Full restyling articles Part 4
This commit is contained in:
parent
8ad3e138eb
commit
60b7dcd6b0
|
@ -1,92 +1,54 @@
|
||||||
<!--Old Style-->
|
|
||||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||||
<head>
|
<head>
|
||||||
|
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||||
|
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||||
<link rel="stylesheet" href="../style.css"/>
|
<link rel="stylesheet" href="../style.css"/>
|
||||||
<meta charset="UTF-8">
|
|
||||||
<title>iTunes — Spyware Watchdog</title>
|
<title>iTunes — Spyware Watchdog</title>
|
||||||
</head>
|
</head>
|
||||||
<body>
|
<body>
|
||||||
<img src="../images/itunes_logo.png" alt="itunes logo">
|
<div class="case">
|
||||||
<h1>iTunes</h1>
|
<div class="main">
|
||||||
<p>
|
<img src="../images/itunes_logo.png" alt="itunes logo"/>
|
||||||
iTunes is a media player, media library, Internet radio broadcaster, and mobile device management application developed by Apple Inc.
|
<h1>iTunes</h1>
|
||||||
</p>
|
<p>iTunes is a media player, media library, Internet radio broadcaster, and mobile device management application developed by Apple Inc.</p>
|
||||||
<h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2>
|
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||||
<p>
|
<p>iTunes is a spyware music player developed by Apple that collects an enormous amount of information about its users. iTunes is riddled with numerous spyware features and types of information collection, and is integrated with Apple's spyware platforms. Apple is not subtle about its spyware- it explains what it does plainly and clearly, so there is no deception about the scope and level of privacy violations committed by its software.</p>
|
||||||
iTunes is a spyware music player developed by Apple that collects an enormous amount of information about its users. iTunes is riddled with numerous spyware features and types of information collection, and is integrated with Apple's spyware platforms. Apple is not subtle about its spyware- it explains what it does plainly and clearly, so there is no deception about the scope and level of privacy violations committed by its software.
|
<h3>iTunes is integrated into the Apple ID spyware platform</h3>
|
||||||
</p>
|
<p>iTunes is integrated with the "Apple ID" spyware platform, which it requires for you to use certain features of the app. This spyware platform collects the following information from you<sup><a href="#s1">[1]</a></sup>:</p>
|
||||||
<h3>iTunes is integrated into the Apple ID spyware platform</h3>
|
<ul>
|
||||||
<p>
|
<li>Name</li>
|
||||||
iTunes is integrated with the "Apple ID" spyware platform, which it requires for you to use certain features of the app.
|
<li>Mailing address</li>
|
||||||
This spyware platform collects the following information from you<sup><a href="#1">[1]</a></sup>:
|
<li>Phone Number</li>
|
||||||
</p>
|
<li>E-Mail address</li>
|
||||||
<ul>
|
<li>Credit card information</li>
|
||||||
<li>Name</li>
|
</ul>
|
||||||
<li>Mailing address</li>
|
<h3>Phoning Home</h3>
|
||||||
<li>Phone Number</li>
|
<p>Whenever you open iTunes, these two requests are immediately made:</p>
|
||||||
<li>E-Mail address</li>
|
<img class="screenshot" src="../images/itunes_spyware1.png" alt="iTunes unsolicited network requests"/>
|
||||||
<li>Credit card information</li>
|
<p><a href="https://support.apple.com/en-us/HT201999">Here</a><sup><a href="#s2">[2]</a></sup> is a list of all of the domains that iTunes will connect too. So, whenever you start up iTunes, you are immediately checked into the botnet. It's not clarified exactly what iTunes is connected to for what reason. The only hint we have comes from this passage in the privacy policy<sup><a href="#s1">[1]</a></sup>:</p>
|
||||||
</ul>
|
<p><i>"We may collect information such as occupation, language, zip code, area code, unique device identifier, referrer URL, location, and the time zone where an Apple product is used so that we can better understand customer behavior and improve our products, services, and advertising."</i></p>
|
||||||
<h3>Phoning Home</h3>
|
<p>So, we can only assume that iTunes is collecting all of this information, or at least as much of it as it can get, from you and sending it back to apple.</p>
|
||||||
<p>
|
<h3>Apple sells your personal information</h3>
|
||||||
Whenever you open iTunes, these two requests are immediately made:
|
<p>Apple is very up-front about this in its privacy policy<sup><a href="#s1">[1]</a></sup>:</p>
|
||||||
</p>
|
<p><i>"Apple shares personal information with companies who provide services such as information processing, extending credit, fulfilling customer orders, delivering products to you, managing and enhancing customer data, providing customer service, assessing your interest in our products and services, and conducting customer research or satisfaction surveys."</i></p>
|
||||||
<img src="../images/itunes_spyware1.png" alt="iTunes unsolicited network requests">
|
<p>So, there can be no illusion or mistake about what happens to the information you provide to iTunes — it will be sold to datamining companies.</p>
|
||||||
<p>
|
</div>
|
||||||
<a href="https://support.apple.com/en-us/HT201999">Here</a><sup><a href="#2">[2]</a></sup> is a list of all of the domains that iTunes will connect too.
|
<hr/>
|
||||||
So, whenever you start up iTunes, you are immediately checked into the botnet. It's not clarified exactly what iTunes is
|
<div class="footer">
|
||||||
connected to for what reason. The only hint we have comes from this passage in the privacy policy<sup><a href="#1">[1]</a></sup>:
|
<div class="sources">
|
||||||
</p>
|
<h4>Sources:</h4>
|
||||||
<p><i>
|
<ol>
|
||||||
"We may collect information such as occupation, language, zip code, area code, unique device identifier, referrer URL, location, and the time zone where an Apple product is used so that we can better understand customer behavior and improve our products, services, and advertising."
|
<li id="s1"><a href="https://www.apple.com/legal/privacy/en-ww/">Apple Privacy Policy</a> <a href="http://webarchive.loc.gov/all/20160817232247/http://www.apple.com/legal/privacy/en-ww/">[webarchive.loc.gov]</a> <a href="https://web.archive.org/web/20180529202128/https://www.apple.com/legal/privacy/en-ww/">[web.archive.org]</a> <a href="http://www.webcitation.org/6xDCQswT1">[www.webcitation.org]</a> <a href="https://webarchive.nrscotland.gov.uk/20170609165052/https://apple.com/legal/privacy/en-ww/">[webarchive.nrscotland.gov.uk]</a> <a href="http://arquivo.pt/wayback/20161102151804/https://www.apple.com/legal/privacy/en-ww/">[arquivo.pt]</a> <a href="http://collection.europarchive.org/nli/20160627122417/http://www.apple.com/legal/privacy/en-ww/">[collection.europarchive.org]</a> <a href="https://archive.is/KdMGe">[archive.is]</a></li>
|
||||||
</i></p>
|
<li id="s2"><a href="https://support.apple.com/en-us/HT201999">About macOS, iOS, and iTunes server host connections and iTunes background processes</a> <a href="https://web.archive.org/web/20180523044139/https://support.apple.com/en-us/HT201999">[web.archive.org]</a> <a href="http://webarchive.loc.gov/all/20160817153143/https://support.apple.com/en-us/HT201999">[webarchive.loc.gov]</a> <a href="https://archive.is/KNtlQ">[archive.is]</a></li>
|
||||||
<p>
|
</ol>
|
||||||
So, we can only assume that iTunes is collecting all of this information, or at least as much of it as it can get, from you and sending it back to apple.
|
</div>
|
||||||
</p>
|
<hr/>
|
||||||
<h3>Apple sells your personal information</h3>
|
<b>This article was last edited on 5/12/2018</b>
|
||||||
<p>
|
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||||
Apple is very up-front about this in its privacy policy<sup><a href="#1">[1]</a></sup>:
|
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||||
</P>
|
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||||
<p><i>
|
</div>
|
||||||
"Apple shares personal information with companies who provide services such as information processing, extending credit, fulfilling customer orders, delivering products to you, managing and enhancing customer data, providing customer service, assessing your interest in our products and services, and conducting customer research or satisfaction surveys."
|
</div>
|
||||||
</i></p>
|
|
||||||
<p>
|
|
||||||
So, there can be no illusion or mistake about what happens to the information you provide to iTunes — it will be sold to datamining companies.
|
|
||||||
</p>
|
|
||||||
|
|
||||||
<hr>
|
|
||||||
<center>
|
|
||||||
<h2>Sources</h2>
|
|
||||||
<p>
|
|
||||||
<a name="1">1.</a>
|
|
||||||
<a href="https://www.apple.com/legal/privacy/en-ww/">Apple Privacy Policy</a>
|
|
||||||
<a href="http://webarchive.loc.gov/all/20160817232247/http://www.apple.com/legal/privacy/en-ww/">[webarchive.loc.gov]</a>
|
|
||||||
<a href="https://web.archive.org/web/20180529202128/https://www.apple.com/legal/privacy/en-ww/">[web.archive.org]</a>
|
|
||||||
<a href="http://www.webcitation.org/6xDCQswT1">[www.webcitation.org]</a>
|
|
||||||
<a href="https://webarchive.nrscotland.gov.uk/20170609165052/https://apple.com/legal/privacy/en-ww/">[webarchive.nrscotland.gov.uk]</a>
|
|
||||||
<a href="http://arquivo.pt/wayback/20161102151804/https://www.apple.com/legal/privacy/en-ww/">[arquivo.pt]</a>
|
|
||||||
<a href="http://collection.europarchive.org/nli/20160627122417/http://www.apple.com/legal/privacy/en-ww/">[collection.europarchive.org]</a>
|
|
||||||
<a href="https://archive.is/KdMGe">[archive.is]</a><br>
|
|
||||||
|
|
||||||
<a name="2">2.</a>
|
|
||||||
<a href="https://support.apple.com/en-us/HT201999">About macOS, iOS, and iTunes server host connections and iTunes background processes</a>
|
|
||||||
<a href="https://web.archive.org/web/20180523044139/https://support.apple.com/en-us/HT201999">[web.archive.org]</a>
|
|
||||||
<a href="http://webarchive.loc.gov/all/20160817153143/https://support.apple.com/en-us/HT201999">[webarchive.loc.gov]</a>
|
|
||||||
<a href="https://archive.is/KNtlQ">[archive.is]</a><br>
|
|
||||||
|
|
||||||
</p>
|
|
||||||
|
|
||||||
|
|
||||||
<hr>
|
|
||||||
<p><b>
|
|
||||||
This article was last edited on 5/12/2018
|
|
||||||
</b></p>
|
|
||||||
<p>
|
|
||||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
|
||||||
</p>
|
|
||||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
|
||||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
|
||||||
</center>
|
|
||||||
</body>
|
</body>
|
||||||
</html>
|
</html>
|
||||||
|
|
|
@ -1,67 +1,56 @@
|
||||||
<!--Old Style-->
|
|
||||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||||
<head>
|
<head>
|
||||||
<link rel="stylesheet" href="../style.css"/>
|
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||||
<meta charset="UTF-8">
|
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||||
<title>Razer — Spyware Watchdog</title>
|
<title>Razer — Spyware Watchdog</title>
|
||||||
|
<link rel="stylesheet" href="../style.css"/>
|
||||||
</head>
|
</head>
|
||||||
<body>
|
<body>
|
||||||
<img src="../images/razer_logo.png">
|
<div class="case">
|
||||||
<h1>Razer</h1>
|
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||||
<p>Razer is a company that makes software and hardware for gamers.</p>
|
<div class="main">
|
||||||
|
<img src="../images/razer_logo.png" alt="Razer Logo"/>
|
||||||
<h2>Spyware level: <b style="color:red;">EXTREMELY HIGH</b></h2>
|
<h1>Razer</h1>
|
||||||
|
<p>Razer is a company that makes software and hardware for gamers.</p>
|
||||||
<h3>Data collection</h3>
|
<h2>Spyware level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||||
<p>Razer confirms that they collect this data:</p>
|
<h3>Data collection</h3>
|
||||||
<ul>
|
<p>Razer confirms that they collect this data:</p>
|
||||||
|
<ul>
|
||||||
<li>E-mail</li>
|
<li>E-mail</li>
|
||||||
<li>Full name</li>
|
<li>Full name</li>
|
||||||
<li>Contact info</li>
|
<li>Contact info</li>
|
||||||
<li>Info you send when you contact them (texts and such)</li>
|
<li>Info you send when you contact them (texts and such)</li>
|
||||||
<li>The time you use their services and products</li>
|
<li>The time you use their services and products</li>
|
||||||
<li>Info you send via polls</li>
|
<li>Info you send via polls</li>
|
||||||
<li>IP, geolocation, OS and browser version</li>
|
<li>IP, geolocation, OS and browser version</li>
|
||||||
</ul>
|
</ul>
|
||||||
|
<p>Razer also admits<sup><a href="#s1">[1]</a><a href="#s2">[2]</a></sup> that they sell users' info. They also claim that the employees can see this data. Razer FORCES you to create an account to use YOUR products.</p>
|
||||||
<p>
|
<img class="screenshot" src="../images/theevidence.png" alt="screenshot"/>
|
||||||
Razer also admits<sup><a href="#1">[1]</a><a href="#2">[2]</a></sup> that they sell users' info. They also claim that the employees can see this data.
|
<p>Where is the option "Sign in later" at? Without an account, you CAN'T configure your keyboard, change your mouse DPI and RGB configuration and such, this means that the configurations you set to your (Razer) peripherals are in somebody else's PC, and Razer knows who has that (your) info.</p>
|
||||||
Razer FORCES you to create an account to use YOUR products.
|
</div>
|
||||||
</p>
|
<hr/>
|
||||||
<img class="screenshot" src="../images/theevidence.png">
|
<div class="footer">
|
||||||
<p>
|
<div class="futher">
|
||||||
Where is the option "Sign in later" at? Without an account, you CAN'T configure your keyboard,
|
<h4>Further reading:</h4>
|
||||||
change your mouse DPI and RGB configuration and such, this means that the configurations you set to your (Razer) peripherals are in somebody
|
<ol>
|
||||||
else's PC, and Razer knows who has that (your) info.
|
<li><a href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a></li>
|
||||||
</p>
|
</ol>
|
||||||
|
</div>
|
||||||
<hr>
|
<hr/>
|
||||||
<center>
|
<div class="sources">
|
||||||
<h2>Further reading</h2>
|
<h4>Sources:</h4>
|
||||||
<a href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a>
|
<ol>
|
||||||
<hr>
|
<li id="s1"><a href="https://www.razer.com/legal/privacy-policy">Razer — Privacy Policy | Razer United States</a> <a href="https://archive.fo/sVOGz">[archive.is]</a></li>
|
||||||
<h2>Credit</h2>
|
<li id="s2"><a href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a> <a href="https://archive.fo/sjgDR">[archive.is]</a></li>
|
||||||
<p>This article was written by:
|
</ol>
|
||||||
<a href="mailto:qorg[@]vxempire.xyz">qorg11</a>
|
</div>
|
||||||
</p>
|
<hr/>
|
||||||
<hr>
|
<b>This article was translated on 3/10/2019</b>
|
||||||
<h2>References</h2>
|
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||||
<p>1. <a id="1" href="https://www.razer.com/legal/privacy-policy">Razer — Privacy Policy | Razer United States</a> <a href="https://archive.fo/sVOGz">[archive.is]</a><br>
|
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||||
2. <a id="2" href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a> <a href="https://archive.fo/sjgDR">[archive.is]</a></p>
|
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||||
|
</div>
|
||||||
<hr>
|
</div>
|
||||||
<p><b>
|
|
||||||
This article was translated on 3/10/2019<br>
|
|
||||||
This is a translation of the Spanish article. It may become outdated in the future. Check the dates on both articles.
|
|
||||||
</b></p>
|
|
||||||
|
|
||||||
<p>
|
|
||||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
|
||||||
</p>
|
|
||||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
|
||||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
|
||||||
</center>
|
|
||||||
</body>
|
</body>
|
||||||
</html>
|
</html>
|
||||||
|
|
|
@ -1,90 +1,62 @@
|
||||||
<!--Old Style-->
|
|
||||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||||
<head>
|
<head>
|
||||||
|
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||||
|
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||||
<link rel="stylesheet" href="../style.css"/>
|
<link rel="stylesheet" href="../style.css"/>
|
||||||
<meta charset="UTF-8">
|
|
||||||
<title>Redshell — Spyware Watchdog</title>
|
<title>Redshell — Spyware Watchdog</title>
|
||||||
</head>
|
</head>
|
||||||
<body>
|
<body>
|
||||||
<img src="../images/redshell_logo.png" alt="redshell Logo">
|
<div class="case">
|
||||||
<h1>Redshell</h1>
|
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||||
<p>
|
<div class="main">
|
||||||
Redshell is a spyware platform that is integrated into many video games.
|
<img src="../images/redshell_logo.png" alt="redshell Logo"/>
|
||||||
</p>
|
<h1>Redshell</h1>
|
||||||
<h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2>
|
<p>Redshell is a spyware platform that is integrated into many video games.</p>
|
||||||
<p>
|
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||||
Redshell is a spyware platform. Its purpose is to collect huge amounts of information about its user's computers
|
<p>Redshell is a spyware platform. Its purpose is to collect huge amounts of information about its user's computers to try and connect marketing data (collected through other spyware platforms) to actual results. It fingerprints any computers it is attached too and phones home. It also collects information about how a player has been interacting with the video game that it is embedded in. It's strongly recommended that any programs that embed this spyware are avoided entirely.</p>
|
||||||
to try and connect marketing data (collected through other spyware platforms) to actual results. It fingerprints
|
<h3>Redshell collects a huge amount of information from its users machines</h3>
|
||||||
any computers it is attached too and phones home. It also collects information about how a player has been interacting
|
<p>Redshell has confirmed that it collects the following information<sup><a href="#s1">[1]</a></sup>:</p>
|
||||||
with the video game that it is embedded in. It's strongly recommended that any programs that embed this spyware are
|
<ul>
|
||||||
avoided entirely.
|
<li>Operating System</li>
|
||||||
</p>
|
<li>Installed Browsers</li>
|
||||||
<h3>Redshell collects a huge amount of information from its users machines</h3>
|
<li>Available Fonts</li>
|
||||||
<p>
|
<li>Screen Resolution</li>
|
||||||
Redshell has confirmed that it collects the following information<sup><a href="#1">[1]</a></sup>:
|
<li>IP Address</li>
|
||||||
</p>
|
<li>Timezone</li>
|
||||||
<ul>
|
<li>System Language</li>
|
||||||
<li>Operating System</li>
|
<li>Game-Specific UUID</li>
|
||||||
<li>Installed Browsers</li>
|
</ul>
|
||||||
<li>Available Fonts</li>
|
<p>This is obviously a very large amount of information being mined. The purpose of this is to fingerprint the user as well as possible, destroying any kind of anonymity. It goes beyond most spyware programs in the information it collects, by scanning your computer for installed programs and collecting various demographic information about the user. It's very clear that this is a huge amount of personal information to be collecting, despite all of the claims on the official website about how innocent this data is.</p>
|
||||||
<li>Screen Resolution</li>
|
<h3>Phoning home</h3>
|
||||||
<li>IP Address</li>
|
<p>Redshell is designed to phone home at its client's (the game developer) whim. Any program using Redshell will phone home with personal information in a way peculiar to that program.</p>
|
||||||
<li>Timezone</li>
|
<h3>Sharing Information with third parties</h3>
|
||||||
<li>System Language</li>
|
<p>Redshell clearly says that it shares any kind of marketing data with third parties<sup><a href="#s1">[1]</a></sup>:</p>
|
||||||
<li>Game-Specific UUID</li>
|
<p><i>"For example: Studio X wants to run ads through Google AdWords. When a potential customer clicks on an that ad, they are sent through our tracking link and redirected to the destination set by the studio (in the same way a bitly link works) — usually their game's Steam page. AdWords provides us with unique id for that user and if they end up playing the game, we tell AdWords so they know the ad was effective."
|
||||||
</ul>
|
</i></p>
|
||||||
<p>
|
<p>Of course, the words "integrated partner" are used to describe these third parties. The bottom line is that other people are being given this information. There is also an important distinction to make when talking about this: as Redshell's spyware is a product, Redshell does not actually have control over what the buyers of that product can do. So, just because Redshell doesn't sell the information its spyware collects about it's users to third parties, that doesn't mean that the buyers of the product do not or will not sell the information that they collect through Redshell to third parties.</p>
|
||||||
This is obviously a very large amount of information being mined. The purpose of this is to fingerprint the user as well
|
</div>
|
||||||
as possible, destroying any kind of anonymity. It goes beyond most spyware programs in the information it collects, by
|
<hr/>
|
||||||
scanning your computer for installed programs and collecting various demographic information about the user. It's very clear
|
<div class="footer">
|
||||||
that this is a huge amount of personal information to be collecting, despite all of the claims on the official website about how
|
<div class="futher">
|
||||||
innocent this data is.
|
<h4>Further Reading:</h4>
|
||||||
<p>
|
<ol>
|
||||||
<h3>Phoning home</h3>
|
<li><a href="https://old.reddit.com/r/Steam/comments/8pud8b/psa_red_shell_spyware_holy_potatoes_were_in_space/">[PSA] RED SHELL Spyware — "Holy Potatoes! We’re in Space?!" integrated and removed it after complaints</a> <a href="https://snew.github.io/r/Steam/comments/8pud8b/">[snew.github.io]</a> <a href="http://archive.is/jwlur">[archive.is]</a></li>
|
||||||
<p>
|
</ol>
|
||||||
Redshell is designed to phone home at its client's (the game developer) whim. Any program using Redshell will phone home with
|
</div>
|
||||||
personal information in a way peculiar to that program.
|
<hr/>
|
||||||
</p>
|
<div class="sources">
|
||||||
<h3>Sharing Information with third parties</h3>
|
<h4>Sources:</h4>
|
||||||
<p>
|
<ol>
|
||||||
Redshell clearly says that it shares any kind of marketing data with third parties<sup><a href="#1">[1]</a></sup>:
|
<li id="s1"><a href="https://www.redshell.io/gamers">Hi there, we're Red Shell.</a> <a href="https://web.archive.org/web/20180710040517/https://redshell.io/gamers">[web.archive.org]</a></li>
|
||||||
</p>
|
</ol>
|
||||||
<p><i>
|
</div>
|
||||||
"For example: Studio X wants to run ads through Google AdWords. When a potential customer clicks on an that ad, they are sent through our tracking link and redirected to the destination set by the studio (in the same way a bitly link works) — usually their game's Steam page. AdWords provides us with unique id for that user and if they end up playing the game, we tell AdWords so they know the ad was effective."
|
<hr/>
|
||||||
</i></p>
|
<b>This article was last edited on 7/16/2018</b>
|
||||||
<p>
|
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||||
Of course, the words "integrated partner" are used to describe these third parties. The bottom line is that other people are being
|
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||||
given this information. There is also an important distinction to make when talking about this: as Redshell's spyware is a product,
|
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||||
Redshell does not actually have control over what the buyers of that product can do. So, just because Redshell doesn't sell the
|
</div>
|
||||||
information its spyware collects about it's users to third parties, that doesn't mean that the buyers of the product do not or
|
</div>
|
||||||
will not sell the information that they collect through Redshell to third parties.
|
|
||||||
</p>
|
|
||||||
<hr>
|
|
||||||
<center>
|
|
||||||
<h3>Further Reading</h3>
|
|
||||||
<p>
|
|
||||||
<a href="https://old.reddit.com/r/Steam/comments/8pud8b/psa_red_shell_spyware_holy_potatoes_were_in_space/">[PSA] RED SHELL Spyware — "Holy Potatoes! We’re in Space?!" integrated and removed it after complaints</a>
|
|
||||||
<a href="https://snew.github.io/r/Steam/comments/8pud8b/">[snew.github.io]</a>
|
|
||||||
<a href="http://archive.is/jwlur">[archive.is]</a>
|
|
||||||
</p>
|
|
||||||
<hr>
|
|
||||||
<h2>Sources</h2>
|
|
||||||
<p>
|
|
||||||
<a name="1">1.</a>
|
|
||||||
<a href="https://www.redshell.io/gamers">Hi there, we're Red Shell.</a>
|
|
||||||
<a href="https://web.archive.org/web/20180710040517/https://redshell.io/gamers">[web.archive.org]</a>
|
|
||||||
<br>
|
|
||||||
</p>
|
|
||||||
<hr>
|
|
||||||
<p><b>
|
|
||||||
This article was last edited on 7/16/2018
|
|
||||||
</b></p>
|
|
||||||
<p>
|
|
||||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
|
||||||
</p>
|
|
||||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
|
||||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
|
||||||
</center>
|
|
||||||
</body>
|
</body>
|
||||||
</html>
|
</html>
|
||||||
|
|
Loading…
Reference in New Issue