
||||||
<ul>
|
|
||||||
<li>your first and last name</li>
|
|
||||||
<li>your title and your company’s name</li>
|
|
||||||
<li>your home, billing, name of a city or town,
|
|
||||||
state/province</li>
|
|
||||||
<li>your country code</li>
|
|
||||||
<li>your e-mail address</li>
|
|
||||||
<li>your telephone number</li>
|
|
||||||
<li>any other identifier that permits Godot to make
|
|
||||||
physical or online contact with you</li>
|
|
||||||
</ul>
|
|
||||||
|
|
||||||
</p>
|
|
||||||
<h3>Sources</h3>
|
|
||||||
<p><a href="https://godotengine.org/privacy-policy">Godot
|
|
||||||
privacy
|
|
||||||
policy</a><a href="https://web.archive.org/web/20200918125741/https://godotengine.org/privacy-policy">
|
|
||||||
[archive.org]</a>
|
|
||||||
</div>
|
|
||||||
<hr />
|
|
||||||
<div class="footer">
|
|
||||||
<b>This article was created on 2020-11-02</b><br />
|
|
||||||
<b>This article was last edited on 2020-11-02</b>
|
|
||||||
<!--Dont change-->
|
|
||||||
<p>
|
|
||||||
If you want to edit this article, or contribute your own article(s), visit us
|
|
||||||
at the git repo on
|
|
||||||
<a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.
|
|
||||||
</p>
|
|
||||||
<p>
|
|
||||||
All contributions must be licensed under the CC0 license to be
|
|
||||||
accepted.
|
|
||||||
</p>
|
|
||||||
<a href="../LICENSE.txt">
|
|
||||||
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
|
|
||||||
</a>
|
|
||||||
<!--Dont change-->
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
</body>
|
|
||||||
</html>
|
|
|
@ -22,7 +22,6 @@
|
||||||
<div class="directory-list">
|
<div class="directory-list">
|
||||||
<h2>Web Browsers</h2>
|
<h2>Web Browsers</h2>
|
||||||
<ul>
|
<ul>
|
||||||
<li><a href="../articles/browsers.html">Comparison between web browsers</a></li>
|
|
||||||
<li><a href="../articles/badwolf.html">BadWolf</a> <a href="../articles/badwolf_de.html">[deutsch]</a> </li>
|
<li><a href="../articles/badwolf.html">BadWolf</a> <a href="../articles/badwolf_de.html">[deutsch]</a> </li>
|
||||||
<li><a href="../articles/brave.html">Brave</a> <a href="../articles/brave_ru.html">[Русский]</a></li>
|
<li><a href="../articles/brave.html">Brave</a> <a href="../articles/brave_ru.html">[Русский]</a></li>
|
||||||
<li><a href="../articles/chrome.html">Google Chrome</a> <a href="../articles/chrome_es.html">[Español]</a> <a href="chrome_pl.html">[Polski]</a></li>
|
<li><a href="../articles/chrome.html">Google Chrome</a> <a href="../articles/chrome_es.html">[Español]</a> <a href="chrome_pl.html">[Polski]</a></li>
|
||||||
|
@ -83,7 +82,7 @@
|
||||||
<li><a href="../articles/steam.html">Steam</a> <a href="../articles/steam_ru.html">[Русский]</a></li>
|
<li><a href="../articles/steam.html">Steam</a> <a href="../articles/steam_ru.html">[Русский]</a></li>
|
||||||
<li><a href="../articles/redshell.html">Red Shell</a></li>
|
<li><a href="../articles/redshell.html">Red Shell</a></li>
|
||||||
<li><a href="../articles/unity.html">Unity</a></li>
|
<li><a href="../articles/unity.html">Unity</a></li>
|
||||||
<li><a href="../articles/razer_en.html">Razer</a> <a href="../articles/razer.html">[Español]</a></li>
|
<li><a href="../articles/razer.html">Razer</a> <a href="../articles/razer_es.html">[Español]</a></li>
|
||||||
<li><a href="../articles/ksp.html">Kerbal Space Program</a></li>
|
<li><a href="../articles/ksp.html">Kerbal Space Program</a></li>
|
||||||
<li><a href="../articles/gzdoom.html">GZDoom</a></li>
|
<li><a href="../articles/gzdoom.html">GZDoom</a></li>
|
||||||
</ul>
|
</ul>
|
||||||
|
|
|
@ -1,39 +0,0 @@
|
||||||
<!--Old Style-->
|
|
||||||
<!DOCTYPE HTML>
|
|
||||||
<html lang="en-us">
|
|
||||||
<head>
|
|
||||||
<link rel="stylesheet" href="../style.css">
|
|
||||||
<meta charset="UTF-8">
|
|
||||||
<title>Spyware Watchdog</title>
|
|
||||||
</head>
|
|
||||||
<body>
|
|
||||||
<center>
|
|
||||||
|
|
||||||
<h1>Online Spyware Classification Project Unfinished Article Catalog</h1>
|
|
||||||
<p>
|
|
||||||
This is a catalog of all of the articles that are currently works-in-progress. The articles here are either unfinished, or not accurate and need to be edited before they can be added to the normal catalog. If you want to edit any of these articles, or contribute your own articles, visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. These articles need the most help, so feel free to contribute!
|
|
||||||
</p>
|
|
||||||
<p>The <a href="../requested_articles.txt">requested articles</a> file also has a list of articles that have been requested, and the state of those
|
|
||||||
requests.</p>
|
|
||||||
<hr>
|
|
||||||
<p>
|
|
||||||
<a href="../articles/signal.html">Signal</a><br>
|
|
||||||
<a href="../articles/utorrent.html">uTorrent</a><br>
|
|
||||||
|
|
||||||
<a href="../articles/nvidia.html">Nvidia Drivers</a><br>
|
|
||||||
|
|
||||||
<a href="../articles/1password.html">1password</a><br>
|
|
||||||
<a href="../articles/foobar2000.html">foobar2000</a><br>
|
|
||||||
|
|
||||||
<a href="../articles/example.html">Example Article</a><br>
|
|
||||||
<a href="../guides/classify.html">Classification Guide</a><br>
|
|
||||||
</p>
|
|
||||||
<h3>Other Options</h3>
|
|
||||||
<p>
|
|
||||||
<a href="../articles/index.html">Main Catalog</a><br>
|
|
||||||
<a href="../index.html">Back to Home</a><br>
|
|
||||||
</p>
|
|
||||||
</center>
|
|
||||||
</body>
|
|
||||||
|
|
||||||
</html>
|
|
|
@ -1,80 +0,0 @@
|
||||||
<!--Old Style-->
|
|
||||||
<!DOCTYPE HTML>
|
|
||||||
<html lang=”en-us”>
|
|
||||||
<head>
|
|
||||||
<link rel="stylesheet" href="../style.css">
|
|
||||||
<meta charset="UTF-8">
|
|
||||||
<title>Spyware Watchdog</title>
|
|
||||||
</head>
|
|
||||||
<body>
|
|
||||||
<h1>Nvidia Graphics Card Drivers</h1>
|
|
||||||
<img src="../images/nvidia_logo.png" alt="Nvidia logo">
|
|
||||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
|
||||||
|
|
||||||
<h2>UNFINISHED ARTICLE- UNDER CONSTRUCTION</h2>
|
|
||||||
|
|
||||||
<p>This article is about the graphics card driver software used for modern Nvidia graphics cards. It is not about any one specific driver.</p>
|
|
||||||
|
|
||||||
<h2>Spyware Level: <font color=red>Not Rated</font></h2>
|
|
||||||
|
|
||||||
<p>
|
|
||||||
Nvidia produces graphics cards, and of course to use this hardware you need to install their drivers. Unfortunately Nvidia's drivers are riddled with
|
|
||||||
spyware and the installation process is a minefield of serious privacy pitfalls, with options selected by default that have serious privacy
|
|
||||||
implications they have if actually enabled. It isn't possible to install any of their drivers without bundled spyware being installed onto your computer,
|
|
||||||
which needs to be cleaned up after the installation.
|
|
||||||
</p>
|
|
||||||
<h3>Nvidia's installer is bundled with other spyware programs</h3>
|
|
||||||
<p>
|
|
||||||
When attempting to install an Nvidia graphics card driver you will be shown an option to install the spyware program GeForce Experience onto your computer.
|
|
||||||
This program is malware that is also developed by Nvidia as well, and has a huge range of serious privacy issues, including scanning and uploading information
|
|
||||||
about the files onto your computer to Nvidia. (An article about GeForce Experience is planned)
|
|
||||||
</p>
|
|
||||||
<img src="../images/nvidia_bundling.png" alt="Nvidia driver installation screenshot">
|
|
||||||
<h3>Nvidia drivers install telemetry services onto the host machine</h3>
|
|
||||||
<p>
|
|
||||||
When the installation is finished, these services will show up (This is on Windows 7):
|
|
||||||
</p>
|
|
||||||
<img src="../images/nvidia_spyware_service.png" alt="Nvidia spyware services">
|
|
||||||
<p>
|
|
||||||
These can at least be disabled like so:
|
|
||||||
</p>
|
|
||||||
<img src="../images/nvidia_spyware_disable.png" alt="Nvidia spyware service disable">
|
|
||||||
<p>Nvidia telemetry domains can also be blocked at the hosts file although the source is two years old:
|
|
||||||
<ul>
|
|
||||||
<li>0.0.0.0 telemetry.gfe.nvidia.com</li>
|
|
||||||
<li>0.0.0.0 gfe.nvidia.com</li>
|
|
||||||
<li>0.0.0.0 services.gfe.nvidia.com</li>
|
|
||||||
<li>0.0.0.0 accounts.nvgs.nvidia.com</li>
|
|
||||||
<li>0.0.0.0 events.gfe.nvidia.com</li>
|
|
||||||
<li>0.0.0.0 images.nvidiagrid.net</li>
|
|
||||||
<li>0.0.0.0 rds-assets.nvidia.com</li>
|
|
||||||
<li>0.0.0.0 assets.nvidiagrid.net</li>
|
|
||||||
</ul>
|
|
||||||
</p>
|
|
||||||
<hr>
|
|
||||||
<h2>Sources</h2>
|
|
||||||
<p>
|
|
||||||
<a name="1">1.</a>
|
|
||||||
<a href="https://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">Section 14 of the HTTP/1.1 Specification</a>
|
|
||||||
<a href="http://webarchive.loc.gov/all/20160922055153/http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[webarchive.loc.gov]</a>
|
|
||||||
<a href="https://web.archive.org/web/20180522154719/http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[web.archive.org]</a>
|
|
||||||
<a href="http://archive.is/20180425174415/https://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[archive.is]</a>
|
|
||||||
<a href="https://webarchive.nrscotland.gov.uk/20170610193333/http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[webarchive.nrscotland.gov.uk]</a>
|
|
||||||
<a href="http://www.webcitation.org/6tcP2LTQW">[www.webcitation.org]</a>
|
|
||||||
<a href="http://arquivo.pt/wayback/20160108175646/http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[arquivo.pt]</a>
|
|
||||||
<a href="http://veebiarhiiv.digar.ee/a/20150704125123/http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[veebiarhiiv.digar.ee]</a>
|
|
||||||
<a href="http://webarchive.proni.gov.uk/20110424091530/http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html">[webarchive.proni.gov.uk]</a><br>
|
|
||||||
<a href="https://web.archive.org/web/20180410192231/https://www.reddit.com/r/nvidia/comments/8b5nej/updated_remove_mandatory_login_of_geforce/">Blocking Nvidia Domains</a><br>
|
|
||||||
</p>
|
|
||||||
|
|
||||||
|
|
||||||
<hr>
|
|
||||||
<p><b>
|
|
||||||
This article was last edited on 7/22/2018
|
|
||||||
</b></p>
|
|
||||||
<p>
|
|
||||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
|
||||||
</p>
|
|
||||||
<a href="../LICENSE.txt"><img src="../images/cc0.png" alt="CC0 License"></a>
|
|
||||||
</body>
|
|
||||||
</html>
|
|
|
@ -11,7 +11,7 @@
|
||||||
<h1>Pale Moon</h1>
|
<h1>Pale Moon</h1>
|
||||||
<p>
|
<p>
|
||||||
Pale Moon is a fork of an old <a href="../articles/firefox.html">Firefox</a> version, before the user interface change that put off many people. Version 28.4 was used to
|
Pale Moon is a fork of an old <a href="../articles/firefox.html">Firefox</a> version, before the user interface change that put off many people. Version 28.4 was used to
|
||||||
write this article. This article replaces an old article (<a href="../articles/palemoon_old.html">here</a>).
|
write this article.
|
||||||
</p>
|
</p>
|
||||||
<p>
|
<p>
|
||||||
<h2>Spyware Level: <font color=yellow>Medium</font></h2>
|
<h2>Spyware Level: <font color=yellow>Medium</font></h2>
|
||||||
|
|
|
@ -10,7 +10,7 @@
|
||||||
<img src="../images/palemoon_logo.png" alt="Pale Moon logo">
|
<img src="../images/palemoon_logo.png" alt="Pale Moon logo">
|
||||||
<h1>Pale Moon</h1>
|
<h1>Pale Moon</h1>
|
||||||
<p>
|
<p>
|
||||||
Pale Moon es un fork de una versión vieja de <a href="../articles/firefox_es.html">Firefox</a>, antes del cambio de interfaz de usuario que molestó a tanta gente. La versión 28.4 fue usada para escribir este artículo. Este artículo sirve de reemplazo para uno más viejo (<a href="../articles/palemoon_old.html">[Inglés]</a>).
|
Pale Moon es un fork de una versión vieja de <a href="../articles/firefox_es.html">Firefox</a>, antes del cambio de interfaz de usuario que molestó a tanta gente. La versión 28.4 fue usada para escribir este artículo.
|
||||||
</p>
|
</p>
|
||||||
<p>
|
<p>
|
||||||
<h2>Nivel de Spyware: <font color=yellow>Medio</font></h2>
|
<h2>Nivel de Spyware: <font color=yellow>Medio</font></h2>
|
||||||
|
|
|
@ -1,100 +0,0 @@
|
||||||
<!--Old Style-->
|
|
||||||
<!DOCTYPE HTML>
|
|
||||||
<html lang=”en-us”>
|
|
||||||
<head>
|
|
||||||
<link rel="stylesheet" href="../style.css">
|
|
||||||
<meta charset="UTF-8">
|
|
||||||
<title>Outdated Pale Moon — Spyware Watchdog</title>
|
|
||||||
</head>
|
|
||||||
<body>
|
|
||||||
<img src="../images/palemoon_logo.png" alt="Pale Moon logo">
|
|
||||||
<h1>Pale Moon</h1>
|
|
||||||
<center>
|
|
||||||
<h3><font color=red>Note: This article is outdated. <a href="../articles/palemoon.html">Here</a> is the updated version. </font></h3>
|
|
||||||
</center>
|
|
||||||
<p>
|
|
||||||
Pale Moon is a fork of an old <a href="../articles/firefox.html">Firefox</a> version, before the user interface change that put off many people. But is it a worthy alternative to FF in terms of privacy? Versions 27.7.2 and 28.1.0 were both tested for this article.
|
|
||||||
</p>
|
|
||||||
<p>
|
|
||||||
<h2>Spyware Level: <font color=yellow>Medium</font></h2>
|
|
||||||
<p>After following the <a href="/guides/palemoon.html">mitigation guide</a>, this software is <font color=lime><b>Not Spyware</b></font>.
|
|
||||||
</p>
|
|
||||||
<p>
|
|
||||||
Connects to a MASSIVE amount of trackers, and these requests can <b>only be avoided on subsequent runs</b>. Has geolocation, search suggestions, and auto-updates. Sends SSL certificates from the sites you visit. Together made 169 unsolicited requests upon my first run of it, but again, most of them can be avoided on subsequent runs. Pale Moon, in the end, has less privacy issues than Firefox, aside from its terrible start page, so the rating is Medium.
|
|
||||||
</p>
|
|
||||||
<h3>First run</h3>
|
|
||||||
<p>
|
|
||||||
If this is your first run of Pale Moon, it will automatically connect to its first run webpage (http://palemoon.org/firstrun.html), which in turn will make a bunch of requests for location-aware Google Ads.
|
|
||||||
</p>
|
|
||||||
<h3>Pale Moon's start page</h3>
|
|
||||||
<p>
|
|
||||||
By default, Pale Moon's start page is set to https://palemoon.start.me, and it will automatically make a connection to it upon its first run. That page will then (again) make a bunch of requests for various trackers — here is a list:
|
|
||||||
<ul>
|
|
||||||
<li>Google Ads (location-aware)</li>
|
|
||||||
<li>Facebook (so if you're logged in, they know who you are)</li>
|
|
||||||
<li>Quantserve ("Quantcast is an American technology company, founded in 2006, that specializes in audience measurement and real-time advertising.")</li>
|
|
||||||
<li>Amazon Ads</li>
|
|
||||||
<li>Criteo ("Criteo is a personalized retargeting company that works with Internet retailers to serve personalized online display advertisements to consumers who have previously visited the advertiser's website.")</li>
|
|
||||||
<li>Scorecardresearch ("ScorecardResearch conducts research by collecting Internet web browsing data and then uses that data to help show how people use the Internet")</li>
|
|
||||||
<li>HubSpot ("HubSpot is an inbound marketing and sales platform that helps companies attract visitors, convert leads, and close customers.")</li>
|
|
||||||
<li>Alexa Metrics</li>
|
|
||||||
<li>Twitter Ads and Analytics</li>
|
|
||||||
<li>A few others</li>
|
|
||||||
</ul>
|
|
||||||
<p>
|
|
||||||
All these requests contain the Pale Moon start page referrer, so they know where you came from. They also all set uniquely identifying cookies, so if you come across another website with these trackers included, they will know you're the person from the Pale Moon's start page, and could start building a profile from your browsing habits. You can easily delete the cookies and change the start page so that it never appears again, but <b>there is no way to avoid the requests being made upon Pale Moon's first run.</b>
|
|
||||||
|
|
||||||
</p>
|
|
||||||
<h3>Blocking privacy-enhancing addons</h3>
|
|
||||||
<p>
|
|
||||||
Pale Moon blocks privacy enhancing addons like NoScript, citing this rationale for
|
|
||||||
blocking such an imporant addon: <i>"NoScript is known to cause severe issues with a large (and growing) number of websites. Unless finely tuned for every website visited,
|
|
||||||
NoScript will cause display issues and functional issues. "</i><sup><a href="#1">[1]</a></sup> So, it looks like Pale Moon's developers are actively working against the interests of its
|
|
||||||
privacy-concerned users, and would rather allow websites to execute malicious ECMAScript programs on unsuspecting user's machines, than to be blamed for a broken website.
|
|
||||||
<b><font color=yellow>To disable this blocklist, set extensions.blocklist.enabled to false in about:config.</font></b>
|
|
||||||
</p>
|
|
||||||
<h3>Auto-updates</h3>
|
|
||||||
<p>
|
|
||||||
Pale Moon will automatically update itself, addons and search engines, as well as its blocklist.xml file with the addons it considers "malicious". Some of these can be turned off from the GUI, and some only from about:config.
|
|
||||||
</p>
|
|
||||||
|
|
||||||
<h3>Search Suggestions</h3>
|
|
||||||
<p>The default search engine is the privacy-respecting DuckDuckGo, however search suggestions are enabled by default, which could send a request for every letter you've typed, all while you think it stays in-browser until you press Enter. Can be turned off by right-clicking the search bar.
|
|
||||||
</p>
|
|
||||||
|
|
||||||
<h3>Geolocation</h3>
|
|
||||||
<p>Pale Moon connects to Mozilla's geolocation services.</p>
|
|
||||||
|
|
||||||
<h3>OCSP querying</h3>
|
|
||||||
<p>Will automatically check every site's SSL certificate to see if it is valid, which necessitates sending it to a third party. Can be turned off from the GUI.</p>
|
|
||||||
<hr>
|
|
||||||
<center>
|
|
||||||
<h2>Sources</h2>
|
|
||||||
<p>
|
|
||||||
|
|
||||||
<a name="1">1.</a>
|
|
||||||
<a href="http://blocklist.palemoon.org/info/?id=pm112">This Add-on to your browser has been blocked or disabled.</a>
|
|
||||||
<a href="https://web.archive.org/web/20180514135250/http://blocklist.palemoon.org/info/?id=pm112">[web.archive.org]</a>
|
|
||||||
<a href="http://archive.is/EiraE">[archive.is]</a>
|
|
||||||
<br>
|
|
||||||
|
|
||||||
</p>
|
|
||||||
<hr>
|
|
||||||
<h2>Credits</h2>
|
|
||||||
<p>
|
|
||||||
This article was written by <a href="https://digdeeper.neocities.org/">digdeeper.neocities.org</a><br>
|
|
||||||
Formatting changes and some sections were written by the site maintainer.
|
|
||||||
</p>
|
|
||||||
<hr>
|
|
||||||
<p><b>
|
|
||||||
This article was created on 6/7/2018<br>
|
|
||||||
This article was last updated on 10/14/2018
|
|
||||||
</b></p>
|
|
||||||
<p>
|
|
||||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
|
||||||
</p>
|
|
||||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
|
||||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
|
||||||
</center>
|
|
||||||
</body>
|
|
||||||
</html>
|
|
|
@ -7,59 +7,63 @@
|
||||||
<title>Razer — Spyware Watchdog</title>
|
<title>Razer — Spyware Watchdog</title>
|
||||||
</head>
|
</head>
|
||||||
<body>
|
<body>
|
||||||
<img src="../images/razer_logo.png">
|
<img src="../images/razer_logo.png">
|
||||||
<h1>Razer</h1>
|
<h1>Razer</h1>
|
||||||
<center>
|
<center>
|
||||||
<p><a href="../articles/razer_en.html">English Translation</a></p>
|
<p><a href="../articles/razer.html">Spanish Article</a></p>
|
||||||
</center>
|
</center>
|
||||||
<p>Razer es una compañía que hace programas y hardware para videojugadores</p>
|
<p>Razer is a company that makes software and hardware for gamers.</p>
|
||||||
<h2>Nivel de spyware: <b style="color:red;">EXTREMADAMENTE ALTO</b></h2>
|
|
||||||
<h3>Información que recolecta</h3>
|
|
||||||
<p>Razer confirma<sup><a href="#1">[1]</a></sup> que recolecta estos datos:</p>
|
|
||||||
<ul>
|
|
||||||
<li>Correo electrónico</li>
|
|
||||||
<li>Nombre</li>
|
|
||||||
<li>Información de contacto</li>
|
|
||||||
<li>La información que envias cuando los contactas (mensaje y demás)</li>
|
|
||||||
<li>El tiempo que usas sus productos/servicios</li>
|
|
||||||
<li>Los datos que envias en encuestas</li>
|
|
||||||
<li>Dirección IP, geolocalización, sistema operativo, navegador</li>
|
|
||||||
</ul>
|
|
||||||
<p>Razer tambien admite<sup><a href="#1">[1]</a> <a href="#2">[2]</a> </sup>que vende los datos de los usuarios</p>
|
|
||||||
<p>También dice que los empleados pueden ver esos datos.</p>
|
|
||||||
<h3>Razer te obliga a crear una cuenta para usar sus productos</h3>
|
|
||||||
<img class="screenshot" src="../images/theevidence.png">
|
|
||||||
<p style="font-family:monospace">¿Dónde está el botón para iniciar sesión en otro momento?</p>
|
|
||||||
<p>Sin una cuenta, no puedes configurar ni tu teclado ni tu ratón, no puedes cambiar el DPI del ratón (A no ser que haya un botón en el ratón para eso)</p>
|
|
||||||
<p>Basicamente, cada vez que abras el software para cambiar el color del ratón o lo que sea, Razer recibirá tus datos.</p>
|
|
||||||
<p>Estás obligado a conectarte a "la nube" para cargar configuraciones, esto quiere decir que las configuraciones de tu hardware están en el ordenador de otra persona, y saben quien las tiene (las configuraciones)</p>
|
|
||||||
|
|
||||||
<hr>
|
<h2>Spyware level: <b style="color:red;">EXTREMELY HIGH</b></h2>
|
||||||
<center>
|
|
||||||
<h2>Mas lecturas</h2>
|
<h3>Data collection</h3>
|
||||||
<a href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a>
|
<p>Razer confirms that they collect this data:</p>
|
||||||
<hr>
|
<ul>
|
||||||
<h2>Crédito</h2>
|
|
||||||
<p>This article was written by:
|
<li>E-mail</li>
|
||||||
<a href="mailto:qorg[@]vxempire.xyz">qorg11</a>
|
<li>Full name</li>
|
||||||
</p>
|
<li>Contact info</li>
|
||||||
<hr>
|
<li>Info you send when you contact them (texts and such)</li>
|
||||||
<h2>Referencias</h2>
|
<li>The time you use their services and products</li>
|
||||||
<p>1. <a id="1" href="https://www.razer.com/legal/privacy-policy">Razer - Privacy Policy | Razer United States</a> <a href="https://archive.fo/sVOGz">[archive.is]</a><br>
|
<li>Info you send via polls</li>
|
||||||
|
<li>IP, geolocation, OS and browser version</li>
|
||||||
|
</ul>
|
||||||
|
|
||||||
|
<p>
|
||||||
|
Razer also admits<sup><a href="#1">[1]</a><a href="#2">[2]</a></sup> that they sell users' info. They also claim that the employees can see this data.
|
||||||
|
Razer FORCES you to create an account to use YOUR products.
|
||||||
|
</p>
|
||||||
|
<img class="screenshot" src="../images/theevidence.png">
|
||||||
|
<p>
|
||||||
|
Where is the option "Sign in later" at? Without an account, you CAN'T configure your keyboard,
|
||||||
|
change your mouse DPI and RGB configuration and such, this means that the configurations you set to your (Razer) peripherals are in somebody
|
||||||
|
else's PC, and Razer knows who has that (your) info.
|
||||||
|
</p>
|
||||||
|
|
||||||
|
<hr>
|
||||||
|
<center>
|
||||||
|
<h2>Further reading</h2>
|
||||||
|
<a href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a>
|
||||||
|
<hr>
|
||||||
|
<h2>Credit</h2>
|
||||||
|
<p>This article was written by:
|
||||||
|
<a href="mailto:qorg[@]vxempire.xyz">qorg11</a>
|
||||||
|
</p>
|
||||||
|
<hr>
|
||||||
|
<h2>References</h2>
|
||||||
|
<p>1. <a id="1" href="https://www.razer.com/legal/privacy-policy">Razer — Privacy Policy | Razer United States</a> <a href="https://archive.fo/sVOGz">[archive.is]</a><br>
|
||||||
2. <a id="2" href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a> <a href="https://archive.fo/sjgDR">[archive.is]</a></p>
|
2. <a id="2" href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a> <a href="https://archive.fo/sjgDR">[archive.is]</a></p>
|
||||||
|
|
||||||
|
<hr>
|
||||||
|
|
||||||
|
|
||||||
<hr>
|
|
||||||
<p><b>
|
<p><b>
|
||||||
This article was created on 3/4/2019
|
This article was translated on 3/10/2019<br>
|
||||||
|
This is a translation of the Spanish article. It may become outdated in the future. Check the dates on both articles.
|
||||||
</b></p>
|
</b></p>
|
||||||
|
|
||||||
<p>
|
<p>
|
||||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||||
</p>
|
</p>
|
||||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
|
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||||
</center>
|
</center>
|
||||||
</body>
|
</body>
|
||||||
|
|
|
@ -1,70 +0,0 @@
|
||||||
<!--Old Style-->
|
|
||||||
<!DOCTYPE HTML>
|
|
||||||
<html lang="en-us">
|
|
||||||
<head>
|
|
||||||
<link rel="stylesheet" href="../style.css">
|
|
||||||
<meta charset="UTF-8">
|
|
||||||
<title>Razer — Spyware Watchdog</title>
|
|
||||||
</head>
|
|
||||||
<body>
|
|
||||||
<img src="../images/razer_logo.png">
|
|
||||||
<h1>Razer</h1>
|
|
||||||
<center>
|
|
||||||
<p><a href="../articles/razer.html">Spanish Article</a></p>
|
|
||||||
</center>
|
|
||||||
<p>Razer is a company that makes software and hardware for gamers.</p>
|
|
||||||
|
|
||||||
<h2>Spyware level: <b style="color:red;">EXTREMELY HIGH</b></h2>
|
|
||||||
|
|
||||||
<h3>Data collection</h3>
|
|
||||||
<p>Razer confirms that they collect this data:</p>
|
|
||||||
<ul>
|
|
||||||
|
|
||||||
<li>E-mail</li>
|
|
||||||
<li>Full name</li>
|
|
||||||
<li>Contact info</li>
|
|
||||||
<li>Info you send when you contact them (texts and such)</li>
|
|
||||||
<li>The time you use their services and products</li>
|
|
||||||
<li>Info you send via polls</li>
|
|
||||||
<li>IP, geolocation, OS and browser version</li>
|
|
||||||
</ul>
|
|
||||||
|
|
||||||
<p>
|
|
||||||
Razer also admits<sup><a href="#1">[1]</a><a href="#2">[2]</a></sup> that they sell users' info. They also claim that the employees can see this data.
|
|
||||||
Razer FORCES you to create an account to use YOUR products.
|
|
||||||
</p>
|
|
||||||
<img class="screenshot" src="../images/theevidence.png">
|
|
||||||
<p>
|
|
||||||
Where is the option "Sign in later" at? Without an account, you CAN'T configure your keyboard,
|
|
||||||
change your mouse DPI and RGB configuration and such, this means that the configurations you set to your (Razer) peripherals are in somebody
|
|
||||||
else's PC, and Razer knows who has that (your) info.
|
|
||||||
</p>
|
|
||||||
|
|
||||||
<hr>
|
|
||||||
<center>
|
|
||||||
<h2>Further reading</h2>
|
|
||||||
<a href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a>
|
|
||||||
<hr>
|
|
||||||
<h2>Credit</h2>
|
|
||||||
<p>This article was written by:
|
|
||||||
<a href="mailto:qorg[@]vxempire.xyz">qorg11</a>
|
|
||||||
</p>
|
|
||||||
<hr>
|
|
||||||
<h2>References</h2>
|
|
||||||
<p>1. <a id="1" href="https://www.razer.com/legal/privacy-policy">Razer — Privacy Policy | Razer United States</a> <a href="https://archive.fo/sVOGz">[archive.is]</a><br>
|
|
||||||
2. <a id="2" href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a> <a href="https://archive.fo/sjgDR">[archive.is]</a></p>
|
|
||||||
|
|
||||||
<hr>
|
|
||||||
<p><b>
|
|
||||||
This article was translated on 3/10/2019<br>
|
|
||||||
This is a translation of the Spanish article. It may become outdated in the future. Check the dates on both articles.
|
|
||||||
</b></p>
|
|
||||||
|
|
||||||
<p>
|
|
||||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
|
||||||
</p>
|
|
||||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
|
||||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
|
||||||
</center>
|
|
||||||
</body>
|
|
||||||
</html>
|
|
|
@ -0,0 +1,66 @@
|
||||||
|
<!--Old Style-->
|
||||||
|
<!DOCTYPE HTML>
|
||||||
|
<html lang="en-us">
|
||||||
|
<head>
|
||||||
|
<link rel="stylesheet" href="../style.css">
|
||||||
|
<meta charset="UTF-8">
|
||||||
|
<title>Razer — Spyware Watchdog</title>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<img src="../images/razer_logo.png">
|
||||||
|
<h1>Razer</h1>
|
||||||
|
<center>
|
||||||
|
<p><a href="../articles/razer_en.html">English Translation</a></p>
|
||||||
|
</center>
|
||||||
|
<p>Razer es una compañía que hace programas y hardware para videojugadores</p>
|
||||||
|
<h2>Nivel de spyware: <b style="color:red;">EXTREMADAMENTE ALTO</b></h2>
|
||||||
|
<h3>Información que recolecta</h3>
|
||||||
|
<p>Razer confirma<sup><a href="#1">[1]</a></sup> que recolecta estos datos:</p>
|
||||||
|
<ul>
|
||||||
|
<li>Correo electrónico</li>
|
||||||
|
<li>Nombre</li>
|
||||||
|
<li>Información de contacto</li>
|
||||||
|
<li>La información que envias cuando los contactas (mensaje y demás)</li>
|
||||||
|
<li>El tiempo que usas sus productos/servicios</li>
|
||||||
|
<li>Los datos que envias en encuestas</li>
|
||||||
|
<li>Dirección IP, geolocalización, sistema operativo, navegador</li>
|
||||||
|
</ul>
|
||||||
|
<p>Razer tambien admite<sup><a href="#1">[1]</a> <a href="#2">[2]</a> </sup>que vende los datos de los usuarios</p>
|
||||||
|
<p>También dice que los empleados pueden ver esos datos.</p>
|
||||||
|
<h3>Razer te obliga a crear una cuenta para usar sus productos</h3>
|
||||||
|
<img class="screenshot" src="../images/theevidence.png">
|
||||||
|
<p style="font-family:monospace">¿Dónde está el botón para iniciar sesión en otro momento?</p>
|
||||||
|
<p>Sin una cuenta, no puedes configurar ni tu teclado ni tu ratón, no puedes cambiar el DPI del ratón (A no ser que haya un botón en el ratón para eso)</p>
|
||||||
|
<p>Basicamente, cada vez que abras el software para cambiar el color del ratón o lo que sea, Razer recibirá tus datos.</p>
|
||||||
|
<p>Estás obligado a conectarte a "la nube" para cargar configuraciones, esto quiere decir que las configuraciones de tu hardware están en el ordenador de otra persona, y saben quien las tiene (las configuraciones)</p>
|
||||||
|
|
||||||
|
<hr>
|
||||||
|
<center>
|
||||||
|
<h2>Mas lecturas</h2>
|
||||||
|
<a href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a>
|
||||||
|
<hr>
|
||||||
|
<h2>Crédito</h2>
|
||||||
|
<p>This article was written by:
|
||||||
|
<a href="mailto:qorg[@]vxempire.xyz">qorg11</a>
|
||||||
|
</p>
|
||||||
|
<hr>
|
||||||
|
<h2>Referencias</h2>
|
||||||
|
<p>1. <a id="1" href="https://www.razer.com/legal/privacy-policy">Razer - Privacy Policy | Razer United States</a> <a href="https://archive.fo/sVOGz">[archive.is]</a><br>
|
||||||
|
2. <a id="2" href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a> <a href="https://archive.fo/sjgDR">[archive.is]</a></p>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
<hr>
|
||||||
|
<p><b>
|
||||||
|
This article was created on 3/4/2019
|
||||||
|
</b></p>
|
||||||
|
|
||||||
|
<p>
|
||||||
|
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||||
|
</p>
|
||||||
|
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
|
||||||
|
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||||
|
</center>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -1,56 +0,0 @@
|
||||||
<!--Old Style-->
|
|
||||||
<!DOCTYPE HTML>
|
|
||||||
<html lang=”en-us”>
|
|
||||||
<head>
|
|
||||||
<link rel="stylesheet" href="../style.css">
|
|
||||||
<meta charset="UTF-8">
|
|
||||||
<title>Spyware Watchdog</title>
|
|
||||||
</head>
|
|
||||||
<body>
|
|
||||||
<h1>systemd</h1>
|
|
||||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
|
||||||
<h1><font color=red>This article is not accurate and needs to be rewritten</font></h1>
|
|
||||||
<h2>Spyware Level: <font color="yellow">Not Rated</font></h2>
|
|
||||||
<p>
|
|
||||||
A lot of people asked me to write this article, so here is my attempt at writing it. Lots of people have lots of reasons to dislike systemd, and a lot of them wonder if
|
|
||||||
there is also a privacy reason to dislike systemd. But I have not ever heard of any kind of telemetry, phoning home, or any other kind of spyware in the systemd software
|
|
||||||
suite. systemd is free software so anyone can look at the code. And a lot of people have spent a lot of time cataloging why they don't like systemd. But if you read their
|
|
||||||
reasons, none of them mention any kind of spyware hiding inside of systemd's codebase that can be actually proven. So, I can't write that systemd is spyware until someone
|
|
||||||
can prove that it is spyware. If you have proof then feel free to email me and I will be happy to change this rating.
|
|
||||||
</p>
|
|
||||||
<p>
|
|
||||||
This line of reasoning for giving systemd a "Not Spyware" rating has some flaws, and the most obvious one is that it isn't reasonable to audit the 1 million lines of systemd
|
|
||||||
code for spyware. But this is still too generic of a criticism to make about it, because while in theory it is true, there needs to be real proof. Maybe the take-away is
|
|
||||||
that while there are many reasons to not like systemd, it's really probably not violating anyone's privacy, just because of how much scrutiny it has gotten. Maybe it should be
|
|
||||||
rated "Potential Spyware" or a lower, "Probably Not Spyware"? I think that the rating should be taken with a grain of salt because of this.
|
|
||||||
</p>
|
|
||||||
<p>
|
|
||||||
I have personally never used systemd and I don't have the skills to actually audit it or run tests on it myself. So this isn't a very good place to look when looking for reasons
|
|
||||||
to dislike systemd. At the very least, I can point to anti-systemd web pages that I am sure would be the first to report on systemd potentially violating the privacy of its users.
|
|
||||||
But I don't want to call them "sources" or anything because what they talk about is beyond the scope of this website.
|
|
||||||
</p>
|
|
||||||
<hr>
|
|
||||||
<h2>Anti systemd web pages</h2>
|
|
||||||
<p>
|
|
||||||
<a href="https://suckless.org/sucks/systemd/">systemd is the best example of Suck.</a>
|
|
||||||
<a href="https://web.archive.org/web/20180725191931/https://suckless.org/sucks/systemd">[web.archive.org]</a>
|
|
||||||
<a href="http://archive.li/BfS7l">[archive.is]</a><br>
|
|
||||||
|
|
||||||
<a href="http://without-systemd.org/wiki/index.php/Arguments_against_systemd">Arguments against systemd</a>
|
|
||||||
<a href="http://web.archive.org/web/20180802045154/http://without-systemd.org/wiki/index.php/Arguments_against_systemd">[web.archive.org]</a>
|
|
||||||
<a href="http://archive.li/bnmIo">[archive.is]</a><br>
|
|
||||||
|
|
||||||
<a href="https://web.archive.org/web/20170724100245/https://muchweb.me/systemd-nsa-attempt/">Is systemd an NSA attempt?</a>
|
|
||||||
|
|
||||||
</p>
|
|
||||||
<hr>
|
|
||||||
<p><b>
|
|
||||||
This article was last edited on 8/7/2018
|
|
||||||
</b></p>
|
|
||||||
<p>
|
|
||||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
|
||||||
</p>
|
|
||||||
<a href="../LICENSE.txt"><img src="../images/cc0.png" alt="CC0 License"></a>
|
|
||||||
</body>
|
|
||||||
|
|
||||||
</html>
|
|
|
@ -1,102 +0,0 @@
|
||||||
<!-- NOTICE!!!! -->
|
|
||||||
|
|
||||||
<!-- BEFORE MAKING A PULL REQUEST OR PUSH PLEASE ALWAYS CHECK WITH THE VALIDATOR -->
|
|
||||||
<!-- http://validator.w3.org/#validate-by-input -->
|
|
||||||
|
|
||||||
<!-- NOTICE!!!! -->
|
|
||||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
|
||||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
|
||||||
<head>
|
|
||||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
|
||||||
<title>Tiktok — Spyware Watchdog</title>
|
|
||||||
<link rel="stylesheet" href="../style.css" />
|
|
||||||
</head>
|
|
||||||
<body>
|
|
||||||
<div class="case">
|
|
||||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
|
||||||
<div class="main">
|
|
||||||
<img
|
|
||||||
src="../images/example_logo.png"
|
|
||||||
alt="Images are in the ../images folder"
|
|
||||||
/>
|
|
||||||
<h1>Tiktok</h1>
|
|
||||||
<h3> Work in progress</h3>
|
|
||||||
<p>
|
|
||||||
Tiktok is a social media app allowing people to post short form videos, usually from a couple seconds
|
|
||||||
to up to 3 minutes long in length.
|
|
||||||
</p>
|
|
||||||
<p>
|
|
||||||
Like Discord, TikTok is spyware because all data goes through a central server, and multidues of data on you and your device are collected, sometimes even without your consent.
|
|
||||||
</p>
|
|
||||||
<h3>
|
|
||||||
Tiktok collects mass amounts of data
|
|
||||||
</h3>
|
|
||||||
<p>
|
|
||||||
Tiktok explicitly confirms in its privacy policy<sup
|
|
||||||
><a href="#s1">[1]</a></sup
|
|
||||||
>
|
|
||||||
that it collects/can access the following information:
|
|
||||||
</p>
|
|
||||||
<ul>
|
|
||||||
<li>Age of user</li>
|
|
||||||
<li>ID cards (if submitted)</li>
|
|
||||||
<li>Device UUID</li>
|
|
||||||
<li>User's e-mail address</li>
|
|
||||||
<li>Content from your clipboard</li>
|
|
||||||
<li>All images and videos stored on your phone</li>
|
|
||||||
|
|
||||||
</ul>
|
|
||||||
<p>It also collects data from outside companies ("advertising partners") from third parties without your consent.</p>
|
|
||||||
<h3>
|
|
||||||
Tiktok shares this data with companies in the business of spyware.
|
|
||||||
</h3>
|
|
||||||
</div>
|
|
||||||
<hr/>
|
|
||||||
<div class="footer">
|
|
||||||
<div class="futher">
|
|
||||||
<h4>Further Reading:</h4>
|
|
||||||
<ol>
|
|
||||||
<li><a href="">Source</a>
|
|
||||||
<a href="">[web.archive.org]</a>
|
|
||||||
<a href="">[archive.is]</a></li>
|
|
||||||
</ol>
|
|
||||||
</div>
|
|
||||||
<hr/>
|
|
||||||
<div class="sources">
|
|
||||||
<h4>Sources:</h4>
|
|
||||||
<ol>
|
|
||||||
<li id="s1">
|
|
||||||
<a href="">Source1</a>
|
|
||||||
<a href="">[web.archive.org]</a>
|
|
||||||
<a href="">[archive.is]</a>
|
|
||||||
<a href="">[ghostarchive.org]</a>
|
|
||||||
</li>
|
|
||||||
<li id="s2">
|
|
||||||
<a href="">Source2</a>
|
|
||||||
<a href="">[web.archive.org]</a>
|
|
||||||
<a href="">[archive.is]</a>
|
|
||||||
<a href="">[ghostarchive.org]</a>
|
|
||||||
</li>
|
|
||||||
</ol>
|
|
||||||
</div>
|
|
||||||
<hr/>
|
|
||||||
<b>This article was created on mm/dd/yyyy</b><br/>
|
|
||||||
<b>This article was last edited on mm/dd/yyyy</b>
|
|
||||||
<!--Dont change-->
|
|
||||||
<p>
|
|
||||||
If you want to edit this article, or contribute your own article(s), visit us
|
|
||||||
at the git repo on
|
|
||||||
<a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.
|
|
||||||
</p>
|
|
||||||
<p>
|
|
||||||
All contributions must be licensed under the CC0 license to be
|
|
||||||
accepted.
|
|
||||||
</p>
|
|
||||||
<a href="../LICENSE.txt">
|
|
||||||
<img class="icon" src="../images/cc0.png" alt="CC0 License"/>
|
|
||||||
</a>
|
|
||||||
<!--Dont change-->
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
</body>
|
|
||||||
</html>
|
|
Before Width: | Height: | Size: 15 KiB |
Before Width: | Height: | Size: 4.9 KiB |
Before Width: | Height: | Size: 2.9 KiB |
Before Width: | Height: | Size: 100 KiB |
Before Width: | Height: | Size: 2.6 KiB |
Before Width: | Height: | Size: 6.2 KiB |
Before Width: | Height: | Size: 1.7 KiB |
Before Width: | Height: | Size: 92 KiB |
Before Width: | Height: | Size: 7.2 KiB |
Before Width: | Height: | Size: 14 KiB |
Before Width: | Height: | Size: 3.7 KiB |
Before Width: | Height: | Size: 224 KiB |
Before Width: | Height: | Size: 1.6 KiB |
|
@ -1,92 +0,0 @@
|
||||||
This text file is so that I can list all of the articles that
|
|
||||||
people have requested to be made, so that I don't forget about
|
|
||||||
anyone's request. If you are interested in writing articles
|
|
||||||
for the site and need help choosing something to review, this
|
|
||||||
list is a good place to start.
|
|
||||||
|
|
||||||
1password — made a "stub" article:
|
|
||||||
https://spyware.neocities.org/articles/1password.html
|
|
||||||
|
|
||||||
Ask.com services (excite, myway) — no progress has been made
|
|
||||||
|
|
||||||
Merge information from http://archive.is/baCzK and https://www.ghacks.net/2016/02/08/steam-uses-insecure-out-of-date-chromium-browser/
|
|
||||||
to the steam article, also run it through MITMproxy to find what requests it makes. — no progress has been made
|
|
||||||
|
|
||||||
Create a new class of articles about browser addons, the following explicitly:
|
|
||||||
NoScript (allegedly phones home? needs a test to see if that's true or not...)
|
|
||||||
Stylish (definite spyware)
|
|
||||||
Ghostery
|
|
||||||
|
|
||||||
No progress made on any of those ^
|
|
||||||
|
|
||||||
uTorrent — stub article: https://spyware.neocities.org/articles/utorrent.html
|
|
||||||
|
|
||||||
Write about Razor mouse products:
|
|
||||||
Useful links:
|
|
||||||
https://www.razer.com/legal/privacy-policy
|
|
||||||
http://wp.xin.at/archives/1438
|
|
||||||
For mitigation guides there's an easy way to run any program without letting it connect to the internet using scripts through iptables and there's always the --net=none option with firejail.
|
|
||||||
https://serverfault.com/questions/550276/how-to-block-internet-access-to-certain-programs-on-linux I use 'ni' instead of 'no-internet'.
|
|
||||||
|
|
||||||
No progress has been made ^
|
|
||||||
|
|
||||||
Write about the oculus rift:
|
|
||||||
https://www.roadtovr.com/oculus-vr-privacy-policy-serves-needs-facebook-not-users/
|
|
||||||
https://www.roadtovr.com/error-rendered-many-rifts-useless-simple-workaround/
|
|
||||||
|
|
||||||
No Progress ^
|
|
||||||
|
|
||||||
Write about privacy badger: https://www.eff.org/privacybadger#faq-Why-does-my-browser-connect-to-fastly.com-IP-addresses-on-startup-after-installing-Privacy-Badger
|
|
||||||
|
|
||||||
Write about lenovo bundling spyware:
|
|
||||||
https://www.makeuseof.com/tag/security-failings-demonstrate-avoid-lenovo/
|
|
||||||
|
|
||||||
Write about HP bundling spyware:
|
|
||||||
https://www.extremetech.com/computing/259605-hp-caught-installing-spyware-windows-10-systems-without-permission-notification
|
|
||||||
https://www.engadget.com/2017/11/28/hp-quietly-installs-system-slowing-spyware-on-its-pcs/
|
|
||||||
|
|
||||||
Write about Dell bundling spyware:
|
|
||||||
https://www.techdirt.com/articles/20050530/2333212.shtml
|
|
||||||
https://arstechnica.com/information-technology/2015/11/dell-does-superfish-ships-pcs-with-self-signed-root-certificates/
|
|
||||||
|
|
||||||
Write about TOSHIBA bundling spyware:
|
|
||||||
https://www.shouldiremoveit.com/TOSHIBA-Service-Station-5383-program.aspx
|
|
||||||
|
|
||||||
Write about Acer bundling spyware:
|
|
||||||
https://www.pcmag.com/article2/0,2817,2477704,00.asp
|
|
||||||
|
|
||||||
Rate CPU's for spyware:
|
|
||||||
https://libreboot.org/faq.html#amd
|
|
||||||
https://libreboot.org/faq.html#intel
|
|
||||||
|
|
||||||
Some progress made with that. See AMD CPU article. Still need to finish that.
|
|
||||||
|
|
||||||
Write about visual studio — no progress
|
|
||||||
write about geary — no progress
|
|
||||||
|
|
||||||
Add this tag to the top of everything:
|
|
||||||
<meta name="viewport" content="width=device-width, initial-scale=1">
|
|
||||||
|
|
||||||
Ublock Origin — No progress (phoning home? check privacy policy)
|
|
||||||
|
|
||||||
> please add to overview browsers like Seamonkey, Srware Iron and Sphere
|
|
||||||
> browser: https://sphere.tenebris.cc <https://sphere.tenebris.cc/>
|
|
||||||
|
|
||||||
Did Iron and Sphere
|
|
||||||
|
|
||||||
|
|
||||||
Write about the Bromite Android Browser
|
|
||||||
|
|
||||||
-I don't have an android phone. So someone else will have to write it, I don't have the means to do a reveiw of it.
|
|
||||||
|
|
||||||
write articles about alternatives to Discord:
|
|
||||||
|
|
||||||
Signal
|
|
||||||
XMPP
|
|
||||||
Mumble, etc.
|
|
||||||
|
|
||||||
No progress has been made yet.
|
|
||||||
|
|
||||||
Write an article about Facebook.
|
|
||||||
Write an article about TikTok.
|
|
||||||
|
|
|
@ -1,70 +0,0 @@
|
||||||
<?xml version="1.0" encoding="UTF-8"?>
|
|
||||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
|
|
||||||
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
|
||||||
xsi:schemaLocation="http://www.w3.org/MarkUp/SCHEMA/xhtml11.xsd" xml:lang="en">
|
|
||||||
<head>
|
|
||||||
<title>Signal</title>
|
|
||||||
<link rel="stylesheet" type="text/css" href="../style.css"/>
|
|
||||||
</head>
|
|
||||||
<body>
|
|
||||||
|
|
||||||
<h1 >Signal</h1>
|
|
||||||
<p><img src="../images/Signal-logo.png" /></p>
|
|
||||||
<p>Signal is a "private" instant messenger.</p>
|
|
||||||
<h2 >Spyware level: <font style="color:yellow;">MEDIUM</font></h2>
|
|
||||||
<h2 >You need to give Signal your phone number to work</h1>
|
|
||||||
<p>You cannot create an account in Signal without giving it your phone number.</p>
|
|
||||||
<h3 >Signal is not completly Peer-To-Peer</h1>
|
|
||||||
<p>Signal claims to be a Peer-To-Peer messenger. But this is not true because Signal stores <strong>your phone number</strong> in the servers.<a href="#fn1" class="footnote-ref" ><sup>1</sup></a></p>
|
|
||||||
<h1>Signal has the decryption keys of their messages</h1>
|
|
||||||
<p>
|
|
||||||
The Signal legal terms<sup>3</sup> claims they have the
|
|
||||||
decryption keys:<br/>
|
|
||||||
<i>
|
|
||||||
"Additional technical information is stored on our servers,
|
|
||||||
including randomly generated authentication tokens, keys, push
|
|
||||||
tokens, and other material that is necessary to establish
|
|
||||||
calls and transmit messages. Signal limits this additional
|
|
||||||
technical information to the minimum required to operate the
|
|
||||||
Services."
|
|
||||||
</i>
|
|
||||||
<br/>
|
|
||||||
It also says it would give info to the government and law
|
|
||||||
enforcement agencies:<br/>
|
|
||||||
<i>
|
|
||||||
Third Parties. We work with third parties to provide some of our
|
|
||||||
Services. For example, our Third-Party Providers send a
|
|
||||||
verification code to your phone number when you register for our
|
|
||||||
Services. These providers are bound by their Privacy Policies to
|
|
||||||
safeguard that information. If you use other Third-Party
|
|
||||||
Services like YouTube, Spotify, Giphy, etc. in connection with
|
|
||||||
our Services, their Terms and Privacy Policies govern your use
|
|
||||||
of those services.
|
|
||||||
</i>
|
|
||||||
<br/>
|
|
||||||
Please note the "Services like youtube, spotify, giphy". Those
|
|
||||||
sites are in the Signal source code<sup>4</sup>, so they can spy
|
|
||||||
on you.
|
|
||||||
|
|
||||||
Then, we have this:<br/>
|
|
||||||
<i>
|
|
||||||
Other instances where Signal may need to share your data
|
|
||||||
|
|
||||||
To meet any applicable law, regulation, legal process or enforceable governmental request.
|
|
||||||
To enforce applicable Terms, including investigation of potential violations.
|
|
||||||
To detect, prevent, or otherwise address fraud, security, or technical issues.
|
|
||||||
To protect against harm to the rights, property, or safety of Signal, our users, or the public as required or permitted by law.
|
|
||||||
</i>
|
|
||||||
<br/>
|
|
||||||
</p>
|
|
||||||
<h3 >Further reading</h1>
|
|
||||||
<p><a href="https://kill-9.xyz/harmful/software/signal">Signal considered harmful</a></p>
|
|
||||||
<h1 >References</h1>
|
|
||||||
<section class="footnotes" role="doc-endnotes">
|
|
||||||
<p>1: <a href="https://blog.0day.rocks/a-look-into-signals-encrypted-profiles-5491908186c1">A Look Into Signal’s Encrypted Profiles</a></p>
|
|
||||||
<p>2: <a href="https://github.com/signalapp/Signal-Android/issues/127">Request: Google Play signed download alternative</a></p>
|
|
||||||
<p>3: <a href="https://signal.org/legal/">https://signal.org/legal/</a></p>
|
|
||||||
<p>4: <a href="https://signal.org/blog/signal-and-giphy-update/">https://signal.org/blog/signal-and-giphy-update/</a></p>
|
|
||||||
</section>
|
|
||||||
</body>
|
|
||||||
</html>
|
|