Full restyling articles Part 4
This commit is contained in:
parent
8ad3e138eb
commit
60b7dcd6b0
|
@ -1,26 +1,21 @@
|
||||||
<!--Old Style-->
|
|
||||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||||
<head>
|
<head>
|
||||||
|
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||||
|
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||||
<link rel="stylesheet" href="../style.css"/>
|
<link rel="stylesheet" href="../style.css"/>
|
||||||
<meta charset="UTF-8">
|
|
||||||
<title>iTunes — Spyware Watchdog</title>
|
<title>iTunes — Spyware Watchdog</title>
|
||||||
</head>
|
</head>
|
||||||
<body>
|
<body>
|
||||||
<img src="../images/itunes_logo.png" alt="itunes logo">
|
<div class="case">
|
||||||
|
<div class="main">
|
||||||
|
<img src="../images/itunes_logo.png" alt="itunes logo"/>
|
||||||
<h1>iTunes</h1>
|
<h1>iTunes</h1>
|
||||||
<p>
|
<p>iTunes is a media player, media library, Internet radio broadcaster, and mobile device management application developed by Apple Inc.</p>
|
||||||
iTunes is a media player, media library, Internet radio broadcaster, and mobile device management application developed by Apple Inc.
|
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||||
</p>
|
<p>iTunes is a spyware music player developed by Apple that collects an enormous amount of information about its users. iTunes is riddled with numerous spyware features and types of information collection, and is integrated with Apple's spyware platforms. Apple is not subtle about its spyware- it explains what it does plainly and clearly, so there is no deception about the scope and level of privacy violations committed by its software.</p>
|
||||||
<h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2>
|
|
||||||
<p>
|
|
||||||
iTunes is a spyware music player developed by Apple that collects an enormous amount of information about its users. iTunes is riddled with numerous spyware features and types of information collection, and is integrated with Apple's spyware platforms. Apple is not subtle about its spyware- it explains what it does plainly and clearly, so there is no deception about the scope and level of privacy violations committed by its software.
|
|
||||||
</p>
|
|
||||||
<h3>iTunes is integrated into the Apple ID spyware platform</h3>
|
<h3>iTunes is integrated into the Apple ID spyware platform</h3>
|
||||||
<p>
|
<p>iTunes is integrated with the "Apple ID" spyware platform, which it requires for you to use certain features of the app. This spyware platform collects the following information from you<sup><a href="#s1">[1]</a></sup>:</p>
|
||||||
iTunes is integrated with the "Apple ID" spyware platform, which it requires for you to use certain features of the app.
|
|
||||||
This spyware platform collects the following information from you<sup><a href="#1">[1]</a></sup>:
|
|
||||||
</p>
|
|
||||||
<ul>
|
<ul>
|
||||||
<li>Name</li>
|
<li>Name</li>
|
||||||
<li>Mailing address</li>
|
<li>Mailing address</li>
|
||||||
|
@ -29,64 +24,31 @@ This spyware platform collects the following information from you<sup><a href="#
|
||||||
<li>Credit card information</li>
|
<li>Credit card information</li>
|
||||||
</ul>
|
</ul>
|
||||||
<h3>Phoning Home</h3>
|
<h3>Phoning Home</h3>
|
||||||
<p>
|
<p>Whenever you open iTunes, these two requests are immediately made:</p>
|
||||||
Whenever you open iTunes, these two requests are immediately made:
|
<img class="screenshot" src="../images/itunes_spyware1.png" alt="iTunes unsolicited network requests"/>
|
||||||
</p>
|
<p><a href="https://support.apple.com/en-us/HT201999">Here</a><sup><a href="#s2">[2]</a></sup> is a list of all of the domains that iTunes will connect too. So, whenever you start up iTunes, you are immediately checked into the botnet. It's not clarified exactly what iTunes is connected to for what reason. The only hint we have comes from this passage in the privacy policy<sup><a href="#s1">[1]</a></sup>:</p>
|
||||||
<img src="../images/itunes_spyware1.png" alt="iTunes unsolicited network requests">
|
<p><i>"We may collect information such as occupation, language, zip code, area code, unique device identifier, referrer URL, location, and the time zone where an Apple product is used so that we can better understand customer behavior and improve our products, services, and advertising."</i></p>
|
||||||
<p>
|
<p>So, we can only assume that iTunes is collecting all of this information, or at least as much of it as it can get, from you and sending it back to apple.</p>
|
||||||
<a href="https://support.apple.com/en-us/HT201999">Here</a><sup><a href="#2">[2]</a></sup> is a list of all of the domains that iTunes will connect too.
|
|
||||||
So, whenever you start up iTunes, you are immediately checked into the botnet. It's not clarified exactly what iTunes is
|
|
||||||
connected to for what reason. The only hint we have comes from this passage in the privacy policy<sup><a href="#1">[1]</a></sup>:
|
|
||||||
</p>
|
|
||||||
<p><i>
|
|
||||||
"We may collect information such as occupation, language, zip code, area code, unique device identifier, referrer URL, location, and the time zone where an Apple product is used so that we can better understand customer behavior and improve our products, services, and advertising."
|
|
||||||
</i></p>
|
|
||||||
<p>
|
|
||||||
So, we can only assume that iTunes is collecting all of this information, or at least as much of it as it can get, from you and sending it back to apple.
|
|
||||||
</p>
|
|
||||||
<h3>Apple sells your personal information</h3>
|
<h3>Apple sells your personal information</h3>
|
||||||
<p>
|
<p>Apple is very up-front about this in its privacy policy<sup><a href="#s1">[1]</a></sup>:</p>
|
||||||
Apple is very up-front about this in its privacy policy<sup><a href="#1">[1]</a></sup>:
|
<p><i>"Apple shares personal information with companies who provide services such as information processing, extending credit, fulfilling customer orders, delivering products to you, managing and enhancing customer data, providing customer service, assessing your interest in our products and services, and conducting customer research or satisfaction surveys."</i></p>
|
||||||
</P>
|
<p>So, there can be no illusion or mistake about what happens to the information you provide to iTunes — it will be sold to datamining companies.</p>
|
||||||
<p><i>
|
</div>
|
||||||
"Apple shares personal information with companies who provide services such as information processing, extending credit, fulfilling customer orders, delivering products to you, managing and enhancing customer data, providing customer service, assessing your interest in our products and services, and conducting customer research or satisfaction surveys."
|
<hr/>
|
||||||
</i></p>
|
<div class="footer">
|
||||||
<p>
|
<div class="sources">
|
||||||
So, there can be no illusion or mistake about what happens to the information you provide to iTunes — it will be sold to datamining companies.
|
<h4>Sources:</h4>
|
||||||
</p>
|
<ol>
|
||||||
|
<li id="s1"><a href="https://www.apple.com/legal/privacy/en-ww/">Apple Privacy Policy</a> <a href="http://webarchive.loc.gov/all/20160817232247/http://www.apple.com/legal/privacy/en-ww/">[webarchive.loc.gov]</a> <a href="https://web.archive.org/web/20180529202128/https://www.apple.com/legal/privacy/en-ww/">[web.archive.org]</a> <a href="http://www.webcitation.org/6xDCQswT1">[www.webcitation.org]</a> <a href="https://webarchive.nrscotland.gov.uk/20170609165052/https://apple.com/legal/privacy/en-ww/">[webarchive.nrscotland.gov.uk]</a> <a href="http://arquivo.pt/wayback/20161102151804/https://www.apple.com/legal/privacy/en-ww/">[arquivo.pt]</a> <a href="http://collection.europarchive.org/nli/20160627122417/http://www.apple.com/legal/privacy/en-ww/">[collection.europarchive.org]</a> <a href="https://archive.is/KdMGe">[archive.is]</a></li>
|
||||||
<hr>
|
<li id="s2"><a href="https://support.apple.com/en-us/HT201999">About macOS, iOS, and iTunes server host connections and iTunes background processes</a> <a href="https://web.archive.org/web/20180523044139/https://support.apple.com/en-us/HT201999">[web.archive.org]</a> <a href="http://webarchive.loc.gov/all/20160817153143/https://support.apple.com/en-us/HT201999">[webarchive.loc.gov]</a> <a href="https://archive.is/KNtlQ">[archive.is]</a></li>
|
||||||
<center>
|
</ol>
|
||||||
<h2>Sources</h2>
|
</div>
|
||||||
<p>
|
<hr/>
|
||||||
<a name="1">1.</a>
|
<b>This article was last edited on 5/12/2018</b>
|
||||||
<a href="https://www.apple.com/legal/privacy/en-ww/">Apple Privacy Policy</a>
|
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||||
<a href="http://webarchive.loc.gov/all/20160817232247/http://www.apple.com/legal/privacy/en-ww/">[webarchive.loc.gov]</a>
|
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||||
<a href="https://web.archive.org/web/20180529202128/https://www.apple.com/legal/privacy/en-ww/">[web.archive.org]</a>
|
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||||
<a href="http://www.webcitation.org/6xDCQswT1">[www.webcitation.org]</a>
|
</div>
|
||||||
<a href="https://webarchive.nrscotland.gov.uk/20170609165052/https://apple.com/legal/privacy/en-ww/">[webarchive.nrscotland.gov.uk]</a>
|
</div>
|
||||||
<a href="http://arquivo.pt/wayback/20161102151804/https://www.apple.com/legal/privacy/en-ww/">[arquivo.pt]</a>
|
|
||||||
<a href="http://collection.europarchive.org/nli/20160627122417/http://www.apple.com/legal/privacy/en-ww/">[collection.europarchive.org]</a>
|
|
||||||
<a href="https://archive.is/KdMGe">[archive.is]</a><br>
|
|
||||||
|
|
||||||
<a name="2">2.</a>
|
|
||||||
<a href="https://support.apple.com/en-us/HT201999">About macOS, iOS, and iTunes server host connections and iTunes background processes</a>
|
|
||||||
<a href="https://web.archive.org/web/20180523044139/https://support.apple.com/en-us/HT201999">[web.archive.org]</a>
|
|
||||||
<a href="http://webarchive.loc.gov/all/20160817153143/https://support.apple.com/en-us/HT201999">[webarchive.loc.gov]</a>
|
|
||||||
<a href="https://archive.is/KNtlQ">[archive.is]</a><br>
|
|
||||||
|
|
||||||
</p>
|
|
||||||
|
|
||||||
|
|
||||||
<hr>
|
|
||||||
<p><b>
|
|
||||||
This article was last edited on 5/12/2018
|
|
||||||
</b></p>
|
|
||||||
<p>
|
|
||||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
|
||||||
</p>
|
|
||||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
|
||||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
|
||||||
</center>
|
|
||||||
</body>
|
</body>
|
||||||
</html>
|
</html>
|
||||||
|
|
|
@ -1,22 +1,22 @@
|
||||||
<!--Old Style-->
|
|
||||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||||
<head>
|
<head>
|
||||||
<link rel="stylesheet" href="../style.css"/>
|
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||||
<meta charset="UTF-8">
|
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||||
<title>Razer — Spyware Watchdog</title>
|
<title>Razer — Spyware Watchdog</title>
|
||||||
|
<link rel="stylesheet" href="../style.css"/>
|
||||||
</head>
|
</head>
|
||||||
<body>
|
<body>
|
||||||
<img src="../images/razer_logo.png">
|
<div class="case">
|
||||||
|
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||||
|
<div class="main">
|
||||||
|
<img src="../images/razer_logo.png" alt="Razer Logo"/>
|
||||||
<h1>Razer</h1>
|
<h1>Razer</h1>
|
||||||
<p>Razer is a company that makes software and hardware for gamers.</p>
|
<p>Razer is a company that makes software and hardware for gamers.</p>
|
||||||
|
<h2>Spyware level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||||
<h2>Spyware level: <b style="color:red;">EXTREMELY HIGH</b></h2>
|
|
||||||
|
|
||||||
<h3>Data collection</h3>
|
<h3>Data collection</h3>
|
||||||
<p>Razer confirms that they collect this data:</p>
|
<p>Razer confirms that they collect this data:</p>
|
||||||
<ul>
|
<ul>
|
||||||
|
|
||||||
<li>E-mail</li>
|
<li>E-mail</li>
|
||||||
<li>Full name</li>
|
<li>Full name</li>
|
||||||
<li>Contact info</li>
|
<li>Contact info</li>
|
||||||
|
@ -25,43 +25,32 @@
|
||||||
<li>Info you send via polls</li>
|
<li>Info you send via polls</li>
|
||||||
<li>IP, geolocation, OS and browser version</li>
|
<li>IP, geolocation, OS and browser version</li>
|
||||||
</ul>
|
</ul>
|
||||||
|
<p>Razer also admits<sup><a href="#s1">[1]</a><a href="#s2">[2]</a></sup> that they sell users' info. They also claim that the employees can see this data. Razer FORCES you to create an account to use YOUR products.</p>
|
||||||
<p>
|
<img class="screenshot" src="../images/theevidence.png" alt="screenshot"/>
|
||||||
Razer also admits<sup><a href="#1">[1]</a><a href="#2">[2]</a></sup> that they sell users' info. They also claim that the employees can see this data.
|
<p>Where is the option "Sign in later" at? Without an account, you CAN'T configure your keyboard, change your mouse DPI and RGB configuration and such, this means that the configurations you set to your (Razer) peripherals are in somebody else's PC, and Razer knows who has that (your) info.</p>
|
||||||
Razer FORCES you to create an account to use YOUR products.
|
</div>
|
||||||
</p>
|
<hr/>
|
||||||
<img class="screenshot" src="../images/theevidence.png">
|
<div class="footer">
|
||||||
<p>
|
<div class="futher">
|
||||||
Where is the option "Sign in later" at? Without an account, you CAN'T configure your keyboard,
|
<h4>Further reading:</h4>
|
||||||
change your mouse DPI and RGB configuration and such, this means that the configurations you set to your (Razer) peripherals are in somebody
|
<ol>
|
||||||
else's PC, and Razer knows who has that (your) info.
|
<li><a href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a></li>
|
||||||
</p>
|
</ol>
|
||||||
|
</div>
|
||||||
<hr>
|
<hr/>
|
||||||
<center>
|
<div class="sources">
|
||||||
<h2>Further reading</h2>
|
<h4>Sources:</h4>
|
||||||
<a href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a>
|
<ol>
|
||||||
<hr>
|
<li id="s1"><a href="https://www.razer.com/legal/privacy-policy">Razer — Privacy Policy | Razer United States</a> <a href="https://archive.fo/sVOGz">[archive.is]</a></li>
|
||||||
<h2>Credit</h2>
|
<li id="s2"><a href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a> <a href="https://archive.fo/sjgDR">[archive.is]</a></li>
|
||||||
<p>This article was written by:
|
</ol>
|
||||||
<a href="mailto:qorg[@]vxempire.xyz">qorg11</a>
|
</div>
|
||||||
</p>
|
<hr/>
|
||||||
<hr>
|
<b>This article was translated on 3/10/2019</b>
|
||||||
<h2>References</h2>
|
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||||
<p>1. <a id="1" href="https://www.razer.com/legal/privacy-policy">Razer — Privacy Policy | Razer United States</a> <a href="https://archive.fo/sVOGz">[archive.is]</a><br>
|
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||||
2. <a id="2" href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a> <a href="https://archive.fo/sjgDR">[archive.is]</a></p>
|
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||||
|
</div>
|
||||||
<hr>
|
</div>
|
||||||
<p><b>
|
|
||||||
This article was translated on 3/10/2019<br>
|
|
||||||
This is a translation of the Spanish article. It may become outdated in the future. Check the dates on both articles.
|
|
||||||
</b></p>
|
|
||||||
|
|
||||||
<p>
|
|
||||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
|
||||||
</p>
|
|
||||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
|
||||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
|
||||||
</center>
|
|
||||||
</body>
|
</body>
|
||||||
</html>
|
</html>
|
||||||
|
|
|
@ -1,29 +1,22 @@
|
||||||
<!--Old Style-->
|
|
||||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||||
<head>
|
<head>
|
||||||
|
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||||
|
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||||
<link rel="stylesheet" href="../style.css"/>
|
<link rel="stylesheet" href="../style.css"/>
|
||||||
<meta charset="UTF-8">
|
|
||||||
<title>Redshell — Spyware Watchdog</title>
|
<title>Redshell — Spyware Watchdog</title>
|
||||||
</head>
|
</head>
|
||||||
<body>
|
<body>
|
||||||
<img src="../images/redshell_logo.png" alt="redshell Logo">
|
<div class="case">
|
||||||
|
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||||
|
<div class="main">
|
||||||
|
<img src="../images/redshell_logo.png" alt="redshell Logo"/>
|
||||||
<h1>Redshell</h1>
|
<h1>Redshell</h1>
|
||||||
<p>
|
<p>Redshell is a spyware platform that is integrated into many video games.</p>
|
||||||
Redshell is a spyware platform that is integrated into many video games.
|
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||||
</p>
|
<p>Redshell is a spyware platform. Its purpose is to collect huge amounts of information about its user's computers to try and connect marketing data (collected through other spyware platforms) to actual results. It fingerprints any computers it is attached too and phones home. It also collects information about how a player has been interacting with the video game that it is embedded in. It's strongly recommended that any programs that embed this spyware are avoided entirely.</p>
|
||||||
<h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2>
|
|
||||||
<p>
|
|
||||||
Redshell is a spyware platform. Its purpose is to collect huge amounts of information about its user's computers
|
|
||||||
to try and connect marketing data (collected through other spyware platforms) to actual results. It fingerprints
|
|
||||||
any computers it is attached too and phones home. It also collects information about how a player has been interacting
|
|
||||||
with the video game that it is embedded in. It's strongly recommended that any programs that embed this spyware are
|
|
||||||
avoided entirely.
|
|
||||||
</p>
|
|
||||||
<h3>Redshell collects a huge amount of information from its users machines</h3>
|
<h3>Redshell collects a huge amount of information from its users machines</h3>
|
||||||
<p>
|
<p>Redshell has confirmed that it collects the following information<sup><a href="#s1">[1]</a></sup>:</p>
|
||||||
Redshell has confirmed that it collects the following information<sup><a href="#1">[1]</a></sup>:
|
|
||||||
</p>
|
|
||||||
<ul>
|
<ul>
|
||||||
<li>Operating System</li>
|
<li>Operating System</li>
|
||||||
<li>Installed Browsers</li>
|
<li>Installed Browsers</li>
|
||||||
|
@ -34,57 +27,36 @@ avoided entirely.
|
||||||
<li>System Language</li>
|
<li>System Language</li>
|
||||||
<li>Game-Specific UUID</li>
|
<li>Game-Specific UUID</li>
|
||||||
</ul>
|
</ul>
|
||||||
<p>
|
<p>This is obviously a very large amount of information being mined. The purpose of this is to fingerprint the user as well as possible, destroying any kind of anonymity. It goes beyond most spyware programs in the information it collects, by scanning your computer for installed programs and collecting various demographic information about the user. It's very clear that this is a huge amount of personal information to be collecting, despite all of the claims on the official website about how innocent this data is.</p>
|
||||||
This is obviously a very large amount of information being mined. The purpose of this is to fingerprint the user as well
|
|
||||||
as possible, destroying any kind of anonymity. It goes beyond most spyware programs in the information it collects, by
|
|
||||||
scanning your computer for installed programs and collecting various demographic information about the user. It's very clear
|
|
||||||
that this is a huge amount of personal information to be collecting, despite all of the claims on the official website about how
|
|
||||||
innocent this data is.
|
|
||||||
<p>
|
|
||||||
<h3>Phoning home</h3>
|
<h3>Phoning home</h3>
|
||||||
<p>
|
<p>Redshell is designed to phone home at its client's (the game developer) whim. Any program using Redshell will phone home with personal information in a way peculiar to that program.</p>
|
||||||
Redshell is designed to phone home at its client's (the game developer) whim. Any program using Redshell will phone home with
|
|
||||||
personal information in a way peculiar to that program.
|
|
||||||
</p>
|
|
||||||
<h3>Sharing Information with third parties</h3>
|
<h3>Sharing Information with third parties</h3>
|
||||||
<p>
|
<p>Redshell clearly says that it shares any kind of marketing data with third parties<sup><a href="#s1">[1]</a></sup>:</p>
|
||||||
Redshell clearly says that it shares any kind of marketing data with third parties<sup><a href="#1">[1]</a></sup>:
|
<p><i>"For example: Studio X wants to run ads through Google AdWords. When a potential customer clicks on an that ad, they are sent through our tracking link and redirected to the destination set by the studio (in the same way a bitly link works) — usually their game's Steam page. AdWords provides us with unique id for that user and if they end up playing the game, we tell AdWords so they know the ad was effective."
|
||||||
</p>
|
|
||||||
<p><i>
|
|
||||||
"For example: Studio X wants to run ads through Google AdWords. When a potential customer clicks on an that ad, they are sent through our tracking link and redirected to the destination set by the studio (in the same way a bitly link works) — usually their game's Steam page. AdWords provides us with unique id for that user and if they end up playing the game, we tell AdWords so they know the ad was effective."
|
|
||||||
</i></p>
|
</i></p>
|
||||||
<p>
|
<p>Of course, the words "integrated partner" are used to describe these third parties. The bottom line is that other people are being given this information. There is also an important distinction to make when talking about this: as Redshell's spyware is a product, Redshell does not actually have control over what the buyers of that product can do. So, just because Redshell doesn't sell the information its spyware collects about it's users to third parties, that doesn't mean that the buyers of the product do not or will not sell the information that they collect through Redshell to third parties.</p>
|
||||||
Of course, the words "integrated partner" are used to describe these third parties. The bottom line is that other people are being
|
</div>
|
||||||
given this information. There is also an important distinction to make when talking about this: as Redshell's spyware is a product,
|
<hr/>
|
||||||
Redshell does not actually have control over what the buyers of that product can do. So, just because Redshell doesn't sell the
|
<div class="footer">
|
||||||
information its spyware collects about it's users to third parties, that doesn't mean that the buyers of the product do not or
|
<div class="futher">
|
||||||
will not sell the information that they collect through Redshell to third parties.
|
<h4>Further Reading:</h4>
|
||||||
</p>
|
<ol>
|
||||||
<hr>
|
<li><a href="https://old.reddit.com/r/Steam/comments/8pud8b/psa_red_shell_spyware_holy_potatoes_were_in_space/">[PSA] RED SHELL Spyware — "Holy Potatoes! We’re in Space?!" integrated and removed it after complaints</a> <a href="https://snew.github.io/r/Steam/comments/8pud8b/">[snew.github.io]</a> <a href="http://archive.is/jwlur">[archive.is]</a></li>
|
||||||
<center>
|
</ol>
|
||||||
<h3>Further Reading</h3>
|
</div>
|
||||||
<p>
|
<hr/>
|
||||||
<a href="https://old.reddit.com/r/Steam/comments/8pud8b/psa_red_shell_spyware_holy_potatoes_were_in_space/">[PSA] RED SHELL Spyware — "Holy Potatoes! We’re in Space?!" integrated and removed it after complaints</a>
|
<div class="sources">
|
||||||
<a href="https://snew.github.io/r/Steam/comments/8pud8b/">[snew.github.io]</a>
|
<h4>Sources:</h4>
|
||||||
<a href="http://archive.is/jwlur">[archive.is]</a>
|
<ol>
|
||||||
</p>
|
<li id="s1"><a href="https://www.redshell.io/gamers">Hi there, we're Red Shell.</a> <a href="https://web.archive.org/web/20180710040517/https://redshell.io/gamers">[web.archive.org]</a></li>
|
||||||
<hr>
|
</ol>
|
||||||
<h2>Sources</h2>
|
</div>
|
||||||
<p>
|
<hr/>
|
||||||
<a name="1">1.</a>
|
<b>This article was last edited on 7/16/2018</b>
|
||||||
<a href="https://www.redshell.io/gamers">Hi there, we're Red Shell.</a>
|
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||||
<a href="https://web.archive.org/web/20180710040517/https://redshell.io/gamers">[web.archive.org]</a>
|
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||||
<br>
|
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||||
</p>
|
</div>
|
||||||
<hr>
|
</div>
|
||||||
<p><b>
|
|
||||||
This article was last edited on 7/16/2018
|
|
||||||
</b></p>
|
|
||||||
<p>
|
|
||||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
|
||||||
</p>
|
|
||||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
|
||||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
|
||||||
</center>
|
|
||||||
</body>
|
</body>
|
||||||
</html>
|
</html>
|
||||||
|
|
Loading…
Reference in New Issue