Full restyling articles Part 4
This commit is contained in:
parent
8ad3e138eb
commit
60b7dcd6b0
|
@ -1,26 +1,21 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<title>iTunes — Spyware Watchdog</title>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/itunes_logo.png" alt="itunes logo">
|
||||
<div class="case">
|
||||
<div class="main">
|
||||
<img src="../images/itunes_logo.png" alt="itunes logo"/>
|
||||
<h1>iTunes</h1>
|
||||
<p>
|
||||
iTunes is a media player, media library, Internet radio broadcaster, and mobile device management application developed by Apple Inc.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2>
|
||||
<p>
|
||||
iTunes is a spyware music player developed by Apple that collects an enormous amount of information about its users. iTunes is riddled with numerous spyware features and types of information collection, and is integrated with Apple's spyware platforms. Apple is not subtle about its spyware- it explains what it does plainly and clearly, so there is no deception about the scope and level of privacy violations committed by its software.
|
||||
</p>
|
||||
<p>iTunes is a media player, media library, Internet radio broadcaster, and mobile device management application developed by Apple Inc.</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>iTunes is a spyware music player developed by Apple that collects an enormous amount of information about its users. iTunes is riddled with numerous spyware features and types of information collection, and is integrated with Apple's spyware platforms. Apple is not subtle about its spyware- it explains what it does plainly and clearly, so there is no deception about the scope and level of privacy violations committed by its software.</p>
|
||||
<h3>iTunes is integrated into the Apple ID spyware platform</h3>
|
||||
<p>
|
||||
iTunes is integrated with the "Apple ID" spyware platform, which it requires for you to use certain features of the app.
|
||||
This spyware platform collects the following information from you<sup><a href="#1">[1]</a></sup>:
|
||||
</p>
|
||||
<p>iTunes is integrated with the "Apple ID" spyware platform, which it requires for you to use certain features of the app. This spyware platform collects the following information from you<sup><a href="#s1">[1]</a></sup>:</p>
|
||||
<ul>
|
||||
<li>Name</li>
|
||||
<li>Mailing address</li>
|
||||
|
@ -29,64 +24,31 @@ This spyware platform collects the following information from you<sup><a href="#
|
|||
<li>Credit card information</li>
|
||||
</ul>
|
||||
<h3>Phoning Home</h3>
|
||||
<p>
|
||||
Whenever you open iTunes, these two requests are immediately made:
|
||||
</p>
|
||||
<img src="../images/itunes_spyware1.png" alt="iTunes unsolicited network requests">
|
||||
<p>
|
||||
<a href="https://support.apple.com/en-us/HT201999">Here</a><sup><a href="#2">[2]</a></sup> is a list of all of the domains that iTunes will connect too.
|
||||
So, whenever you start up iTunes, you are immediately checked into the botnet. It's not clarified exactly what iTunes is
|
||||
connected to for what reason. The only hint we have comes from this passage in the privacy policy<sup><a href="#1">[1]</a></sup>:
|
||||
</p>
|
||||
<p><i>
|
||||
"We may collect information such as occupation, language, zip code, area code, unique device identifier, referrer URL, location, and the time zone where an Apple product is used so that we can better understand customer behavior and improve our products, services, and advertising."
|
||||
</i></p>
|
||||
<p>
|
||||
So, we can only assume that iTunes is collecting all of this information, or at least as much of it as it can get, from you and sending it back to apple.
|
||||
</p>
|
||||
<p>Whenever you open iTunes, these two requests are immediately made:</p>
|
||||
<img class="screenshot" src="../images/itunes_spyware1.png" alt="iTunes unsolicited network requests"/>
|
||||
<p><a href="https://support.apple.com/en-us/HT201999">Here</a><sup><a href="#s2">[2]</a></sup> is a list of all of the domains that iTunes will connect too. So, whenever you start up iTunes, you are immediately checked into the botnet. It's not clarified exactly what iTunes is connected to for what reason. The only hint we have comes from this passage in the privacy policy<sup><a href="#s1">[1]</a></sup>:</p>
|
||||
<p><i>"We may collect information such as occupation, language, zip code, area code, unique device identifier, referrer URL, location, and the time zone where an Apple product is used so that we can better understand customer behavior and improve our products, services, and advertising."</i></p>
|
||||
<p>So, we can only assume that iTunes is collecting all of this information, or at least as much of it as it can get, from you and sending it back to apple.</p>
|
||||
<h3>Apple sells your personal information</h3>
|
||||
<p>
|
||||
Apple is very up-front about this in its privacy policy<sup><a href="#1">[1]</a></sup>:
|
||||
</P>
|
||||
<p><i>
|
||||
"Apple shares personal information with companies who provide services such as information processing, extending credit, fulfilling customer orders, delivering products to you, managing and enhancing customer data, providing customer service, assessing your interest in our products and services, and conducting customer research or satisfaction surveys."
|
||||
</i></p>
|
||||
<p>
|
||||
So, there can be no illusion or mistake about what happens to the information you provide to iTunes — it will be sold to datamining companies.
|
||||
</p>
|
||||
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://www.apple.com/legal/privacy/en-ww/">Apple Privacy Policy</a>
|
||||
<a href="http://webarchive.loc.gov/all/20160817232247/http://www.apple.com/legal/privacy/en-ww/">[webarchive.loc.gov]</a>
|
||||
<a href="https://web.archive.org/web/20180529202128/https://www.apple.com/legal/privacy/en-ww/">[web.archive.org]</a>
|
||||
<a href="http://www.webcitation.org/6xDCQswT1">[www.webcitation.org]</a>
|
||||
<a href="https://webarchive.nrscotland.gov.uk/20170609165052/https://apple.com/legal/privacy/en-ww/">[webarchive.nrscotland.gov.uk]</a>
|
||||
<a href="http://arquivo.pt/wayback/20161102151804/https://www.apple.com/legal/privacy/en-ww/">[arquivo.pt]</a>
|
||||
<a href="http://collection.europarchive.org/nli/20160627122417/http://www.apple.com/legal/privacy/en-ww/">[collection.europarchive.org]</a>
|
||||
<a href="https://archive.is/KdMGe">[archive.is]</a><br>
|
||||
|
||||
<a name="2">2.</a>
|
||||
<a href="https://support.apple.com/en-us/HT201999">About macOS, iOS, and iTunes server host connections and iTunes background processes</a>
|
||||
<a href="https://web.archive.org/web/20180523044139/https://support.apple.com/en-us/HT201999">[web.archive.org]</a>
|
||||
<a href="http://webarchive.loc.gov/all/20160817153143/https://support.apple.com/en-us/HT201999">[webarchive.loc.gov]</a>
|
||||
<a href="https://archive.is/KNtlQ">[archive.is]</a><br>
|
||||
|
||||
</p>
|
||||
|
||||
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 5/12/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<p>Apple is very up-front about this in its privacy policy<sup><a href="#s1">[1]</a></sup>:</p>
|
||||
<p><i>"Apple shares personal information with companies who provide services such as information processing, extending credit, fulfilling customer orders, delivering products to you, managing and enhancing customer data, providing customer service, assessing your interest in our products and services, and conducting customer research or satisfaction surveys."</i></p>
|
||||
<p>So, there can be no illusion or mistake about what happens to the information you provide to iTunes — it will be sold to datamining companies.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://www.apple.com/legal/privacy/en-ww/">Apple Privacy Policy</a> <a href="http://webarchive.loc.gov/all/20160817232247/http://www.apple.com/legal/privacy/en-ww/">[webarchive.loc.gov]</a> <a href="https://web.archive.org/web/20180529202128/https://www.apple.com/legal/privacy/en-ww/">[web.archive.org]</a> <a href="http://www.webcitation.org/6xDCQswT1">[www.webcitation.org]</a> <a href="https://webarchive.nrscotland.gov.uk/20170609165052/https://apple.com/legal/privacy/en-ww/">[webarchive.nrscotland.gov.uk]</a> <a href="http://arquivo.pt/wayback/20161102151804/https://www.apple.com/legal/privacy/en-ww/">[arquivo.pt]</a> <a href="http://collection.europarchive.org/nli/20160627122417/http://www.apple.com/legal/privacy/en-ww/">[collection.europarchive.org]</a> <a href="https://archive.is/KdMGe">[archive.is]</a></li>
|
||||
<li id="s2"><a href="https://support.apple.com/en-us/HT201999">About macOS, iOS, and iTunes server host connections and iTunes background processes</a> <a href="https://web.archive.org/web/20180523044139/https://support.apple.com/en-us/HT201999">[web.archive.org]</a> <a href="http://webarchive.loc.gov/all/20160817153143/https://support.apple.com/en-us/HT201999">[webarchive.loc.gov]</a> <a href="https://archive.is/KNtlQ">[archive.is]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 5/12/2018</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,22 +1,22 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<title>Razer — Spyware Watchdog</title>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/razer_logo.png">
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/razer_logo.png" alt="Razer Logo"/>
|
||||
<h1>Razer</h1>
|
||||
<p>Razer is a company that makes software and hardware for gamers.</p>
|
||||
|
||||
<h2>Spyware level: <b style="color:red;">EXTREMELY HIGH</b></h2>
|
||||
|
||||
<h2>Spyware level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<h3>Data collection</h3>
|
||||
<p>Razer confirms that they collect this data:</p>
|
||||
<ul>
|
||||
|
||||
<li>E-mail</li>
|
||||
<li>Full name</li>
|
||||
<li>Contact info</li>
|
||||
|
@ -25,43 +25,32 @@
|
|||
<li>Info you send via polls</li>
|
||||
<li>IP, geolocation, OS and browser version</li>
|
||||
</ul>
|
||||
|
||||
<p>
|
||||
Razer also admits<sup><a href="#1">[1]</a><a href="#2">[2]</a></sup> that they sell users' info. They also claim that the employees can see this data.
|
||||
Razer FORCES you to create an account to use YOUR products.
|
||||
</p>
|
||||
<img class="screenshot" src="../images/theevidence.png">
|
||||
<p>
|
||||
Where is the option "Sign in later" at? Without an account, you CAN'T configure your keyboard,
|
||||
change your mouse DPI and RGB configuration and such, this means that the configurations you set to your (Razer) peripherals are in somebody
|
||||
else's PC, and Razer knows who has that (your) info.
|
||||
</p>
|
||||
|
||||
<hr>
|
||||
<center>
|
||||
<h2>Further reading</h2>
|
||||
<a href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a>
|
||||
<hr>
|
||||
<h2>Credit</h2>
|
||||
<p>This article was written by:
|
||||
<a href="mailto:qorg[@]vxempire.xyz">qorg11</a>
|
||||
</p>
|
||||
<hr>
|
||||
<h2>References</h2>
|
||||
<p>1. <a id="1" href="https://www.razer.com/legal/privacy-policy">Razer — Privacy Policy | Razer United States</a> <a href="https://archive.fo/sVOGz">[archive.is]</a><br>
|
||||
2. <a id="2" href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a> <a href="https://archive.fo/sjgDR">[archive.is]</a></p>
|
||||
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was translated on 3/10/2019<br>
|
||||
This is a translation of the Spanish article. It may become outdated in the future. Check the dates on both articles.
|
||||
</b></p>
|
||||
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<p>Razer also admits<sup><a href="#s1">[1]</a><a href="#s2">[2]</a></sup> that they sell users' info. They also claim that the employees can see this data. Razer FORCES you to create an account to use YOUR products.</p>
|
||||
<img class="screenshot" src="../images/theevidence.png" alt="screenshot"/>
|
||||
<p>Where is the option "Sign in later" at? Without an account, you CAN'T configure your keyboard, change your mouse DPI and RGB configuration and such, this means that the configurations you set to your (Razer) peripherals are in somebody else's PC, and Razer knows who has that (your) info.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Further reading:</h4>
|
||||
<ol>
|
||||
<li><a href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://www.razer.com/legal/privacy-policy">Razer — Privacy Policy | Razer United States</a> <a href="https://archive.fo/sVOGz">[archive.is]</a></li>
|
||||
<li id="s2"><a href="http://wp.xin.at/archives/1438">The Razer Synapse 2.0 spy ware</a> <a href="https://archive.fo/sjgDR">[archive.is]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was translated on 3/10/2019</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
|
@ -1,29 +1,22 @@
|
|||
<!--Old Style-->
|
||||
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
|
||||
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
|
||||
<head>
|
||||
<meta http-equiv="Content-type" content="application/xhtml+xml;charset=utf-8"/>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1"/>
|
||||
<link rel="stylesheet" href="../style.css"/>
|
||||
<meta charset="UTF-8">
|
||||
<title>Redshell — Spyware Watchdog</title>
|
||||
</head>
|
||||
<body>
|
||||
<img src="../images/redshell_logo.png" alt="redshell Logo">
|
||||
<div class="case">
|
||||
<div class="nav"><a href="index.html">← Catalog</a></div>
|
||||
<div class="main">
|
||||
<img src="../images/redshell_logo.png" alt="redshell Logo"/>
|
||||
<h1>Redshell</h1>
|
||||
<p>
|
||||
Redshell is a spyware platform that is integrated into many video games.
|
||||
</p>
|
||||
<h2>Spyware Level: <font color=red>EXTREMELY HIGH</font></h2>
|
||||
<p>
|
||||
Redshell is a spyware platform. Its purpose is to collect huge amounts of information about its user's computers
|
||||
to try and connect marketing data (collected through other spyware platforms) to actual results. It fingerprints
|
||||
any computers it is attached too and phones home. It also collects information about how a player has been interacting
|
||||
with the video game that it is embedded in. It's strongly recommended that any programs that embed this spyware are
|
||||
avoided entirely.
|
||||
</p>
|
||||
<p>Redshell is a spyware platform that is integrated into many video games.</p>
|
||||
<h2>Spyware Level: <span class="red">EXTREMELY HIGH</span></h2>
|
||||
<p>Redshell is a spyware platform. Its purpose is to collect huge amounts of information about its user's computers to try and connect marketing data (collected through other spyware platforms) to actual results. It fingerprints any computers it is attached too and phones home. It also collects information about how a player has been interacting with the video game that it is embedded in. It's strongly recommended that any programs that embed this spyware are avoided entirely.</p>
|
||||
<h3>Redshell collects a huge amount of information from its users machines</h3>
|
||||
<p>
|
||||
Redshell has confirmed that it collects the following information<sup><a href="#1">[1]</a></sup>:
|
||||
</p>
|
||||
<p>Redshell has confirmed that it collects the following information<sup><a href="#s1">[1]</a></sup>:</p>
|
||||
<ul>
|
||||
<li>Operating System</li>
|
||||
<li>Installed Browsers</li>
|
||||
|
@ -34,57 +27,36 @@ avoided entirely.
|
|||
<li>System Language</li>
|
||||
<li>Game-Specific UUID</li>
|
||||
</ul>
|
||||
<p>
|
||||
This is obviously a very large amount of information being mined. The purpose of this is to fingerprint the user as well
|
||||
as possible, destroying any kind of anonymity. It goes beyond most spyware programs in the information it collects, by
|
||||
scanning your computer for installed programs and collecting various demographic information about the user. It's very clear
|
||||
that this is a huge amount of personal information to be collecting, despite all of the claims on the official website about how
|
||||
innocent this data is.
|
||||
<p>
|
||||
<p>This is obviously a very large amount of information being mined. The purpose of this is to fingerprint the user as well as possible, destroying any kind of anonymity. It goes beyond most spyware programs in the information it collects, by scanning your computer for installed programs and collecting various demographic information about the user. It's very clear that this is a huge amount of personal information to be collecting, despite all of the claims on the official website about how innocent this data is.</p>
|
||||
<h3>Phoning home</h3>
|
||||
<p>
|
||||
Redshell is designed to phone home at its client's (the game developer) whim. Any program using Redshell will phone home with
|
||||
personal information in a way peculiar to that program.
|
||||
</p>
|
||||
<p>Redshell is designed to phone home at its client's (the game developer) whim. Any program using Redshell will phone home with personal information in a way peculiar to that program.</p>
|
||||
<h3>Sharing Information with third parties</h3>
|
||||
<p>
|
||||
Redshell clearly says that it shares any kind of marketing data with third parties<sup><a href="#1">[1]</a></sup>:
|
||||
</p>
|
||||
<p><i>
|
||||
"For example: Studio X wants to run ads through Google AdWords. When a potential customer clicks on an that ad, they are sent through our tracking link and redirected to the destination set by the studio (in the same way a bitly link works) — usually their game's Steam page. AdWords provides us with unique id for that user and if they end up playing the game, we tell AdWords so they know the ad was effective."
|
||||
<p>Redshell clearly says that it shares any kind of marketing data with third parties<sup><a href="#s1">[1]</a></sup>:</p>
|
||||
<p><i>"For example: Studio X wants to run ads through Google AdWords. When a potential customer clicks on an that ad, they are sent through our tracking link and redirected to the destination set by the studio (in the same way a bitly link works) — usually their game's Steam page. AdWords provides us with unique id for that user and if they end up playing the game, we tell AdWords so they know the ad was effective."
|
||||
</i></p>
|
||||
<p>
|
||||
Of course, the words "integrated partner" are used to describe these third parties. The bottom line is that other people are being
|
||||
given this information. There is also an important distinction to make when talking about this: as Redshell's spyware is a product,
|
||||
Redshell does not actually have control over what the buyers of that product can do. So, just because Redshell doesn't sell the
|
||||
information its spyware collects about it's users to third parties, that doesn't mean that the buyers of the product do not or
|
||||
will not sell the information that they collect through Redshell to third parties.
|
||||
</p>
|
||||
<hr>
|
||||
<center>
|
||||
<h3>Further Reading</h3>
|
||||
<p>
|
||||
<a href="https://old.reddit.com/r/Steam/comments/8pud8b/psa_red_shell_spyware_holy_potatoes_were_in_space/">[PSA] RED SHELL Spyware — "Holy Potatoes! We’re in Space?!" integrated and removed it after complaints</a>
|
||||
<a href="https://snew.github.io/r/Steam/comments/8pud8b/">[snew.github.io]</a>
|
||||
<a href="http://archive.is/jwlur">[archive.is]</a>
|
||||
</p>
|
||||
<hr>
|
||||
<h2>Sources</h2>
|
||||
<p>
|
||||
<a name="1">1.</a>
|
||||
<a href="https://www.redshell.io/gamers">Hi there, we're Red Shell.</a>
|
||||
<a href="https://web.archive.org/web/20180710040517/https://redshell.io/gamers">[web.archive.org]</a>
|
||||
<br>
|
||||
</p>
|
||||
<hr>
|
||||
<p><b>
|
||||
This article was last edited on 7/16/2018
|
||||
</b></p>
|
||||
<p>
|
||||
If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>. All contributions must be licensed under the CC0 license to be accepted.
|
||||
</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"></a>
|
||||
<p><a href="../articles/index.html">Back to catalog</a></p>
|
||||
</center>
|
||||
<p>Of course, the words "integrated partner" are used to describe these third parties. The bottom line is that other people are being given this information. There is also an important distinction to make when talking about this: as Redshell's spyware is a product, Redshell does not actually have control over what the buyers of that product can do. So, just because Redshell doesn't sell the information its spyware collects about it's users to third parties, that doesn't mean that the buyers of the product do not or will not sell the information that they collect through Redshell to third parties.</p>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="footer">
|
||||
<div class="futher">
|
||||
<h4>Further Reading:</h4>
|
||||
<ol>
|
||||
<li><a href="https://old.reddit.com/r/Steam/comments/8pud8b/psa_red_shell_spyware_holy_potatoes_were_in_space/">[PSA] RED SHELL Spyware — "Holy Potatoes! We’re in Space?!" integrated and removed it after complaints</a> <a href="https://snew.github.io/r/Steam/comments/8pud8b/">[snew.github.io]</a> <a href="http://archive.is/jwlur">[archive.is]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<div class="sources">
|
||||
<h4>Sources:</h4>
|
||||
<ol>
|
||||
<li id="s1"><a href="https://www.redshell.io/gamers">Hi there, we're Red Shell.</a> <a href="https://web.archive.org/web/20180710040517/https://redshell.io/gamers">[web.archive.org]</a></li>
|
||||
</ol>
|
||||
</div>
|
||||
<hr/>
|
||||
<b>This article was last edited on 7/16/2018</b>
|
||||
<p>If you want to edit this article, or contribute your own article(s), visit us at the git repo on <a href="https://codeberg.org/shadow/SpywareWatchdog">Codeberg</a>.</p>
|
||||
<p>All contributions must be licensed under the CC0 license to be accepted.</p>
|
||||
<a href="../LICENSE.txt"><img class="icon" src="../images/cc0.png" alt="CC0 License"/></a>
|
||||
</div>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
|
|
Loading…
Reference in New Issue