From 60b7dcd6b01a8ca6d8e2ab16cd7a32af066a5f7d Mon Sep 17 00:00:00 2001 From: codddfeea Date: Sun, 8 May 2022 22:09:27 +0300 Subject: [PATCH] Full restyling articles Part 4 --- articles/itunes.html | 130 ++++++++++++++------------------------- articles/razer.html | 109 +++++++++++++++------------------ articles/redshell.html | 136 ++++++++++++++++------------------------- 3 files changed, 149 insertions(+), 226 deletions(-) diff --git a/articles/itunes.html b/articles/itunes.html index 1033c12..b889115 100644 --- a/articles/itunes.html +++ b/articles/itunes.html @@ -1,92 +1,54 @@ - - + + + - iTunes — Spyware Watchdog - itunes logo -

iTunes

-

-iTunes is a media player, media library, Internet radio broadcaster, and mobile device management application developed by Apple Inc. -

-

Spyware Level: EXTREMELY HIGH

-

-iTunes is a spyware music player developed by Apple that collects an enormous amount of information about its users. iTunes is riddled with numerous spyware features and types of information collection, and is integrated with Apple's spyware platforms. Apple is not subtle about its spyware- it explains what it does plainly and clearly, so there is no deception about the scope and level of privacy violations committed by its software. -

-

iTunes is integrated into the Apple ID spyware platform

-

-iTunes is integrated with the "Apple ID" spyware platform, which it requires for you to use certain features of the app. -This spyware platform collects the following information from you[1]: -

- -

Phoning Home

-

-Whenever you open iTunes, these two requests are immediately made: -

- iTunes unsolicited network requests -

-Here[2] is a list of all of the domains that iTunes will connect too. -So, whenever you start up iTunes, you are immediately checked into the botnet. It's not clarified exactly what iTunes is -connected to for what reason. The only hint we have comes from this passage in the privacy policy[1]: -

-

- "We may collect information such as occupation, language, zip code, area code, unique device identifier, referrer URL, location, and the time zone where an Apple product is used so that we can better understand customer behavior and improve our products, services, and advertising." -

-

-So, we can only assume that iTunes is collecting all of this information, or at least as much of it as it can get, from you and sending it back to apple. -

-

Apple sells your personal information

-

-Apple is very up-front about this in its privacy policy[1]: -

-

- "Apple shares personal information with companies who provide services such as information processing, extending credit, fulfilling customer orders, delivering products to you, managing and enhancing customer data, providing customer service, assessing your interest in our products and services, and conducting customer research or satisfaction surveys." -

-

-So, there can be no illusion or mistake about what happens to the information you provide to iTunes — it will be sold to datamining companies. -

- -
-
-

Sources

-

- 1. - Apple Privacy Policy - [webarchive.loc.gov] - [web.archive.org] - [www.webcitation.org] - [webarchive.nrscotland.gov.uk] - [arquivo.pt] - [collection.europarchive.org] - [archive.is]
- - 2. - About macOS, iOS, and iTunes server host connections and iTunes background processes - [web.archive.org] - [webarchive.loc.gov] - [archive.is]
- -

- - -
-

- This article was last edited on 5/12/2018 -

-

- If you want to edit this article, or contribute your own article(s), visit us at the git repo on Codeberg. All contributions must be licensed under the CC0 license to be accepted. -

- CC0 License -

Back to catalog

-
+
+
+ itunes logo +

iTunes

+

iTunes is a media player, media library, Internet radio broadcaster, and mobile device management application developed by Apple Inc.

+

Spyware Level: EXTREMELY HIGH

+

iTunes is a spyware music player developed by Apple that collects an enormous amount of information about its users. iTunes is riddled with numerous spyware features and types of information collection, and is integrated with Apple's spyware platforms. Apple is not subtle about its spyware- it explains what it does plainly and clearly, so there is no deception about the scope and level of privacy violations committed by its software.

+

iTunes is integrated into the Apple ID spyware platform

+

iTunes is integrated with the "Apple ID" spyware platform, which it requires for you to use certain features of the app. This spyware platform collects the following information from you[1]:

+
    +
  • Name
  • +
  • Mailing address
  • +
  • Phone Number
  • +
  • E-Mail address
  • +
  • Credit card information
  • +
+

Phoning Home

+

Whenever you open iTunes, these two requests are immediately made:

+ iTunes unsolicited network requests +

Here[2] is a list of all of the domains that iTunes will connect too. So, whenever you start up iTunes, you are immediately checked into the botnet. It's not clarified exactly what iTunes is connected to for what reason. The only hint we have comes from this passage in the privacy policy[1]:

+

"We may collect information such as occupation, language, zip code, area code, unique device identifier, referrer URL, location, and the time zone where an Apple product is used so that we can better understand customer behavior and improve our products, services, and advertising."

+

So, we can only assume that iTunes is collecting all of this information, or at least as much of it as it can get, from you and sending it back to apple.

+

Apple sells your personal information

+

Apple is very up-front about this in its privacy policy[1]:

+

"Apple shares personal information with companies who provide services such as information processing, extending credit, fulfilling customer orders, delivering products to you, managing and enhancing customer data, providing customer service, assessing your interest in our products and services, and conducting customer research or satisfaction surveys."

+

So, there can be no illusion or mistake about what happens to the information you provide to iTunes — it will be sold to datamining companies.

+
+
+ +
diff --git a/articles/razer.html b/articles/razer.html index 5037cf8..abb1068 100644 --- a/articles/razer.html +++ b/articles/razer.html @@ -1,67 +1,56 @@ - - - - + + + Razer — Spyware Watchdog + - -

Razer

-

Razer is a company that makes software and hardware for gamers.

- -

Spyware level: EXTREMELY HIGH

- -

Data collection

-

Razer confirms that they collect this data:

- - -

- Razer also admits[1][2] that they sell users' info. They also claim that the employees can see this data. - Razer FORCES you to create an account to use YOUR products. -

- -

- Where is the option "Sign in later" at? Without an account, you CAN'T configure your keyboard, - change your mouse DPI and RGB configuration and such, this means that the configurations you set to your (Razer) peripherals are in somebody - else's PC, and Razer knows who has that (your) info. -

- -
-
-

Further reading

- The Razer Synapse 2.0 spy ware -
-

Credit

-

This article was written by: - qorg11 -

-
-

References

-

1. Razer — Privacy Policy | Razer United States [archive.is]
- 2. The Razer Synapse 2.0 spy ware [archive.is]

- -
-

- This article was translated on 3/10/2019
- This is a translation of the Spanish article. It may become outdated in the future. Check the dates on both articles. -

- -

- If you want to edit this article, or contribute your own article(s), visit us at the git repo on Codeberg. All contributions must be licensed under the CC0 license to be accepted. -

- CC0 License -

Back to catalog

-
+
+ +
+ Razer Logo +

Razer

+

Razer is a company that makes software and hardware for gamers.

+

Spyware level: EXTREMELY HIGH

+

Data collection

+

Razer confirms that they collect this data:

+
    +
  • E-mail
  • +
  • Full name
  • +
  • Contact info
  • +
  • Info you send when you contact them (texts and such)
  • +
  • The time you use their services and products
  • +
  • Info you send via polls
  • +
  • IP, geolocation, OS and browser version
  • +
+

Razer also admits[1][2] that they sell users' info. They also claim that the employees can see this data. Razer FORCES you to create an account to use YOUR products.

+ screenshot +

Where is the option "Sign in later" at? Without an account, you CAN'T configure your keyboard, change your mouse DPI and RGB configuration and such, this means that the configurations you set to your (Razer) peripherals are in somebody else's PC, and Razer knows who has that (your) info.

+
+
+ +
diff --git a/articles/redshell.html b/articles/redshell.html index 49e26d2..1df8a30 100644 --- a/articles/redshell.html +++ b/articles/redshell.html @@ -1,90 +1,62 @@ - - + + + - Redshell — Spyware Watchdog - redshell Logo -

Redshell

-

-Redshell is a spyware platform that is integrated into many video games. -

-

Spyware Level: EXTREMELY HIGH

-

-Redshell is a spyware platform. Its purpose is to collect huge amounts of information about its user's computers -to try and connect marketing data (collected through other spyware platforms) to actual results. It fingerprints -any computers it is attached too and phones home. It also collects information about how a player has been interacting -with the video game that it is embedded in. It's strongly recommended that any programs that embed this spyware are -avoided entirely. -

-

Redshell collects a huge amount of information from its users machines

-

- Redshell has confirmed that it collects the following information[1]: -

- -

- This is obviously a very large amount of information being mined. The purpose of this is to fingerprint the user as well - as possible, destroying any kind of anonymity. It goes beyond most spyware programs in the information it collects, by - scanning your computer for installed programs and collecting various demographic information about the user. It's very clear - that this is a huge amount of personal information to be collecting, despite all of the claims on the official website about how - innocent this data is. -

-

Phoning home

-

- Redshell is designed to phone home at its client's (the game developer) whim. Any program using Redshell will phone home with - personal information in a way peculiar to that program. -

-

Sharing Information with third parties

-

- Redshell clearly says that it shares any kind of marketing data with third parties[1]: -

-

- "For example: Studio X wants to run ads through Google AdWords. When a potential customer clicks on an that ad, they are sent through our tracking link and redirected to the destination set by the studio (in the same way a bitly link works) — usually their game's Steam page. AdWords provides us with unique id for that user and if they end up playing the game, we tell AdWords so they know the ad was effective." -

-

- Of course, the words "integrated partner" are used to describe these third parties. The bottom line is that other people are being - given this information. There is also an important distinction to make when talking about this: as Redshell's spyware is a product, - Redshell does not actually have control over what the buyers of that product can do. So, just because Redshell doesn't sell the - information its spyware collects about it's users to third parties, that doesn't mean that the buyers of the product do not or - will not sell the information that they collect through Redshell to third parties. -

-
-
-

Further Reading

-

-[PSA] RED SHELL Spyware — "Holy Potatoes! We’re in Space?!" integrated and removed it after complaints -[snew.github.io] -[archive.is] -

-
-

Sources

-

- 1. - Hi there, we're Red Shell. - [web.archive.org] -
-

-
-

- This article was last edited on 7/16/2018 -

-

- If you want to edit this article, or contribute your own article(s), visit us at the git repo on Codeberg. All contributions must be licensed under the CC0 license to be accepted. -

- CC0 License -

Back to catalog

-
+
+ +
+ redshell Logo +

Redshell

+

Redshell is a spyware platform that is integrated into many video games.

+

Spyware Level: EXTREMELY HIGH

+

Redshell is a spyware platform. Its purpose is to collect huge amounts of information about its user's computers to try and connect marketing data (collected through other spyware platforms) to actual results. It fingerprints any computers it is attached too and phones home. It also collects information about how a player has been interacting with the video game that it is embedded in. It's strongly recommended that any programs that embed this spyware are avoided entirely.

+

Redshell collects a huge amount of information from its users machines

+

Redshell has confirmed that it collects the following information[1]:

+
    +
  • Operating System
  • +
  • Installed Browsers
  • +
  • Available Fonts
  • +
  • Screen Resolution
  • +
  • IP Address
  • +
  • Timezone
  • +
  • System Language
  • +
  • Game-Specific UUID
  • +
+

This is obviously a very large amount of information being mined. The purpose of this is to fingerprint the user as well as possible, destroying any kind of anonymity. It goes beyond most spyware programs in the information it collects, by scanning your computer for installed programs and collecting various demographic information about the user. It's very clear that this is a huge amount of personal information to be collecting, despite all of the claims on the official website about how innocent this data is.

+

Phoning home

+

Redshell is designed to phone home at its client's (the game developer) whim. Any program using Redshell will phone home with personal information in a way peculiar to that program.

+

Sharing Information with third parties

+

Redshell clearly says that it shares any kind of marketing data with third parties[1]:

+

"For example: Studio X wants to run ads through Google AdWords. When a potential customer clicks on an that ad, they are sent through our tracking link and redirected to the destination set by the studio (in the same way a bitly link works) — usually their game's Steam page. AdWords provides us with unique id for that user and if they end up playing the game, we tell AdWords so they know the ad was effective." +

+

Of course, the words "integrated partner" are used to describe these third parties. The bottom line is that other people are being given this information. There is also an important distinction to make when talking about this: as Redshell's spyware is a product, Redshell does not actually have control over what the buyers of that product can do. So, just because Redshell doesn't sell the information its spyware collects about it's users to third parties, that doesn't mean that the buyers of the product do not or will not sell the information that they collect through Redshell to third parties.

+
+
+ +