Update articles to new design 1

This commit is contained in:
UmbreonFR4 2020-07-25 10:33:15 +01:00
parent 8e871ffb0c
commit 0c585e9335
100 changed files with 2140 additions and 1226 deletions

View File

@ -1,42 +1,60 @@
<!DOCTYPE HTML> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html lang=”en-us”> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"> <meta
<meta charset="UTF-8"> http-equiv="Content-type"
<title>Spyware Watchdog</title> content="application/xhtml+xml;charset=utf-8"
</head> />
<body> <title>1Password - Spyware Watchdog</title>
<h1>1Password</h1> <link rel="stylesheet" href="../style.css" />
<p><a href="../articles/index.html">Back to catalog</a></p> </head>
<img src="../images/1pw_logo.png" alt="1password Logo">
<p>
1password is a password management service
</p>
<h2>Spyware Level: <font color=red>Not Rated</font></h2>
<p>
This article is a stub and sitll needs to be written. If you want to write it, email me so I dont duplicate effort.
</p>
<p>
https://1password.com/legal/privacy/
https://www.macworld.com/article/2996213/security/1password-is-still-secure-but-you-can-reduce-a-potential-risk.html
https://paul.reviews/privacy-password-managers-a-reality-check/
</p>
<p>
>Third-Party Data Processors
>Your Secure and Service data are held by third party data processors, who provide us with hosting and other infrastructure services. The locations of these are described above. In many cases (but we cannot promise that this will always be the case) even Service data held by these entities is encrypted with keys held only by us.
>Data needed to process payments is collected by our payment processor, Stripe, Inc., which conforms to a U.S.-E.U. Privacy Shield Framework. See https://stripe.com/privacy-shield-policy
</p> <body>
<hr> <div class="case">
<p><b> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
This article was created on 6/16/2018 <div class="main">
</b></p> <img src="../images/1pw_logo.png" alt="1Password Logo" />
<p><b> <h1>1Password</h1>
This article was last edited on 6/16/2018 <p>
</b></p> 1password is a password management service
<p> </p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted. <h2>Spyware Level: <span class="red">Not Rated</span></h2>
</p> <p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a> This article is a stub and still needs to be written. If you want to
</body> write it, email me so I dont duplicate effort.
https://1password.com/legal/privacy/
https://www.macworld.com/article/2996213/security/1password-is-still-secure-but-you-can-reduce-a-potential-risk.html
https://paul.reviews/privacy-password-managers-a-reality-check/
>Third-Party Data Processors >Your Secure and Service data are held by
third party data processors, who provide us with hosting and other
infrastructure services. The locations of these are described above.
In many cases (but we cannot promise that this will always be the
case) even Service data held by these entities is encrypted with keys
held only by us. >Data needed to process payments is collected by our
payment processor, Stripe, Inc., which conforms to a U.S.-E.U. Privacy
Shield Framework. See https://stripe.com/privacy-shield-policy
</p>
</div>
<hr />
<div class="footer">
<b>This article was created on 6/16/2018</b><br />
<b>This article was last edited on 6/16/2018</b>
<!--Dont change-->
<p>
If you want to edit this article, or contribute your own article(s),
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p>
<p>
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode">
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
</a>
<!--Dont change-->
</div>
</div>
</body>
</html> </html>

View File

@ -1,68 +1,144 @@
<!DOCTYPE HTML> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html lang=”en-us”> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"> <meta
<meta charset="UTF-8"> http-equiv="Content-type"
<title>Spyware Watchdog</title> content="application/xhtml+xml;charset=utf-8"
/>
<title>AMD - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head> </head>
<body> <body>
<meta name="viewport" content="width=device-width, initial-scale=1"> <div class="case">
<h1>AMD CPU Family</h1> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<p><a href="../articles/index.html">Back to catalog</a></p> <div class="main">
<img src="../images/amd_logo.png" alt="One of the logos AMD uses for its CPU's"> <h1>
<h1>UNFINISHED ARTICLE - UNDER CONSTRUCTION - BAD FORMATTING</h1> <span class="red">UNFINISHED ARTICLE - UNDER CONSTRUCTION - BAD FORMATTING</span>
<p> </h1>
Advanced Micro Devices, Inc. is an American multinational semiconductor company based in Santa Clara, California, that develops computer processors and related technologies for business and consumer markets. This article is specifically about the CPU's that are produced by AMD and nothing else. The logo is one of many logos used by AMD, but the <img src="../images/amd_logo.png" alt="amd Logo" />
article is not about any one specific CPU. <b>No rating is given</b> because this is not an article about any specific product, and the rating system is difficult to fit into this <h1>AMD CPU Family</h1>
article. <p>
</p> This part of the article should have the name of the program and what
<p> it does, and who develops it.
Modern CPU models produced by AMD contain an embedded ARM co-processor called the Platform Security Processor (PSP). Nearly all AMD CPU's produced since 2013 operate under the supervision of this separate, more privileged, environment consisting of an integrated ARM processor with access to isolated resources as well as main system memory and I/O. </p>
<sup><a href="#1">[1]</a></sup> <p>
</p> Advanced Micro Devices, Inc. is an American multinational
<p> semiconductor company based in Santa Clara, California, that develops
This article isn't complete. This is a work-in-progress and so this article is not formatted properly.. computer processors and related technologies for business and consumer
</p> markets. This article is specifically about the CPU's that are
<p>http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf (page 11)</p> produced by AMD and nothing else. The logo is one of many logos used
<p>While ARM and AMD tout the “Trusted Execution Environment” as useful for secure payment, anti-theft and malware protection, they also discuss content protection or DRM as a use case. https://www.owasp.o../images/c/c8/OWASP_Security_Tapas_-_TrustZone%2C_TEE_and_Mobile_Security_final.pdf</p> by AMD, but the article is not about any one specific CPU.
<p>Possible uses … DRM</p> <b>No rating is given</b> because this is not an article about any
<p> specific product, and the rating system is difficult to fit into this
Researchers have already been able to identify exploits in AMDs Platform Security Processor. In 2018 researchers published a vulnerability in which a specially crafted certificate could lead to a stack overflow in the PSPs TPM firmware allowing for remote code execution. (https://seclists.org/fulldisclosure/2018/Jan/12) Another group goes on to detail how an attacker might leverage exploits RYZENFALL or FALLOUT to gain foothold in networks with Ryzen based systems. (https://www.techpowerup.com/242386/cts-labs-responds-to-a-techpowerup-technical-questionnaire) article.
</p> </p>
<hr> <p>
<p>Please note that Family 16h and Modern CPU models produced by AMD contain an embedded ARM co-processor
called the Platform Security Processor (PSP). Nearly all AMD CPU's
Family 15h-Models60h and later contain a PSP</p> produced since 2013 operate under the supervision of this separate,
<h2><font color=red>NOT TRUSTED:</font></h2> more privileged, environment consisting of an integrated ARM processor
<ul> with access to isolated resources as well as main system memory and
<li>Kaveri (Steamroller “BDv3”) https://www.amd.com/system/files/TechDocs/51590_15h_Models_30h-3Fh_A-Series_PDS.pdf (page 6) I/O.
https://arstechnica.com/information-technology/2012/06/amd-to-add-arm-processors-to-boost-chip-security/</li> <sup><a href="#s1">[1]</a></sup>
<li>Carrizo/Bristol Ridge (Excavator “BDv4”) https://www.anandtech.com/show/8995/amd-at-isscc-2015-carrizo-and-excavator-details</li> </p>
<li>All Zen based CPUs (17h family)</li> <p>
</ul> This article isn't complete. This is a work-in-progress and so this
<h2><font color=yellow>POTENTIALLY TRUSTED:</font></h2> article is not formatted properly..
<ul> </p>
<li>Jaguar (the only 16h family CPU that does NOT have PSP): http://support.amd.com/TechDocs/52128_16h_Software_Opt_Guide.zip (page 8) https://en.wikipedia.org/wiki/Puma_(microarchitecture)#Improvements_over_Jaguar</li> <p>
<li>All K5-K10, Bobcat, Bulldozer (“BDv1”) and Piledriver (“BDv2”)</li> http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf
<li>All K5-K10, Bobcat, Bulldozer (“BDv1”) and Piledriver (“BDv2”)</li> (page 11)
</ul> </p>
<hr> <p>
<h2>Sources</h2> While ARM and AMD tout the “Trusted Execution Environment” as useful
<p> for secure payment, anti-theft and malware protection, they also
<a name="1">1.</a> discuss content protection or DRM as a use case.
<a href="http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf">AMD Security and Server innovation</a> https://www.owasp.o../images/c/c8/OWASP_Security_Tapas_-_TrustZone%2C_TEE_and_Mobile_Security_final.pdf
<a href="http://web.archive.org/web/20180422100442/http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf">[web.archive.org]</a> </p>
<a href="http://archive.vn/7dYOZ">[archive.vn]</a><br> <p>Possible uses … DRM</p>
</p> <p>
<hr> Researchers have already been able to identify exploits in AMDs
<p><b> Platform Security Processor. In 2018 researchers published a
This article was last edited on 1/10/2019 vulnerability in which a specially crafted certificate could lead to a
</b></p> stack overflow in the PSPs TPM firmware allowing for remote code
<p> execution. (https://seclists.org/fulldisclosure/2018/Jan/12) Another
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted. group goes on to detail how an attacker might leverage exploits
</p> RYZENFALL or FALLOUT to gain foothold in networks with Ryzen based
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a> systems.
(https://www.techpowerup.com/242386/cts-labs-responds-to-a-techpowerup-technical-questionnaire)
</p>
<hr/>
<p>
Please note that Family 16h and Family 15h-Models60h and later contain
a PSP
</p>
<h2><font color="red">NOT TRUSTED:</font></h2>
<ul>
<li>
Kaveri (Steamroller “BDv3”)
https://www.amd.com/system/files/TechDocs/51590_15h_Models_30h-3Fh_A-Series_PDS.pdf
(page 6)
https://arstechnica.com/information-technology/2012/06/amd-to-add-arm-processors-to-boost-chip-security/
</li>
<li>
Carrizo/Bristol Ridge (Excavator “BDv4”)
https://www.anandtech.com/show/8995/amd-at-isscc-2015-carrizo-and-excavator-details
</li>
<li>All Zen based CPUs (17h family)</li>
</ul>
<h2><font color="yellow">POTENTIALLY TRUSTED:</font></h2>
<ul>
<li>
Jaguar (the only 16h family CPU that does NOT have PSP):
http://support.amd.com/TechDocs/52128_16h_Software_Opt_Guide.zip
(page 8)
https://en.wikipedia.org/wiki/Puma_(microarchitecture)#Improvements_over_Jaguar
</li>
<li>
All K5-K10, Bobcat, Bulldozer (“BDv1”) and Piledriver (“BDv2”)
</li>
<li>
All K5-K10, Bobcat, Bulldozer (“BDv1”) and Piledriver (“BDv2”)
</li>
</ul>
</div>
<hr />
<div class="footer">
<div class="sources">
<h4>Sources:</h4>
<ol>
<li id="s1">
<a
href="http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf"
>AMD Security and Server innovation</a
>
<a
href="http://web.archive.org/web/20180422100442/http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf"
>[web.archive.org]</a
>
<a href="http://archive.vn/7dYOZ">[archive.vn]</a><br />
</li>
</ol>
</div>
<hr />
<b>This article was last edited on 1/10/2019</b>
<!--Dont change-->
<p>
If you want to edit this article, or contribute your own article(s),
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p>
<p>
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"
><img class="icon" src="../images/cc0.png" alt="CC0 License"
/></a>
<!--Dont change-->
</div>
</div>
</body> </body>
</html> </html>

View File

@ -1,91 +1,171 @@
<!DOCTYPE HTML> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html lang=”en-us”> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"> <meta
<meta charset="UTF-8"> http-equiv="Content-type"
<title>Bing - Spyware Watchdog</title> content="application/xhtml+xml;charset=utf-8"
</head> />
<body> <title>Bing - Spyware Watchdog</title>
<img src="../images/bing_logo.png" alt="Bing logo"> <link rel="stylesheet" href="../style.css" />
<h1>Bing</h1> </head>
<p>
Bing is a search engine created and owned by Microsoft.
</p>
<h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2>
<p>
Bing is yet another spyware search engine that collects your information and sells it to advertisers. It's strongly recommended that you
do not use Bing.
</p>
<p>
At some point Bing had a privacy policy, but Microsoft doesnt seem to be hosting it anymore. So, this article will look at the
Microsoft Privacy Statement<sup><a href="#1">[1]</a></sup> to help us understand what information Bing collects.
Similarly to the privacy policies of Google and Apple, the Microsoft privacy statement eclipses the entire spyware platform and does not help you understand
in great detail what kind of information one single program could be collecting. (although this policy is more specific)
</p>
<h3>Bing collects your search history</h3> <body>
<div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<img src="../images/bing_logo.png" alt="Bing Logo" />
<h1>Bing</h1>
<p>
This part of the article should have the name of the program and what
it does, and who develops it.
</p>
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
<p>
Bing is yet another spyware search engine that collects your
information and sells it to advertisers. It's strongly recommended
that you do not use Bing.
</p>
<p>
At some point Bing had a privacy policy, but Microsoft doesnt seem to
be hosting it anymore. So, this article will look at the Microsoft
Privacy Statement<sup><a href="#s1">[1]</a></sup> to help us
understand what information Bing collects. Similarly to the privacy
policies of Google and Apple, the Microsoft privacy statement eclipses
the entire spyware platform and does not help you understand in great
detail what kind of information one single program could be
collecting. (although this policy is more specific)
</p>
<p>From the Microsoft Privacy Statement<sup><a href="#1">[1]</a></sup>:</p> <h3>Bing collects your search history</h3>
<p><i> <p>
"Microsoft collects data from you, through our interactions with you and through our products for a variety of purposes described From the Microsoft Privacy Statement<sup><a href="#s1">[1]</a></sup
below...You provide some of this data directly, such as when you...submit a search query to Bing" >:
</i></p> </p>
<p>Later in the Interactions -> Device and usage data section of this statement, it is clarified again that Microsoft collects your: <p>
<i>"Browse History. Data about the web pages you visit."</i>, as well as your: <i>"Images. Images and related information, such as <i>
picture metadata. For example, we collect the image you provide when you use a Bing image-enabled service."</i></p> "Microsoft collects data from you, through our interactions with you
and through our products for a variety of purposes described
below...You provide some of this data directly, such as when
you...submit a search query to Bing"
</i>
</p>
<p>Microsoft claims to store this information for an unlimited amount of time, but it claims that it will eventually anonymize this information <p>
in a process that takes 18 months to complete.<p> Later in the Interactions -> Device and usage data section of this
statement, it is clarified again that Microsoft collects your:
<i>"Browse History. Data about the web pages you visit."</i>, as well
as your:
<i
>"Images. Images and related information, such as picture metadata.
For example, we collect the image you provide when you use a Bing
image-enabled service."</i
>
</p>
<p><i> <p>
"Has Microsoft adopted and announced a specific retention period for a certain data type? For example, for Bing search queries, we de-identify Microsoft claims to store this information for an unlimited amount of
stored queries by removing the entirety of the IP address after 6 months, and cookie IDs and other cross-session identifiers after 18 months. " time, but it claims that it will eventually anonymize this information
</i></p> in a process that takes 18 months to complete.
</p>
<p></p>
<h3>Bing uses your search history to profile you for advertising</h3> <p>
<i>
"Has Microsoft adopted and announced a specific retention period for
a certain data type? For example, for Bing search queries, we
de-identify stored queries by removing the entirety of the IP
address after 6 months, and cookie IDs and other cross-session
identifiers after 18 months. "
</i>
</p>
<p>From the Microsoft Privacy Statement<sup><a href="#1">[1]</a></sup>:</p> <h3>Bing uses your search history to profile you for advertising</h3>
<p><i>
"Microsoft may use data we collect to select and deliver some of the ads you see on Microsoft web properties, such as Microsoft.com, MSN and Bing."
</i></p>
<p>
So since your search history is part of the "data we collect", the natrual conclusion is that, your search queiries are being used to profile you for
advertising. And of course, this is confirmed in this section:
</p>
<p><i> <p>
"The ads that you see may be selected based on data we process about you, such as your interests and favorites, your location, your transactions, how From the Microsoft Privacy Statement<sup><a href="#s1">[1]</a></sup
you use our products,<b><font color=red> your search queries </font></b>, or the content you view. For example, if you view content on MSN about automobiles, we may show advertisements >:
about cars; if you search “pizza places in Seattle” on Bing, you may see advertisements in your search results for restaurants in Seattle." </p>
</i></p> <p>
<i>
"Microsoft may use data we collect to select and deliver some of the
ads you see on Microsoft web properties, such as Microsoft.com, MSN
and Bing."
</i>
</p>
<p>
So since your search history is part of the "data we collect", the
natrual conclusion is that, your search queiries are being used to
profile you for advertising. And of course, this is confirmed in this
section:
</p>
<h3>Bing sells your search history to other spyware platforms</h3> <p>
<i>
"The ads that you see may be selected based on data we process about
you, such as your interests and favorites, your location, your
transactions, how you use our products,
<b>
<font color="red"> your search queries </font>
</b>
, or the content you view. For example, if you view content on MSN
about automobiles, we may show advertisements about cars; if you
search “pizza places in Seattle” on Bing, you may see advertisements
in your search results for restaurants in Seattle."
</i>
</p>
<p>From the Microsoft Privacy Statement<sup><a href="#1">[1]</a></sup>:</p> <h3>Bing sells your search history to other spyware platforms</h3>
<p><i>
"We may share data we collect with third parties, such as Oath, AppNexus, or Facebook (see below), so that the ads you see in our products, <p>
their products, or other sites and apps serviced by these partners are more relevant and valuable to you. " From the Microsoft Privacy Statement<sup><a href="#s1">[1]</a></sup
</i></p> >:
<hr> </p>
<center> <p>
<h2>Sources</h2> <i>
<p> "We may share data we collect with third parties, such as Oath,
<a name="1">1.</a> AppNexus, or Facebook (see below), so that the ads you see in our
<a href="https://privacy.microsoft.com/en-us/privacystatement">Microsoft Privacy Statement</a> products, their products, or other sites and apps serviced by these
<a href="http://web.archive.org/web/20180528165116/https://privacy.microsoft.com/en-us/privacystatement">[web.archive.org]</a> partners are more relevant and valuable to you. "
<a href="https://archive.li/u7eZJ">[archive.li]</a><br> </i>
</p> </p>
<hr> </div>
<p><b> <hr />
This article was last edited on 5/30/2018 <div class="footer">
</b></p> <div class="sources">
<p> <h4>Sources:</h4>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted. <ol>
</p> <li id="s1">
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a> <a href="https://privacy.microsoft.com/en-us/privacystatement"
<p><a href="../articles/index.html">Back to catalog</a></p> >Microsoft Privacy Statement</a
</center> >
</body> <a
</html> href="http://web.archive.org/web/20180528165116/https://privacy.microsoft.com/en-us/privacystatement"
>[web.archive.org]</a
>
<a href="https://archive.li/u7eZJ">[archive.li]</a><br />
</li>
</ol>
</div>
<hr />
<b>This article was last edited on 5/30/2018</b>
<!--Dont change-->
<p>
If you want to edit this article, or contribute your own article(s),
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p>
<p>
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode">
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
</a>
<!--Dont change-->
</div>
</div>
</body>
</html>

View File

@ -1,125 +1,306 @@
<!DOCTYPE HTML> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html lang=”en-us”> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"> <meta
<meta charset="UTF-8"> http-equiv="Content-type"
content="application/xhtml+xml;charset=utf-8"
/>
<title>Outdated Brave - Spyware Watchdog</title> <title>Outdated Brave - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head> </head>
<body> <body>
<img src="../images/brave_logo.png" alt="Brave logo"> <div class="case">
<h1>Brave Browser</h1> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<h3><font color=red>Note: This article is outdated. I will try to update it soon. </font></h3> <div class="main">
<br> <img src="../images/brave_logo.png" alt="Brave Logo" />
<p> <h1>Brave</h1>
Brave Browser is a Chromium fork with many interesting features not found elsewhere, such as built-in Adblock and other extensions, fingerprinting protection, cleaner Preferences menu than other Chrome forks, and the (opt-in) ability to automatically support (pay) the websites you visit. The developers describe it as <i>"A browser with your interests at heart."</i><sup><a href="#1">[1]</a></sup> With the built-in privacy protections, some would seem to agree with that. Let's see how it stacks up when we take everything into account. <h2>
</p> <font color="red"
<h2>Spyware Level: <font color=orange>High</font></h2> >Note: This article is outdated. I will try to update it soon.
<p> </font>
Auto-updates that can be turned off only by hacky workarounds. <a href="../articles/google.html">Google</a> as default search engine. Analytics on Brave's home page. Two other requests made at each start of Brave. Whitelisting spyware from Facebook and Twitter.<sup><a href="#5">[5]</a></sup> Has some decent privacy protections built in, but uMatrix is still better. Some privacy features are there by default, but, it's still trying to work with advertisers (same as Mozilla did with their Sponsored Tiles). Despite claiming to be <i>"A browser with your interests at heart."</i><sup><a href="#1">[1]</a></sup>, it has <a href="../articles/google.html">Google</a> as default search engine, as well as shitty forced updates. Anyway, despite the privacy protections, you should stay away from this browser - it seems to have a "mission" to switch the internet to its version of "user-respecting" ads, (we know how that turned out for Mozilla), and that's slimy and suspicious. Beyond that it has repeatedly shown itself to be dishonest and disingenuous about what it's mission and goals and operations are. </h2>
</p> <p>
<h3>Whitelisting spyware from Facebook and Twitter</h3> Brave Browser is a Chromium fork with many interesting features not
<p> found elsewhere, such as built-in Adblock and other extensions,
On it's website, Brave claims that <i>"Brave fights malware and prevents tracking, keeping your information safe and secure. Its our top priority."</i><sup><a href="#6">[6]</a></sup>. Yet despite this claim, Brave actually <b><font color=red>disables</font></b> its tracking protections for Facebook and Twitter's spyware fingerprinting protection, cleaner Preferences menu than other Chrome
scripts that allow them to track people across the web.<sup><a href="#5">[5]</a></sup> Brave's spyware protections, and any claims that it makes to work in the interests of forks, and the (opt-in) ability to automatically support (pay) the
it's users, <b><font color=orange>cannot be taken seriously.</font></b> Brave is actively working <b><font color=red>against its users</font></b> while lying to them about websites you visit. The developers describe it as
supposed privacy protections that it offers. This problem becomes even more serious when you take into account Brave's response to this situation: <i>"A browser with your interests at heart."</i
</p> ><sup><a href="#s1">[1]</a></sup> With the built-in privacy
<p><i> protections, some would seem to agree with that. Let's see how it
"Loading a script from an edge-cache does not track a user without third-party cookies or equivalent browser-local storage, which Brave always blocks and always will block. In other words, sending requests and receiving responses without cookies or other means of identifying users does not necessarily create a tracking threat." stacks up when we take everything into account.
</i><sup><a href="#7">[7]</a></sup></p> </p>
<p> <h2>Spyware Level: <span class="orange">High</span></h2>
This statement is just, <b><font color=red>completely wrong</font></b>. Just because a website isn't able to store cookies, does not mean that it cannot uniquely identify you. Executing JavaScript spyware from Facebook and Twitter is <b>more than enough.</b> Blocking cookies is not going to stop them from tracking you. This isn't even information that is difficult to verify. There are many websites that you can visit right now, to see just how much information a JavaScript program designed to track you can get. <p>
</p> Auto-updates that can be turned off only by hacky workarounds.
<center> <a href="../articles/google.html">Google</a> as default search engine.
<p> Analytics on Brave's home page. Two other requests made at each start
Here are a few: of Brave. Whitelisting spyware from Facebook and Twitter.<sup
<br> ><a href="#s5">[5]</a></sup
<a href="https://browserleaks.com/">https://browserleaks.com/</a><br> >
<a href="https://panopticlick.eff.org/">https://panopticlick.eff.org/</a><br> Has some decent privacy protections built in, but uMatrix is still
</center> better. Some privacy features are there by default, but, it's still
</p> trying to work with advertisers (same as Mozilla did with their
<h3>Auto-updates</h3> Sponsored Tiles). Despite claiming to be
<p> <i>"A browser with your interests at heart."</i
Brave will check for updates every time you run it, and you CANNOT turn it off (except through fiddling with DNS and such) ! What is the devs' answer? From their GitHub page<sup><a href="#2">[2]</a></sup>: </p> ><sup><a href="#s1">[1]</a></sup
>, it has <a href="../articles/google.html">Google</a> as default
search engine, as well as shitty forced updates. Anyway, despite the
privacy protections, you should stay away from this browser - it seems
to have a "mission" to switch the internet to its version of
"user-respecting" ads, (we know how that turned out for Mozilla), and
that's slimy and suspicious. Beyond that it has repeatedly shown
itself to be dishonest and disingenuous about what it's mission and
goals and operations are.
</p>
<h3>Whitelisting spyware from Facebook and Twitter</h3>
<p>
On it's website, Brave claims that
<i
>"Brave fights malware and prevents tracking, keeping your
information safe and secure. Its our top priority."</i
><sup><a href="#s6">[6]</a></sup
>. Yet despite this claim, Brave actually
<b><font color="red">disables</font></b> its tracking protections for
Facebook and Twitter's spyware scripts that allow them to track people
across the web.<sup><a href="#s5">[5]</a></sup> Brave's spyware
protections, and any claims that it makes to work in the interests of
it's users,
<b><font color="orange">cannot be taken seriously.</font></b> Brave is
actively working
<b><font color="red">against its users</font></b> while lying to them
about supposed privacy protections that it offers. This problem
becomes even more serious when you take into account Brave's response
to this situation:
</p>
<p>
<i>
"Loading a script from an edge-cache does not track a user without
third-party cookies or equivalent browser-local storage, which Brave
always blocks and always will block. In other words, sending
requests and receiving responses without cookies or other means of
identifying users does not necessarily create a tracking threat."
</i>
<sup>
<a href="#s7">[7]</a>
</sup>
</p>
<p>
This statement is just,
<b>
<font color="red">completely wrong</font>
</b>
. Just because a website isn't able to store cookies, does not mean
that it cannot uniquely identify you. Executing JavaScript spyware
from Facebook and Twitter is
<b>
more than enough.
</b>
Blocking cookies is not going to stop them from tracking you. This
isn't even information that is difficult to verify. There are many
websites that you can visit right now, to see just how much
information a JavaScript program designed to track you can get.
</p>
<center>
<p>
Here are a few:
<br />
<a href="https://browserleaks.com/">https://browserleaks.com/</a>
<br />
<a href="https://panopticlick.eff.org/"
>https://panopticlick.eff.org/</a
>
<br />
</p>
</center>
<h3>Auto-updates</h3>
<p>
Brave will check for updates every time you run it, and you CANNOT
turn it off (except through fiddling with DNS and such) ! What is the
devs' answer? From their GitHub page
<sup><a href="#s2">[2]</a></sup
>:
</p>
<p><i>"We don't plan on adding in UI to disable updates, but users can easily adjust environment variables if they really want to put themselves at risk."</i></p> <p>
<i>
"We don't plan on adding in UI to disable updates, but users can
easily adjust environment variables if they really want to put
themselves at risk."
</i>
</p>
<p>and</p> <p>and</p>
<p><i>"i feel that being able to figure out how to do this is a sufficiently high bar for users who want to turn off autoupdating (to prove they know what they're doing and understand the security implications)"</i></p> <p>
<i>
"i feel that being able to figure out how to do this is a
sufficiently high bar for users who want to turn off autoupdating
(to prove they know what they're doing and understand the security
implications)"
</i>
</p>
<P>So according to the devs, you have to hunt down random internet comments to be able to disable auto-updating. Brave will also update what looks like the list of its "partners" every time you run it. Extensions are also updated often. <img class="screenshot" src="../images/brave_partners.png"> <p>
</p> So according to the devs, you have to hunt down random internet
comments to be able to disable auto-updating. Brave will also update
what looks like the list of its "partners" every time you run it.
Extensions are also updated often.
<img class="screenshot" src="../images/brave_partners.png" />
</p>
<h3>Anti-privacy search engine by default</h3> <h3>Anti-privacy search engine by default</h3>
<p> <p>
<a href="../articles/google.html">Google</a> is the default search engine of Brave, and the issues with it are well known and would take a book to describe them all. <a href="../articles/google.html">Google</a>
</p> is the default search engine of Brave, and the issues with it are well
known and would take a book to describe them all.
</p>
<h3>Brave's start page contains analytics</h3> <h3>Brave's start page contains analytics</h3>
<p> <p>
Brave will connect to its home page, https://brave.com, automatically on the first run of Brave, and that page contains Piwik's analytics scripts. This is the full request: <img class="screenshot" src="../images/brave_piwik.png">It will also make a connection to Google to download some fonts. You can disable these on subsequent runs by changing the start page. Brave will connect to its home page, https://brave.com, automatically
</p> on the first run of Brave, and that page contains Piwik's analytics
<h3>Crash reports</h3> scripts. This is the full request:
<p>Enabled by default, but can be disabled from the preferences menu.</p> <img class="screenshot" src="../images/brave_piwik.png" />
<h3>Other requests</h3> It will also make a connection to Google to download some fonts. You
<p>Brave will make a connection to this site every time it is started up: <img class="screenshot" src="../images/brave_bat.png"> It probably has something to do with their project of working with advertisers to provide more relevant targeted ads, which sounds pretty disgusting, but can be turned off ("Notify me about token promotions"). You can read more about it here<sup><a href="#3">[3]</a></sup>.It will also make this request which downloads the rulesets for HTTPS Everywhere: <img class="screenshot" src="../images/brave_httpse.png"></p> can disable these on subsequent runs by changing the start page.
<h3>Brave's privacy protections</h3> </p>
<p>Brave Browser also contains in-built privacy protections such as HTTPS Everywhere, AdBlock, cookie blocking, script blocking, and fingerprinting protections - that are configurable site by site. This is commendable of course, but in the end, uMatrix outclasses them. Trackers, for example, easily avoid pure AdBlock (so you will be tracked by Facebook and such), and binary script blocking breaks sites. Nice effort on Brave's part though, and the fingerprinting protection I don't think is found in any other browser (but I didn't confirm if it actually works). <h3>Crash reports</h3>
</p> <p>
<hr> Enabled by default, but can be disabled from the preferences menu.
<center> </p>
<h2>Credits</h2> <h3>Other requests</h3>
<p> <p>
This article was written by <a href="https://digdeeper.neocities.org/">digdeeper.neocities.org</a><br> Brave will make a connection to this site every time it is started up:
Formatting changes were done by the site maintainer. <img class="screenshot" src="../images/brave_bat.png" />
</p> It probably has something to do with their project of working with
<hr> advertisers to provide more relevant targeted ads, which sounds pretty
<h2>Sources</h2> disgusting, but can be turned off ("Notify me about token
<p> promotions"). You can read more about it here
<a name="1">1.</a> <sup><a href="#s3">[3]</a></sup>
<a href="https://brave.com">Brave's website</a> .It will also make this request which downloads the rulesets for HTTPS
<a href="https://web.archive.org/web/20180609070708/https://brave.com">[web.archive.org]</a> Everywhere:
<br> <img class="screenshot" src="../images/brave_httpse.png" />
<a name="2">2.</a> </p>
<a href="https://github.com/brave/browser-laptop/issues/1877">How to stop autoupdate of brave?</a> <h3>Brave's privacy protections</h3>
<a href="http://web.archive.org/web/20180530053311/https://github.com/brave/browser-laptop/issues/1877">[web.archive.org]</a> <p>
<a href="https://archive.li/AJZr5">[archive.li]</a><br> Brave Browser also contains in-built privacy protections such as HTTPS
<a name="3">3.</a> Everywhere, AdBlock, cookie blocking, script blocking, and
<a href="https://basicattentiontoken.org">Basic Attention Token</a> fingerprinting protections - that are configurable site by site. This
<a href="https://web.archive.org/web/20180528161328/https://www.basicattentiontoken.org">[web.archive.org]</a> is commendable of course, but in the end, uMatrix outclasses them.
<a href="http://wayback.archive-it.org/all/20180528161328/https://www.basicattentiontoken.org">[wayback.archive-it.org]</a><br> Trackers, for example, easily avoid pure AdBlock (so you will be
<a name="4">4.</a> tracked by Facebook and such), and binary script blocking breaks
<a href="https://laptop-updates.brave.com/promo/custom-headers">Laptop Headers</a> sites. Nice effort on Brave's part though, and the fingerprinting
<a href="http://web.archive.org/web/20190213015206/https://laptop-updates.brave.com/promo/custom-headers">[web.archive.org]</a> protection I don't think is found in any other browser (but I didn't
<a href="https://archive.fo/ecx6L">[archive.fo]</a><br> confirm if it actually works).
<a name="5">5.</a> </p>
<a href="https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser/">Facebook, Twitter Trackers Whitelisted by Brave Browser</a> </div>
<a href="http://web.archive.org/web/20190213055618/https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser/">[web.archive.org]</a> <hr />
<a href="https://archive.fo/X98Xz">[archive.fo]</a><br> <div class="footer">
<div>
<a name="6">6.</a> <h4>Credits</h4>
<a href="https://brave.com/features/">Brave Browser Features</a> <ol>
<a href="http://web.archive.org/web/20190124134301/https://brave.com/features/">[web.archive.org]</a><br> This article was written by
<a href="https://digdeeper.neocities.org/"
<a name="7">7.</a> >digdeeper.neocities.org</a
<a href="https://brave.com/script-blocking-exceptions-update/">Script Blocking Exceptions Update</a> ><br />
<a href="http://web.archive.org/web/20190214034944/https://brave.com/script-blocking-exceptions-update/">[web.archive.org]</a> Formatting changes were done by the site maintainer.
<a href="http://archive.fo/Qopen">[archive.fo]</a><br> </ol>
</div>
</p> <hr />
<hr> <div class="sources">
<p><b> <h4>Sources:</h4>
This article was last edited on 2/13/2019 <ol>
</b></p> <li id="s1">
<p><b> <a href="https://brave.com">Brave's website</a>
This article was created on 5/7/2018 <a
</b></p> href="https://web.archive.org/web/20180609070708/https://brave.com"
<p> >[web.archive.org]</a
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted. >
</p> </li>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a> <li id="s2">
<p><a href="../articles/index.html">Back to catalog</a></p> <a href="https://github.com/brave/browser-laptop/issues/1877"
</center> >How to stop autoupdate of brave?</a
>
<a
href="http://web.archive.org/web/20180530053311/https://github.com/brave/browser-laptop/issues/1877"
>[web.archive.org]</a
>
<a href="https://archive.li/AJZr5">[archive.li]</a>
</li>
<li id="s3">
<a href="https://basicattentiontoken.org"
>Basic Attention Token</a
>
<a
href="https://web.archive.org/web/20180528161328/https://www.basicattentiontoken.org"
>[web.archive.org]</a
>
<a
href="http://wayback.archive-it.org/all/20180528161328/https://www.basicattentiontoken.org"
>[wayback.archive-it.org]</a
>
</li>
<li id="s4">
<a href="https://laptop-updates.brave.com/promo/custom-headers"
>Laptop Headers</a
>
<a
href="http://web.archive.org/web/20190213015206/https://laptop-updates.brave.com/promo/custom-headers"
>[web.archive.org]</a
>
<a href="https://archive.fo/ecx6L">[archive.fo]</a>
</li>
<li id="s5">
<a
href="https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser/"
>Facebook, Twitter Trackers Whitelisted by Brave Browser</a
>
<a
href="http://web.archive.org/web/20190213055618/https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser/"
>[web.archive.org]</a
>
<a href="https://archive.fo/X98Xz">[archive.fo]</a>
</li>
<li id="s6">
<a href="https://brave.com/features/">Brave Browser Features</a>
<a
href="http://web.archive.org/web/20190124134301/https://brave.com/features/"
>[web.archive.org]</a
>
</li>
<li id="s7">
<a href="https://brave.com/script-blocking-exceptions-update/"
>Script Blocking Exceptions Update</a
>
<a
href="http://web.archive.org/web/20190214034944/https://brave.com/script-blocking-exceptions-update/"
>[web.archive.org]</a
>
<a href="http://archive.fo/Qopen">[archive.fo]</a>
</li>
</ol>
</div>
<hr />
<b>This article was created on 5/7/2018</b><br />
<b>This article was last edited on 2/13/2019</b>
<!--Dont change-->
<p>
If you want to edit this article, or contribute your own article(s),
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p>
<p>
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"
><img class="icon" src="../images/cc0.png" alt="CC0 License"
/></a>
<!--Dont change-->
</div>
</div>
</body> </body>
</html> </html>

View File

@ -1,142 +1,302 @@
<!DOCTYPE HTML> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html lang=”en-us”> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"> <meta
<meta charset="UTF-8"> http-equiv="Content-type"
<title>Comparison between web browsers - Spyware Watchdog</title> content="application/xhtml+xml;charset=utf-8"
</head> />
<body> <title>Comparison between web browsers - Spyware Watchdog</title>
<center> <link rel="stylesheet" href="../style.css" />
<h1>Comparison between web browsers</h1> </head>
<p>
This purpose of this article is not to rate each web browser in a vaccum, like articles on this website that focus on one specific web browser, but rather to compare all of the
web browsers that have been rated on this website against each other. This is a ranking that is based on how much Pirvacy a browser offers by default, as well as, how
much privacy can be gained by configuring it.
</p>
<h2><font color=lime>Top Tier - Best Privacy</font></h2>
<p>
These are all browsers that require a minimal amount of configuration and can achive the required level of privacy needed to browse the modern web- compatibility with a
comperhensive suite of content-blocking extensions that can block spyware providers correctly and fully. Iridium and Pale Moon both are configured in a way that leaks
user information and thus require additional configuration.
</p>
<table>
<tr>
<td><center><img src="../images/tor_logo.png" alt="TOR Logo"></center></td>
<td><center><img src="../images/icecat_logo.png" alt="GNU IceCat Logo"></center></td>
<td><center><img src="../images/ungoogled_chromium_logo.png" alt="Ungoogled Chromium Logo"></center></td>
<td><center><img src="../images/iridium_logo.jpg" alt="Iridium Logo"></center></td>
<td><center><img src="../images/palemoon_logo.png" alt="Pale Moon Logo"></center></td>
</tr>
<tr>
<td><center><b><a href="../articles/tor.html">TOR Browser</a></b></center></td>
<td><center><b><a href="../articles/icecat.html">GNU IceCat</a></b></center></td>
<td><center><b><a href="../articles/ungoogled_chromium.html">Ungoogled Chromium</a></b></center></td>
<td><center><b><a href="../articles/iridium.html">Iridium Browser</a></b><br><small><a href="/guides/iridium.html">Configuration Guide</a></small></center></td>
<td><center><b><a href="../articles/palemoon.html">Pale Moon</a></b><br><small><a href="/guides/palemoon.html">Configuration Guide</a></small></center></td>
</tr>
</table>
<h2><font color=lime>High Tier - Good Privacy</font></h2>
<p>
These browsers do not have privacy issues, but they also do not have enough privacy features to make it to the highest tier. These browsers both have simple ad-blockers, and
do not have any privacy issues, however, these tools are not as good as the comperhensive privacy tools that Top Tier browsers offer.
</p>
<table>
<tr>
<td><center><img src="../images/otter_browser_logo.png" alt="Otter Browser Logo"></center></td>
<td><center><img src="../images/falkon_logo.png" alt="Falkon Logo"></center></td>
<body>
<div class="case">
</tr> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<tr> <div class="main">
<td><center><b><a href="../articles/otter.html">Otter Browser</a></b></center></td> <h1>Comparison between web browsers</h1>
<td><center><b><a href="../articles/falkon.html">Falkon</a></b></center></td> <p>
This purpose of this article is not to rate each web browser in a
vaccum, like articles on this website that focus on one specific web
browser, but rather to compare all of the web browsers that have been
</tr> rated on this website against each other. This is a ranking that is
</table> based on how much Pirvacy a browser offers by default, as well as, how
<h2><font color=yellow>Mid Tier - Ok Privacy</font></h2> much privacy can be gained by configuring it.
<p> </p>
These browsers do not have any big privacy flaws, but they also do not have sufficent privacy protections. Qutebrowser has a very basic adblocker in it. Both browsers don't <h2><span class="lime">Top Tier - Best Privacy</span></h2>
have access to extensions either. So, it's just not enough to be able to browse the modern web privately, despite the developers not putting spyware into their browsers. <p>
</p> These are all browsers that require a minimal amount of configuration
<table> and can achive the required level of privacy needed to browse the
<tr> modern web- compatibility with a comperhensive suite of
content-blocking extensions that can block spyware providers correctly
<td><center><img src="../images/qutebrowser_logo.png" alt="Qutebrowser Logo"></center></td> and fully. Iridium and Pale Moon both are configured in a way that
<td><center><img src="../images/sphere_logo.png" alt="SphereLogo"></center></td> leaks user information and thus require additional configuration.
</p>
<table>
</tr> <center>
<tr> <tbody>
<td><center><b><a href="../articles/qutebrowser.html">Qutebrowser</a></b></center></td> <tr>
<td><center><b><a href="../articles/sphere.html">Sphere Browser</a></b></center></td> <td>
<img src="../images/tor_browser_logo.png" alt="TOR Logo" />
</tr> </td>
</table> <td>
<h2><font color=orange>Low Tier - Poor Privacy</font></h2> <img src="../images/icecat_logo.png" alt="GNU IceCat Logo" />
<p> </td>
These browsers do not protect your privacy, but they are not in the lowest tier since they still have something to offer, although, they should not be used in general. <td>
Vivaldi does not let you disable all of the spyware features, Brave whitelists trackers and has forced updates, and Firefox and Waterfox are loaded with spyware, to the point <img
where configuring them is so <a href="https://github.com/intika/Librefox">non-trivial</a> that you might as well use a version of Firefox that respects your privacy src="../images/chromium_logo.png"
<b>by default</b>, rather than diving into the uncertainty of digging out all of the spyware features (and repeating the process every time the browser is updated). It's awalys alt="Ungoogled Chromium Logo"
going to be better to pick a browser higher on this list. />
<table> </td>
<tr> <td>
<td><center><img src="../images/waterfox logo.png" alt="Waterfox Logo"></center></td> <img src="../images/iridium_logo.png" alt="Iridium Logo" />
<td><img src="../images/brave_logo.png" alt="Brave logo"></td> </td>
<td><img src="../images/firefox_logo.png" alt="firefox Logo"></td> <td>
<td><img src="../images/vivaldi_logo.png" alt="vivaldi Logo"></td> <img src="../images/palemoon_logo.png" alt="Pale Moon Logo" />
<td><img src="../images/dissenter_logo.png" alt="Dissenter Logo"></td> </td>
</tr> </tr>
<tr> <tr>
<td><center><b><a href="../articles/waterfox.html">Waterfox</a></b></center></td> <td>
<td><center><b><a href="../articles/brave.html">Brave</a></b></center></td> <b><a href="../articles/tor.html">TOR Browser</a></b>
<td><center><b><a href="../articles/firefox.html">Firefox</a></b></center></td> </td>
<td><center><b><a href="../articles/vivaldi.html">Vivaldi</a></b></center></td> <td>
<td><center><b><a href="../articles/dissenter.html">Dissenter</a></b></center></td> <b><a href="../articles/icecat.html">GNU IceCat</a></b>
</tr> </td>
</table> <td>
<h2><font color=red>Rock Bottom - No Privacy</font></h2> <b
<p> ><a href="../articles/ungoogled_chromium.html"
These browsers are unashamedly designed to collect as much information about the user as possible (all are rated EXTREMELY HIGH by the site). Only SRWare Iron has it's source code availible, and all the developers have mistreated their users (complete disregard for privacy and / or false advertising) for a long time. These browsers are actively hostile against their users and thus should not be used at all. >Ungoogled Chromium</a
</p> ></b
<table> >
<tr> </td>
<td> <img src="../images/chrome_logo.png" alt="chrome logo"></td> <td>
<td> <img src="../images/opera_logo.png" alt="opera logo"></td> <b><a href="../articles/iridium.html">Iridium Browser</a></b
<td> <img src="../images/slimjet_logo.png" alt="SlimJet logo"></td> ><br /><small
<td> <img src="../images/webdiscover_logo.png" alt="WebDiscover logo"></td> ><a href="../guides/iridium.html"
<td> <img src="../images/srware_logo.png" alt="Iron logo"></td> >Configuration Guide</a
</tr> ></small
<tr> >
<td><center><b><a href="../articles/chrome.html">Google Chrome</a></b></center></td> </td>
<td><center><b><a href="../articles/opera.html">Opera</a></b></center></td> <td>
<td><center><b><a href="../articles/slimjet.html">SlimJet</a></b></center></td> <b><a href="../articles/palemoon.html">Pale Moon</a></b
<td><center><b><a href="../articles/webdiscover.html">WebDiscover</a></b></center></td> ><br /><small
<td><center><b><a href="../articles/iron.html">SRWare Iron</a></b></center></td> ><a href="../guides/palemoon.html"
>Configuration Guide</a
</tr> ></small
</table> >
<hr> </td>
<h2>Further Reading</h2> </tr>
<p> </tbody>
This isn't the only guide on what web browser to pick, with an emphasis on privacy, to exist, and many other people, </center>
with their own knowlege and prespectives, have written their own guides. It would be a waste to only read one guide </table>
to make your decision, so, you should probably read a few more, these are some good ones. <h2><span class="lime">High Tier - Good Privacy</span></h2>
</p> <p>
<a href="https://digdeeper.neocities.org/ghost/browsers.html">Digdeeper - How to choose a browser for everyday use?</a><br> These browsers do not have privacy issues, but they also do not have
<a href="https://clarkycat.neocities.org/browser.html">Clarkycat - Browser Recommendation and Addons</a><br> enough privacy features to make it to the highest tier. These browsers
<hr> both have simple ad-blockers, and do not have any privacy issues,
<p><b> however, these tools are not as good as the comperhensive privacy
This article was last edited on 2/20/2019 tools that Top Tier browsers offer.
</b></p> </p>
<p> <table>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted. <center>
</p> <tbody>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a> <tr>
<p><a href="../articles/index.html">Back to catalog</a></p> <td>
</center> <img
</body> src="../images/otter_browser_logo.png"
</html> alt="Otter Browser Logo"
/>
</td>
<td>
<img src="../images/falkon_logo.png" alt="Falkon Logo" />
</td>
</tr>
<tr>
<td>
<b><a href="../articles/otter.html">Otter Browser</a></b>
</td>
<td>
<b><a href="../articles/falkon.html">Falkon</a></b>
</td>
</tr>
</tbody>
</center>
</table>
<h2><span class="yellow">Mid Tier - Ok Privacy</span></h2>
<p>
These browsers do not have any big privacy flaws, but they also do not
have sufficent privacy protections. Qutebrowser has a very basic
adblocker in it. Both browsers don't have access to extensions either.
So, it's just not enough to be able to browse the modern web
privately, despite the developers not putting spyware into their
browsers.
</p>
<table>
<center>
<tbody>
<tr>
<td>
<img
src="../images/qutebrowser_logo.png"
alt="Qutebrowser Logo"
/>
</td>
<td>
<img src="../images/sphere_logo.png" alt="SphereLogo" />
</td>
</tr>
<tr>
<td>
<b><a href="../articles/qutebrowser.html">Qutebrowser</a></b>
</td>
<td>
<b><a href="../articles/sphere.html">Sphere Browser</a></b>
</td>
</tr>
</tbody>
</center>
</table>
<h2><span class="orange">Low Tier - Poor Privacy</span></h2>
<p>
These browsers do not protect your privacy, but they are not in the
lowest tier since they still have something to offer, although, they
should not be used in general. Vivaldi does not let you disable all of
the spyware features, Brave whitelists trackers and has forced
updates, and Firefox and Waterfox are loaded with spyware, to the
point where configuring them is so
<a href="https://github.com/intika/Librefox">non-trivial</a> that you
might as well use a version of Firefox that respects your privacy
<b>by default</b>, rather than diving into the uncertainty of digging
out all of the spyware features (and repeating the process every time
the browser is updated). It's awalys going to be better to pick a
browser higher on this list.
</p>
<table>
<center>
<tbody>
<tr>
<td>
<img src="../images/waterfox_logo.png" alt="Waterfox Logo" />
</td>
<td><img src="../images/brave_logo.png" alt="Brave logo" /></td>
<td>
<img src="../images/firefox_logo3.svg" alt="firefox Logo" />
</td>
<td>
<img src="../images/vivaldi_logo.png" alt="vivaldi Logo" />
</td>
<td>
<img src="../images/dissenter_logo.png"alt="Dissenter Logo"/>
</td>
</tr>
<tr>
<td>
<b><a href="../articles/waterfox.html">Waterfox</a></b>
</td>
<td>
<b><a href="../articles/brave.html">Brave</a></b>
</td>
<td>
<b><a href="../articles/firefox.html">Firefox</a></b>
</td>
<td>
<b><a href="../articles/vivaldi.html">Vivaldi</a></b>
</td>
<td>
<b><a href="../articles/dissenter.html">Dissenter</a></b>
</td>
</tr>
</tbody>
</center>
</table>
<h2><span class="red">Rock Bottom - No Privacy</span></h2>
<p>
These browsers are unashamedly designed to collect as much information
about the user as possible (all are rated EXTREMELY HIGH by the site).
Only SRWare Iron has it's source code availible, and all the
developers have mistreated their users (complete disregard for privacy
and / or false advertising) for a long time. These browsers are
actively hostile against their users and thus should not be used at
all.
</p>
<table>
<center>
<tbody>
<tr>
<td>
<img src="../images/chrome_logo.png" alt="chrome logo" />
</td>
<td><img src="../images/opera_logo.png" alt="opera logo" /></td>
<td>
<img src="../images/slimjet_logo.png" alt="SlimJet logo" />
</td>
<td>
<img
src="../images/webdiscover_logo.png"
alt="WebDiscover logo"
/>
</td>
<td><img src="../images/srware_logo.png" alt="Iron logo" /></td>
</tr>
<tr>
<td>
<b><a href="../articles/chrome.html">Google Chrome</a></b>
</td>
<td>
<b><a href="../articles/opera.html">Opera</a></b>
</td>
<td>
<b><a href="../articles/slimjet.html">SlimJet</a></b>
</td>
<td>
<b><a href="../articles/webdiscover.html">WebDiscover</a></b>
</td>
<td>
<b><a href="../articles/iron.html">SRWare Iron</a></b>
</td>
</tr>
</tbody>
</center>
</table>
</div>
<hr />
<div class="footer">
<div>
<h4>Further Reading:</h4>
<ol>
<p>
This isn't the only guide on what web browser to pick, with an
emphasis on privacy, to exist, and many other people, with their
own knowlege and prespectives, have written their own guides. It
would be a waste to only read one guide to make your decision, so,
you should probably read a few more, these are some good ones.
<br /><a
href="https://digdeeper.neocities.org/ghost/browsers.html"
>Digdeeper - How to choose a browser for everyday use?</a
>
<br /><a href="https://clarkycat.neocities.org/browser.html"
>Clarkycat - Browser Recommendation and Addons</a
>
</p>
</ol>
</div>
<hr />
<b>This article was last edited on 2/20/2019</b>
<!--Dont change-->
<p>
If you want to edit this article, or contribute your own article(s),
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p>
<p>
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode">
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
</a>
<!--Dont change-->
</div>
</div>
</body>
</html>

View File

@ -1,99 +1,177 @@
<!DOCTYPE HTML> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html lang=”en-us”> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"> <meta
<meta charset="UTF-8"> http-equiv="Content-type"
<title>CCleaner - Spyware Watchdog</title> content="application/xhtml+xml;charset=utf-8"
</head> />
<body> <title>CCleaner - Spyware Watchdog</title>
<img src="../images/ccleaner_logo.png" alt="ccleaner logo"> <link rel="stylesheet" href="../style.css" />
<h1>CCleaner</h1> </head>
<p>
CCleaner, developed by Piriform, is a utility program used to clean potentially unwanted files and invalid Windows Registry entries from a computer.
</p>
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
<p>
CCleaner is spyware that collects your personal information to advertise to you. It also sells your information to third parties so that they can advertise to you.
It collects a huge amount of very personal information, like your <b><font color=red>physical location.</font></b> CCleaner uses the technique of privacy policy obfusication
where it provides one privacy policy for every single product its company offers, making it more difficult to know what parts of the privacy policy apply to which program.
</p>
<h3>CCleaner collects and sells user information to advertisers</h3>
<p>
CCleaner clearly shows in its privacy settings that it is collecting information about your comptuer and selling that information to
advertisers:
</p>
<img class="screenshot" src="../images/ccleaner_privacy.png" alt ="Ccleaner privacy settings">
<p>Image Source: <sup><a href="#2">[2]</a></sup></p>
<h3>CCleaner tracks a huge amount of personal information</h3> <body>
<p> <div class="case">
If we look at the privacy policy, we can see that CCleaner reports the following<sup><a href="#3">[3]</a></sup>: <div class="nav"><a href="index.html">&larr; Catalog</a></div>
</p> <div class="main">
<ul> <img src="../images/ccleaner_logo.png" alt="CCleaner Logo" />
<li>IP Address <h1>CCleaner</h1>
<li>Unique User ID <p>
<li>Operating System CCleaner, developed by Piriform, is a utility program used to clean
<li>Other Avast Products installed potentially unwanted files and invalid Windows Registry entries from a
<li><b><font color=red>physical location</font></b> computer.
</ul> </p>
<p> <h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
Beyond this, CCleaner is integrated with the following spyware platforms, which all collect their own sets of information: <p>
</p> CCleaner is spyware that collects your personal information to
<ul> advertise to you. It also sells your information to third parties so
<li>Google Analytics that they can advertise to you. It collects a huge amount of very
<li>Logentries personal information, like your
</ul> <b><font color="red">physical location.</font></b> CCleaner uses the
<p> technique of privacy policy obfusication where it provides one privacy
It would be very time consuming to go through all of those privacy policies (especially because many of these are obfusicated), but it should be policy for every single product its company offers, making it more
enough to understand that CCleaner is full of third party spyware, as well as first party spyware. difficult to know what parts of the privacy policy apply to which
</p> program.
<h3>CCleaner sends you spam email</h3> </p>
<p>From the privacy policy<sup><a href="#3">[3]</a></sup>:</p> <h3>CCleaner collects and sells user information to advertisers</h3>
<p><i> <p>
"When we collect your email address, we may market our other products and services to you. You may choose to unsubscribe from future email marketing by following the instructions in the email." CCleaner clearly shows in its privacy settings that it is collecting
</i></p> information about your comptuer and selling that information to
</p> advertisers:
<h3>CCleaner tracks your physical location</h3> </p>
<p> <img
According to the privacy policy, the ccleaner website tries to track your physical location.<sup><a href="#3">[3]</a></sup> class="screenshot"
</p> src="../images/ccleaner_privacy.png"
<p><i> alt="Ccleaner privacy settings"
"Our websites use cookies to acquire data that may be used to determine your physical location via your Internet Protocol address (“IP Address”) and automated geolocation techniques, or to acquire basic information about the computer, tablet, or mobile phone that you use to visit us." />
</i></p> <p>
<p> Image Source: <sup><a href="#s2">[2]</a></sup>
<i>"location data"</i> is also mentioned when talking about the information that ccleaner itself collects about it's users. </p>
</p>
<h3>Past Security Flaws</h3> <h3>CCleaner tracks a huge amount of personal information</h3>
<p> <p>
In the past, CCleaner has been compromised and backdoors have been added to it.<sup><a href="#1">[1]</a></sup> If we look at the privacy policy, we can see that CCleaner reports the
</p> following<sup><a href="#s3">[3]</a></sup
<hr> >:
<center> </p>
<h2>Sources</h2> <ul>
<p> <li>IP Address</li>
<a name="1">1.</a> <li>Unique User ID</li>
<a href="https://www.ccleaner.com/news/blog/2017/9/18/security-notification-for-ccleaner-v5336162-and-ccleaner-cloud-v1073191-for-32-bit-windows-users"> <li>Operating System</li>
Security Notification for CCleaner v5.33.6162 and CCleaner Cloud v1.07.3191 for 32-bit Windows users <li>Other Avast Products installed</li>
</a> <li>
<a href="https://web.archive.org/web/20180816103218/https://www.ccleaner.com/news/blog/2017/9/18/security-notification-for-ccleaner-v5336162-and-ccleaner-cloud-v1073191-for-32-bit-windows-users">[web.archive.org]</a><br> <b><font color="red">physical location</font></b>
<a name="2">2.</a> </li>
<a href="https://misdirectedrequest.wordpress.com/2018/06/04/ccleaner-privacy-issue/">CCleaner Privacy Issue </a> </ul>
<a href="http://web.archive.org/web/20180821215956/https://misdirectedrequest.wordpress.com/2018/06/04/ccleaner-privacy-issue/">[web.archive.org]</a>
<a href="http://archive.is/HJFBP">[archive.is]</a><br> <p>
<a name="3">3.</a> Beyond this, CCleaner is integrated with the following spyware
<a href="http://www.ccleaner.com/about/privacy-policy">What Happens to Your Data</a> platforms, which all collect their own sets of information:
<a href="https://web.archive.org/web/20180816025428/https://www.ccleaner.com/about/privacy-policy">[web.archive.org]</a> </p>
<a href="http://archive.is/HJFBP">[archive.is]</a><br> <ul>
</p> <li>Google Analytics</li>
<hr> <li>Logentries</li>
<p><b> </ul>
This article was last edited on 8/21/2018
</b></p> <p>
<p> It would be very time consuming to go through all of those privacy
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted. policies (especially because many of these are obfusicated), but it
</p> should be enough to understand that CCleaner is full of third party
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a> spyware, as well as first party spyware.
<p><a href="../articles/index.html">Back to catalog</a></p> </p>
</center> <h3>CCleaner sends you spam email</h3>
</body> <p>
</html> From the privacy policy<sup><a href="#s3">[3]</a></sup
>:
</p>
<p>
<i>
"When we collect your email address, we may market our other
products and services to you. You may choose to unsubscribe from
future email marketing by following the instructions in the email."
</i>
</p>
<h3>CCleaner tracks your physical location</h3>
<p>
According to the privacy policy, the ccleaner website tries to track
your physical location.<sup><a href="#s3">[3]</a></sup>
</p>
<p>
<i>
"Our websites use cookies to acquire data that may be used to
determine your physical location via your Internet Protocol address
(“IP Address”) and automated geolocation techniques, or to acquire
basic information about the computer, tablet, or mobile phone that
you use to visit us."
</i>
</p>
<p>
<i>"location data"</i> is also mentioned when talking about the
information that ccleaner itself collects about it's users.
</p>
<h3>Past Security Flaws</h3>
<p>
In the past, CCleaner has been compromised and backdoors have been
added to it.<sup><a href="#s1">[1]</a></sup>
</p>
</div>
<hr />
<div class="footer">
<div class="sources">
<h4>Sources:</h4>
<ol>
<li id="s1">
<a
href="https://www.ccleaner.com/news/blog/2017/9/18/security-notification-for-ccleaner-v5336162-and-ccleaner-cloud-v1073191-for-32-bit-windows-users"
>
Security Notification for CCleaner v5.33.6162 and CCleaner Cloud
v1.07.3191 for 32-bit Windows users
</a>
<a
href="https://web.archive.org/web/20180816103218/https://www.ccleaner.com/news/blog/2017/9/18/security-notification-for-ccleaner-v5336162-and-ccleaner-cloud-v1073191-for-32-bit-windows-users"
>[web.archive.org]</a
>
</li>
<li id="s2">
<a
href="https://misdirectedrequest.wordpress.com/2018/06/04/ccleaner-privacy-issue/"
>CCleaner Privacy Issue
</a>
<a
href="http://web.archive.org/web/20180821215956/https://misdirectedrequest.wordpress.com/2018/06/04/ccleaner-privacy-issue/"
>[web.archive.org]</a
>
<a href="http://archive.is/HJFBP">[archive.is]</a>
</li>
<li id="s3">
<a href="http://www.ccleaner.com/about/privacy-policy"
>What Happens to Your Data</a
>
<a
href="https://web.archive.org/web/20180816025428/https://www.ccleaner.com/about/privacy-policy"
>[web.archive.org]</a
>
<a href="http://archive.is/HJFBP">[archive.is]</a>
</li>
</ol>
</div>
<hr />
<b>This article was last edited on 8/21/2018</b>
<!--Dont change-->
<p>
If you want to edit this article, or contribute your own article(s),
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p>
<p>
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"
><img class="icon" src="../images/cc0.png" alt="CC0 License"
/></a>
<!--Dont change-->
</div>
</div>
</body>
</html>

View File

@ -1,48 +1,85 @@
<!DOCTYPE HTML> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html lang=”en-us”> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"> <meta
<meta charset="UTF-8"> http-equiv="Content-type"
content="application/xhtml+xml;charset=utf-8"
/>
<title>CDex - Spyware Watchdog</title> <title>CDex - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head> </head>
<body> <body>
<img src="../images/cdex_logo.png" alt="cdex logo"> <div class="case">
<h1>CDex</h1> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<p> <div class="main">
CDex is an Open Source Digital Audio CD Extractor. <img src="../images/cdex_logo.png" alt="CDex Logo" />
</p> <h1>CDex</h1>
<h2>Spyware Level: <font color=yellowgreen>Low</font></h2> <p>
<p> CDex is an Open Source Digital Audio CD Extractor.
CDex's installer bundles it with spyware, and it will randomly suggest a spyware program to the user, with a chance to opt-out. </p>
Usually it attempts to bundle itself with the webdiscover browser and one time I got it to try and offer me an antivirus program, but <h2>Spyware Level: <span class="yellowgreen">Low</span></h2>
I wasn't able to reproduce this. The program was tested on Windows 7 32-bit with Microsoft Network Monitor 3.4 and Wireshark 2.6.2. <p>
The version of the program tested was 2.06. <b><font color="lime">It did not make any connections to the internet</font></b> that my CDex's installer bundles it with spyware, and it will randomly suggest
tests were able to find. To test the program I ripped the audio files out of a CD with both network monitoring programs open. a spyware program to the user, with a chance to opt-out. Usually it
</p> attempts to bundle itself with the webdiscover browser and one time I
<h3>Bundling with spyware</h3> got it to try and offer me an antivirus program, but I wasn't able to
<p> reproduce this. The program was tested on Windows 7 32-bit with
CDex attempts to bundle it self with the <a href="../articles/webdiscover.html">WebDiscover</a> web browser. This is an Opt-out and not an Opt-in like it should be. Microsoft Network Monitor 3.4 and Wireshark 2.6.2. The version of the
This program is spyware, because according to it's privacy policy<sup><a href="#1">[1]</a></sup>, it collects information about it's users. program tested was 2.06.
</p> <b
<img class="screenshot" src="../images/cdex_bundling.png" alt="CDex installer spyware opt-out screen"> ><font color="lime"
<hr> >It did not make any connections to the internet</font
<center> ></b
<h2>Sources</h2> >
<p> that my tests were able to find. To test the program I ripped the
<a name="1">1.</a> audio files out of a CD with both network monitoring programs open.
<a href="https://getwebdiscover.com/privacy/">WebDiscover Privacy Policy</a> </p>
<a href="http://web.archive.org/web/20171224213336/https://getwebdiscover.com/privacy/">[web.archive.org]</a> <h3>Bundling with spyware</h3>
<a href="http://archive.is/Orpq6">[archive.is]</a><br> <p>
</p> CDex attempts to bundle it self with the
<hr> <a href="../articles/webdiscover.html">WebDiscover</a> web browser.
<p><b> This is an Opt-out and not an Opt-in like it should be. This program
This article was last edited on 7/29/2018 is spyware, because according to it's privacy policy<sup
</b></p> ><a href="#s1">[1]</a></sup
<p> >, it collects information about it's users.
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted. </p>
</p> <img
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a> class="screenshot"
<p><a href="../articles/index.html">Back to catalog</a></p> src="../images/cdex_bundling.png"
</center> alt="CDex installer spyware opt-out screen"
/>
</div>
<hr />
<div class="footer">
<div class="sources">
<h4>Sources:</h4>
<ol>
<li id="s1">
<a href="https://getwebdiscover.com/privacy/">WebDiscover Privacy Policy</a>
<a href="http://web.archive.org/web/20171224213336/https://getwebdiscover.com/privacy/">[web.archive.org]</a>
<a href="http://archive.is/Orpq6">[archive.is]</a>
</li>
</ol>
</div>
<hr />
<b>This article was last edited on 7/29/2018</b>
<!--Dont change-->
<p>
If you want to edit this article, or contribute your own article(s),
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p>
<p>
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode">
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
</a>
<!--Dont change-->
</div>
</div>
</body> </body>
</html> </html>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,244 +1,418 @@
<!DOCTYPE HTML> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html lang=”en-us”> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>
<link rel="stylesheet" href="../style.css"> <meta
<meta charset="UTF-8"> http-equiv="Content-type"
content="application/xhtml+xml;charset=utf-8"
/>
<title>Discord - Spyware Watchdog</title> <title>Discord - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head> </head>
<body> <body>
<img src="../images/discord_logo.png" alt="Discord-Logo"> <div class="case">
<h1>Discord</h1> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<center> <div class="main">
<a href="../articles/discord_es.html">Spanish Translation</a> <img src="../images/discord_logo.png" alt="Discord Logo" />
</center> <h1>Discord</h1>
<p> <center>
Discord is an instant messaging application for MacOS, Windows, Linux, <a href="../articles/discord_es.html">Spanish Translation</a>
Android, and iOS. Discord is used to communicate via voice chat and </center>
text chat, and has image-sharing and file-sharing capabilities. <p>
</p> Discord is an instant messaging application for MacOS, Windows, Linux,
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2> Android, and iOS. Discord is used to communicate via voice chat and
<p> text chat, and has image-sharing and file-sharing capabilities.
<font color="lightgreen"> </p>
Thanks to Richard Stallman for linking to our article <a href="https://stallman.org/discord.html"> here</a>! The spotlight is very much appreciated. <h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
</font><br> <p>
</p> <font color="lightgreen">
<a href="../articles/discord.html"><img class="icon" src="../images/discord-no-way-2.gif" alt="Discord? No Way!"></a> Thanks to Richard Stallman for linking to our article
<p> <a href="https://stallman.org/discord.html"> here</a>!
Discord is spyware because it collects all information that passes The spotlight is very much appreciated.
through its communication platform. As Discord is a centralized </font>
communication platform, all communications have to go through Discord's <br />
official servers, where all of that information can potentially be </p>
recorded. The vast majority of said information has been confirmed <a href="../articles/discord.html"
to be recorded, such as all communications between users. Discord has ><img
also been confirmed to use other spyware features such as various forms class="icon"
of telemetry. Discord's main source of income is from investment, from which src="../images/discord-no-way-2.gif"
it has received over $279.3 million dollars<sup><a href="#4">[4]</a></sup>. Discord cannot be built from alt="Discord? No Way!"
source and the source code for Discord is unavailable. /></a>
</p> <p>
<h3>Discord does not make its source code available</h3> Discord is spyware because it collects all information that passes
<p> through its communication platform. As Discord is a centralized
It is impossible to download and examine Discord's source code, communication platform, all communications have to go through
which means that it is impossible to prove that Discord is not Discord's official servers, where all of that information can
spyware. Any program which does not make its source code available is potentially be recorded. The vast majority of said information has
potential spyware. been confirmed to be recorded, such as all communications between
</p> users. Discord has also been confirmed to use other spyware features
<h3>Discord confirms that it collects large amounts of sensitive user data</h3> such as various forms of telemetry. Discord's main source of income is
<p> from investment, from which it has received over $279.3 million
Discord explicitly confirms in its privacy policy<sup><a href="#1">[1]</a></sup> that it collects the following information: dollars<sup><a href="#s4">[4]</a></sup
</p> >. Discord cannot be built from source and the source code for Discord
<ul> is unavailable.
<li>IP Address</li> </p>
<li>Device UUID</li> <h3>Discord does not make its source code available</h3>
<li>User's e-mail address</li> <p>
<li>All text messages</li> It is impossible to download and examine Discord's source code, which
<li>All images</li> means that it is impossible to prove that Discord is not spyware. Any
<li>All VOIP data (voice chat)</li> program which does not make its source code available is potential
<li>Open rates for e-mail sent by Discord</li> spyware.
</ul> </p>
<p> <h3>
Discord does not explictly confirm that it collects this information, but still collects it by default: Discord confirms that it collects large amounts of sensitive user data
</p> </h3>
<ul> <p>
<li>Logs of all of the other programs that are open on your computer</li> Discord explicitly confirms in its privacy policy<sup
</ul> ><a href="#s1">[1]</a></sup
<p> >
The implications of this information can be broken down like this: By that it collects the following information:
recording your IP address, Discord can track your general location </p>
(about as precise as which county you are in). Discord can also tell <ul>
which devices you use, as it uniquely identifies each device, and how <li>IP Address</li>
much you use those devices, as it can record your device usage habits <li>Device UUID</li>
(since Discord is usually open in the background so that it can receive <li>User's e-mail address</li>
messages). Discord also records every single interaction you have with <li>All text messages</li>
other users through its service. This means that Discord is confirmed <li>All images</li>
to log every conversation that you have through Discord, and record <li>All VOIP data (voice chat)</li>
everything that you say on Discord, and view all images that you send <li>Open rates for e-mail sent by Discord</li>
through Discord. Therefore, none of your interactions on Discord are </ul>
private. Discord's privacy policy also contains several occurrences of <p>
phrases such as "including but not limited to," which is an explicit Discord does not explictly confirm that it collects this information,
confirmation that Discord contains more spyware features that are not but still collects it by default:
disclosed to the user. </p>
</p> <ul>
<h3>Discord contains features which allow integration with other spyware platforms</h3> <li>
<p> Logs of all of the other programs that are open on your computer
Discord contains the opt-in spyware feature known as "social media </li>
integration." This allows you to sync your persistent user identity </ul>
on Discord with your persistent user identity on other spyware <p>
platforms, such as Facebook and Twitter. In its privacy policy<sup><a href="#1">[1]</a></sup>, The implications of this information can be broken down like this: By
Discord has confirmed that if you opt in to this spyware feature, recording your IP address, Discord can track your general location
Discord will obtain an undisclosed amount of access to information (about as precise as which county you are in). Discord can also tell
obtained about you by the spyware platforms that you choose to sync which devices you use, as it uniquely identifies each device, and how
with. much you use those devices, as it can record your device usage habits
</p> (since Discord is usually open in the background so that it can
<h3>Discord contains a process logger</h3> receive messages). Discord also records every single interaction you
<p> have with other users through its service. This means that Discord is
Discord has been confirmed to monitor the open processes on your confirmed to log every conversation that you have through Discord, and
operating system. This is a spyware feature known as a "process logger" record everything that you say on Discord, and view all images that
that is generally used to record your program usage habits. This was you send through Discord. Therefore, none of your interactions on
confirmed by the CTO of Discord in a Reddit thread.<sup><a href="#2">[2]</a></sup> Discord are private. Discord's privacy policy also contains several
In the same thread, the CTO also elaborates that this spyware feature (the monitoring of processes) is occurrences of phrases such as "including but not limited to," which
mandatory for several features of the platform. The CTO and a Discord engineer go on is an explicit confirmation that Discord contains more spyware
to claim that Discord does not use the process logger to send records features that are not disclosed to the user.
of the open processes on the user's computer. </p>
</p> <h3>
<p> Discord contains features which allow integration with other spyware
The test to prove that Discord logs processes was done again by the writer with procmon on 4/11/2019 with platforms
the features: "Use data to customize my Discord Experience" and "Display currently running game as a status message" </h3>
turned off. Discord did <font color=lime><b>NOT</b></font> log all of the processes open this way. <p>
However when setting the "Display currently running game as a status message" turned on, the behavior Discord contains the opt-in spyware feature known as "social media
described in<sup><a href="#2">[2]</a></sup> was replecated. You can see that behavior here: integration." This allows you to sync your persistent user identity on
</p> Discord with your persistent user identity on other spyware platforms,
<img class="screenshot" src="../images/discord_process_logging.png" alt="Discord process logging as described in [2] confirmed with procmon"> such as Facebook and Twitter. In its privacy policy<sup
<p> ><a href="#s1">[1]</a></sup
It turns out that this feature <font color=lime><b>can be disabled through the UI.</b></font> Because of the nature of closed-source >, Discord has confirmed that if you opt in to this spyware feature,
software it isn't possible for either this article or the Discord developers to prove how much information is being sent to Discord will obtain an undisclosed amount of access to information
Discord's servers when the process logger is turned on. But it's at least possible to turn it off. obtained about you by the spyware platforms that you choose to sync
</p> with.
<h3>Discord uses it's process logging for advertising</h3> </p>
<p> <h3>Discord contains a process logger</h3>
Discord shows this in it's privacy option here: <p>
</p> Discord has been confirmed to monitor the open processes on your
<img class="screenshot" src="../images/discord_data.png" alt="Discord process logging usefulness"> operating system. This is a spyware feature known as a "process
<p> logger" that is generally used to record your program usage habits.
That the process logging features of Discord are now being recorded on Discord's servers as a form of telemetry (spyware), This was confirmed by the CTO of Discord in a Reddit thread.<sup
and removes speculation about why this feature exists. It is clarified by Discord that this spyware feature is used for advertising ><a href="#s2">[2]</a></sup
to it's users.<sup><a href="#8">[8]</a></sup> This means that Discord is <font color=red><b>recording the programs you have open to build >
a statistical model of what programs you might buy/lisence in the future.</b></font> In the same thread, the CTO also elaborates that this spyware feature
</p> (the monitoring of processes) is mandatory for several features of the
<img class="screenshot" src="../images/discord_2.png" alt="Discord confirms process logging is used for advertising"> platform. The CTO and a Discord engineer go on to claim that Discord
does not use the process logger to send records of the open processes
on the user's computer.
</p>
<p>
The test to prove that Discord logs processes was done again by the
writer with procmon on 4/11/2019 with the features: "Use data to
customize my Discord Experience" and "Display currently running game
as a status message" turned off. Discord did
<font color="lime"><b>NOT</b></font> log all of the processes open
this way. However when setting the "Display currently running game as
a status message" turned on, the behavior described in<sup
><a href="#s2">[2]</a></sup
>
was replecated. You can see that behavior here:
</p>
<img
class="screenshot"
src="../images/discord_process_logging.png"
alt="Discord process logging as described in [2] confirmed with procmon"
/>
<p>
It turns out that this feature
<font color="lime"><b>can be disabled through the UI.</b></font>
Because of the nature of closed-source software it isn't possible for
either this article or the Discord developers to prove how much
information is being sent to Discord's servers when the process logger
is turned on. But it's at least possible to turn it off.
</p>
<h3>Discord uses it's process logging for advertising</h3>
<p>
Discord shows this in it's privacy option here:
</p>
<img
class="screenshot"
src="../images/discord_data.png"
alt="Discord process logging usefulness"
/>
<p>
That the process logging features of Discord are now being recorded on
Discord's servers as a form of telemetry (spyware), and removes
speculation about why this feature exists. It is clarified by Discord
that this spyware feature is used for advertising to it's users.<sup
><a href="#s8">[8]</a></sup
>
This means that Discord is
<font color="red"
><b
>recording the programs you have open to build a statistical model
of what programs you might buy/lisence in the future.</b
></font
>
</p>
<img
class="screenshot"
src="../images/discord_2.png"
alt="Discord confirms process logging is used for advertising"
/>
<h3>Discord tries to force some users to give their Telephone numbers</h3> <h3>
<p> Discord tries to force some users to give their Telephone numbers
Discord will lock users out of it's service and will not allow them to continue using it without giving their phone number or contacting Discord </h3>
support. This kind of feature is designed to extract very personal information out of it's users (phone numbers). The criteria for locking out <p>
users isn't known. Discord will lock users out of it's service and will not allow them to
</p> continue using it without giving their phone number or contacting
<img class="screenshot" src="../images/discord_verify.png" alt="discord phone verification"> Discord support. This kind of feature is designed to extract very
personal information out of it's users (phone numbers). The criteria
for locking out users isn't known.
<!--
You can be locked out of your account for spamming
multiple users in dm's a short ammount of time,
This is due to the spam protection
-->
</p>
<img
class="screenshot"
src="../images/discord_verify.png"
alt="discord phone verification"
/>
<h3>Discord receives government requests for your information</h3> <h3>Discord receives government requests for your information</h3>
<p> <p>
Discord has confirmed in an email correspondence<sup><a href="#6">[6]</a></sup> Discord has confirmed in an email correspondence<sup
that it does receive government requests for information. So, we know ><a href="#s6">[6]</a></sup
that the government potentially has access to all of the information >
that Discord collects about you. You can read a copy of the email image that it does receive government requests for information. So, we know
posted in the source <a href="https://spyware.neocities.o../images/discord%20government%20requests.png">here</a> in case the link there dies. that the government potentially has access to all of the information
</p> that Discord collects about you. You can read a copy of the email
<hr> image posted in the source
<h2>Speculation on Discord's future</h2> <a
<p> href="https://spyware.neocities.org/images/discord%20government%20requests.png"
It's unknown whether Discord currently is or isn't selling user information. Currently Discord has been able >here</a
to consistently raise new invesment capital, which is at a level where it could reasonably be covering >
all of its operating costs. However, Discord, like any other company, is not going to exist in a in case the link there dies.
constant state of investment. Discord is going to have to transition away from an investment-financed </p>
business model to a revenue model that exclusively relies on generating revenue from the users of the <hr />
platform. <h2>Speculation on Discord's future</h2>
</p> <p>
<p> It's unknown whether Discord currently is or isn't selling user
Discord has several ways of making money. It can lisence emoji's and other features of the program with information. Currently Discord has been able to consistently raise new
Discord Nitro<sup><a href="#5">[5]</a></sup>, or it can make money lisencing video games through it's invesment capital, which is at a level where it could reasonably be
new online store, as a competitor to <a href="../articles/steam.html">Steam</a>. However both of these revenue covering all of its operating costs. However, Discord, like any other
sources may not be enough. Discord has raised $279.3 million dollars<sup><a href="#4">[4]</a></sup> company, is not going to exist in a constant state of investment.
and it has to return on this investment. (which is more than 279.3 million dollars that has to be paid back) Discord is going to have to transition away from an
</p> investment-financed business model to a revenue model that exclusively
<p> relies on generating revenue from the users of the platform.
If Discord is not able to satisfy it's obligation to it's investors, it has a third option- selling user information </p>
to advertisers. Discord is already datamining it's users to produce it's recommendation system,<sup><a href="#8">[8]</a></sup> which means that it <p>
is already turning it's userbase into extremely valueble, sellable, advertising data. Discord has 130 million users<sup><a href="#7">[7]</a></sup>, Discord has several ways of making money. It can lisence emoji's and
and it can produce a statistical model of what games each user (who does not opt-out of advertising) owns, plays, and wants to buy. other features of the program with Discord Nitro<sup
This is incredibly valueble information that Discord can sell if it cannot reach it's profit obligations with it's current ><a href="#s5">[5]</a></sup
revenue model. If Discord is a successful games store, then it wont need to do this. But if Discord gets in financial trouble, >, or it can make money lisencing video games through it's new online
it probably will be forced to liquiate this asset. store, as a competitor to <a href="../articles/steam.html">Steam</a>.
</p> However both of these revenue sources may not be enough. Discord has
raised $279.3 million dollars<sup><a href="#s4">[4]</a></sup>
and it has to return on this investment. (which is more than 279.3
million dollars that has to be paid back)
</p>
<p>
If Discord is not able to satisfy it's obligation to it's investors,
it has a third option- selling user information to advertisers.
Discord is already datamining it's users to produce it's
recommendation system,<sup><a href="#s8">[8]</a></sup> which means
that it is already turning it's userbase into extremely valueble,
sellable, advertising data. Discord has 130 million users<sup
><a href="#s7">[7]</a></sup
>, and it can produce a statistical model of what games each user (who
does not opt-out of advertising) owns, plays, and wants to buy. This
is incredibly valueble information that Discord can sell if it cannot
reach it's profit obligations with it's current revenue model. If
Discord is a successful games store, then it wont need to do this. But
if Discord gets in financial trouble, it probably will be forced to
liquiate this asset.
</p>
</div>
<hr />
<div class="footer">
<div class="futher">
<h4>Further Reading:</h4>
<ol>
<a
href="https://old.reddit.com/r/privacy/comments/8lkb5s/friends_dont_let_friends_use_discord_the/"
>Friends Don't Let Friends Use Discord</a
>
<a href="https://archive.is/Q4N9J">[archive.is]</a
><br />
<hr> <a
<center> href="https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html"
<h2>Further Reading</h2> >Help Me, Tom's Guide: Is Discord Tracking Me?</a
>
<a
href="http://archive.is/20180418204656/https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html"
>[archive.is]</a
><br />
<a href="https://old.reddit.com/r/privacy/comments/8lkb5s/friends_dont_let_friends_use_discord_the/">Friends Don't Let Friends Use Discord</a> <a href="https://www.hooktube.com/watch?v=cn4CENr5NV0"
<a href="https://archive.is/Q4N9J">[archive.is]</a><br> >Why Discord is Trash</a
><br />
<a href="https://www.hooktube.com/watch?v=QN_6AZT92pU"
>Why You Shouldn't Use Discord</a
><br />
<a href="https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html">Help Me, Tom's Guide: Is Discord Tracking Me?</a> <a href="http://subvert.pw/res/discord.pdf"
<a href="http://archive.is/20180418204656/https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html">[archive.is]</a><br> >THE DISCORD SITUATION</a
>
<a href="https://www.hooktube.com/watch?v=cn4CENr5NV0">Why Discord is Trash</a><br> <a
<a href="https://www.hooktube.com/watch?v=QN_6AZT92pU">Why You Shouldn't Use Discord</a><br> href="https://web.archive.org/web/20180528205030/http://subvert.pw/res/discord.pdf"
<a href="http://subvert.pw/res/discord.pdf">THE DISCORD SITUATION</a> >[web.archive.org]</a
<a href="https://web.archive.org/web/20180528205030/http://subvert.pw/res/discord.pdf">[web.archive.org]</a><br> >
<hr> </ol>
<h2>Sources</h2> </div>
<p> <hr />
<a name="1">1.</a> <div class="sources">
<a href="https://discordapp.com/privacy">Discord Privacy Policy</a> <h4>Sources:</h4>
<a href="https://web.archive.org/web/20180528052213/https://discordapp.com/privacy">[web.archive.org]</a> <ol>
<a href="http://archive.is/20180515102020/https://discordapp.com/privacy">[archive.is]</a><br> <li id="s1">
<a href="https://discordapp.com/privacy"
<a name="2">2.</a> >Discord Privacy Policy</a
<a href="https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/">Why is Discord recording our open programs and uploading them?</a> >
<a href="https://web.archive.org/web/20180410043931/https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/">[web.archive.org]</a> <a
<a href="https://archive.li/qFcQA">[archive.is]</a><br> href="https://web.archive.org/web/20180528052213/https://discordapp.com/privacy"
>[web.archive.org]</a
<a name="3">3.</a> >
<a href="https://discordapp.com/company">Discord</a> <a
<a href="http://wayback.archive-it.org/all/20171226205723/https://discordapp.com/company">[wayback.archive-it.org]</a> href="http://archive.is/20180515102020/https://discordapp.com/privacy"
<a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a><br> >[archive.is]</a
>
<a name="4">4.</a> </li>
<a href="https://www.crunchbase.com/organization/discord">Crunchbase</a> <li id="s2">
<a href="https://web.archive.org/web/20180423015034/https://www.crunchbase.com/organization/discord">[web.archive.org]</a> <a
<a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a><br> href="https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/"
>Why is Discord recording our open programs and uploading
<a name="5">5.</a> them?</a
<a href="https://discordapp.com/nitro">Discord Nitro</a> >
<a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a><br> <a
href="https://web.archive.org/web/20180410043931/https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/"
<a name="6">6.</a> >[web.archive.org]</a
<a href="https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">Discord receives government requests. No plans on adding E2E Encryption any time soon.</a> >
<a href="https://archive.is/JrdJ9">[archive.is]</a> <a href="https://archive.li/qFcQA">[archive.is]</a>
<a href="http://web.archive.org/web/20180228033615/https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">[web.archive.org]</a><br> </li>
<li id="s3">
<a href="https://discordapp.com/company">Discord</a>
<a name="7">7.</a> <a
<a href=" https://www.statista.com/statistics/746215/discord-user-number/">Number of registered Discord users</a> href="http://wayback.archive-it.org/all/20171226205723/https://discordapp.com/company"
<a href="http://web.archive.org/web/20181119040747/https://www.statista.com/statistics/746215/discord-user-number/">[web.archive.org]</a><br> >[wayback.archive-it.org]</a
>
<a
href="http://archive.is/20170724163442/https://discordapp.com/company"
<a name="8">8.</a> >[archive.is]</a
<a href="https://support.discordapp.com/hc/en-us/articles/360004109911">Data Privacy Controls</a> >
<a href="http://web.archive.org/web/20181201004455/https://support.discordapp.com/hc/en-us/articles/360004109911">[web.archive.org]</a><br> </li>
</p> <li id="s4">
<a href="https://www.crunchbase.com/organization/discord"
<hr> >Crunchbase</a
<p><b> >
This article was last edited on 4/11/2019 <a
</b></p> href="https://web.archive.org/web/20180423015034/https://www.crunchbase.com/organization/discord"
<p><b> >[web.archive.org]</a
This article was created on 11/23/17 >
</b></p> <a
<p> href="http://archive.is/20170724163442/https://discordapp.com/company"
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted. >[archive.is]</a
</p> >
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a> </li>
<p><a href="../articles/index.html">Back to catalog</a></p> <li id="s5">
</center> <a href="https://discordapp.com/nitro">Discord Nitro</a>
<a
href="http://archive.is/20170724163442/https://discordapp.com/company"
>[archive.is]</a
>
</li>
<li id="s6">
<a
href="https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/"
>Discord receives government requests. No plans on adding E2E
Encryption any time soon.</a
>
<a href="https://archive.is/JrdJ9">[archive.is]</a>
<a
href="http://web.archive.org/web/20180228033615/https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/"
>[web.archive.org]</a
>
</li>
<li id="s7">
<a
href=" https://www.statista.com/statistics/746215/discord-user-number/"
>Number of registered Discord users</a
>
<a
href="http://web.archive.org/web/20181119040747/https://www.statista.com/statistics/746215/discord-user-number/"
>[web.archive.org]</a
>
</li>
<li id="s8">
<a
href="https://support.discordapp.com/hc/en-us/articles/360004109911"
>Data Privacy Controls</a
>
<a
href="http://web.archive.org/web/20181201004455/https://support.discordapp.com/hc/en-us/articles/360004109911"
>[web.archive.org]</a
>
</li>
</ol>
</div>
<hr />
<b>This article was created on 11/23/17</b><br />
<b>This article was last edited on 4/11/2019</b>
<!--Dont change-->
<p>
If you want to edit this article, or contribute your own article(s),
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p>
<p>
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode">
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
</a>
<!--Dont change-->
</div>
</div>
</body> </body>
</html> </html>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,51 +1,79 @@
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<meta
http-equiv="Content-type"
content="application/xhtml+xml;charset=utf-8"
/>
<title>[Program/Service Name Here] - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head>
<head> <body>
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/> <div class="case">
<title>[Program/Service Name Here] - Spyware Watchdog</title> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<link rel="stylesheet" href="../style.css"/> <div class="main">
</head> <img
src="../images/example_logo.png"
<body> alt="Images are in the ../images folder"
<div class="case"> />
<div class="nav"><a href="index.html">&larr; Catalog</a></div> <h1>[Program/Service Name Here]</h1>
<div class="main"> <p>
<img src="../images/example_logo.png" alt="Images are in the ../images folder"/> This part of the article should have the name of the program and what
<h1>[Program/Service Name Here]</h1> it does, and who develops it.
<p> </p>
This part of the article should have the name of the program and what it does, and who develops it. <h2>Spyware Level: <span class="green">Not Rated</span></h2>
</p> <h2>Spyware Feature X</h2>
<h2>Spyware Level: <span class="green">Not Rated</span></h2> <p>
<h2>Spyware Feature X</h2> Proof goes here<sup><a href="#s1">[1]</a></sup
<p>Proof goes here<sup><a href="#s1">[1]</a></sup>.</p> >.
</div> </p>
<hr> </div>
<div class="footer"> <hr />
<div class="futher"> <div class="footer">
<h4>Further Reading:</h4> <div class="futher">
<ol> <h4>Further Reading:</h4>
<a href="">Source</a> <a href="">[web.archive.org]</a> <a href="">[archive.is]</a> <ol>
</ol> <a href="">Source</a>
</div> <a href="">[web.archive.org]</a>
<hr> <a href="">[archive.is]</a>
<div class="sources"> </ol>
<h4>Sources:</h4> </div>
<ol> <hr />
<li id="s1"><a href="">Source1</a> <a href="">[web.archive.org]</a> <a href="">[archive.is]</a></li> <div class="sources">
<li id="s2"><a href="">Source2</a> <a href="">[web.archive.org]</a> <a href="">[archive.is]</a></li> <h4>Sources:</h4>
</ol> <ol>
</div> <li id="s1">
<hr> <a href="">Source1</a>
<b>This article was created on mm/dd/yyyy</b> <a href="">[web.archive.org]</a>
<b>This article was last edited on mm/dd/yyyy</b> <a href="">[archive.is]</a>
<!--Dont change--> </li>
<p>If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.</p> <li id="s2">
<p>All contributions must be licensed under the CC0 license to be accepted.</p> <a href="">Source2</a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a> <a href="">[web.archive.org]</a>
<!--Dont change--> <a href="">[archive.is]</a>
</div> </li>
</div> </ol>
</body> </div>
<hr />
</html> <b>This article was created on mm/dd/yyyy</b><br />
<b>This article was last edited on mm/dd/yyyy</b>
<!--Dont change-->
<p>
If you want to edit this article, or contribute your own article(s),
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p>
<p>
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode">
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
</a>
<!--Dont change-->
</div>
</div>
</body>
</html>

View File

@ -1,59 +1,64 @@
<!DOCTYPE HTML> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html lang=”en-us”> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<link rel="stylesheet" href="../style.css">
<meta charset="UTF-8">
<title>Internet Explorer - Spyware Watchdog</title>
</head>
<body>
<img src="../images/ie_logo.png" alt="Internet Explorer Logo">
<h1>Internet Explorer</h1>
<p>
Internet Explorer is a Web Browser distributed by Microsoft with most versions of the Microsoft Windows Operating system.
</p>
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
<p>
Internet Explorer contains many serious spyware features, however all of these features appear to be "opt-out" features. It is not verified whether or not opting out will actually disable all of these features, or if there are other spyware features that are not known which cannot be opted out of. Internet Explorer can record your search history and location, and report that information to Microsoft. Internet Explorer is not the worst spyware, but it is still loaded with spyware features that can mine serious information from users.
</p>
<h3>Internet Explorer does not have available source code</h3>
<p>
Internet Explorer cannot be built from available source code. This means that it is impossible to prove that it is not a spyware program or that it does not have unknown spyware features inside of it.
</p>
<h3>Internet Explorer is self-updating software</h3>
<p>
Internet Explorer can be updated through spyware programs such as Windows Update<sup><a href="#1">[1]</a></sup>. Automatic software updates are a spyware feature becuase they cannot be verified to be non-spyware by the user. Luckily, this spyware feature is opt-out and can be turned off.
</p>
<h3>Internet Explorer sends your search history to Microsoft</h3>
<p>
Internet Explorer contains a spyware feature called "flip ahead"<sup><a href="#1">[1]</a></sup>. Flip ahead will periodically send your browsing history to Microsoft. This spyware feature is opt-out and can be disabled. Microsoft claims that the information it recevies is encrypted to protect user privacy and santized to prevent personal information from being stored. This is unverifiable. Microsoft confirms that it does use the information obtained from flip ahead to build statstical models of your browsing habits. Other spyware features such as "Smartscreen filter", and "Suggested Sites" also confirm that they send your internet history to Microsoft.
</p>
<h3>Internet Explorer can track your location</h3>
<p>
Internet Explorer has the spyware feature commonly referred to as "location services", which is a feature that allows it to track the location of the user. The privacy statement<sup><a href="#1">[1]</a></sup> explains that your location is obtained through a "Microsoft Location Service". Which means that your location is sent to a Microsoft server. Microsoft does not elaborate on what it does with this data or whether it stores this data. This spyware feature is opt-out.
</p>
<h3>Internet Explorer has an anti-privacy search engine by default</h3>
<p>The default search engine is <a href="../articles/bing.html">Bing</a> which datamines its users and sells that information to advertisers.</p>
<hr> <head>
<center> <meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<h2>Sources</h2> <title>Internet Explorer - Spyware Watchdog</title>
<p> <link rel="stylesheet" href="../style.css"/>
<a name="1">1.</a> </head>
<a href="https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">Internet Explorer 10 privacy statement</a>
<a href="http://webarchive.loc.gov/all/20160915190335/https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">[webarchive.loc.gov]</a> <body>
<a href="https://web.archive.org/web/20180509170237/https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">[web.archive.org]</a> <div class="case">
<a href="https://archive.is/EnsRH">[archive.is]</a><br> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
</p> <div class="main">
<img src="../images/ie_logo.png" alt="Internet Explorer Logo"/>
<h1>Internet Explorer</h1>
<p>
Internet Explorer is a Web Browser distributed by Microsoft with most versions of the Microsoft Windows Operating system.
</p>
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
<p>
Internet Explorer contains many serious spyware features, however all of these features appear to be "opt-out" features. It is not verified whether or not opting out will actually disable all of these features, or if there are other spyware features that are not known which cannot be opted out of. Internet Explorer can record your search history and location, and report that information to Microsoft. Internet Explorer is not the worst spyware, but it is still loaded with spyware features that can mine serious information from users.
</p>
<h3>Internet Explorer does not have available source code</h3>
<p>
Internet Explorer cannot be built from available source code. This means that it is impossible to prove that it is not a spyware program or that it does not have unknown spyware features inside of it.
</p>
<h3>Internet Explorer is self-updating software</h3>
<p>
Internet Explorer can be updated through spyware programs such as Windows Update<sup><a href="#s1">[1]</a></sup>. Automatic software updates are a spyware feature becuase they cannot be verified to be non-spyware by the user. Luckily, this spyware feature is opt-out and can be turned off.
</p>
<h3>Internet Explorer sends your search history to Microsoft</h3>
<p>
Internet Explorer contains a spyware feature called "flip ahead"<sup><a href="#s1">[1]</a></sup>. Flip ahead will periodically send your browsing history to Microsoft. This spyware feature is opt-out and can be disabled. Microsoft claims that the information it recevies is encrypted to protect user privacy and santized to prevent personal information from being stored. This is unverifiable. Microsoft confirms that it does use the information obtained from flip ahead to build statstical models of your browsing habits. Other spyware features such as "Smartscreen filter", and "Suggested Sites" also confirm that they send your internet history to Microsoft.
</p>
<h3>Internet Explorer can track your location</h3>
<p>
Internet Explorer has the spyware feature commonly referred to as "location services", which is a feature that allows it to track the location of the user. The privacy statement<sup><a href="#s1">[1]</a></sup> explains that your location is obtained through a "Microsoft Location Service". Which means that your location is sent to a Microsoft server. Microsoft does not elaborate on what it does with this data or whether it stores this data. This spyware feature is opt-out.
</p>
<h3>Internet Explorer has an anti-privacy search engine by default</h3>
<p>The default search engine is <a href="../articles/bing.html">Bing</a> which datamines its users and sells that information to advertisers.</p>
</div>
<hr>
<div class="footer">
<div class="sources">
<h4>Sources:</h4>
<ol>
<li id="s1"><a href="https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">Internet Explorer 10 privacy statement</a>
<a href="http://webarchive.loc.gov/all/20160915190335/https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">[webarchive.loc.gov]</a>
<a href="https://web.archive.org/web/20180509170237/https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">[web.archive.org]</a>
<a href="https://archive.is/EnsRH">[archive.is]</a><br></li>
</ol>
</div>
<hr>
<b>This article was last edited on 2/18/2019</b>
<!--Dont change-->
<p>If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
<!--Dont change-->
</div>
</div>
</body>
<hr>
<p><b>
This article was last updated on 2/18/2019
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</body>
</html> </html>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
@ -6,7 +7,7 @@
<title>Firefox - Spyware Watchdog</title> <title>Firefox - Spyware Watchdog</title>
</head> </head>
<body> <body>
<img src="../images/firefox_logo.png" alt="Firefox logo"> <img src="../images/firefox_logo3.svg" alt="Firefox logo">
<h1>Mozilla Firefox</h1> <h1>Mozilla Firefox</h1>
<center> <center>
<a href="../articles/firefox_es.html">Spanish Translation</a> <a href="../articles/firefox_es.html">Spanish Translation</a>

View File

@ -1,4 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
@ -12,7 +12,7 @@
<a href="../articles/index.html">Back to catalog</a><br> <a href="../articles/index.html">Back to catalog</a><br>
<a href="../guides/firefox_es.html">Guía de mitigación</a> <a href="../guides/firefox_es.html">Guía de mitigación</a>
</p> </p>
<img src="../images/firefox_logo.png" alt="Firefox logo"> <img src="../images/firefox_logo3.svg" alt="Firefox logo">
<p> <p>
Mozilla Firefox es uno de los navegadores web más populares y perdurables. Sus desarrolladores han adquirido cierta reputación por desarrollar un "navegador que respeta la privacidad y seguridad del usuario" - pero, ¿es algo justificado o sólo una estrategia de marketing? Bueno, de hecho, a través de sus años de existencia, los desarrolladores han tomado varias decisiones que podrían ser consideradas anti-privacidad (y anti-usuario en general), pero en este artículo nos estaremos enfocando exclusivamente en aquellas que pueden ser consideradas spyware. Versión testeada: 52.5.0, con la configuración por defecto. Programas usados para buscar solicitudes web: Mitmproxy. Mozilla Firefox es uno de los navegadores web más populares y perdurables. Sus desarrolladores han adquirido cierta reputación por desarrollar un "navegador que respeta la privacidad y seguridad del usuario" - pero, ¿es algo justificado o sólo una estrategia de marketing? Bueno, de hecho, a través de sus años de existencia, los desarrolladores han tomado varias decisiones que podrían ser consideradas anti-privacidad (y anti-usuario en general), pero en este artículo nos estaremos enfocando exclusivamente en aquellas que pueden ser consideradas spyware. Versión testeada: 52.5.0, con la configuración por defecto. Programas usados para buscar solicitudes web: Mitmproxy.
</p> </p>
@ -20,7 +20,7 @@
<p> <p>
Después de seguir la <a href="../guides/firefox.html">guía de mitigación</a>, este programa <font color=lime><b>No Es Spyware</b></font>. Después de seguir la <a href="../guides/firefox.html">guía de mitigación</a>, este programa <font color=lime><b>No Es Spyware</b></font>.
</p> </p>
<br/> <br/>
<p>Este navegador envía bastante información de forma frecuente (mucha de la cual podría ser utilizada para identificarte de forma única). Todos los "servicios" que provee, como los buscadores que vienen por defecto y Pocket, son anti-privacidad. La clasificación puesta no es más alta porque al menos puedes desactivar or modificar la mayoría de estas características, aunque esto requiera lidiar bastante con about:config <p>Este navegador envía bastante información de forma frecuente (mucha de la cual podría ser utilizada para identificarte de forma única). Todos los "servicios" que provee, como los buscadores que vienen por defecto y Pocket, son anti-privacidad. La clasificación puesta no es más alta porque al menos puedes desactivar or modificar la mayoría de estas características, aunque esto requiera lidiar bastante con about:config
</p> </p>
<h3>Llamadas a casa</h3> <h3>Llamadas a casa</h3>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang="en-us"> <html lang="en-us">
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang="en-us"> <html lang="en-us">
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang="en-us"> <html lang="en-us">
<head> <head>

View File

@ -1,4 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
@ -6,7 +7,7 @@
<title>Iridium Browser - Spyware Watchdog</title> <title>Iridium Browser - Spyware Watchdog</title>
</head> </head>
<body> <body>
<img src="../images/iridium_logo.jpg" alt="Iridium Logo"> <img src="../images/iridium_logo.png" alt="Iridium Logo">
<h1>Iridium Browser</h1> <h1>Iridium Browser</h1>
<p> <p>
Iridium is a privacy-based fork of Google Chrome. From their website: "All modifications enhance the privacy of the user and make sure that the latest and best secure technologies are used. Automatic transmission of partial queries, keywords and metrics to central services is prevented and only occurs with the approval of the user." Unlike other browsers of its kind, this one is fully featured (has all the addons that are available for Chrome), and so is recommended for everyday usage. Iridium is a privacy-based fork of Google Chrome. From their website: "All modifications enhance the privacy of the user and make sure that the latest and best secure technologies are used. Automatic transmission of partial queries, keywords and metrics to central services is prevented and only occurs with the approval of the user." Unlike other browsers of its kind, this one is fully featured (has all the addons that are available for Chrome), and so is recommended for everyday usage.

View File

@ -1,180 +1,188 @@
<!DOCTYPE HTML> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html lang=”en-us”> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<link rel="stylesheet" href="../style.css">
<meta charset="UTF-8">
<title>SRWare Iron - Spyware Watchdog</title>
</head>
<body>
<meta name="viewport" content="width=device-width, initial-scale=1"> <head>
<img src="../images/srware_logo.png" alt="SRWare Iron Logo"> <meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<h1>SRWare Iron</h1> <title>SRWare Iron - Spyware Watchdog</title>
<p> <link rel="stylesheet" href="../style.css"/>
SRWare Iron is a free web browser, and an implementation of Chromium by SRWare of Germany. </head>
</p>
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2> <body>
<p> <div class="case">
SRWare Iron claims to be a privacy respecting web browser that is an alternative to <a href="../articles/chrome.html">Google Chrome</a>'s <div class="nav"><a href="index.html">&larr; Catalog</a></div>
spyware, and specifically brands itself as a privacy respecting web browser that aims to give users <div class="main">
the Chrome experience without Google's spyware. However when examining this program, these claims <img src="../images/srware_logo.png" alt="SRWare Iron Logo"/>
instantly melt away. SRWare Iron connects to an absolutely incredible amount of trackers and opens <h1>SRWare Iron</h1>
connections to an enormous amount of servers on it's first run. It racks up a rough estimate of <p>
<b><font color="yellow">~400-500 unsolicited connections</font></b>, and it actually took several minitues for it to stop making new SRWare Iron is a free web browser, and an implementation of Chromium by SRWare of Germany.
requests and connections. SRWare Iron uses the spyware search engine <a href="../articles/bing.html">Bing</a> as it's default search </p>
engine, however it goes beyond that and routes your requests to Bing through it's own servers <h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
so that it can spy on your internet searches as well. The bottom line is that this browser is just <p>
another false privacy initiative and is really <b><font color="red">no better than Chrome.</font></b> SRWare Iron claims to be a privacy respecting web browser that is an alternative to <a href="../articles/chrome.html">Google Chrome</a>'s
</p> spyware, and specifically brands itself as a privacy respecting web browser that aims to give users
<p> the Chrome experience without Google's spyware. However when examining this program, these claims
Version 69.0.3600.0 of SRWare Iron was tested on Windows 7 64-bit. MITMproxy, Microsoft Network Montior 3.4, instantly melt away. SRWare Iron connects to an absolutely incredible amount of trackers and opens
and Sysinternals ProcMon were used to monitor the behavior of this program. connections to an enormous amount of servers on it's first run. It racks up a rough estimate of
</p> <b><font color="yellow">~400-500 unsolicited connections</font></b>, and it actually took several minitues for it to stop making new
<h3>False Privacy Initiative</h3> requests and connections. SRWare Iron uses the spyware search engine <a href="../articles/bing.html">Bing</a> as it's default search
<p> engine, however it goes beyond that and routes your requests to Bing through it's own servers
SRWare Iron claims on it's website that it is: so that it can spy on your internet searches as well. The bottom line is that this browser is just
</p> another false privacy initiative and is really <b><font color="red">no better than Chrome.</font></b>
<p><i> </p>
"Chrome thrilled with an extremely fast site rendering, a sleek design and innovative features. But it also gets critic from data protection specialists , for reasons such as creating a unique user ID or the submission of entries to Google to generate suggestions. SRWare Iron is a real alternative. The browser is based on the Chromium-source and offers the same features as Chrome - but without the critical points that the privacy concern." <p>
</i><sup><a href="#1">[1]</a></sup></p> Version 69.0.3600.0 of SRWare Iron was tested on Windows 7 64-bit. MITMproxy, Microsoft Network Montior 3.4,
<p> and Sysinternals ProcMon were used to monitor the behavior of this program.
The reality is that you are merely trading in one spyware product for another. Where Chrome's spyware has been removed, </p>
Iron's spyware is there to replace it. Which poision are you going to pick? The worst part is that people will read what is <h3>False Privacy Initiative</h3>
claimed on SRWare's website and beleive it without doing any tests for themselves. Like <p>
<a href="https://dottech.org/23821/srware-iron-a-privacy-oriented-web-browser-built-from-google-chromes-source-code/">this article</a> SRWare Iron claims on it's website that it is:
<a href="http://web.archive.org/web/20160327201202/http://dottech.org/23821/srware-iron-a-privacy-oriented-web-browser-built-from-google-chromes-source-code/">[web.archive.org]</a> </p>
that just copies the comparison-list from Iron's website without any real investegation before delcaring it a privacy alterantive to Chrome. <p><i>
The most audacious thing about it is this incredible quote on the FAQ section for the Iron browser: "Chrome thrilled with an extremely fast site rendering, a sleek design and innovative features. But it also gets critic from data protection specialists , for reasons such as creating a unique user ID or the submission of entries to Google to generate suggestions. SRWare Iron is a real alternative. The browser is based on the Chromium-source and offers the same features as Chrome - but without the critical points that the privacy concern."
</p> </i><sup><a href="#s1">[1]</a></sup></p>
<p><i> <p>
"Can i really check that Iron doesn't submit any private data, how you say? Yes, you can. There are tools like Wireshark, which scan the whole network-traffic. We could not recognize any obvious activity. But you can proof this by yourself." The reality is that you are merely trading in one spyware product for another. Where Chrome's spyware has been removed,
</i><sup><a href="#2">[2]</a></sup></p> Iron's spyware is there to replace it. Which poision are you going to pick? The worst part is that people will read what is
<p> claimed on SRWare's website and beleive it without doing any tests for themselves. Like
Which is just an amazing gem in the context of what is actually found when running tests on the software. <a href="https://dottech.org/23821/srware-iron-a-privacy-oriented-web-browser-built-from-google-chromes-source-code/">this article</a>
</p> <a href="http://web.archive.org/web/20160327201202/http://dottech.org/23821/srware-iron-a-privacy-oriented-web-browser-built-from-google-chromes-source-code/">[web.archive.org]</a>
<h3>Massive amount of connections on first startup</h3> that just copies the comparison-list from Iron's website without any real investegation before delcaring it a privacy alterantive to Chrome.
<p> The most audacious thing about it is this incredible quote on the FAQ section for the Iron browser:
When you first start SRWare Iron, it will immediately open the following two pages: <code>https://iron.start.me/us</code> and </p>
<code>https://www.srware.net/en/software_srware_iron.php</code>. The most offensive page is the <code>start.me</code> domain <p><i>
which begins loading in an enormous amount of spyware from all over the internet. I did not count the specific amount of requests "Can i really check that Iron doesn't submit any private data, how you say? Yes, you can. There are tools like Wireshark, which scan the whole network-traffic. We could not recognize any obvious activity. But you can proof this by yourself."
but it was somewhere in the 400-500 range (my software doesn't provide a great amount of automation... or maybe i'm not using it </i><sup><a href="#s2">[2]</a></sup></p>
as well as I could). This <a href../images/iron_spyware.png">image</a> (at 1.06 MB- almost 1/4 of the size of the entire site as of writing!) <p>
should give you an idea of the amount of requests I was swamped by. It took a while for it to die down. On subsequent runs the Which is just an amazing gem in the context of what is actually found when running tests on the software.
amount of requests it sent was far less. It connected to spyware platforms like Google Analytics and Piwik, and executed their JavaScript payloads. </p>
There were a lot of redundant connections to Google Analytics so it's probable that multiple companies are able to send their own <h3>Massive amount of connections on first startup</h3>
analytics payloads through this homescreen. Thus throughly fingerprinting and profiling your web browser and computer the moment you <p>
begin browsing the internet with your new "privacy respecting" browser- so that all of these advertising companies can track you When you first start SRWare Iron, it will immediately open the following two pages: <code>https://iron.start.me/us</code> and
everywhere you go! <code>https://www.srware.net/en/software_srware_iron.php</code>. The most offensive page is the <code>start.me</code> domain
</p> which begins loading in an enormous amount of spyware from all over the internet. I did not count the specific amount of requests
<p> but it was somewhere in the 400-500 range (my software doesn't provide a great amount of automation... or maybe i'm not using it
When checking the browser's connections in Network Monitor 3.4, you could see that it connected to a huge amount as well as I could). This <a href../images/iron_spyware.png">image</a> (at 1.06 MB- almost 1/4 of the size of the entire site as of writing!)
of servers, even though only two domains were ever contacted.<a href../images/iron_connections.png">This screenshot</a> doesn't caputre should give you an idea of the amount of requests I was swamped by. It took a while for it to die down. On subsequent runs the
all of the IP addresses that it connected, but should give you an idea. amount of requests it sent was far less. It connected to spyware platforms like Google Analytics and Piwik, and executed their JavaScript payloads.
</p> There were a lot of redundant connections to Google Analytics so it's probable that multiple companies are able to send their own
<p> analytics payloads through this homescreen. Thus throughly fingerprinting and profiling your web browser and computer the moment you
And just so that there is no ambiguity, this notice is shown when you load this homepage: begin browsing the internet with your new "privacy respecting" browser- so that all of these advertising companies can track you
</p> everywhere you go!
<p><i> </p>
"We use cookies to personalise content and ads, to provide social media features <p>
and to analyse our traffic. We also share information about your use of our site When checking the browser's connections in Network Monitor 3.4, you could see that it connected to a huge amount
with our social media, advertising and analytics partners who may combine it of servers, even though only two domains were ever contacted.<a href../images/iron_connections.png">This screenshot</a> doesn't caputre
with other information youve provided to them or theyve collected from your all of the IP addresses that it connected, but should give you an idea.
use of their services." </p>
</i></p> <p>
<p> And just so that there is no ambiguity, this notice is shown when you load this homepage:
Just so that there is no doubt- you are being served tracking cookies by advertising companies. </p>
</p> <p><i>
<h3>Redirecting of internet searches through developer's domain</h3> "We use cookies to personalise content and ads, to provide social media features
<p> and to analyse our traffic. We also share information about your use of our site
After you've finished identifying your web browser to just about every single spyware company on the internet, you can begin with our social media, advertising and analytics partners who may combine it
making internet searches with your new SRWare Iron browser. The default search engine is the spyware search engine <a href="../articles/bing.html">Bing</a>. with other information youve provided to them or theyve collected from your
However it's not enough to just point you at a spyware search engine... when you try and actually run a search on Bing, this is what happens: use of their services."
</p> </i></p>
<img class="screenshot" src="../images/iron_bing.png" alt="SRWare Iron redirecting through it's own servers"> <p>
<p> Just so that there is no doubt- you are being served tracking cookies by advertising companies.
Basically, every time you make a search with this browser, your searches are sent through the developer's servers. </p>
So, the developer can know exactly what your internet history is, in this way. Your searches are also being sent through <h3>Redirecting of internet searches through developer's domain</h3>
<code>wisesearches.com</code>, but I don't know who they are. So now instead of giving up your search history to one <p>
spyware company, Google, you can give it to three spyware companies, by switching to this browser. This is a very similar After you've finished identifying your web browser to just about every single spyware company on the internet, you can begin
tactic to the one that the spyware browser <a href="../articles/slimjet.html">Slimjet</a> uses, where it routes searches to making internet searches with your new SRWare Iron browser. The default search engine is the spyware search engine <a href="../articles/bing.html">Bing</a>.
Bing through it's own domains. However it's not enough to just point you at a spyware search engine... when you try and actually run a search on Bing, this is what happens:
</p> </p>
<h3>Motivations of the SRWare Iron developer?</h3> <img class="screenshot" src="../images/iron_bing.png" alt="SRWare Iron redirecting through it's own servers">
<p> <p>
If you dig deeper into how SRWare Iron was created, you can find some interesting information from some of the developers of Basically, every time you make a search with this browser, your searches are sent through the developer's servers.
Chrome about the motivations behind the creation of this fork. More specifically this very interesting conversation:<sup><a href="#3">[3]</a></sup> So, the developer can know exactly what your internet history is, in this way. Your searches are also being sent through
</p> <code>wisesearches.com</code>, but I don't know who they are. So now instead of giving up your search history to one
<xmp> spyware company, Google, you can give it to three spyware companies, by switching to this browser. This is a very similar
<Kmos> Iron: why not contribute to it, instead of forking ? tactic to the one that the spyware browser <a href="../articles/slimjet.html">Slimjet</a> uses, where it routes searches to
<Iron> because i removed all privacy-related code Bing through it's own domains.
<Iron> e.g. RLZ </p>
<Iron> and URL tracking every 5 seconds after start <h3>Motivations of the SRWare Iron developer?</h3>
<Iron> the original chrome is heavily communitating to google...i hate that <p>
<jamessan> all of those are supposed to have options to disable them, iirc If you dig deeper into how SRWare Iron was created, you can find some interesting information from some of the developers of
<Iron> yes but they haven't options yet Chrome about the motivations behind the creation of this fork. More specifically this very interesting conversation:<sup><a href="#s3">[3]</a></sup>
<Iron> and nobody knows when the next beta is released </p>
<jamessan> so work on getting the options added so they'll be there for the next release <xmp>
<mgreenblatt> Iron.. why not propose a patch based on preprocessor defines that disables the sections you dislike without forking the code? <Kmos> Iron: why not contribute to it, instead of forking ?
<mgreenblatt> (assuming such a thing doesn't already exist) <Iron> because i removed all privacy-related code
<Iron> because a fork will bring a lot of publicity to my person and my homepage <Iron> e.g. RLZ
<Iron> that means: a lot of money too ;) <Iron> and URL tracking every 5 seconds after start
<Kmos> rotflol <Iron> the original chrome is heavily communitating to google...i hate that
<Iron> what means rotful? <jamessan> all of those are supposed to have options to disable them, iirc
<mgreenblatt> Iron.. you're a large corporation that can dedicate the time to support a fork of something as complicated as chromium? <Iron> yes but they haven't options yet
<Kmos> Iron: google about it <Iron> and nobody knows when the next beta is released
<Iron> yes there is enough time to support it <jamessan> so work on getting the options added so they'll be there for the next release
<jamessan> heh, you're expecting to make lots of money from making a fork of chromium? that's quite amusing <mgreenblatt> Iron.. why not propose a patch based on preprocessor defines that disables the sections you dislike without forking the code?
<Iron> i dont take money for my fork <mgreenblatt> (assuming such a thing doesn't already exist)
<Iron> but i have adsense on my page ;) <Iron> because a fork will bring a lot of publicity to my person and my homepage
<Iron> a lot of visitor -> a lot of clicka > a lot of money ;) <Iron> that means: a lot of money too ;)
<Kmos> and do you think google should support your fork <Kmos> rotflol
<Kmos> lol <Iron> what means rotful?
<mgreenblatt> Iron.. it's always good to have dreams ;-) <mgreenblatt> Iron.. you're a large corporation that can dedicate the time to support a fork of something as complicated as chromium?
<Iron> we are here in germany <Kmos> Iron: google about it
<Iron> the press will love my fork <Iron> yes there is enough time to support it
<Iron> i talked to much journalists already <jamessan> heh, you're expecting to make lots of money from making a fork of chromium? that's quite amusing
<DrPizza> Why are you forking? <Iron> i dont take money for my fork
<DrPizza> to do what? <Iron> but i have adsense on my page ;)
<Iron> to remove all things in source talking to google ;) <Iron> a lot of visitor -> a lot of clicka > a lot of money ;)
<jamessan> to get fame and fortune <Kmos> and do you think google should support your fork
<Iron> nobody here trusts google <Kmos> lol
<Iron> the german people say: google is very evil <mgreenblatt> Iron.. it's always good to have dreams ;-)
<jamessan> yet you use google's adsense <Iron> we are here in germany
</xmp> <Iron> the press will love my fork
<p> <Iron> i talked to much journalists already
So, this could explain a lot... the motivation for this web browser to exist was to monetize <DrPizza> Why are you forking?
privacy concerns by generating traffic to his website, where he could make money by serving spyware <DrPizza> to do what?
to the very users that wanted to escape from it. Then his fork gets loaded up with all sorts of <Iron> to remove all things in source talking to google ;)
spyware from all sorts of other companies... which he probably makes some amount of money from as well. <jamessan> to get fame and fortune
(why else would he take the time to integrate these things into his browser? we can only speculate.) <Iron> nobody here trusts google
At the end of the day it's pretty clear that this browser is a huge scam and you shouldn't use it. <Iron> the german people say: google is very evil
</p> <jamessan> yet you use google's adsense
<hr> </xmp>
<center> <p>
<h2>Sources</h2> So, this could explain a lot... the motivation for this web browser to exist was to monetize
<p> privacy concerns by generating traffic to his website, where he could make money by serving spyware
<a name="1">1.</a> to the very users that wanted to escape from it. Then his fork gets loaded up with all sorts of
<a href="http://www.srware.net/en/software_srware_iron.php">SRWare Iron: The Browser of the future - Overview</a> spyware from all sorts of other companies... which he probably makes some amount of money from as well.
<a href="https://web.archive.org/web/20181118232123/http://www.srware.net/en/software_srware_iron.php">[web.archive.org]</a> (why else would he take the time to integrate these things into his browser? we can only speculate.)
<a href="https://archive.is/qMNlG">[archive.is]</a><br> At the end of the day it's pretty clear that this browser is a huge scam and you shouldn't use it.
<a name="2">2.</a> </p>
<a href="https://www.srware.net/en/software_srware_iron_faq.php">SRWare Iron: The Browser of the future - Frequently asked questions</a> </div>
<a href="https://web.archive.org/web/20180502103925/http://www.srware.net:80/en/software_srware_iron_faq.php">[web.archive.org]</a> <hr>
<a href="https://archive.fo/TXJbh">[archive.is]</a><br> <div class="footer">
<a name="3">3.</a> <div class="sources">
<a href="http://neugierig.org/software/chromium/notes/2009/12/iron.html">The story of Iron</a> <h4>Sources:</h4>
<a href="http://web.archive.org/web/20180427094010/http://neugierig.org/software/chromium/notes/2009/12/iron.html">[web.archive.org]</a><br> <ol>
</p> <li id="s1">
<hr> <a href="http://www.srware.net/en/software_srware_iron.php">SRWare Iron: The Browser of the future - Overview</a>
<p><b> <a href="https://web.archive.org/web/20181118232123/http://www.srware.net/en/software_srware_iron.php">[web.archive.org]</a>
This article was last edited on 11/20/2018 <a href="https://archive.is/qMNlG">[archive.is]</a><br>
</b></p> </li>
<p> <li id="s2">
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.All contributions must be licensed under the CC0 liscence to be accepted. <a href="https://www.srware.net/en/software_srware_iron_faq.php">SRWare Iron: The Browser of the future - Frequently asked questions</a>
</p> <a href="https://web.archive.org/web/20180502103925/http://www.srware.net:80/en/software_srware_iron_faq.php">[web.archive.org]</a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a> <a href="https://archive.fo/TXJbh">[archive.is]</a><br>
<p><a href="../articles/index.html">Back to catalog</a></p> </li>
<center> <li id="s3">
</body> <a href="http://neugierig.org/software/chromium/notes/2009/12/iron.html">The story of Iron</a>
<a href="http://web.archive.org/web/20180427094010/http://neugierig.org/software/chromium/notes/2009/12/iron.html">[web.archive.org]</a><br>
</li>
</ol>
</div>
<hr>
<b>This article was last edited on 11/20/2018</b>
<!--Dont change-->
<p>If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
<!--Dont change-->
</div>
</div>
</body>
</html> </html>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang="en-us"> <html lang="en-us">
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang="en-us"> <html lang="en-us">
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,95 +1,107 @@
<!DOCTYPE HTML> <!--Old Style-->
<html lang=”en-us”> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<head> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<link rel="stylesheet" href="../style.css">
<meta charset="UTF-8"> <head>
<title>Slimjet - Spyware Watchdog</title> <meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
</head> <title>Slimjet - Spyware Watchdog</title>
<body> <link rel="stylesheet" href="../style.css"/>
<img src="../images/slimjet_logo.png" alt="slimjet Logo"> </head>
<h1>Slimjet</h1>
<p> <body>
Slimjet is a clone of the SlimBrowser web browser from FlashPeak that uses the Chromium as a base. <div class="case">
</p> <div class="nav"><a href="index.html">&larr; Catalog</a></div>
<h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2> <div class="main">
<p> <img src="../images/slimjet_logo.png" alt="Slimjet Logo"/>
Slimjet's website claims that it is very committed to user privacy, and that it blocks Google tracking, unlike Google Chrome<sup><a href="#1">[1]</a></sup>. However this claim is <b><font color=red>not true</font></b>. Slimjet is constantly sending information to google and connecting to google <h1>Slimjet</h1>
services. Slimjet claims to be concerned about privacy but ultimately retains just about all of the spyware features found in Google Chrome, as well as additional spyware added on by FlashPoint. In this way, Slimjet manages to implement all of the spyware that is found in browsers like Google Chrome, except instead of one company having this information, it's split up among several companies... <p>
</p> Slimjet is a clone of the SlimBrowser web browser from FlashPeak that uses the Chromium as a base.
<h3>Phoning Home</h3> </p>
<p> <h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
Even though on its site, FlashPeak claims that: <i>"Slimjet doesn't send any usage data back to Google like Chrome."</i><sup><a href="#1">[1]</a></sup> <p>
the moment I turn it on with MITMproxy running, I am greeted with this: Slimjet's website claims that it is very committed to user privacy, and that it blocks Google tracking, unlike Google Chrome<sup><a href="#s1">[1]</a></sup>. However this claim is <b><font color=red>not true</font></b>. Slimjet is constantly sending information to google and connecting to google
</p> services. Slimjet claims to be concerned about privacy but ultimately retains just about all of the spyware features found in Google Chrome, as well as additional spyware added on by FlashPoint. In this way, Slimjet manages to implement all of the spyware that is found in browsers like Google Chrome, except instead of one company having this information, it's split up among several companies...
<img class="screenshot" src="../images/sj_google_requests.png" alt="Slimjet sending requests to all sorts of google services"> </p>
<p> <h3>Phoning Home</h3>
So, this claim just isn't true at all. It's still got a lot of Google's spyware in it, if it's still connecting to so many Google services. What's kind of surprising is that it didn't seem connect to any servers explicitly operated by FlashPeak when I was testing it. Even though, it claims to collect information about it's users for internal usage.<sup><a href="#2">[2]</a></sup> So, it must be phoning home as well as sending information to Google. Maybe it sends information through some kind of Google web service? <p>
</p> Even though on its site, FlashPeak claims that: <i>"Slimjet doesn't send any usage data back to Google like Chrome."</i><sup><a href="#s1">[1]</a></sup>
<h3>Default Search Engine is Spyware</h3> the moment I turn it on with MITMproxy running, I am greeted with this:
<p> </p>
The default search engine is <a href="../articles/bing.html">Bing</a>, which sells your information to advertisers. If that isn't enough, it's <img class="screenshot" src="../images/sj_google_requests.png" alt="Slimjet sending requests to all sorts of google services">
<i>"served from fpseek.com"</i> which means that not only are you exposing your information to Bing, this is also being logged by fpseek, which <p>
has it's own privacy policy<sup><a href="#3">[3]</a></sup>. Whenever you search something using the default search engine, requests are sent to both Bing and fpseek. So, this claim just isn't true at all. It's still got a lot of Google's spyware in it, if it's still connecting to so many Google services. What's kind of surprising is that it didn't seem connect to any servers explicitly operated by FlashPeak when I was testing it. Even though, it claims to collect information about it's users for internal usage.<sup><a href="#s2">[2]</a></sup> So, it must be phoning home as well as sending information to Google. Maybe it sends information through some kind of Google web service?
</p> </p>
<img class="screenshot" src="../images/fpseek.png" alt="Fpseek connection"> <h3>Default Search Engine is Spyware</h3>
<p> <p>
So, not only are you sharing everything with Microsoft, now there is another company looking at all of your searches. This is a uniquely bad The default search engine is <a href="../articles/bing.html">Bing</a>, which sells your information to advertisers. If that isn't enough, it's
default search engine because of how much information it leaks out. Fpseek itself is a company that seems to be tracking how users interact <i>"served from fpseek.com"</i> which means that not only are you exposing your information to Bing, this is also being logged by fpseek, which
with advertisments and it says that it uses information it collects about it's users to: has it's own privacy policy<sup><a href="#s3">[3]</a></sup>. Whenever you search something using the default search engine, requests are sent to both Bing and fpseek.
</p> </p>
<p><i> <img class="screenshot" src="../images/fpseek.png" alt="Fpseek connection">
"...maintain and improve the quality and operation of the Software & Services, including, monitoring viewability of and interaction with advertisements, search results and other products and services provided by Company." <p>
</i><sup><a href="#3">[3]</a></sup></p> So, not only are you sharing everything with Microsoft, now there is another company looking at all of your searches. This is a uniquely bad
<p> default search engine because of how much information it leaks out. Fpseek itself is a company that seems to be tracking how users interact
So, it looks like your searches are sent to two advertising companies instead of just one. At the very least when the search engine is changed to with advertisments and it says that it uses information it collects about it's users to:
an alternative like DuckDuckGo the requests to fpseek stop. </p>
</p> <p><i>
<h3>Collecting Information about Users</h3> "...maintain and improve the quality and operation of the Software & Services, including, monitoring viewability of and interaction with advertisements, search results and other products and services provided by Company."
<p> </i><sup><a href="#s3">[3]</a></sup></p>
Slimjet claims to collects <i>"some anonymous feature usage statistics information"</i>, and claims not to record your IP or sell that information <p>
to advertisters. However it is still opt-out spyware. So, it looks like your searches are sent to two advertising companies instead of just one. At the very least when the search engine is changed to
</p> an alternative like DuckDuckGo the requests to fpseek stop.
<h3>Using the Microsoft BITS service to upload search history to Google servers</h3> </p>
<p> <h3>Collecting Information about Users</h3>
When you start Slimjet, it will begin using the BITS (Background Intelligent Transfer Service) which is designed to use spare bandwidth to transfer <p>
updates and other information. These requests are sent between Slimjet and a Google server, with confirmation from Process Monitor and MITMproxy: Slimjet claims to collects <i>"some anonymous feature usage statistics information"</i>, and claims not to record your IP or sell that information
</p> to advertisters. However it is still opt-out spyware.
<img class="screenshot" src="../images/sj_google_BITS.png" alt="Bits1"> </p>
<img class="screenshot" src="../images/sj_google_BITS_2.png" alt="Bits2"> <h3>Using the Microsoft BITS service to upload search history to Google servers</h3>
<img class="screenshot" src="../images/sj_google_BITS_3.png" alt="Bits3"> <p>
<p> When you start Slimjet, it will begin using the BITS (Background Intelligent Transfer Service) which is designed to use spare bandwidth to transfer
Personal information was censored from these images. It's unclear what this is for specifically but this is probably being done to implement the updates and other information. These requests are sent between Slimjet and a Google server, with confirmation from Process Monitor and MITMproxy:
"CLOUD SYNC OF BOOKMARK & DATA" that is advertised on Slimjet's website. This is probably how they upload all of your search history and bookmarks into their cloud services, which seem to be provided by Google. There are no other features or requests made that would require large amounts of data to be sent too an external server in this way, so by process of elimination this is my theory as to how it's implemented. </p>
</p> <img class="screenshot" src="../images/sj_google_BITS.png" alt="Bits1">
<img class="screenshot" src="../images/sj_cloud.png" alt="cloud sync feature"> <img class="screenshot" src="../images/sj_google_BITS_2.png" alt="Bits2">
<p> <img class="screenshot" src="../images/sj_google_BITS_3.png" alt="Bits3">
Obviously you can tell that any kind of service to sync your search history "in the cloud" is a privacy nightmare. Now both Google and Slimjet have access to your search history... <p>
</p> Personal information was censored from these images. It's unclear what this is for specifically but this is probably being done to implement the
<hr> "CLOUD SYNC OF BOOKMARK & DATA" that is advertised on Slimjet's website. This is probably how they upload all of your search history and bookmarks into their cloud services, which seem to be provided by Google. There are no other features or requests made that would require large amounts of data to be sent too an external server in this way, so by process of elimination this is my theory as to how it's implemented.
<center> </p>
<h2>Sources</h2> <img class="screenshot" src="../images/sj_cloud.png" alt="cloud sync feature">
<p> <p>
<a name="1">1.</a> Obviously you can tell that any kind of service to sync your search history "in the cloud" is a privacy nightmare. Now both Google and Slimjet have access to your search history...
<a href="https://www.slimjet.com/">Fastest web browser that automatically blocks ads</a> </p>
<a href="http://web.archive.org/web/20180624103729/https://www.slimjet.com/">[web.archive.org]</a> </div>
<a href="http://archive.is/67qZa">[archive.is]</a><br> <hr>
<a name="2">2.</a> <div class="footer">
<a href="https://www.slimjet.com/en/privacy-policy.htm">Privacy Policy</a> <div class="sources">
<a href="http://web.archive.org/web/20180624104143/https://www.slimjet.com/en/privacy-policy.htm">[web.archive.org]</a><br> <h4>Sources:</h4>
<a name="3">3.</a> <ol>
<a href="http://info.fpseek.com/privacy-policy/">Privacy Policy Fpseek</a> <li id="s1">
<a href="http://web.archive.org/web/20170619202653/http://info.fpseek.com/privacy-policy/">[web.archive.org]</a> <a href="https://www.slimjet.com/">Fastest web browser that automatically blocks ads</a>
<a href="http://archive.is/fHly1">[archive.is]</a><br> <a href="http://web.archive.org/web/20180624103729/https://www.slimjet.com/">[web.archive.org]</a>
</p> <a href="http://archive.is/67qZa">[archive.is]</a>
<hr> </li>
<p><b> <li id="s2">
This article was last edited on 8/4/2018 <a href="https://www.slimjet.com/en/privacy-policy.htm">Privacy Policy</a>
</b></p> <a href="http://web.archive.org/web/20180624104143/https://www.slimjet.com/en/privacy-policy.htm">[web.archive.org]</a><br>
<p> </li>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted. <li id="s3">
</p> <a href="http://info.fpseek.com/privacy-policy/">Privacy Policy Fpseek</a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a> <a href="http://web.archive.org/web/20170619202653/http://info.fpseek.com/privacy-policy/">[web.archive.org]</a>
<p><a href="../articles/index.html">Back to catalog</a></p> <a href="http://archive.is/fHly1">[archive.is]</a><br>
</center> </li>
</body> </ol>
</div>
<hr>
<b>This article was last edited on 8/4/2018</b>
<!--Dont change-->
<p>If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
<!--Dont change-->
</div>
</div>
</body>
</html> </html>

View File

@ -1,4 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
@ -7,7 +8,7 @@
</head> </head>
<body> <body>
<meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="viewport" content="width=device-width, initial-scale=1">
<img src="../images/tor_logo.png" alt="TOR browser logo"> <img src="../images/tor_browser_logo.png" alt="TOR browser logo">
<h1>Tor Browser</h1> <h1>Tor Browser</h1>
<p> <p>
Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.<sup><a href="#1">[1]</a></sup> Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.<sup><a href="#1">[1]</a></sup>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
@ -8,7 +9,7 @@
<body> <body>
<meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="viewport" content="width=device-width, initial-scale=1">
<img src="../images/ugc_logo.png" alt="Ungoogled-Chromium logo"> <img src="../images/chromium_logo.png" alt="Ungoogled-Chromium logo">
<h1>Ungoogled-Chromium</h1> <h1>Ungoogled-Chromium</h1>
<p> <p>
Ungoogled-chromium is Google Chromium, sans integration with <a href="../articles/google.html">Google</a>. It also features some tweaks to enhance privacy, Ungoogled-chromium is Google Chromium, sans integration with <a href="../articles/google.html">Google</a>. It also features some tweaks to enhance privacy,

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>
@ -6,7 +7,7 @@
<title>Waterfox - Spyware Watchdog</title> <title>Waterfox - Spyware Watchdog</title>
</head> </head>
<body> <body>
<img src="../images/waterfox logo.png" alt="Waterfox Logo"> <img src="../images/waterfox_logo.png" alt="Waterfox Logo">
<h1>Waterfox</h1> <h1>Waterfox</h1>
<p> <p>
Waterfox is a web browser that is a fork of <a href="../articles/firefox.html">Firefox</a>. Waterfox is a web browser that is a fork of <a href="../articles/firefox.html">Firefox</a>.
@ -22,7 +23,7 @@ information about you with Mozilla, and has other spyware features.
If you start up Waterfox for the first time, it will make <b><font color="red">109 requests</font></b><sup><a href="#5">[5]</a></sup> to several spyware platforms, most notably If you start up Waterfox for the first time, it will make <b><font color="red">109 requests</font></b><sup><a href="#5">[5]</a></sup> to several spyware platforms, most notably
Google Analytics, and Mozilla online services like its Geolocation service, and several other Mozilla services, as Google Analytics, and Mozilla online services like its Geolocation service, and several other Mozilla services, as
well as Waterfox's own update service. You can look at a list of these requests well as Waterfox's own update service. You can look at a list of these requests
<a href="https://digdeeper.neocities.o../images/wfox.png">here</a> or a on mirror <a href="../images/wfox.png">here</a>. <a href="../images/wfox.png">here</a> or a on mirror <a href="https://digdeeper.neocities.org/images/wfox.png">here</a>.
</p> </p>
<h3>Waterfox has a communication problem</h3> <h3>Waterfox has a communication problem</h3>
<p> <p>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head> <head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML> <!DOCTYPE HTML>
<html lang=”en-us”> <html lang=”en-us”>
<head> <head>

View File

@ -6,7 +6,7 @@
<title>Iridium Browser Spyware Mitigation Guide - Spyware Watchdog</title> <title>Iridium Browser Spyware Mitigation Guide - Spyware Watchdog</title>
</head> </head>
<body> <body>
<img src="../images/iridium_logo.jpg"> <img src="../images/iridium_logo.png">
<h1>Iridium Browser Spyware Mitigation Guide</h1> <h1>Iridium Browser Spyware Mitigation Guide</h1>
<p> <p>
After configuring Iridium according to this guide it's rating changes like so: After configuring Iridium according to this guide it's rating changes like so:

Binary file not shown.

Before

Width:  |  Height:  |  Size: 14 KiB

After

Width:  |  Height:  |  Size: 17 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 5.8 KiB

After

Width:  |  Height:  |  Size: 3.8 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 4.9 KiB

After

Width:  |  Height:  |  Size: 3.5 KiB

View File

Before

Width:  |  Height:  |  Size: 11 KiB

After

Width:  |  Height:  |  Size: 11 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 5.7 KiB

After

Width:  |  Height:  |  Size: 3.1 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 21 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 24 KiB

After

Width:  |  Height:  |  Size: 31 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 22 KiB

After

Width:  |  Height:  |  Size: 17 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 11 KiB

BIN
images/iridium_logo.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 12 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 18 KiB

After

Width:  |  Height:  |  Size: 257 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 5.5 KiB

After

Width:  |  Height:  |  Size: 13 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 16 KiB

After

Width:  |  Height:  |  Size: 18 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 22 KiB

After

Width:  |  Height:  |  Size: 9.4 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 24 KiB

After

Width:  |  Height:  |  Size: 26 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 8.4 KiB

After

Width:  |  Height:  |  Size: 11 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 14 KiB

After

Width:  |  Height:  |  Size: 14 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 22 KiB

After

Width:  |  Height:  |  Size: 21 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 6.9 KiB

After

Width:  |  Height:  |  Size: 10 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 20 KiB

After

Width:  |  Height:  |  Size: 30 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 14 KiB

After

Width:  |  Height:  |  Size: 8.1 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 5.5 KiB

After

Width:  |  Height:  |  Size: 7.2 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 29 KiB

After

Width:  |  Height:  |  Size: 48 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 4.1 KiB

After

Width:  |  Height:  |  Size: 9.1 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 6.7 KiB

After

Width:  |  Height:  |  Size: 451 B

Binary file not shown.

Before

Width:  |  Height:  |  Size: 6.5 KiB

After

Width:  |  Height:  |  Size: 9.9 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 30 KiB

After

Width:  |  Height:  |  Size: 19 KiB

BIN
images/tor_browser_logo.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 13 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 24 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 5.9 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 13 KiB

After

Width:  |  Height:  |  Size: 20 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 9.1 KiB

After

Width:  |  Height:  |  Size: 5.0 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 18 KiB

BIN
images/waterfox_logo.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 10 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 9.0 KiB

After

Width:  |  Height:  |  Size: 6.4 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 14 KiB

After

Width:  |  Height:  |  Size: 4.5 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 8.3 KiB

After

Width:  |  Height:  |  Size: 3.9 KiB

View File

@ -6,10 +6,14 @@ body {
font-family: sans; font-family: sans;
} }
p { p {
max-width: 780px; max-width: 780px;
margin: auto; margin: auto;
} }
h1, h2, h3, h4, h5 { h1,
h2,
h3,
h4,
h5 {
text-align: center; text-align: center;
margin-right: auto; margin-right: auto;
margin-left: auto; margin-left: auto;
@ -22,15 +26,15 @@ h4 {
margin-right: auto; margin-right: auto;
margin-left: 1vw; margin-left: 1vw;
} }
a {
color: #006B9F;
}
a:hover {
color: #094561;
}
:target a { :target a {
color: #959800; color: #959800;
} }
a {
color: #006b9f;
}
a:hover {
color: #094561;
}
.img-link a:hover { .img-link a:hover {
border: none; border: none;
} }
@ -49,19 +53,21 @@ img {
width: 780px; width: 780px;
} }
hr { hr {
border: 1px solid #1A1A1A; border: 1px solid #1a1a1a;
} }
ul { ul {
max-width: 780px; max-width: 780px;
margin-left: auto; margin-left: auto;
margin-right: auto; margin-right: auto;
} }
table, th, td { table,
th,
td {
text-align: center; text-align: center;
border: 1px solid white; border: 1px solid white;
margin-left: auto; margin-left: auto;
margin-right: auto; margin-right: auto;
max-width: 780px; max-width: 780px;
} }
td { td {
padding-right: 10px; padding-right: 10px;
@ -79,7 +85,7 @@ code {
padding-right: 5px; padding-right: 5px;
} }
ol { ol {
max-width: 780px; max-width: 780px;
margin-left: auto; margin-left: auto;
margin-right: auto; margin-right: auto;
} }
@ -98,7 +104,7 @@ xmp {
margin-right: auto; margin-right: auto;
margin-top: 10px; margin-top: 10px;
margin-bottom: 10px; margin-bottom: 10px;
max-width: 500px; max-width: 500px;
} }
.nav { .nav {
margin-top: 0.5vh; margin-top: 0.5vh;
@ -115,23 +121,26 @@ xmp {
.nav a { .nav a {
text-decoration: none; text-decoration: none;
} }
.lime {
color: #00ff00;
}
.green { .green {
color: #00981B; color: #00981b;
} }
.yellowgreen { .yellowgreen {
color: #C8E63C; color: #c8e63c;
} }
.yellow { .yellow {
color: #FFFF00; color: #ffff00;
} }
.orange { .orange {
color: #FF6100; color: #ff6100;
} }
.red { .red {
color: #FF0000; color: #ff0000;
} }
.case { .case {
border: 2px solid #1A1A1A; border: 2px solid #1a1a1a;
border-radius: 15px; border-radius: 15px;
margin-left: 3vw; margin-left: 3vw;
margin-right: 3vw; margin-right: 3vw;
@ -144,10 +153,12 @@ xmp {
.main { .main {
min-height: 60vh; min-height: 60vh;
} }
.sources, .futher { .sources,
.futher {
text-align: left; text-align: left;
} }
.footer, .center { .footer,
.center {
margin-top: 1vh; margin-top: 1vh;
text-align: center; text-align: center;
} }