Update articles to new design 1

This commit is contained in:
UmbreonFR4 2020-07-25 10:33:15 +01:00
parent 8e871ffb0c
commit 0c585e9335
100 changed files with 2140 additions and 1226 deletions

View File

@ -1,42 +1,60 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<link rel="stylesheet" href="../style.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<meta
http-equiv="Content-type"
content="application/xhtml+xml;charset=utf-8"
/>
<title>1Password - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head>
<body>
<div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<img src="../images/1pw_logo.png" alt="1Password Logo" />
<h1>1Password</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/1pw_logo.png" alt="1password Logo">
<p>
1password is a password management service
</p>
<h2>Spyware Level: <font color=red>Not Rated</font></h2>
<p>
This article is a stub and sitll needs to be written. If you want to write it, email me so I dont duplicate effort.
</p>
<h2>Spyware Level: <span class="red">Not Rated</span></h2>
<p>
This article is a stub and still needs to be written. If you want to
write it, email me so I dont duplicate effort.
https://1password.com/legal/privacy/
https://www.macworld.com/article/2996213/security/1password-is-still-secure-but-you-can-reduce-a-potential-risk.html
https://paul.reviews/privacy-password-managers-a-reality-check/
>Third-Party Data Processors >Your Secure and Service data are held by
third party data processors, who provide us with hosting and other
infrastructure services. The locations of these are described above.
In many cases (but we cannot promise that this will always be the
case) even Service data held by these entities is encrypted with keys
held only by us. >Data needed to process payments is collected by our
payment processor, Stripe, Inc., which conforms to a U.S.-E.U. Privacy
Shield Framework. See https://stripe.com/privacy-shield-policy
</p>
</div>
<hr />
<div class="footer">
<b>This article was created on 6/16/2018</b><br />
<b>This article was last edited on 6/16/2018</b>
<!--Dont change-->
<p>
If you want to edit this article, or contribute your own article(s),
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p>
<p>
>Third-Party Data Processors
>Your Secure and Service data are held by third party data processors, who provide us with hosting and other infrastructure services. The locations of these are described above. In many cases (but we cannot promise that this will always be the case) even Service data held by these entities is encrypted with keys held only by us.
>Data needed to process payments is collected by our payment processor, Stripe, Inc., which conforms to a U.S.-E.U. Privacy Shield Framework. See https://stripe.com/privacy-shield-policy
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<hr>
<p><b>
This article was created on 6/16/2018
</b></p>
<p><b>
This article was last edited on 6/16/2018
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode">
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
</a>
<!--Dont change-->
</div>
</div>
</body>
</html>

View File

@ -1,68 +1,144 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<link rel="stylesheet" href="../style.css">
<meta charset="UTF-8">
<title>Spyware Watchdog</title>
<meta
http-equiv="Content-type"
content="application/xhtml+xml;charset=utf-8"
/>
<title>AMD - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head>
<body>
<meta name="viewport" content="width=device-width, initial-scale=1">
<div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<h1>
<span class="red">UNFINISHED ARTICLE - UNDER CONSTRUCTION - BAD FORMATTING</span>
</h1>
<img src="../images/amd_logo.png" alt="amd Logo" />
<h1>AMD CPU Family</h1>
<p><a href="../articles/index.html">Back to catalog</a></p>
<img src="../images/amd_logo.png" alt="One of the logos AMD uses for its CPU's">
<h1>UNFINISHED ARTICLE - UNDER CONSTRUCTION - BAD FORMATTING</h1>
<p>
Advanced Micro Devices, Inc. is an American multinational semiconductor company based in Santa Clara, California, that develops computer processors and related technologies for business and consumer markets. This article is specifically about the CPU's that are produced by AMD and nothing else. The logo is one of many logos used by AMD, but the
article is not about any one specific CPU. <b>No rating is given</b> because this is not an article about any specific product, and the rating system is difficult to fit into this
This part of the article should have the name of the program and what
it does, and who develops it.
</p>
<p>
Advanced Micro Devices, Inc. is an American multinational
semiconductor company based in Santa Clara, California, that develops
computer processors and related technologies for business and consumer
markets. This article is specifically about the CPU's that are
produced by AMD and nothing else. The logo is one of many logos used
by AMD, but the article is not about any one specific CPU.
<b>No rating is given</b> because this is not an article about any
specific product, and the rating system is difficult to fit into this
article.
</p>
<p>
Modern CPU models produced by AMD contain an embedded ARM co-processor called the Platform Security Processor (PSP). Nearly all AMD CPU's produced since 2013 operate under the supervision of this separate, more privileged, environment consisting of an integrated ARM processor with access to isolated resources as well as main system memory and I/O.
<sup><a href="#1">[1]</a></sup>
Modern CPU models produced by AMD contain an embedded ARM co-processor
called the Platform Security Processor (PSP). Nearly all AMD CPU's
produced since 2013 operate under the supervision of this separate,
more privileged, environment consisting of an integrated ARM processor
with access to isolated resources as well as main system memory and
I/O.
<sup><a href="#s1">[1]</a></sup>
</p>
<p>
This article isn't complete. This is a work-in-progress and so this article is not formatted properly..
This article isn't complete. This is a work-in-progress and so this
article is not formatted properly..
</p>
<p>
http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf
(page 11)
</p>
<p>
While ARM and AMD tout the “Trusted Execution Environment” as useful
for secure payment, anti-theft and malware protection, they also
discuss content protection or DRM as a use case.
https://www.owasp.o../images/c/c8/OWASP_Security_Tapas_-_TrustZone%2C_TEE_and_Mobile_Security_final.pdf
</p>
<p>http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf (page 11)</p>
<p>While ARM and AMD tout the “Trusted Execution Environment” as useful for secure payment, anti-theft and malware protection, they also discuss content protection or DRM as a use case. https://www.owasp.o../images/c/c8/OWASP_Security_Tapas_-_TrustZone%2C_TEE_and_Mobile_Security_final.pdf</p>
<p>Possible uses … DRM</p>
<p>
Researchers have already been able to identify exploits in AMDs Platform Security Processor. In 2018 researchers published a vulnerability in which a specially crafted certificate could lead to a stack overflow in the PSPs TPM firmware allowing for remote code execution. (https://seclists.org/fulldisclosure/2018/Jan/12) Another group goes on to detail how an attacker might leverage exploits RYZENFALL or FALLOUT to gain foothold in networks with Ryzen based systems. (https://www.techpowerup.com/242386/cts-labs-responds-to-a-techpowerup-technical-questionnaire)
Researchers have already been able to identify exploits in AMDs
Platform Security Processor. In 2018 researchers published a
vulnerability in which a specially crafted certificate could lead to a
stack overflow in the PSPs TPM firmware allowing for remote code
execution. (https://seclists.org/fulldisclosure/2018/Jan/12) Another
group goes on to detail how an attacker might leverage exploits
RYZENFALL or FALLOUT to gain foothold in networks with Ryzen based
systems.
(https://www.techpowerup.com/242386/cts-labs-responds-to-a-techpowerup-technical-questionnaire)
</p>
<hr>
<p>Please note that Family 16h and
Family 15h-Models60h and later contain a PSP</p>
<h2><font color=red>NOT TRUSTED:</font></h2>
<hr/>
<p>
Please note that Family 16h and Family 15h-Models60h and later contain
a PSP
</p>
<h2><font color="red">NOT TRUSTED:</font></h2>
<ul>
<li>Kaveri (Steamroller “BDv3”) https://www.amd.com/system/files/TechDocs/51590_15h_Models_30h-3Fh_A-Series_PDS.pdf (page 6)
https://arstechnica.com/information-technology/2012/06/amd-to-add-arm-processors-to-boost-chip-security/</li>
<li>Carrizo/Bristol Ridge (Excavator “BDv4”) https://www.anandtech.com/show/8995/amd-at-isscc-2015-carrizo-and-excavator-details</li>
<li>
Kaveri (Steamroller “BDv3”)
https://www.amd.com/system/files/TechDocs/51590_15h_Models_30h-3Fh_A-Series_PDS.pdf
(page 6)
https://arstechnica.com/information-technology/2012/06/amd-to-add-arm-processors-to-boost-chip-security/
</li>
<li>
Carrizo/Bristol Ridge (Excavator “BDv4”)
https://www.anandtech.com/show/8995/amd-at-isscc-2015-carrizo-and-excavator-details
</li>
<li>All Zen based CPUs (17h family)</li>
</ul>
<h2><font color=yellow>POTENTIALLY TRUSTED:</font></h2>
<h2><font color="yellow">POTENTIALLY TRUSTED:</font></h2>
<ul>
<li>Jaguar (the only 16h family CPU that does NOT have PSP): http://support.amd.com/TechDocs/52128_16h_Software_Opt_Guide.zip (page 8) https://en.wikipedia.org/wiki/Puma_(microarchitecture)#Improvements_over_Jaguar</li>
<li>All K5-K10, Bobcat, Bulldozer (“BDv1”) and Piledriver (“BDv2”)</li>
<li>All K5-K10, Bobcat, Bulldozer (“BDv1”) and Piledriver (“BDv2”)</li>
<li>
Jaguar (the only 16h family CPU that does NOT have PSP):
http://support.amd.com/TechDocs/52128_16h_Software_Opt_Guide.zip
(page 8)
https://en.wikipedia.org/wiki/Puma_(microarchitecture)#Improvements_over_Jaguar
</li>
<li>
All K5-K10, Bobcat, Bulldozer (“BDv1”) and Piledriver (“BDv2”)
</li>
<li>
All K5-K10, Bobcat, Bulldozer (“BDv1”) and Piledriver (“BDv2”)
</li>
</ul>
<hr>
<h2>Sources</h2>
</div>
<hr />
<div class="footer">
<div class="sources">
<h4>Sources:</h4>
<ol>
<li id="s1">
<a
href="http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf"
>AMD Security and Server innovation</a
>
<a
href="http://web.archive.org/web/20180422100442/http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf"
>[web.archive.org]</a
>
<a href="http://archive.vn/7dYOZ">[archive.vn]</a><br />
</li>
</ol>
</div>
<hr />
<b>This article was last edited on 1/10/2019</b>
<!--Dont change-->
<p>
<a name="1">1.</a>
<a href="http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf">AMD Security and Server innovation</a>
<a href="http://web.archive.org/web/20180422100442/http://www.uefi.org/sites/default/files/resources/UEFI_PlugFest_AMD_Security_and_Server_innovation_AMD_March_2013.pdf">[web.archive.org]</a>
<a href="http://archive.vn/7dYOZ">[archive.vn]</a><br>
If you want to edit this article, or contribute your own article(s),
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p>
<hr>
<p><b>
This article was last edited on 1/10/2019
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img src="../images/cc0.png" alt="CC0 Liscence"></a>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"
><img class="icon" src="../images/cc0.png" alt="CC0 License"
/></a>
<!--Dont change-->
</div>
</div>
</body>
</html>

View File

@ -1,91 +1,171 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<link rel="stylesheet" href="../style.css">
<meta charset="UTF-8">
<meta
http-equiv="Content-type"
content="application/xhtml+xml;charset=utf-8"
/>
<title>Bing - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head>
<body>
<img src="../images/bing_logo.png" alt="Bing logo">
<div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<img src="../images/bing_logo.png" alt="Bing Logo" />
<h1>Bing</h1>
<p>
Bing is a search engine created and owned by Microsoft.
This part of the article should have the name of the program and what
it does, and who develops it.
</p>
<h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2>
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
<p>
Bing is yet another spyware search engine that collects your information and sells it to advertisers. It's strongly recommended that you
do not use Bing.
Bing is yet another spyware search engine that collects your
information and sells it to advertisers. It's strongly recommended
that you do not use Bing.
</p>
<p>
At some point Bing had a privacy policy, but Microsoft doesnt seem to be hosting it anymore. So, this article will look at the
Microsoft Privacy Statement<sup><a href="#1">[1]</a></sup> to help us understand what information Bing collects.
Similarly to the privacy policies of Google and Apple, the Microsoft privacy statement eclipses the entire spyware platform and does not help you understand
in great detail what kind of information one single program could be collecting. (although this policy is more specific)
At some point Bing had a privacy policy, but Microsoft doesnt seem to
be hosting it anymore. So, this article will look at the Microsoft
Privacy Statement<sup><a href="#s1">[1]</a></sup> to help us
understand what information Bing collects. Similarly to the privacy
policies of Google and Apple, the Microsoft privacy statement eclipses
the entire spyware platform and does not help you understand in great
detail what kind of information one single program could be
collecting. (although this policy is more specific)
</p>
<h3>Bing collects your search history</h3>
<p>From the Microsoft Privacy Statement<sup><a href="#1">[1]</a></sup>:</p>
<p>
From the Microsoft Privacy Statement<sup><a href="#s1">[1]</a></sup
>:
</p>
<p><i>
"Microsoft collects data from you, through our interactions with you and through our products for a variety of purposes described
below...You provide some of this data directly, such as when you...submit a search query to Bing"
</i></p>
<p>
<i>
"Microsoft collects data from you, through our interactions with you
and through our products for a variety of purposes described
below...You provide some of this data directly, such as when
you...submit a search query to Bing"
</i>
</p>
<p>Later in the Interactions -> Device and usage data section of this statement, it is clarified again that Microsoft collects your:
<i>"Browse History. Data about the web pages you visit."</i>, as well as your: <i>"Images. Images and related information, such as
picture metadata. For example, we collect the image you provide when you use a Bing image-enabled service."</i></p>
<p>
Later in the Interactions -> Device and usage data section of this
statement, it is clarified again that Microsoft collects your:
<i>"Browse History. Data about the web pages you visit."</i>, as well
as your:
<i
>"Images. Images and related information, such as picture metadata.
For example, we collect the image you provide when you use a Bing
image-enabled service."</i
>
</p>
<p>Microsoft claims to store this information for an unlimited amount of time, but it claims that it will eventually anonymize this information
in a process that takes 18 months to complete.<p>
<p>
Microsoft claims to store this information for an unlimited amount of
time, but it claims that it will eventually anonymize this information
in a process that takes 18 months to complete.
</p>
<p></p>
<p><i>
"Has Microsoft adopted and announced a specific retention period for a certain data type? For example, for Bing search queries, we de-identify
stored queries by removing the entirety of the IP address after 6 months, and cookie IDs and other cross-session identifiers after 18 months. "
</i></p>
<p>
<i>
"Has Microsoft adopted and announced a specific retention period for
a certain data type? For example, for Bing search queries, we
de-identify stored queries by removing the entirety of the IP
address after 6 months, and cookie IDs and other cross-session
identifiers after 18 months. "
</i>
</p>
<h3>Bing uses your search history to profile you for advertising</h3>
<p>From the Microsoft Privacy Statement<sup><a href="#1">[1]</a></sup>:</p>
<p><i>
"Microsoft may use data we collect to select and deliver some of the ads you see on Microsoft web properties, such as Microsoft.com, MSN and Bing."
</i></p>
<p>
So since your search history is part of the "data we collect", the natrual conclusion is that, your search queiries are being used to profile you for
advertising. And of course, this is confirmed in this section:
From the Microsoft Privacy Statement<sup><a href="#s1">[1]</a></sup
>:
</p>
<p>
<i>
"Microsoft may use data we collect to select and deliver some of the
ads you see on Microsoft web properties, such as Microsoft.com, MSN
and Bing."
</i>
</p>
<p>
So since your search history is part of the "data we collect", the
natrual conclusion is that, your search queiries are being used to
profile you for advertising. And of course, this is confirmed in this
section:
</p>
<p><i>
"The ads that you see may be selected based on data we process about you, such as your interests and favorites, your location, your transactions, how
you use our products,<b><font color=red> your search queries </font></b>, or the content you view. For example, if you view content on MSN about automobiles, we may show advertisements
about cars; if you search “pizza places in Seattle” on Bing, you may see advertisements in your search results for restaurants in Seattle."
</i></p>
<p>
<i>
"The ads that you see may be selected based on data we process about
you, such as your interests and favorites, your location, your
transactions, how you use our products,
<b>
<font color="red"> your search queries </font>
</b>
, or the content you view. For example, if you view content on MSN
about automobiles, we may show advertisements about cars; if you
search “pizza places in Seattle” on Bing, you may see advertisements
in your search results for restaurants in Seattle."
</i>
</p>
<h3>Bing sells your search history to other spyware platforms</h3>
<p>From the Microsoft Privacy Statement<sup><a href="#1">[1]</a></sup>:</p>
<p><i>
"We may share data we collect with third parties, such as Oath, AppNexus, or Facebook (see below), so that the ads you see in our products,
their products, or other sites and apps serviced by these partners are more relevant and valuable to you. "
</i></p>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
<a href="https://privacy.microsoft.com/en-us/privacystatement">Microsoft Privacy Statement</a>
<a href="http://web.archive.org/web/20180528165116/https://privacy.microsoft.com/en-us/privacystatement">[web.archive.org]</a>
<a href="https://archive.li/u7eZJ">[archive.li]</a><br>
From the Microsoft Privacy Statement<sup><a href="#s1">[1]</a></sup
>:
</p>
<hr>
<p><b>
This article was last edited on 5/30/2018
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
<i>
"We may share data we collect with third parties, such as Oath,
AppNexus, or Facebook (see below), so that the ads you see in our
products, their products, or other sites and apps serviced by these
partners are more relevant and valuable to you. "
</i>
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
</div>
<hr />
<div class="footer">
<div class="sources">
<h4>Sources:</h4>
<ol>
<li id="s1">
<a href="https://privacy.microsoft.com/en-us/privacystatement"
>Microsoft Privacy Statement</a
>
<a
href="http://web.archive.org/web/20180528165116/https://privacy.microsoft.com/en-us/privacystatement"
>[web.archive.org]</a
>
<a href="https://archive.li/u7eZJ">[archive.li]</a><br />
</li>
</ol>
</div>
<hr />
<b>This article was last edited on 5/30/2018</b>
<!--Dont change-->
<p>
If you want to edit this article, or contribute your own article(s),
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p>
<p>
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode">
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
</a>
<!--Dont change-->
</div>
</div>
</body>
</html>

View File

@ -1,125 +1,306 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<link rel="stylesheet" href="../style.css">
<meta charset="UTF-8">
<meta
http-equiv="Content-type"
content="application/xhtml+xml;charset=utf-8"
/>
<title>Outdated Brave - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head>
<body>
<img src="../images/brave_logo.png" alt="Brave logo">
<h1>Brave Browser</h1>
<h3><font color=red>Note: This article is outdated. I will try to update it soon. </font></h3>
<br>
<div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<img src="../images/brave_logo.png" alt="Brave Logo" />
<h1>Brave</h1>
<h2>
<font color="red"
>Note: This article is outdated. I will try to update it soon.
</font>
</h2>
<p>
Brave Browser is a Chromium fork with many interesting features not found elsewhere, such as built-in Adblock and other extensions, fingerprinting protection, cleaner Preferences menu than other Chrome forks, and the (opt-in) ability to automatically support (pay) the websites you visit. The developers describe it as <i>"A browser with your interests at heart."</i><sup><a href="#1">[1]</a></sup> With the built-in privacy protections, some would seem to agree with that. Let's see how it stacks up when we take everything into account.
Brave Browser is a Chromium fork with many interesting features not
found elsewhere, such as built-in Adblock and other extensions,
fingerprinting protection, cleaner Preferences menu than other Chrome
forks, and the (opt-in) ability to automatically support (pay) the
websites you visit. The developers describe it as
<i>"A browser with your interests at heart."</i
><sup><a href="#s1">[1]</a></sup> With the built-in privacy
protections, some would seem to agree with that. Let's see how it
stacks up when we take everything into account.
</p>
<h2>Spyware Level: <font color=orange>High</font></h2>
<h2>Spyware Level: <span class="orange">High</span></h2>
<p>
Auto-updates that can be turned off only by hacky workarounds. <a href="../articles/google.html">Google</a> as default search engine. Analytics on Brave's home page. Two other requests made at each start of Brave. Whitelisting spyware from Facebook and Twitter.<sup><a href="#5">[5]</a></sup> Has some decent privacy protections built in, but uMatrix is still better. Some privacy features are there by default, but, it's still trying to work with advertisers (same as Mozilla did with their Sponsored Tiles). Despite claiming to be <i>"A browser with your interests at heart."</i><sup><a href="#1">[1]</a></sup>, it has <a href="../articles/google.html">Google</a> as default search engine, as well as shitty forced updates. Anyway, despite the privacy protections, you should stay away from this browser - it seems to have a "mission" to switch the internet to its version of "user-respecting" ads, (we know how that turned out for Mozilla), and that's slimy and suspicious. Beyond that it has repeatedly shown itself to be dishonest and disingenuous about what it's mission and goals and operations are.
Auto-updates that can be turned off only by hacky workarounds.
<a href="../articles/google.html">Google</a> as default search engine.
Analytics on Brave's home page. Two other requests made at each start
of Brave. Whitelisting spyware from Facebook and Twitter.<sup
><a href="#s5">[5]</a></sup
>
Has some decent privacy protections built in, but uMatrix is still
better. Some privacy features are there by default, but, it's still
trying to work with advertisers (same as Mozilla did with their
Sponsored Tiles). Despite claiming to be
<i>"A browser with your interests at heart."</i
><sup><a href="#s1">[1]</a></sup
>, it has <a href="../articles/google.html">Google</a> as default
search engine, as well as shitty forced updates. Anyway, despite the
privacy protections, you should stay away from this browser - it seems
to have a "mission" to switch the internet to its version of
"user-respecting" ads, (we know how that turned out for Mozilla), and
that's slimy and suspicious. Beyond that it has repeatedly shown
itself to be dishonest and disingenuous about what it's mission and
goals and operations are.
</p>
<h3>Whitelisting spyware from Facebook and Twitter</h3>
<p>
On it's website, Brave claims that <i>"Brave fights malware and prevents tracking, keeping your information safe and secure. Its our top priority."</i><sup><a href="#6">[6]</a></sup>. Yet despite this claim, Brave actually <b><font color=red>disables</font></b> its tracking protections for Facebook and Twitter's spyware
scripts that allow them to track people across the web.<sup><a href="#5">[5]</a></sup> Brave's spyware protections, and any claims that it makes to work in the interests of
it's users, <b><font color=orange>cannot be taken seriously.</font></b> Brave is actively working <b><font color=red>against its users</font></b> while lying to them about
supposed privacy protections that it offers. This problem becomes even more serious when you take into account Brave's response to this situation:
On it's website, Brave claims that
<i
>"Brave fights malware and prevents tracking, keeping your
information safe and secure. Its our top priority."</i
><sup><a href="#s6">[6]</a></sup
>. Yet despite this claim, Brave actually
<b><font color="red">disables</font></b> its tracking protections for
Facebook and Twitter's spyware scripts that allow them to track people
across the web.<sup><a href="#s5">[5]</a></sup> Brave's spyware
protections, and any claims that it makes to work in the interests of
it's users,
<b><font color="orange">cannot be taken seriously.</font></b> Brave is
actively working
<b><font color="red">against its users</font></b> while lying to them
about supposed privacy protections that it offers. This problem
becomes even more serious when you take into account Brave's response
to this situation:
</p>
<p><i>
"Loading a script from an edge-cache does not track a user without third-party cookies or equivalent browser-local storage, which Brave always blocks and always will block. In other words, sending requests and receiving responses without cookies or other means of identifying users does not necessarily create a tracking threat."
</i><sup><a href="#7">[7]</a></sup></p>
<p>
This statement is just, <b><font color=red>completely wrong</font></b>. Just because a website isn't able to store cookies, does not mean that it cannot uniquely identify you. Executing JavaScript spyware from Facebook and Twitter is <b>more than enough.</b> Blocking cookies is not going to stop them from tracking you. This isn't even information that is difficult to verify. There are many websites that you can visit right now, to see just how much information a JavaScript program designed to track you can get.
<i>
"Loading a script from an edge-cache does not track a user without
third-party cookies or equivalent browser-local storage, which Brave
always blocks and always will block. In other words, sending
requests and receiving responses without cookies or other means of
identifying users does not necessarily create a tracking threat."
</i>
<sup>
<a href="#s7">[7]</a>
</sup>
</p>
<p>
This statement is just,
<b>
<font color="red">completely wrong</font>
</b>
. Just because a website isn't able to store cookies, does not mean
that it cannot uniquely identify you. Executing JavaScript spyware
from Facebook and Twitter is
<b>
more than enough.
</b>
Blocking cookies is not going to stop them from tracking you. This
isn't even information that is difficult to verify. There are many
websites that you can visit right now, to see just how much
information a JavaScript program designed to track you can get.
</p>
<center>
<p>
Here are a few:
<br>
<a href="https://browserleaks.com/">https://browserleaks.com/</a><br>
<a href="https://panopticlick.eff.org/">https://panopticlick.eff.org/</a><br>
</center>
<br />
<a href="https://browserleaks.com/">https://browserleaks.com/</a>
<br />
<a href="https://panopticlick.eff.org/"
>https://panopticlick.eff.org/</a
>
<br />
</p>
</center>
<h3>Auto-updates</h3>
<p>
Brave will check for updates every time you run it, and you CANNOT turn it off (except through fiddling with DNS and such) ! What is the devs' answer? From their GitHub page<sup><a href="#2">[2]</a></sup>: </p>
Brave will check for updates every time you run it, and you CANNOT
turn it off (except through fiddling with DNS and such) ! What is the
devs' answer? From their GitHub page
<sup><a href="#s2">[2]</a></sup
>:
</p>
<p><i>"We don't plan on adding in UI to disable updates, but users can easily adjust environment variables if they really want to put themselves at risk."</i></p>
<p>
<i>
"We don't plan on adding in UI to disable updates, but users can
easily adjust environment variables if they really want to put
themselves at risk."
</i>
</p>
<p>and</p>
<p><i>"i feel that being able to figure out how to do this is a sufficiently high bar for users who want to turn off autoupdating (to prove they know what they're doing and understand the security implications)"</i></p>
<p>
<i>
"i feel that being able to figure out how to do this is a
sufficiently high bar for users who want to turn off autoupdating
(to prove they know what they're doing and understand the security
implications)"
</i>
</p>
<P>So according to the devs, you have to hunt down random internet comments to be able to disable auto-updating. Brave will also update what looks like the list of its "partners" every time you run it. Extensions are also updated often. <img class="screenshot" src="../images/brave_partners.png">
<p>
So according to the devs, you have to hunt down random internet
comments to be able to disable auto-updating. Brave will also update
what looks like the list of its "partners" every time you run it.
Extensions are also updated often.
<img class="screenshot" src="../images/brave_partners.png" />
</p>
<h3>Anti-privacy search engine by default</h3>
<p>
<a href="../articles/google.html">Google</a> is the default search engine of Brave, and the issues with it are well known and would take a book to describe them all.
<a href="../articles/google.html">Google</a>
is the default search engine of Brave, and the issues with it are well
known and would take a book to describe them all.
</p>
<h3>Brave's start page contains analytics</h3>
<p>
Brave will connect to its home page, https://brave.com, automatically on the first run of Brave, and that page contains Piwik's analytics scripts. This is the full request: <img class="screenshot" src="../images/brave_piwik.png">It will also make a connection to Google to download some fonts. You can disable these on subsequent runs by changing the start page.
Brave will connect to its home page, https://brave.com, automatically
on the first run of Brave, and that page contains Piwik's analytics
scripts. This is the full request:
<img class="screenshot" src="../images/brave_piwik.png" />
It will also make a connection to Google to download some fonts. You
can disable these on subsequent runs by changing the start page.
</p>
<h3>Crash reports</h3>
<p>Enabled by default, but can be disabled from the preferences menu.</p>
<p>
Enabled by default, but can be disabled from the preferences menu.
</p>
<h3>Other requests</h3>
<p>Brave will make a connection to this site every time it is started up: <img class="screenshot" src="../images/brave_bat.png"> It probably has something to do with their project of working with advertisers to provide more relevant targeted ads, which sounds pretty disgusting, but can be turned off ("Notify me about token promotions"). You can read more about it here<sup><a href="#3">[3]</a></sup>.It will also make this request which downloads the rulesets for HTTPS Everywhere: <img class="screenshot" src="../images/brave_httpse.png"></p>
<p>
Brave will make a connection to this site every time it is started up:
<img class="screenshot" src="../images/brave_bat.png" />
It probably has something to do with their project of working with
advertisers to provide more relevant targeted ads, which sounds pretty
disgusting, but can be turned off ("Notify me about token
promotions"). You can read more about it here
<sup><a href="#s3">[3]</a></sup>
.It will also make this request which downloads the rulesets for HTTPS
Everywhere:
<img class="screenshot" src="../images/brave_httpse.png" />
</p>
<h3>Brave's privacy protections</h3>
<p>Brave Browser also contains in-built privacy protections such as HTTPS Everywhere, AdBlock, cookie blocking, script blocking, and fingerprinting protections - that are configurable site by site. This is commendable of course, but in the end, uMatrix outclasses them. Trackers, for example, easily avoid pure AdBlock (so you will be tracked by Facebook and such), and binary script blocking breaks sites. Nice effort on Brave's part though, and the fingerprinting protection I don't think is found in any other browser (but I didn't confirm if it actually works).
</p>
<hr>
<center>
<h2>Credits</h2>
<p>
This article was written by <a href="https://digdeeper.neocities.org/">digdeeper.neocities.org</a><br>
Brave Browser also contains in-built privacy protections such as HTTPS
Everywhere, AdBlock, cookie blocking, script blocking, and
fingerprinting protections - that are configurable site by site. This
is commendable of course, but in the end, uMatrix outclasses them.
Trackers, for example, easily avoid pure AdBlock (so you will be
tracked by Facebook and such), and binary script blocking breaks
sites. Nice effort on Brave's part though, and the fingerprinting
protection I don't think is found in any other browser (but I didn't
confirm if it actually works).
</p>
</div>
<hr />
<div class="footer">
<div>
<h4>Credits</h4>
<ol>
This article was written by
<a href="https://digdeeper.neocities.org/"
>digdeeper.neocities.org</a
><br />
Formatting changes were done by the site maintainer.
</p>
<hr>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
</ol>
</div>
<hr />
<div class="sources">
<h4>Sources:</h4>
<ol>
<li id="s1">
<a href="https://brave.com">Brave's website</a>
<a href="https://web.archive.org/web/20180609070708/https://brave.com">[web.archive.org]</a>
<br>
<a name="2">2.</a>
<a href="https://github.com/brave/browser-laptop/issues/1877">How to stop autoupdate of brave?</a>
<a href="http://web.archive.org/web/20180530053311/https://github.com/brave/browser-laptop/issues/1877">[web.archive.org]</a>
<a href="https://archive.li/AJZr5">[archive.li]</a><br>
<a name="3">3.</a>
<a href="https://basicattentiontoken.org">Basic Attention Token</a>
<a href="https://web.archive.org/web/20180528161328/https://www.basicattentiontoken.org">[web.archive.org]</a>
<a href="http://wayback.archive-it.org/all/20180528161328/https://www.basicattentiontoken.org">[wayback.archive-it.org]</a><br>
<a name="4">4.</a>
<a href="https://laptop-updates.brave.com/promo/custom-headers">Laptop Headers</a>
<a href="http://web.archive.org/web/20190213015206/https://laptop-updates.brave.com/promo/custom-headers">[web.archive.org]</a>
<a href="https://archive.fo/ecx6L">[archive.fo]</a><br>
<a name="5">5.</a>
<a href="https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser/">Facebook, Twitter Trackers Whitelisted by Brave Browser</a>
<a href="http://web.archive.org/web/20190213055618/https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser/">[web.archive.org]</a>
<a href="https://archive.fo/X98Xz">[archive.fo]</a><br>
<a name="6">6.</a>
<a
href="https://web.archive.org/web/20180609070708/https://brave.com"
>[web.archive.org]</a
>
</li>
<li id="s2">
<a href="https://github.com/brave/browser-laptop/issues/1877"
>How to stop autoupdate of brave?</a
>
<a
href="http://web.archive.org/web/20180530053311/https://github.com/brave/browser-laptop/issues/1877"
>[web.archive.org]</a
>
<a href="https://archive.li/AJZr5">[archive.li]</a>
</li>
<li id="s3">
<a href="https://basicattentiontoken.org"
>Basic Attention Token</a
>
<a
href="https://web.archive.org/web/20180528161328/https://www.basicattentiontoken.org"
>[web.archive.org]</a
>
<a
href="http://wayback.archive-it.org/all/20180528161328/https://www.basicattentiontoken.org"
>[wayback.archive-it.org]</a
>
</li>
<li id="s4">
<a href="https://laptop-updates.brave.com/promo/custom-headers"
>Laptop Headers</a
>
<a
href="http://web.archive.org/web/20190213015206/https://laptop-updates.brave.com/promo/custom-headers"
>[web.archive.org]</a
>
<a href="https://archive.fo/ecx6L">[archive.fo]</a>
</li>
<li id="s5">
<a
href="https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser/"
>Facebook, Twitter Trackers Whitelisted by Brave Browser</a
>
<a
href="http://web.archive.org/web/20190213055618/https://www.bleepingcomputer.com/news/security/facebook-twitter-trackers-whitelisted-by-brave-browser/"
>[web.archive.org]</a
>
<a href="https://archive.fo/X98Xz">[archive.fo]</a>
</li>
<li id="s6">
<a href="https://brave.com/features/">Brave Browser Features</a>
<a href="http://web.archive.org/web/20190124134301/https://brave.com/features/">[web.archive.org]</a><br>
<a name="7">7.</a>
<a href="https://brave.com/script-blocking-exceptions-update/">Script Blocking Exceptions Update</a>
<a href="http://web.archive.org/web/20190214034944/https://brave.com/script-blocking-exceptions-update/">[web.archive.org]</a>
<a href="http://archive.fo/Qopen">[archive.fo]</a><br>
</p>
<hr>
<p><b>
This article was last edited on 2/13/2019
</b></p>
<p><b>
This article was created on 5/7/2018
</b></p>
<a
href="http://web.archive.org/web/20190124134301/https://brave.com/features/"
>[web.archive.org]</a
>
</li>
<li id="s7">
<a href="https://brave.com/script-blocking-exceptions-update/"
>Script Blocking Exceptions Update</a
>
<a
href="http://web.archive.org/web/20190214034944/https://brave.com/script-blocking-exceptions-update/"
>[web.archive.org]</a
>
<a href="http://archive.fo/Qopen">[archive.fo]</a>
</li>
</ol>
</div>
<hr />
<b>This article was created on 5/7/2018</b><br />
<b>This article was last edited on 2/13/2019</b>
<!--Dont change-->
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
If you want to edit this article, or contribute your own article(s),
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
<p>
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"
><img class="icon" src="../images/cc0.png" alt="CC0 License"
/></a>
<!--Dont change-->
</div>
</div>
</body>
</html>

View File

@ -1,142 +1,302 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<link rel="stylesheet" href="../style.css">
<meta charset="UTF-8">
<meta
http-equiv="Content-type"
content="application/xhtml+xml;charset=utf-8"
/>
<title>Comparison between web browsers - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head>
<body>
<center>
<div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<h1>Comparison between web browsers</h1>
<p>
This purpose of this article is not to rate each web browser in a vaccum, like articles on this website that focus on one specific web browser, but rather to compare all of the
web browsers that have been rated on this website against each other. This is a ranking that is based on how much Pirvacy a browser offers by default, as well as, how
This purpose of this article is not to rate each web browser in a
vaccum, like articles on this website that focus on one specific web
browser, but rather to compare all of the web browsers that have been
rated on this website against each other. This is a ranking that is
based on how much Pirvacy a browser offers by default, as well as, how
much privacy can be gained by configuring it.
</p>
<h2><font color=lime>Top Tier - Best Privacy</font></h2>
<h2><span class="lime">Top Tier - Best Privacy</span></h2>
<p>
These are all browsers that require a minimal amount of configuration and can achive the required level of privacy needed to browse the modern web- compatibility with a
comperhensive suite of content-blocking extensions that can block spyware providers correctly and fully. Iridium and Pale Moon both are configured in a way that leaks
user information and thus require additional configuration.
These are all browsers that require a minimal amount of configuration
and can achive the required level of privacy needed to browse the
modern web- compatibility with a comperhensive suite of
content-blocking extensions that can block spyware providers correctly
and fully. Iridium and Pale Moon both are configured in a way that
leaks user information and thus require additional configuration.
</p>
<table>
<center>
<tbody>
<tr>
<td><center><img src="../images/tor_logo.png" alt="TOR Logo"></center></td>
<td><center><img src="../images/icecat_logo.png" alt="GNU IceCat Logo"></center></td>
<td><center><img src="../images/ungoogled_chromium_logo.png" alt="Ungoogled Chromium Logo"></center></td>
<td><center><img src="../images/iridium_logo.jpg" alt="Iridium Logo"></center></td>
<td><center><img src="../images/palemoon_logo.png" alt="Pale Moon Logo"></center></td>
<td>
<img src="../images/tor_browser_logo.png" alt="TOR Logo" />
</td>
<td>
<img src="../images/icecat_logo.png" alt="GNU IceCat Logo" />
</td>
<td>
<img
src="../images/chromium_logo.png"
alt="Ungoogled Chromium Logo"
/>
</td>
<td>
<img src="../images/iridium_logo.png" alt="Iridium Logo" />
</td>
<td>
<img src="../images/palemoon_logo.png" alt="Pale Moon Logo" />
</td>
</tr>
<tr>
<td><center><b><a href="../articles/tor.html">TOR Browser</a></b></center></td>
<td><center><b><a href="../articles/icecat.html">GNU IceCat</a></b></center></td>
<td><center><b><a href="../articles/ungoogled_chromium.html">Ungoogled Chromium</a></b></center></td>
<td><center><b><a href="../articles/iridium.html">Iridium Browser</a></b><br><small><a href="/guides/iridium.html">Configuration Guide</a></small></center></td>
<td><center><b><a href="../articles/palemoon.html">Pale Moon</a></b><br><small><a href="/guides/palemoon.html">Configuration Guide</a></small></center></td>
<td>
<b><a href="../articles/tor.html">TOR Browser</a></b>
</td>
<td>
<b><a href="../articles/icecat.html">GNU IceCat</a></b>
</td>
<td>
<b
><a href="../articles/ungoogled_chromium.html"
>Ungoogled Chromium</a
></b
>
</td>
<td>
<b><a href="../articles/iridium.html">Iridium Browser</a></b
><br /><small
><a href="../guides/iridium.html"
>Configuration Guide</a
></small
>
</td>
<td>
<b><a href="../articles/palemoon.html">Pale Moon</a></b
><br /><small
><a href="../guides/palemoon.html"
>Configuration Guide</a
></small
>
</td>
</tr>
</table>
<h2><font color=lime>High Tier - Good Privacy</font></h2>
<p>
These browsers do not have privacy issues, but they also do not have enough privacy features to make it to the highest tier. These browsers both have simple ad-blockers, and
do not have any privacy issues, however, these tools are not as good as the comperhensive privacy tools that Top Tier browsers offer.
</p>
<table>
<tr>
<td><center><img src="../images/otter_browser_logo.png" alt="Otter Browser Logo"></center></td>
<td><center><img src="../images/falkon_logo.png" alt="Falkon Logo"></center></td>
</tr>
<tr>
<td><center><b><a href="../articles/otter.html">Otter Browser</a></b></center></td>
<td><center><b><a href="../articles/falkon.html">Falkon</a></b></center></td>
</tr>
</table>
<h2><font color=yellow>Mid Tier - Ok Privacy</font></h2>
<p>
These browsers do not have any big privacy flaws, but they also do not have sufficent privacy protections. Qutebrowser has a very basic adblocker in it. Both browsers don't
have access to extensions either. So, it's just not enough to be able to browse the modern web privately, despite the developers not putting spyware into their browsers.
</p>
<table>
<tr>
<td><center><img src="../images/qutebrowser_logo.png" alt="Qutebrowser Logo"></center></td>
<td><center><img src="../images/sphere_logo.png" alt="SphereLogo"></center></td>
</tr>
<tr>
<td><center><b><a href="../articles/qutebrowser.html">Qutebrowser</a></b></center></td>
<td><center><b><a href="../articles/sphere.html">Sphere Browser</a></b></center></td>
</tr>
</table>
<h2><font color=orange>Low Tier - Poor Privacy</font></h2>
<p>
These browsers do not protect your privacy, but they are not in the lowest tier since they still have something to offer, although, they should not be used in general.
Vivaldi does not let you disable all of the spyware features, Brave whitelists trackers and has forced updates, and Firefox and Waterfox are loaded with spyware, to the point
where configuring them is so <a href="https://github.com/intika/Librefox">non-trivial</a> that you might as well use a version of Firefox that respects your privacy
<b>by default</b>, rather than diving into the uncertainty of digging out all of the spyware features (and repeating the process every time the browser is updated). It's awalys
going to be better to pick a browser higher on this list.
<table>
<tr>
<td><center><img src="../images/waterfox logo.png" alt="Waterfox Logo"></center></td>
<td><img src="../images/brave_logo.png" alt="Brave logo"></td>
<td><img src="../images/firefox_logo.png" alt="firefox Logo"></td>
<td><img src="../images/vivaldi_logo.png" alt="vivaldi Logo"></td>
<td><img src="../images/dissenter_logo.png" alt="Dissenter Logo"></td>
</tr>
<tr>
<td><center><b><a href="../articles/waterfox.html">Waterfox</a></b></center></td>
<td><center><b><a href="../articles/brave.html">Brave</a></b></center></td>
<td><center><b><a href="../articles/firefox.html">Firefox</a></b></center></td>
<td><center><b><a href="../articles/vivaldi.html">Vivaldi</a></b></center></td>
<td><center><b><a href="../articles/dissenter.html">Dissenter</a></b></center></td>
</tr>
</table>
<h2><font color=red>Rock Bottom - No Privacy</font></h2>
<p>
These browsers are unashamedly designed to collect as much information about the user as possible (all are rated EXTREMELY HIGH by the site). Only SRWare Iron has it's source code availible, and all the developers have mistreated their users (complete disregard for privacy and / or false advertising) for a long time. These browsers are actively hostile against their users and thus should not be used at all.
</p>
<table>
<tr>
<td> <img src="../images/chrome_logo.png" alt="chrome logo"></td>
<td> <img src="../images/opera_logo.png" alt="opera logo"></td>
<td> <img src="../images/slimjet_logo.png" alt="SlimJet logo"></td>
<td> <img src="../images/webdiscover_logo.png" alt="WebDiscover logo"></td>
<td> <img src="../images/srware_logo.png" alt="Iron logo"></td>
</tr>
<tr>
<td><center><b><a href="../articles/chrome.html">Google Chrome</a></b></center></td>
<td><center><b><a href="../articles/opera.html">Opera</a></b></center></td>
<td><center><b><a href="../articles/slimjet.html">SlimJet</a></b></center></td>
<td><center><b><a href="../articles/webdiscover.html">WebDiscover</a></b></center></td>
<td><center><b><a href="../articles/iron.html">SRWare Iron</a></b></center></td>
</tr>
</table>
<hr>
<h2>Further Reading</h2>
<p>
This isn't the only guide on what web browser to pick, with an emphasis on privacy, to exist, and many other people,
with their own knowlege and prespectives, have written their own guides. It would be a waste to only read one guide
to make your decision, so, you should probably read a few more, these are some good ones.
</p>
<a href="https://digdeeper.neocities.org/ghost/browsers.html">Digdeeper - How to choose a browser for everyday use?</a><br>
<a href="https://clarkycat.neocities.org/browser.html">Clarkycat - Browser Recommendation and Addons</a><br>
<hr>
<p><b>
This article was last edited on 2/20/2019
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</tbody>
</center>
</table>
<h2><span class="lime">High Tier - Good Privacy</span></h2>
<p>
These browsers do not have privacy issues, but they also do not have
enough privacy features to make it to the highest tier. These browsers
both have simple ad-blockers, and do not have any privacy issues,
however, these tools are not as good as the comperhensive privacy
tools that Top Tier browsers offer.
</p>
<table>
<center>
<tbody>
<tr>
<td>
<img
src="../images/otter_browser_logo.png"
alt="Otter Browser Logo"
/>
</td>
<td>
<img src="../images/falkon_logo.png" alt="Falkon Logo" />
</td>
</tr>
<tr>
<td>
<b><a href="../articles/otter.html">Otter Browser</a></b>
</td>
<td>
<b><a href="../articles/falkon.html">Falkon</a></b>
</td>
</tr>
</tbody>
</center>
</table>
<h2><span class="yellow">Mid Tier - Ok Privacy</span></h2>
<p>
These browsers do not have any big privacy flaws, but they also do not
have sufficent privacy protections. Qutebrowser has a very basic
adblocker in it. Both browsers don't have access to extensions either.
So, it's just not enough to be able to browse the modern web
privately, despite the developers not putting spyware into their
browsers.
</p>
<table>
<center>
<tbody>
<tr>
<td>
<img
src="../images/qutebrowser_logo.png"
alt="Qutebrowser Logo"
/>
</td>
<td>
<img src="../images/sphere_logo.png" alt="SphereLogo" />
</td>
</tr>
<tr>
<td>
<b><a href="../articles/qutebrowser.html">Qutebrowser</a></b>
</td>
<td>
<b><a href="../articles/sphere.html">Sphere Browser</a></b>
</td>
</tr>
</tbody>
</center>
</table>
<h2><span class="orange">Low Tier - Poor Privacy</span></h2>
<p>
These browsers do not protect your privacy, but they are not in the
lowest tier since they still have something to offer, although, they
should not be used in general. Vivaldi does not let you disable all of
the spyware features, Brave whitelists trackers and has forced
updates, and Firefox and Waterfox are loaded with spyware, to the
point where configuring them is so
<a href="https://github.com/intika/Librefox">non-trivial</a> that you
might as well use a version of Firefox that respects your privacy
<b>by default</b>, rather than diving into the uncertainty of digging
out all of the spyware features (and repeating the process every time
the browser is updated). It's awalys going to be better to pick a
browser higher on this list.
</p>
<table>
<center>
<tbody>
<tr>
<td>
<img src="../images/waterfox_logo.png" alt="Waterfox Logo" />
</td>
<td><img src="../images/brave_logo.png" alt="Brave logo" /></td>
<td>
<img src="../images/firefox_logo3.svg" alt="firefox Logo" />
</td>
<td>
<img src="../images/vivaldi_logo.png" alt="vivaldi Logo" />
</td>
<td>
<img src="../images/dissenter_logo.png"alt="Dissenter Logo"/>
</td>
</tr>
<tr>
<td>
<b><a href="../articles/waterfox.html">Waterfox</a></b>
</td>
<td>
<b><a href="../articles/brave.html">Brave</a></b>
</td>
<td>
<b><a href="../articles/firefox.html">Firefox</a></b>
</td>
<td>
<b><a href="../articles/vivaldi.html">Vivaldi</a></b>
</td>
<td>
<b><a href="../articles/dissenter.html">Dissenter</a></b>
</td>
</tr>
</tbody>
</center>
</table>
<h2><span class="red">Rock Bottom - No Privacy</span></h2>
<p>
These browsers are unashamedly designed to collect as much information
about the user as possible (all are rated EXTREMELY HIGH by the site).
Only SRWare Iron has it's source code availible, and all the
developers have mistreated their users (complete disregard for privacy
and / or false advertising) for a long time. These browsers are
actively hostile against their users and thus should not be used at
all.
</p>
<table>
<center>
<tbody>
<tr>
<td>
<img src="../images/chrome_logo.png" alt="chrome logo" />
</td>
<td><img src="../images/opera_logo.png" alt="opera logo" /></td>
<td>
<img src="../images/slimjet_logo.png" alt="SlimJet logo" />
</td>
<td>
<img
src="../images/webdiscover_logo.png"
alt="WebDiscover logo"
/>
</td>
<td><img src="../images/srware_logo.png" alt="Iron logo" /></td>
</tr>
<tr>
<td>
<b><a href="../articles/chrome.html">Google Chrome</a></b>
</td>
<td>
<b><a href="../articles/opera.html">Opera</a></b>
</td>
<td>
<b><a href="../articles/slimjet.html">SlimJet</a></b>
</td>
<td>
<b><a href="../articles/webdiscover.html">WebDiscover</a></b>
</td>
<td>
<b><a href="../articles/iron.html">SRWare Iron</a></b>
</td>
</tr>
</tbody>
</center>
</table>
</div>
<hr />
<div class="footer">
<div>
<h4>Further Reading:</h4>
<ol>
<p>
This isn't the only guide on what web browser to pick, with an
emphasis on privacy, to exist, and many other people, with their
own knowlege and prespectives, have written their own guides. It
would be a waste to only read one guide to make your decision, so,
you should probably read a few more, these are some good ones.
<br /><a
href="https://digdeeper.neocities.org/ghost/browsers.html"
>Digdeeper - How to choose a browser for everyday use?</a
>
<br /><a href="https://clarkycat.neocities.org/browser.html"
>Clarkycat - Browser Recommendation and Addons</a
>
</p>
</ol>
</div>
<hr />
<b>This article was last edited on 2/20/2019</b>
<!--Dont change-->
<p>
If you want to edit this article, or contribute your own article(s),
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p>
<p>
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode">
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
</a>
<!--Dont change-->
</div>
</div>
</body>
</html>

View File

@ -1,99 +1,177 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<link rel="stylesheet" href="../style.css">
<meta charset="UTF-8">
<meta
http-equiv="Content-type"
content="application/xhtml+xml;charset=utf-8"
/>
<title>CCleaner - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head>
<body>
<img src="../images/ccleaner_logo.png" alt="ccleaner logo">
<div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<img src="../images/ccleaner_logo.png" alt="CCleaner Logo" />
<h1>CCleaner</h1>
<p>
CCleaner, developed by Piriform, is a utility program used to clean potentially unwanted files and invalid Windows Registry entries from a computer.
CCleaner, developed by Piriform, is a utility program used to clean
potentially unwanted files and invalid Windows Registry entries from a
computer.
</p>
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
<p>
CCleaner is spyware that collects your personal information to advertise to you. It also sells your information to third parties so that they can advertise to you.
It collects a huge amount of very personal information, like your <b><font color=red>physical location.</font></b> CCleaner uses the technique of privacy policy obfusication
where it provides one privacy policy for every single product its company offers, making it more difficult to know what parts of the privacy policy apply to which program.
CCleaner is spyware that collects your personal information to
advertise to you. It also sells your information to third parties so
that they can advertise to you. It collects a huge amount of very
personal information, like your
<b><font color="red">physical location.</font></b> CCleaner uses the
technique of privacy policy obfusication where it provides one privacy
policy for every single product its company offers, making it more
difficult to know what parts of the privacy policy apply to which
program.
</p>
<h3>CCleaner collects and sells user information to advertisers</h3>
<p>
CCleaner clearly shows in its privacy settings that it is collecting information about your comptuer and selling that information to
CCleaner clearly shows in its privacy settings that it is collecting
information about your comptuer and selling that information to
advertisers:
</p>
<img class="screenshot" src="../images/ccleaner_privacy.png" alt ="Ccleaner privacy settings">
<p>Image Source: <sup><a href="#2">[2]</a></sup></p>
<img
class="screenshot"
src="../images/ccleaner_privacy.png"
alt="Ccleaner privacy settings"
/>
<p>
Image Source: <sup><a href="#s2">[2]</a></sup>
</p>
<h3>CCleaner tracks a huge amount of personal information</h3>
<p>
If we look at the privacy policy, we can see that CCleaner reports the following<sup><a href="#3">[3]</a></sup>:
If we look at the privacy policy, we can see that CCleaner reports the
following<sup><a href="#s3">[3]</a></sup
>:
</p>
<ul>
<li>IP Address
<li>Unique User ID
<li>Operating System
<li>Other Avast Products installed
<li><b><font color=red>physical location</font></b>
<li>IP Address</li>
<li>Unique User ID</li>
<li>Operating System</li>
<li>Other Avast Products installed</li>
<li>
<b><font color="red">physical location</font></b>
</li>
</ul>
<p>
Beyond this, CCleaner is integrated with the following spyware platforms, which all collect their own sets of information:
Beyond this, CCleaner is integrated with the following spyware
platforms, which all collect their own sets of information:
</p>
<ul>
<li>Google Analytics
<li>Logentries
<li>Google Analytics</li>
<li>Logentries</li>
</ul>
<p>
It would be very time consuming to go through all of those privacy policies (especially because many of these are obfusicated), but it should be
enough to understand that CCleaner is full of third party spyware, as well as first party spyware.
It would be very time consuming to go through all of those privacy
policies (especially because many of these are obfusicated), but it
should be enough to understand that CCleaner is full of third party
spyware, as well as first party spyware.
</p>
<h3>CCleaner sends you spam email</h3>
<p>From the privacy policy<sup><a href="#3">[3]</a></sup>:</p>
<p><i>
"When we collect your email address, we may market our other products and services to you. You may choose to unsubscribe from future email marketing by following the instructions in the email."
</i></p>
<p>
From the privacy policy<sup><a href="#s3">[3]</a></sup
>:
</p>
<p>
<i>
"When we collect your email address, we may market our other
products and services to you. You may choose to unsubscribe from
future email marketing by following the instructions in the email."
</i>
</p>
<h3>CCleaner tracks your physical location</h3>
<p>
According to the privacy policy, the ccleaner website tries to track your physical location.<sup><a href="#3">[3]</a></sup>
According to the privacy policy, the ccleaner website tries to track
your physical location.<sup><a href="#s3">[3]</a></sup>
</p>
<p><i>
"Our websites use cookies to acquire data that may be used to determine your physical location via your Internet Protocol address (“IP Address”) and automated geolocation techniques, or to acquire basic information about the computer, tablet, or mobile phone that you use to visit us."
</i></p>
<p>
<i>"location data"</i> is also mentioned when talking about the information that ccleaner itself collects about it's users.
<i>
"Our websites use cookies to acquire data that may be used to
determine your physical location via your Internet Protocol address
(“IP Address”) and automated geolocation techniques, or to acquire
basic information about the computer, tablet, or mobile phone that
you use to visit us."
</i>
</p>
<p>
<i>"location data"</i> is also mentioned when talking about the
information that ccleaner itself collects about it's users.
</p>
<h3>Past Security Flaws</h3>
<p>
In the past, CCleaner has been compromised and backdoors have been added to it.<sup><a href="#1">[1]</a></sup>
In the past, CCleaner has been compromised and backdoors have been
added to it.<sup><a href="#s1">[1]</a></sup>
</p>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
<a href="https://www.ccleaner.com/news/blog/2017/9/18/security-notification-for-ccleaner-v5336162-and-ccleaner-cloud-v1073191-for-32-bit-windows-users">
Security Notification for CCleaner v5.33.6162 and CCleaner Cloud v1.07.3191 for 32-bit Windows users
</div>
<hr />
<div class="footer">
<div class="sources">
<h4>Sources:</h4>
<ol>
<li id="s1">
<a
href="https://www.ccleaner.com/news/blog/2017/9/18/security-notification-for-ccleaner-v5336162-and-ccleaner-cloud-v1073191-for-32-bit-windows-users"
>
Security Notification for CCleaner v5.33.6162 and CCleaner Cloud
v1.07.3191 for 32-bit Windows users
</a>
<a href="https://web.archive.org/web/20180816103218/https://www.ccleaner.com/news/blog/2017/9/18/security-notification-for-ccleaner-v5336162-and-ccleaner-cloud-v1073191-for-32-bit-windows-users">[web.archive.org]</a><br>
<a name="2">2.</a>
<a href="https://misdirectedrequest.wordpress.com/2018/06/04/ccleaner-privacy-issue/">CCleaner Privacy Issue </a>
<a href="http://web.archive.org/web/20180821215956/https://misdirectedrequest.wordpress.com/2018/06/04/ccleaner-privacy-issue/">[web.archive.org]</a>
<a href="http://archive.is/HJFBP">[archive.is]</a><br>
<a name="3">3.</a>
<a href="http://www.ccleaner.com/about/privacy-policy">What Happens to Your Data</a>
<a href="https://web.archive.org/web/20180816025428/https://www.ccleaner.com/about/privacy-policy">[web.archive.org]</a>
<a href="http://archive.is/HJFBP">[archive.is]</a><br>
</p>
<hr>
<p><b>
This article was last edited on 8/21/2018
</b></p>
<a
href="https://web.archive.org/web/20180816103218/https://www.ccleaner.com/news/blog/2017/9/18/security-notification-for-ccleaner-v5336162-and-ccleaner-cloud-v1073191-for-32-bit-windows-users"
>[web.archive.org]</a
>
</li>
<li id="s2">
<a
href="https://misdirectedrequest.wordpress.com/2018/06/04/ccleaner-privacy-issue/"
>CCleaner Privacy Issue
</a>
<a
href="http://web.archive.org/web/20180821215956/https://misdirectedrequest.wordpress.com/2018/06/04/ccleaner-privacy-issue/"
>[web.archive.org]</a
>
<a href="http://archive.is/HJFBP">[archive.is]</a>
</li>
<li id="s3">
<a href="http://www.ccleaner.com/about/privacy-policy"
>What Happens to Your Data</a
>
<a
href="https://web.archive.org/web/20180816025428/https://www.ccleaner.com/about/privacy-policy"
>[web.archive.org]</a
>
<a href="http://archive.is/HJFBP">[archive.is]</a>
</li>
</ol>
</div>
<hr />
<b>This article was last edited on 8/21/2018</b>
<!--Dont change-->
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
If you want to edit this article, or contribute your own article(s),
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
<p>
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"
><img class="icon" src="../images/cc0.png" alt="CC0 License"
/></a>
<!--Dont change-->
</div>
</div>
</body>
</html>

View File

@ -1,48 +1,85 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<link rel="stylesheet" href="../style.css">
<meta charset="UTF-8">
<meta
http-equiv="Content-type"
content="application/xhtml+xml;charset=utf-8"
/>
<title>CDex - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head>
<body>
<img src="../images/cdex_logo.png" alt="cdex logo">
<div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<img src="../images/cdex_logo.png" alt="CDex Logo" />
<h1>CDex</h1>
<p>
CDex is an Open Source Digital Audio CD Extractor.
</p>
<h2>Spyware Level: <font color=yellowgreen>Low</font></h2>
<h2>Spyware Level: <span class="yellowgreen">Low</span></h2>
<p>
CDex's installer bundles it with spyware, and it will randomly suggest a spyware program to the user, with a chance to opt-out.
Usually it attempts to bundle itself with the webdiscover browser and one time I got it to try and offer me an antivirus program, but
I wasn't able to reproduce this. The program was tested on Windows 7 32-bit with Microsoft Network Monitor 3.4 and Wireshark 2.6.2.
The version of the program tested was 2.06. <b><font color="lime">It did not make any connections to the internet</font></b> that my
tests were able to find. To test the program I ripped the audio files out of a CD with both network monitoring programs open.
CDex's installer bundles it with spyware, and it will randomly suggest
a spyware program to the user, with a chance to opt-out. Usually it
attempts to bundle itself with the webdiscover browser and one time I
got it to try and offer me an antivirus program, but I wasn't able to
reproduce this. The program was tested on Windows 7 32-bit with
Microsoft Network Monitor 3.4 and Wireshark 2.6.2. The version of the
program tested was 2.06.
<b
><font color="lime"
>It did not make any connections to the internet</font
></b
>
that my tests were able to find. To test the program I ripped the
audio files out of a CD with both network monitoring programs open.
</p>
<h3>Bundling with spyware</h3>
<p>
CDex attempts to bundle it self with the <a href="../articles/webdiscover.html">WebDiscover</a> web browser. This is an Opt-out and not an Opt-in like it should be.
This program is spyware, because according to it's privacy policy<sup><a href="#1">[1]</a></sup>, it collects information about it's users.
CDex attempts to bundle it self with the
<a href="../articles/webdiscover.html">WebDiscover</a> web browser.
This is an Opt-out and not an Opt-in like it should be. This program
is spyware, because according to it's privacy policy<sup
><a href="#s1">[1]</a></sup
>, it collects information about it's users.
</p>
<img class="screenshot" src="../images/cdex_bundling.png" alt="CDex installer spyware opt-out screen">
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
<img
class="screenshot"
src="../images/cdex_bundling.png"
alt="CDex installer spyware opt-out screen"
/>
</div>
<hr />
<div class="footer">
<div class="sources">
<h4>Sources:</h4>
<ol>
<li id="s1">
<a href="https://getwebdiscover.com/privacy/">WebDiscover Privacy Policy</a>
<a href="http://web.archive.org/web/20171224213336/https://getwebdiscover.com/privacy/">[web.archive.org]</a>
<a href="http://archive.is/Orpq6">[archive.is]</a><br>
</p>
<hr>
<p><b>
This article was last edited on 7/29/2018
</b></p>
<a href="http://archive.is/Orpq6">[archive.is]</a>
</li>
</ol>
</div>
<hr />
<b>This article was last edited on 7/29/2018</b>
<!--Dont change-->
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
If you want to edit this article, or contribute your own article(s),
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
<p>
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode">
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
</a>
<!--Dont change-->
</div>
</div>
</body>
</html>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,12 +1,19 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<link rel="stylesheet" href="../style.css">
<meta charset="UTF-8">
<meta
http-equiv="Content-type"
content="application/xhtml+xml;charset=utf-8"
/>
<title>Discord - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head>
<body>
<img src="../images/discord_logo.png" alt="Discord-Logo">
<div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<img src="../images/discord_logo.png" alt="Discord Logo" />
<h1>Discord</h1>
<center>
<a href="../articles/discord_es.html">Spanish Translation</a>
@ -16,35 +23,50 @@ Discord is an instant messaging application for MacOS, Windows, Linux,
Android, and iOS. Discord is used to communicate via voice chat and
text chat, and has image-sharing and file-sharing capabilities.
</p>
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
<p>
<font color="lightgreen">
Thanks to Richard Stallman for linking to our article <a href="https://stallman.org/discord.html"> here</a>! The spotlight is very much appreciated.
</font><br>
Thanks to Richard Stallman for linking to our article
<a href="https://stallman.org/discord.html"> here</a>!
The spotlight is very much appreciated.
</font>
<br />
</p>
<a href="../articles/discord.html"><img class="icon" src="../images/discord-no-way-2.gif" alt="Discord? No Way!"></a>
<a href="../articles/discord.html"
><img
class="icon"
src="../images/discord-no-way-2.gif"
alt="Discord? No Way!"
/></a>
<p>
Discord is spyware because it collects all information that passes
through its communication platform. As Discord is a centralized
communication platform, all communications have to go through Discord's
official servers, where all of that information can potentially be
recorded. The vast majority of said information has been confirmed
to be recorded, such as all communications between users. Discord has
also been confirmed to use other spyware features such as various forms
of telemetry. Discord's main source of income is from investment, from which
it has received over $279.3 million dollars<sup><a href="#4">[4]</a></sup>. Discord cannot be built from
source and the source code for Discord is unavailable.
communication platform, all communications have to go through
Discord's official servers, where all of that information can
potentially be recorded. The vast majority of said information has
been confirmed to be recorded, such as all communications between
users. Discord has also been confirmed to use other spyware features
such as various forms of telemetry. Discord's main source of income is
from investment, from which it has received over $279.3 million
dollars<sup><a href="#s4">[4]</a></sup
>. Discord cannot be built from source and the source code for Discord
is unavailable.
</p>
<h3>Discord does not make its source code available</h3>
<p>
It is impossible to download and examine Discord's source code,
which means that it is impossible to prove that Discord is not
spyware. Any program which does not make its source code available is
potential spyware.
It is impossible to download and examine Discord's source code, which
means that it is impossible to prove that Discord is not spyware. Any
program which does not make its source code available is potential
spyware.
</p>
<h3>Discord confirms that it collects large amounts of sensitive user data</h3>
<h3>
Discord confirms that it collects large amounts of sensitive user data
</h3>
<p>
Discord explicitly confirms in its privacy policy<sup><a href="#1">[1]</a></sup> that it collects the following information:
Discord explicitly confirms in its privacy policy<sup
><a href="#s1">[1]</a></sup
>
that it collects the following information:
</p>
<ul>
<li>IP Address</li>
@ -56,10 +78,13 @@ Discord explicitly confirms in its privacy policy<sup><a href="#1">[1]</a></sup>
<li>Open rates for e-mail sent by Discord</li>
</ul>
<p>
Discord does not explictly confirm that it collects this information, but still collects it by default:
Discord does not explictly confirm that it collects this information,
but still collects it by default:
</p>
<ul>
<li>Logs of all of the other programs that are open on your computer</li>
<li>
Logs of all of the other programs that are open on your computer
</li>
</ul>
<p>
The implications of this information can be broken down like this: By
@ -67,24 +92,28 @@ recording your IP address, Discord can track your general location
(about as precise as which county you are in). Discord can also tell
which devices you use, as it uniquely identifies each device, and how
much you use those devices, as it can record your device usage habits
(since Discord is usually open in the background so that it can receive
messages). Discord also records every single interaction you have with
other users through its service. This means that Discord is confirmed
to log every conversation that you have through Discord, and record
everything that you say on Discord, and view all images that you send
through Discord. Therefore, none of your interactions on Discord are
private. Discord's privacy policy also contains several occurrences of
phrases such as "including but not limited to," which is an explicit
confirmation that Discord contains more spyware features that are not
disclosed to the user.
(since Discord is usually open in the background so that it can
receive messages). Discord also records every single interaction you
have with other users through its service. This means that Discord is
confirmed to log every conversation that you have through Discord, and
record everything that you say on Discord, and view all images that
you send through Discord. Therefore, none of your interactions on
Discord are private. Discord's privacy policy also contains several
occurrences of phrases such as "including but not limited to," which
is an explicit confirmation that Discord contains more spyware
features that are not disclosed to the user.
</p>
<h3>Discord contains features which allow integration with other spyware platforms</h3>
<h3>
Discord contains features which allow integration with other spyware
platforms
</h3>
<p>
Discord contains the opt-in spyware feature known as "social media
integration." This allows you to sync your persistent user identity
on Discord with your persistent user identity on other spyware
platforms, such as Facebook and Twitter. In its privacy policy<sup><a href="#1">[1]</a></sup>,
Discord has confirmed that if you opt in to this spyware feature,
integration." This allows you to sync your persistent user identity on
Discord with your persistent user identity on other spyware platforms,
such as Facebook and Twitter. In its privacy policy<sup
><a href="#s1">[1]</a></sup
>, Discord has confirmed that if you opt in to this spyware feature,
Discord will obtain an undisclosed amount of access to information
obtained about you by the spyware platforms that you choose to sync
with.
@ -92,153 +121,298 @@ with.
<h3>Discord contains a process logger</h3>
<p>
Discord has been confirmed to monitor the open processes on your
operating system. This is a spyware feature known as a "process logger"
that is generally used to record your program usage habits. This was
confirmed by the CTO of Discord in a Reddit thread.<sup><a href="#2">[2]</a></sup>
In the same thread, the CTO also elaborates that this spyware feature (the monitoring of processes) is
mandatory for several features of the platform. The CTO and a Discord engineer go on
to claim that Discord does not use the process logger to send records
of the open processes on the user's computer.
operating system. This is a spyware feature known as a "process
logger" that is generally used to record your program usage habits.
This was confirmed by the CTO of Discord in a Reddit thread.<sup
><a href="#s2">[2]</a></sup
>
In the same thread, the CTO also elaborates that this spyware feature
(the monitoring of processes) is mandatory for several features of the
platform. The CTO and a Discord engineer go on to claim that Discord
does not use the process logger to send records of the open processes
on the user's computer.
</p>
<p>
The test to prove that Discord logs processes was done again by the writer with procmon on 4/11/2019 with
the features: "Use data to customize my Discord Experience" and "Display currently running game as a status message"
turned off. Discord did <font color=lime><b>NOT</b></font> log all of the processes open this way.
However when setting the "Display currently running game as a status message" turned on, the behavior
described in<sup><a href="#2">[2]</a></sup> was replecated. You can see that behavior here:
The test to prove that Discord logs processes was done again by the
writer with procmon on 4/11/2019 with the features: "Use data to
customize my Discord Experience" and "Display currently running game
as a status message" turned off. Discord did
<font color="lime"><b>NOT</b></font> log all of the processes open
this way. However when setting the "Display currently running game as
a status message" turned on, the behavior described in<sup
><a href="#s2">[2]</a></sup
>
was replecated. You can see that behavior here:
</p>
<img class="screenshot" src="../images/discord_process_logging.png" alt="Discord process logging as described in [2] confirmed with procmon">
<img
class="screenshot"
src="../images/discord_process_logging.png"
alt="Discord process logging as described in [2] confirmed with procmon"
/>
<p>
It turns out that this feature <font color=lime><b>can be disabled through the UI.</b></font> Because of the nature of closed-source
software it isn't possible for either this article or the Discord developers to prove how much information is being sent to
Discord's servers when the process logger is turned on. But it's at least possible to turn it off.
It turns out that this feature
<font color="lime"><b>can be disabled through the UI.</b></font>
Because of the nature of closed-source software it isn't possible for
either this article or the Discord developers to prove how much
information is being sent to Discord's servers when the process logger
is turned on. But it's at least possible to turn it off.
</p>
<h3>Discord uses it's process logging for advertising</h3>
<p>
Discord shows this in it's privacy option here:
</p>
<img class="screenshot" src="../images/discord_data.png" alt="Discord process logging usefulness">
<img
class="screenshot"
src="../images/discord_data.png"
alt="Discord process logging usefulness"
/>
<p>
That the process logging features of Discord are now being recorded on Discord's servers as a form of telemetry (spyware),
and removes speculation about why this feature exists. It is clarified by Discord that this spyware feature is used for advertising
to it's users.<sup><a href="#8">[8]</a></sup> This means that Discord is <font color=red><b>recording the programs you have open to build
a statistical model of what programs you might buy/lisence in the future.</b></font>
That the process logging features of Discord are now being recorded on
Discord's servers as a form of telemetry (spyware), and removes
speculation about why this feature exists. It is clarified by Discord
that this spyware feature is used for advertising to it's users.<sup
><a href="#s8">[8]</a></sup
>
This means that Discord is
<font color="red"
><b
>recording the programs you have open to build a statistical model
of what programs you might buy/lisence in the future.</b
></font
>
</p>
<img class="screenshot" src="../images/discord_2.png" alt="Discord confirms process logging is used for advertising">
<img
class="screenshot"
src="../images/discord_2.png"
alt="Discord confirms process logging is used for advertising"
/>
<h3>Discord tries to force some users to give their Telephone numbers</h3>
<h3>
Discord tries to force some users to give their Telephone numbers
</h3>
<p>
Discord will lock users out of it's service and will not allow them to continue using it without giving their phone number or contacting Discord
support. This kind of feature is designed to extract very personal information out of it's users (phone numbers). The criteria for locking out
users isn't known.
Discord will lock users out of it's service and will not allow them to
continue using it without giving their phone number or contacting
Discord support. This kind of feature is designed to extract very
personal information out of it's users (phone numbers). The criteria
for locking out users isn't known.
<!--
You can be locked out of your account for spamming
multiple users in dm's a short ammount of time,
This is due to the spam protection
-->
</p>
<img class="screenshot" src="../images/discord_verify.png" alt="discord phone verification">
<img
class="screenshot"
src="../images/discord_verify.png"
alt="discord phone verification"
/>
<h3>Discord receives government requests for your information</h3>
<p>
Discord has confirmed in an email correspondence<sup><a href="#6">[6]</a></sup>
Discord has confirmed in an email correspondence<sup
><a href="#s6">[6]</a></sup
>
that it does receive government requests for information. So, we know
that the government potentially has access to all of the information
that Discord collects about you. You can read a copy of the email image
posted in the source <a href="https://spyware.neocities.o../images/discord%20government%20requests.png">here</a> in case the link there dies.
that Discord collects about you. You can read a copy of the email
image posted in the source
<a
href="https://spyware.neocities.org/images/discord%20government%20requests.png"
>here</a
>
in case the link there dies.
</p>
<hr>
<hr />
<h2>Speculation on Discord's future</h2>
<p>
It's unknown whether Discord currently is or isn't selling user information. Currently Discord has been able
to consistently raise new invesment capital, which is at a level where it could reasonably be covering
all of its operating costs. However, Discord, like any other company, is not going to exist in a
constant state of investment. Discord is going to have to transition away from an investment-financed
business model to a revenue model that exclusively relies on generating revenue from the users of the
platform.
It's unknown whether Discord currently is or isn't selling user
information. Currently Discord has been able to consistently raise new
invesment capital, which is at a level where it could reasonably be
covering all of its operating costs. However, Discord, like any other
company, is not going to exist in a constant state of investment.
Discord is going to have to transition away from an
investment-financed business model to a revenue model that exclusively
relies on generating revenue from the users of the platform.
</p>
<p>
Discord has several ways of making money. It can lisence emoji's and other features of the program with
Discord Nitro<sup><a href="#5">[5]</a></sup>, or it can make money lisencing video games through it's
new online store, as a competitor to <a href="../articles/steam.html">Steam</a>. However both of these revenue
sources may not be enough. Discord has raised $279.3 million dollars<sup><a href="#4">[4]</a></sup>
and it has to return on this investment. (which is more than 279.3 million dollars that has to be paid back)
Discord has several ways of making money. It can lisence emoji's and
other features of the program with Discord Nitro<sup
><a href="#s5">[5]</a></sup
>, or it can make money lisencing video games through it's new online
store, as a competitor to <a href="../articles/steam.html">Steam</a>.
However both of these revenue sources may not be enough. Discord has
raised $279.3 million dollars<sup><a href="#s4">[4]</a></sup>
and it has to return on this investment. (which is more than 279.3
million dollars that has to be paid back)
</p>
<p>
If Discord is not able to satisfy it's obligation to it's investors, it has a third option- selling user information
to advertisers. Discord is already datamining it's users to produce it's recommendation system,<sup><a href="#8">[8]</a></sup> which means that it
is already turning it's userbase into extremely valueble, sellable, advertising data. Discord has 130 million users<sup><a href="#7">[7]</a></sup>,
and it can produce a statistical model of what games each user (who does not opt-out of advertising) owns, plays, and wants to buy.
This is incredibly valueble information that Discord can sell if it cannot reach it's profit obligations with it's current
revenue model. If Discord is a successful games store, then it wont need to do this. But if Discord gets in financial trouble,
it probably will be forced to liquiate this asset.
If Discord is not able to satisfy it's obligation to it's investors,
it has a third option- selling user information to advertisers.
Discord is already datamining it's users to produce it's
recommendation system,<sup><a href="#s8">[8]</a></sup> which means
that it is already turning it's userbase into extremely valueble,
sellable, advertising data. Discord has 130 million users<sup
><a href="#s7">[7]</a></sup
>, and it can produce a statistical model of what games each user (who
does not opt-out of advertising) owns, plays, and wants to buy. This
is incredibly valueble information that Discord can sell if it cannot
reach it's profit obligations with it's current revenue model. If
Discord is a successful games store, then it wont need to do this. But
if Discord gets in financial trouble, it probably will be forced to
liquiate this asset.
</p>
</div>
<hr />
<div class="footer">
<div class="futher">
<h4>Further Reading:</h4>
<ol>
<a
href="https://old.reddit.com/r/privacy/comments/8lkb5s/friends_dont_let_friends_use_discord_the/"
>Friends Don't Let Friends Use Discord</a
>
<a href="https://archive.is/Q4N9J">[archive.is]</a
><br />
<hr>
<center>
<h2>Further Reading</h2>
<a
href="https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html"
>Help Me, Tom's Guide: Is Discord Tracking Me?</a
>
<a
href="http://archive.is/20180418204656/https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html"
>[archive.is]</a
><br />
<a href="https://old.reddit.com/r/privacy/comments/8lkb5s/friends_dont_let_friends_use_discord_the/">Friends Don't Let Friends Use Discord</a>
<a href="https://archive.is/Q4N9J">[archive.is]</a><br>
<a href="https://www.hooktube.com/watch?v=cn4CENr5NV0"
>Why Discord is Trash</a
><br />
<a href="https://www.hooktube.com/watch?v=QN_6AZT92pU"
>Why You Shouldn't Use Discord</a
><br />
<a href="https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html">Help Me, Tom's Guide: Is Discord Tracking Me?</a>
<a href="http://archive.is/20180418204656/https://www.tomsguide.com/us/help-me-toms-guide-discord-permissions,review-5104.html">[archive.is]</a><br>
<a href="https://www.hooktube.com/watch?v=cn4CENr5NV0">Why Discord is Trash</a><br>
<a href="https://www.hooktube.com/watch?v=QN_6AZT92pU">Why You Shouldn't Use Discord</a><br>
<a href="http://subvert.pw/res/discord.pdf">THE DISCORD SITUATION</a>
<a href="https://web.archive.org/web/20180528205030/http://subvert.pw/res/discord.pdf">[web.archive.org]</a><br>
<hr>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
<a href="https://discordapp.com/privacy">Discord Privacy Policy</a>
<a href="https://web.archive.org/web/20180528052213/https://discordapp.com/privacy">[web.archive.org]</a>
<a href="http://archive.is/20180515102020/https://discordapp.com/privacy">[archive.is]</a><br>
<a name="2">2.</a>
<a href="https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/">Why is Discord recording our open programs and uploading them?</a>
<a href="https://web.archive.org/web/20180410043931/https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/">[web.archive.org]</a>
<a href="https://archive.li/qFcQA">[archive.is]</a><br>
<a name="3">3.</a>
<a href="http://subvert.pw/res/discord.pdf"
>THE DISCORD SITUATION</a
>
<a
href="https://web.archive.org/web/20180528205030/http://subvert.pw/res/discord.pdf"
>[web.archive.org]</a
>
</ol>
</div>
<hr />
<div class="sources">
<h4>Sources:</h4>
<ol>
<li id="s1">
<a href="https://discordapp.com/privacy"
>Discord Privacy Policy</a
>
<a
href="https://web.archive.org/web/20180528052213/https://discordapp.com/privacy"
>[web.archive.org]</a
>
<a
href="http://archive.is/20180515102020/https://discordapp.com/privacy"
>[archive.is]</a
>
</li>
<li id="s2">
<a
href="https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/"
>Why is Discord recording our open programs and uploading
them?</a
>
<a
href="https://web.archive.org/web/20180410043931/https://www.reddit.com/r/discordapp/comments/43lqyb/why_is_discord_recording_our_open_programs_and/"
>[web.archive.org]</a
>
<a href="https://archive.li/qFcQA">[archive.is]</a>
</li>
<li id="s3">
<a href="https://discordapp.com/company">Discord</a>
<a href="http://wayback.archive-it.org/all/20171226205723/https://discordapp.com/company">[wayback.archive-it.org]</a>
<a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a><br>
<a name="4">4.</a>
<a href="https://www.crunchbase.com/organization/discord">Crunchbase</a>
<a href="https://web.archive.org/web/20180423015034/https://www.crunchbase.com/organization/discord">[web.archive.org]</a>
<a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a><br>
<a name="5">5.</a>
<a
href="http://wayback.archive-it.org/all/20171226205723/https://discordapp.com/company"
>[wayback.archive-it.org]</a
>
<a
href="http://archive.is/20170724163442/https://discordapp.com/company"
>[archive.is]</a
>
</li>
<li id="s4">
<a href="https://www.crunchbase.com/organization/discord"
>Crunchbase</a
>
<a
href="https://web.archive.org/web/20180423015034/https://www.crunchbase.com/organization/discord"
>[web.archive.org]</a
>
<a
href="http://archive.is/20170724163442/https://discordapp.com/company"
>[archive.is]</a
>
</li>
<li id="s5">
<a href="https://discordapp.com/nitro">Discord Nitro</a>
<a href="http://archive.is/20170724163442/https://discordapp.com/company">[archive.is]</a><br>
<a name="6">6.</a>
<a href="https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">Discord receives government requests. No plans on adding E2E Encryption any time soon.</a>
<a
href="http://archive.is/20170724163442/https://discordapp.com/company"
>[archive.is]</a
>
</li>
<li id="s6">
<a
href="https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/"
>Discord receives government requests. No plans on adding E2E
Encryption any time soon.</a
>
<a href="https://archive.is/JrdJ9">[archive.is]</a>
<a href="http://web.archive.org/web/20180228033615/https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/">[web.archive.org]</a><br>
<a name="7">7.</a>
<a href=" https://www.statista.com/statistics/746215/discord-user-number/">Number of registered Discord users</a>
<a href="http://web.archive.org/web/20181119040747/https://www.statista.com/statistics/746215/discord-user-number/">[web.archive.org]</a><br>
<a name="8">8.</a>
<a href="https://support.discordapp.com/hc/en-us/articles/360004109911">Data Privacy Controls</a>
<a href="http://web.archive.org/web/20181201004455/https://support.discordapp.com/hc/en-us/articles/360004109911">[web.archive.org]</a><br>
</p>
<hr>
<p><b>
This article was last edited on 4/11/2019
</b></p>
<p><b>
This article was created on 11/23/17
</b></p>
<a
href="http://web.archive.org/web/20180228033615/https://www.reddit.com/r/privacy/comments/80l8se/discord_receives_government_requests_no_plans_on/"
>[web.archive.org]</a
>
</li>
<li id="s7">
<a
href=" https://www.statista.com/statistics/746215/discord-user-number/"
>Number of registered Discord users</a
>
<a
href="http://web.archive.org/web/20181119040747/https://www.statista.com/statistics/746215/discord-user-number/"
>[web.archive.org]</a
>
</li>
<li id="s8">
<a
href="https://support.discordapp.com/hc/en-us/articles/360004109911"
>Data Privacy Controls</a
>
<a
href="http://web.archive.org/web/20181201004455/https://support.discordapp.com/hc/en-us/articles/360004109911"
>[web.archive.org]</a
>
</li>
</ol>
</div>
<hr />
<b>This article was created on 11/23/17</b><br />
<b>This article was last edited on 4/11/2019</b>
<!--Dont change-->
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
If you want to edit this article, or contribute your own article(s),
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
<p>
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode">
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
</a>
<!--Dont change-->
</div>
</div>
</body>
</html>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,8 +1,10 @@
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<meta
http-equiv="Content-type"
content="application/xhtml+xml;charset=utf-8"
/>
<title>[Program/Service Name Here] - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css" />
</head>
@ -11,41 +13,67 @@
<div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<img src="../images/example_logo.png" alt="Images are in the ../images folder"/>
<img
src="../images/example_logo.png"
alt="Images are in the ../images folder"
/>
<h1>[Program/Service Name Here]</h1>
<p>
This part of the article should have the name of the program and what it does, and who develops it.
This part of the article should have the name of the program and what
it does, and who develops it.
</p>
<h2>Spyware Level: <span class="green">Not Rated</span></h2>
<h2>Spyware Feature X</h2>
<p>Proof goes here<sup><a href="#s1">[1]</a></sup>.</p>
<p>
Proof goes here<sup><a href="#s1">[1]</a></sup
>.
</p>
</div>
<hr>
<hr />
<div class="footer">
<div class="futher">
<h4>Further Reading:</h4>
<ol>
<a href="">Source</a> <a href="">[web.archive.org]</a> <a href="">[archive.is]</a>
<a href="">Source</a>
<a href="">[web.archive.org]</a>
<a href="">[archive.is]</a>
</ol>
</div>
<hr>
<hr />
<div class="sources">
<h4>Sources:</h4>
<ol>
<li id="s1"><a href="">Source1</a> <a href="">[web.archive.org]</a> <a href="">[archive.is]</a></li>
<li id="s2"><a href="">Source2</a> <a href="">[web.archive.org]</a> <a href="">[archive.is]</a></li>
<li id="s1">
<a href="">Source1</a>
<a href="">[web.archive.org]</a>
<a href="">[archive.is]</a>
</li>
<li id="s2">
<a href="">Source2</a>
<a href="">[web.archive.org]</a>
<a href="">[archive.is]</a>
</li>
</ol>
</div>
<hr>
<b>This article was created on mm/dd/yyyy</b>
<hr />
<b>This article was created on mm/dd/yyyy</b><br />
<b>This article was last edited on mm/dd/yyyy</b>
<!--Dont change-->
<p>If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
<p>
If you want to edit this article, or contribute your own article(s),
contact us on XMPP over in spyware@conference.nuegia.net, or visit us
at the git repo on
<a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.
</p>
<p>
All contributions must be licensed under the CC0 license to be
accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode">
<img class="icon" src="../images/cc0.png" alt="CC0 License" />
</a>
<!--Dont change-->
</div>
</div>
</body>
</html>

View File

@ -1,17 +1,22 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<link rel="stylesheet" href="../style.css">
<meta charset="UTF-8">
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<title>Internet Explorer - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css"/>
</head>
<body>
<img src="../images/ie_logo.png" alt="Internet Explorer Logo">
<div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<img src="../images/ie_logo.png" alt="Internet Explorer Logo"/>
<h1>Internet Explorer</h1>
<p>
Internet Explorer is a Web Browser distributed by Microsoft with most versions of the Microsoft Windows Operating system.
</p>
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
<p>
Internet Explorer contains many serious spyware features, however all of these features appear to be "opt-out" features. It is not verified whether or not opting out will actually disable all of these features, or if there are other spyware features that are not known which cannot be opted out of. Internet Explorer can record your search history and location, and report that information to Microsoft. Internet Explorer is not the worst spyware, but it is still loaded with spyware features that can mine serious information from users.
</p>
@ -21,39 +26,39 @@ Internet Explorer cannot be built from available source code. This means that it
</p>
<h3>Internet Explorer is self-updating software</h3>
<p>
Internet Explorer can be updated through spyware programs such as Windows Update<sup><a href="#1">[1]</a></sup>. Automatic software updates are a spyware feature becuase they cannot be verified to be non-spyware by the user. Luckily, this spyware feature is opt-out and can be turned off.
Internet Explorer can be updated through spyware programs such as Windows Update<sup><a href="#s1">[1]</a></sup>. Automatic software updates are a spyware feature becuase they cannot be verified to be non-spyware by the user. Luckily, this spyware feature is opt-out and can be turned off.
</p>
<h3>Internet Explorer sends your search history to Microsoft</h3>
<p>
Internet Explorer contains a spyware feature called "flip ahead"<sup><a href="#1">[1]</a></sup>. Flip ahead will periodically send your browsing history to Microsoft. This spyware feature is opt-out and can be disabled. Microsoft claims that the information it recevies is encrypted to protect user privacy and santized to prevent personal information from being stored. This is unverifiable. Microsoft confirms that it does use the information obtained from flip ahead to build statstical models of your browsing habits. Other spyware features such as "Smartscreen filter", and "Suggested Sites" also confirm that they send your internet history to Microsoft.
Internet Explorer contains a spyware feature called "flip ahead"<sup><a href="#s1">[1]</a></sup>. Flip ahead will periodically send your browsing history to Microsoft. This spyware feature is opt-out and can be disabled. Microsoft claims that the information it recevies is encrypted to protect user privacy and santized to prevent personal information from being stored. This is unverifiable. Microsoft confirms that it does use the information obtained from flip ahead to build statstical models of your browsing habits. Other spyware features such as "Smartscreen filter", and "Suggested Sites" also confirm that they send your internet history to Microsoft.
</p>
<h3>Internet Explorer can track your location</h3>
<p>
Internet Explorer has the spyware feature commonly referred to as "location services", which is a feature that allows it to track the location of the user. The privacy statement<sup><a href="#1">[1]</a></sup> explains that your location is obtained through a "Microsoft Location Service". Which means that your location is sent to a Microsoft server. Microsoft does not elaborate on what it does with this data or whether it stores this data. This spyware feature is opt-out.
Internet Explorer has the spyware feature commonly referred to as "location services", which is a feature that allows it to track the location of the user. The privacy statement<sup><a href="#s1">[1]</a></sup> explains that your location is obtained through a "Microsoft Location Service". Which means that your location is sent to a Microsoft server. Microsoft does not elaborate on what it does with this data or whether it stores this data. This spyware feature is opt-out.
</p>
<h3>Internet Explorer has an anti-privacy search engine by default</h3>
<p>The default search engine is <a href="../articles/bing.html">Bing</a> which datamines its users and sells that information to advertisers.</p>
</div>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
<a href="https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">Internet Explorer 10 privacy statement</a>
<div class="footer">
<div class="sources">
<h4>Sources:</h4>
<ol>
<li id="s1"><a href="https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">Internet Explorer 10 privacy statement</a>
<a href="http://webarchive.loc.gov/all/20160915190335/https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">[webarchive.loc.gov]</a>
<a href="https://web.archive.org/web/20180509170237/https://privacy.microsoft.com/en-us/ie10-win8-privacy-statement">[web.archive.org]</a>
<a href="https://archive.is/EnsRH">[archive.is]</a><br>
</p>
<a href="https://archive.is/EnsRH">[archive.is]</a><br></li>
</ol>
</div>
<hr>
<p><b>
This article was last updated on 2/18/2019
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
<b>This article was last edited on 2/18/2019</b>
<!--Dont change-->
<p>If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
<!--Dont change-->
</div>
</div>
</body>
</html>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
@ -6,7 +7,7 @@
<title>Firefox - Spyware Watchdog</title>
</head>
<body>
<img src="../images/firefox_logo.png" alt="Firefox logo">
<img src="../images/firefox_logo3.svg" alt="Firefox logo">
<h1>Mozilla Firefox</h1>
<center>
<a href="../articles/firefox_es.html">Spanish Translation</a>

View File

@ -1,4 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
@ -12,7 +12,7 @@
<a href="../articles/index.html">Back to catalog</a><br>
<a href="../guides/firefox_es.html">Guía de mitigación</a>
</p>
<img src="../images/firefox_logo.png" alt="Firefox logo">
<img src="../images/firefox_logo3.svg" alt="Firefox logo">
<p>
Mozilla Firefox es uno de los navegadores web más populares y perdurables. Sus desarrolladores han adquirido cierta reputación por desarrollar un "navegador que respeta la privacidad y seguridad del usuario" - pero, ¿es algo justificado o sólo una estrategia de marketing? Bueno, de hecho, a través de sus años de existencia, los desarrolladores han tomado varias decisiones que podrían ser consideradas anti-privacidad (y anti-usuario en general), pero en este artículo nos estaremos enfocando exclusivamente en aquellas que pueden ser consideradas spyware. Versión testeada: 52.5.0, con la configuración por defecto. Programas usados para buscar solicitudes web: Mitmproxy.
</p>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang="en-us">
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang="en-us">
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang="en-us">
<head>

View File

@ -1,4 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
@ -6,7 +7,7 @@
<title>Iridium Browser - Spyware Watchdog</title>
</head>
<body>
<img src="../images/iridium_logo.jpg" alt="Iridium Logo">
<img src="../images/iridium_logo.png" alt="Iridium Logo">
<h1>Iridium Browser</h1>
<p>
Iridium is a privacy-based fork of Google Chrome. From their website: "All modifications enhance the privacy of the user and make sure that the latest and best secure technologies are used. Automatic transmission of partial queries, keywords and metrics to central services is prevented and only occurs with the approval of the user." Unlike other browsers of its kind, this one is fully featured (has all the addons that are available for Chrome), and so is recommended for everyday usage.

View File

@ -1,19 +1,22 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
<link rel="stylesheet" href="../style.css">
<meta charset="UTF-8">
<title>SRWare Iron - Spyware Watchdog</title>
</head>
<body>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<meta name="viewport" content="width=device-width, initial-scale=1">
<img src="../images/srware_logo.png" alt="SRWare Iron Logo">
<head>
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<title>SRWare Iron - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css"/>
</head>
<body>
<div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<img src="../images/srware_logo.png" alt="SRWare Iron Logo"/>
<h1>SRWare Iron</h1>
<p>
SRWare Iron is a free web browser, and an implementation of Chromium by SRWare of Germany.
</p>
<h2>Spyware Level: <font color="red">EXTREMELY HIGH</font></h2>
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
<p>
SRWare Iron claims to be a privacy respecting web browser that is an alternative to <a href="../articles/chrome.html">Google Chrome</a>'s
spyware, and specifically brands itself as a privacy respecting web browser that aims to give users
@ -36,7 +39,7 @@ SRWare Iron claims on it's website that it is:
</p>
<p><i>
"Chrome thrilled with an extremely fast site rendering, a sleek design and innovative features. But it also gets critic from data protection specialists , for reasons such as creating a unique user ID or the submission of entries to Google to generate suggestions. SRWare Iron is a real alternative. The browser is based on the Chromium-source and offers the same features as Chrome - but without the critical points that the privacy concern."
</i><sup><a href="#1">[1]</a></sup></p>
</i><sup><a href="#s1">[1]</a></sup></p>
<p>
The reality is that you are merely trading in one spyware product for another. Where Chrome's spyware has been removed,
Iron's spyware is there to replace it. Which poision are you going to pick? The worst part is that people will read what is
@ -48,7 +51,7 @@ The most audacious thing about it is this incredible quote on the FAQ section fo
</p>
<p><i>
"Can i really check that Iron doesn't submit any private data, how you say? Yes, you can. There are tools like Wireshark, which scan the whole network-traffic. We could not recognize any obvious activity. But you can proof this by yourself."
</i><sup><a href="#2">[2]</a></sup></p>
</i><sup><a href="#s2">[2]</a></sup></p>
<p>
Which is just an amazing gem in the context of what is actually found when running tests on the software.
</p>
@ -102,7 +105,7 @@ Bing through it's own domains.
<h3>Motivations of the SRWare Iron developer?</h3>
<p>
If you dig deeper into how SRWare Iron was created, you can find some interesting information from some of the developers of
Chrome about the motivations behind the creation of this fork. More specifically this very interesting conversation:<sup><a href="#3">[3]</a></sup>
Chrome about the motivations behind the creation of this fork. More specifically this very interesting conversation:<sup><a href="#s3">[3]</a></sup>
</p>
<xmp>
<Kmos> Iron: why not contribute to it, instead of forking ?
@ -149,32 +152,37 @@ Bing through it's own domains.
(why else would he take the time to integrate these things into his browser? we can only speculate.)
At the end of the day it's pretty clear that this browser is a huge scam and you shouldn't use it.
</p>
</div>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
<div class="footer">
<div class="sources">
<h4>Sources:</h4>
<ol>
<li id="s1">
<a href="http://www.srware.net/en/software_srware_iron.php">SRWare Iron: The Browser of the future - Overview</a>
<a href="https://web.archive.org/web/20181118232123/http://www.srware.net/en/software_srware_iron.php">[web.archive.org]</a>
<a href="https://archive.is/qMNlG">[archive.is]</a><br>
<a name="2">2.</a>
</li>
<li id="s2">
<a href="https://www.srware.net/en/software_srware_iron_faq.php">SRWare Iron: The Browser of the future - Frequently asked questions</a>
<a href="https://web.archive.org/web/20180502103925/http://www.srware.net:80/en/software_srware_iron_faq.php">[web.archive.org]</a>
<a href="https://archive.fo/TXJbh">[archive.is]</a><br>
<a name="3">3.</a>
</li>
<li id="s3">
<a href="http://neugierig.org/software/chromium/notes/2009/12/iron.html">The story of Iron</a>
<a href="http://web.archive.org/web/20180427094010/http://neugierig.org/software/chromium/notes/2009/12/iron.html">[web.archive.org]</a><br>
</p>
</li>
</ol>
</div>
<hr>
<p><b>
This article was last edited on 11/20/2018
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
<center>
<b>This article was last edited on 11/20/2018</b>
<!--Dont change-->
<p>If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
<!--Dont change-->
</div>
</div>
</body>
</html>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang="en-us">
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang="en-us">
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,35 +1,41 @@
<!DOCTYPE HTML>
<html lang=”en-us”>
<!--Old Style-->
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<link rel="stylesheet" href="../style.css">
<meta charset="UTF-8">
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
<title>Slimjet - Spyware Watchdog</title>
<link rel="stylesheet" href="../style.css"/>
</head>
<body>
<img src="../images/slimjet_logo.png" alt="slimjet Logo">
<div class="case">
<div class="nav"><a href="index.html">&larr; Catalog</a></div>
<div class="main">
<img src="../images/slimjet_logo.png" alt="Slimjet Logo"/>
<h1>Slimjet</h1>
<p>
Slimjet is a clone of the SlimBrowser web browser from FlashPeak that uses the Chromium as a base.
</p>
<h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2>
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
<p>
Slimjet's website claims that it is very committed to user privacy, and that it blocks Google tracking, unlike Google Chrome<sup><a href="#1">[1]</a></sup>. However this claim is <b><font color=red>not true</font></b>. Slimjet is constantly sending information to google and connecting to google
Slimjet's website claims that it is very committed to user privacy, and that it blocks Google tracking, unlike Google Chrome<sup><a href="#s1">[1]</a></sup>. However this claim is <b><font color=red>not true</font></b>. Slimjet is constantly sending information to google and connecting to google
services. Slimjet claims to be concerned about privacy but ultimately retains just about all of the spyware features found in Google Chrome, as well as additional spyware added on by FlashPoint. In this way, Slimjet manages to implement all of the spyware that is found in browsers like Google Chrome, except instead of one company having this information, it's split up among several companies...
</p>
<h3>Phoning Home</h3>
<p>
Even though on its site, FlashPeak claims that: <i>"Slimjet doesn't send any usage data back to Google like Chrome."</i><sup><a href="#1">[1]</a></sup>
Even though on its site, FlashPeak claims that: <i>"Slimjet doesn't send any usage data back to Google like Chrome."</i><sup><a href="#s1">[1]</a></sup>
the moment I turn it on with MITMproxy running, I am greeted with this:
</p>
<img class="screenshot" src="../images/sj_google_requests.png" alt="Slimjet sending requests to all sorts of google services">
<p>
So, this claim just isn't true at all. It's still got a lot of Google's spyware in it, if it's still connecting to so many Google services. What's kind of surprising is that it didn't seem connect to any servers explicitly operated by FlashPeak when I was testing it. Even though, it claims to collect information about it's users for internal usage.<sup><a href="#2">[2]</a></sup> So, it must be phoning home as well as sending information to Google. Maybe it sends information through some kind of Google web service?
So, this claim just isn't true at all. It's still got a lot of Google's spyware in it, if it's still connecting to so many Google services. What's kind of surprising is that it didn't seem connect to any servers explicitly operated by FlashPeak when I was testing it. Even though, it claims to collect information about it's users for internal usage.<sup><a href="#s2">[2]</a></sup> So, it must be phoning home as well as sending information to Google. Maybe it sends information through some kind of Google web service?
</p>
<h3>Default Search Engine is Spyware</h3>
<p>
The default search engine is <a href="../articles/bing.html">Bing</a>, which sells your information to advertisers. If that isn't enough, it's
<i>"served from fpseek.com"</i> which means that not only are you exposing your information to Bing, this is also being logged by fpseek, which
has it's own privacy policy<sup><a href="#3">[3]</a></sup>. Whenever you search something using the default search engine, requests are sent to both Bing and fpseek.
has it's own privacy policy<sup><a href="#s3">[3]</a></sup>. Whenever you search something using the default search engine, requests are sent to both Bing and fpseek.
</p>
<img class="screenshot" src="../images/fpseek.png" alt="Fpseek connection">
<p>
@ -39,7 +45,7 @@ services. Slimjet claims to be concerned about privacy but ultimately retains ju
</p>
<p><i>
"...maintain and improve the quality and operation of the Software & Services, including, monitoring viewability of and interaction with advertisements, search results and other products and services provided by Company."
</i><sup><a href="#3">[3]</a></sup></p>
</i><sup><a href="#s3">[3]</a></sup></p>
<p>
So, it looks like your searches are sent to two advertising companies instead of just one. At the very least when the search engine is changed to
an alternative like DuckDuckGo the requests to fpseek stop.
@ -65,31 +71,37 @@ services. Slimjet claims to be concerned about privacy but ultimately retains ju
<p>
Obviously you can tell that any kind of service to sync your search history "in the cloud" is a privacy nightmare. Now both Google and Slimjet have access to your search history...
</p>
</div>
<hr>
<center>
<h2>Sources</h2>
<p>
<a name="1">1.</a>
<div class="footer">
<div class="sources">
<h4>Sources:</h4>
<ol>
<li id="s1">
<a href="https://www.slimjet.com/">Fastest web browser that automatically blocks ads</a>
<a href="http://web.archive.org/web/20180624103729/https://www.slimjet.com/">[web.archive.org]</a>
<a href="http://archive.is/67qZa">[archive.is]</a><br>
<a name="2">2.</a>
<a href="http://archive.is/67qZa">[archive.is]</a>
</li>
<li id="s2">
<a href="https://www.slimjet.com/en/privacy-policy.htm">Privacy Policy</a>
<a href="http://web.archive.org/web/20180624104143/https://www.slimjet.com/en/privacy-policy.htm">[web.archive.org]</a><br>
<a name="3">3.</a>
</li>
<li id="s3">
<a href="http://info.fpseek.com/privacy-policy/">Privacy Policy Fpseek</a>
<a href="http://web.archive.org/web/20170619202653/http://info.fpseek.com/privacy-policy/">[web.archive.org]</a>
<a href="http://archive.is/fHly1">[archive.is]</a><br>
</p>
</li>
</ol>
</div>
<hr>
<p><b>
This article was last edited on 8/4/2018
</b></p>
<p>
If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 liscence to be accepted.
</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 Liscence"></a>
<p><a href="../articles/index.html">Back to catalog</a></p>
</center>
<b>This article was last edited on 8/4/2018</b>
<!--Dont change-->
<p>If you want to edit this article, or contribute your own article(s), contact us on XMPP over in spyware@conference.nuegia.net, or visit us at the git repo on <a href="https://codeberg.org/TheShadow/SpywareWatchdog">Codeberg</a>.</p>
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
<a href="https://creativecommons.org/publicdomain/zero/1.0/legalcode"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
<!--Dont change-->
</div>
</div>
</body>
</html>

View File

@ -1,4 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
@ -7,7 +8,7 @@
</head>
<body>
<meta name="viewport" content="width=device-width, initial-scale=1">
<img src="../images/tor_logo.png" alt="TOR browser logo">
<img src="../images/tor_browser_logo.png" alt="TOR browser logo">
<h1>Tor Browser</h1>
<p>
Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.<sup><a href="#1">[1]</a></sup>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
@ -8,7 +9,7 @@
<body>
<meta name="viewport" content="width=device-width, initial-scale=1">
<img src="../images/ugc_logo.png" alt="Ungoogled-Chromium logo">
<img src="../images/chromium_logo.png" alt="Ungoogled-Chromium logo">
<h1>Ungoogled-Chromium</h1>
<p>
Ungoogled-chromium is Google Chromium, sans integration with <a href="../articles/google.html">Google</a>. It also features some tweaks to enhance privacy,

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>
@ -6,7 +7,7 @@
<title>Waterfox - Spyware Watchdog</title>
</head>
<body>
<img src="../images/waterfox logo.png" alt="Waterfox Logo">
<img src="../images/waterfox_logo.png" alt="Waterfox Logo">
<h1>Waterfox</h1>
<p>
Waterfox is a web browser that is a fork of <a href="../articles/firefox.html">Firefox</a>.
@ -22,7 +23,7 @@ information about you with Mozilla, and has other spyware features.
If you start up Waterfox for the first time, it will make <b><font color="red">109 requests</font></b><sup><a href="#5">[5]</a></sup> to several spyware platforms, most notably
Google Analytics, and Mozilla online services like its Geolocation service, and several other Mozilla services, as
well as Waterfox's own update service. You can look at a list of these requests
<a href="https://digdeeper.neocities.o../images/wfox.png">here</a> or a on mirror <a href="../images/wfox.png">here</a>.
<a href="../images/wfox.png">here</a> or a on mirror <a href="https://digdeeper.neocities.org/images/wfox.png">here</a>.
</p>
<h3>Waterfox has a communication problem</h3>
<p>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>

View File

@ -1,3 +1,4 @@
<!--Old Style-->
<!DOCTYPE HTML>
<html lang=”en-us”>
<head>

View File

@ -6,7 +6,7 @@
<title>Iridium Browser Spyware Mitigation Guide - Spyware Watchdog</title>
</head>
<body>
<img src="../images/iridium_logo.jpg">
<img src="../images/iridium_logo.png">
<h1>Iridium Browser Spyware Mitigation Guide</h1>
<p>
After configuring Iridium according to this guide it's rating changes like so:

Binary file not shown.

Before

Width:  |  Height:  |  Size: 14 KiB

After

Width:  |  Height:  |  Size: 17 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 5.8 KiB

After

Width:  |  Height:  |  Size: 3.8 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 4.9 KiB

After

Width:  |  Height:  |  Size: 3.5 KiB

View File

Before

Width:  |  Height:  |  Size: 11 KiB

After

Width:  |  Height:  |  Size: 11 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 5.7 KiB

After

Width:  |  Height:  |  Size: 3.1 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 21 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 24 KiB

After

Width:  |  Height:  |  Size: 31 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 22 KiB

After

Width:  |  Height:  |  Size: 17 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 11 KiB

BIN
images/iridium_logo.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 12 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 18 KiB

After

Width:  |  Height:  |  Size: 257 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 5.5 KiB

After

Width:  |  Height:  |  Size: 13 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 16 KiB

After

Width:  |  Height:  |  Size: 18 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 22 KiB

After

Width:  |  Height:  |  Size: 9.4 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 24 KiB

After

Width:  |  Height:  |  Size: 26 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 8.4 KiB

After

Width:  |  Height:  |  Size: 11 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 14 KiB

After

Width:  |  Height:  |  Size: 14 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 22 KiB

After

Width:  |  Height:  |  Size: 21 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 6.9 KiB

After

Width:  |  Height:  |  Size: 10 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 20 KiB

After

Width:  |  Height:  |  Size: 30 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 14 KiB

After

Width:  |  Height:  |  Size: 8.1 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 5.5 KiB

After

Width:  |  Height:  |  Size: 7.2 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 29 KiB

After

Width:  |  Height:  |  Size: 48 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 4.1 KiB

After

Width:  |  Height:  |  Size: 9.1 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 6.7 KiB

After

Width:  |  Height:  |  Size: 451 B

Binary file not shown.

Before

Width:  |  Height:  |  Size: 6.5 KiB

After

Width:  |  Height:  |  Size: 9.9 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 30 KiB

After

Width:  |  Height:  |  Size: 19 KiB

BIN
images/tor_browser_logo.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 13 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 24 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 5.9 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 13 KiB

After

Width:  |  Height:  |  Size: 20 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 9.1 KiB

After

Width:  |  Height:  |  Size: 5.0 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 18 KiB

BIN
images/waterfox_logo.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 10 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 9.0 KiB

After

Width:  |  Height:  |  Size: 6.4 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 14 KiB

After

Width:  |  Height:  |  Size: 4.5 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 8.3 KiB

After

Width:  |  Height:  |  Size: 3.9 KiB

View File

@ -9,7 +9,11 @@ p {
max-width: 780px;
margin: auto;
}
h1, h2, h3, h4, h5 {
h1,
h2,
h3,
h4,
h5 {
text-align: center;
margin-right: auto;
margin-left: auto;
@ -22,15 +26,15 @@ h4 {
margin-right: auto;
margin-left: 1vw;
}
:target a {
color: #959800;
}
a {
color: #006B9F;
color: #006b9f;
}
a:hover {
color: #094561;
}
:target a {
color: #959800;
}
.img-link a:hover {
border: none;
}
@ -49,14 +53,16 @@ img {
width: 780px;
}
hr {
border: 1px solid #1A1A1A;
border: 1px solid #1a1a1a;
}
ul {
max-width: 780px;
margin-left: auto;
margin-right: auto;
}
table, th, td {
table,
th,
td {
text-align: center;
border: 1px solid white;
margin-left: auto;
@ -115,23 +121,26 @@ xmp {
.nav a {
text-decoration: none;
}
.lime {
color: #00ff00;
}
.green {
color: #00981B;
color: #00981b;
}
.yellowgreen {
color: #C8E63C;
color: #c8e63c;
}
.yellow {
color: #FFFF00;
color: #ffff00;
}
.orange {
color: #FF6100;
color: #ff6100;
}
.red {
color: #FF0000;
color: #ff0000;
}
.case {
border: 2px solid #1A1A1A;
border: 2px solid #1a1a1a;
border-radius: 15px;
margin-left: 3vw;
margin-right: 3vw;
@ -144,10 +153,12 @@ xmp {
.main {
min-height: 60vh;
}
.sources, .futher {
.sources,
.futher {
text-align: left;
}
.footer, .center {
.footer,
.center {
margin-top: 1vh;
text-align: center;
}